Digital security bubble
First Claim
Patent Images
1. A method for transmitting an encrypted encapsulation, the method comprising:
- requesting, by a first device, an identifier associated with a first recipient from a first server;
encrypting, by the first device, a communication using a first key;
encrypting, by the first device, the first key using a second key associated with the first recipient, wherein the second key is obtained from the first server;
encapsulating the encrypted communication, the encrypted first key, and the identifier in an encrypted encapsulation; and
transmitting the encrypted encapsulation to the first recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
A digital security bubble encapsulation is disclosed. A public key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a symmetric key. The symmetric key is encrypted with a public key received in response to the request. The encrypted message, the encrypted symmetric key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.
-
Citations
19 Claims
-
1. A method for transmitting an encrypted encapsulation, the method comprising:
-
requesting, by a first device, an identifier associated with a first recipient from a first server; encrypting, by the first device, a communication using a first key; encrypting, by the first device, the first key using a second key associated with the first recipient, wherein the second key is obtained from the first server; encapsulating the encrypted communication, the encrypted first key, and the identifier in an encrypted encapsulation; and transmitting the encrypted encapsulation to the first recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium comprising instructions that, when executed by at least one processor, perform the steps of:
-
requesting an identifier associated with a first recipient from a first server; encrypting a communication using a first key; encrypting the first key using a second key associated with the first recipient, wherein the second key is obtained from the first server; encapsulating the encrypted communication, the encrypted first key, and the identifier in an encrypted encapsulation; and transmitting the encrypted encapsulation to the first recipient.
-
-
11. A system for transmitting an encrypted encapsulation, the system comprising:
-
a processor configured to; request an identifier associated with a first recipient from a first server; encrypt a communication using a first key; encrypt the first key using a second key associated with the first recipient, wherein the second key is obtained from the first server; encapsulate the encrypted communication, the encrypted first key, and the identifier in an encrypted encapsulation; and transmit the encrypted encapsulation to the first recipient; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification