Secure short message service (SMS) communications
First Claim
1. A system, comprising:
- a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising;
receiving, by a cryptography application of a user device from a text messaging application of the user device, a request to encrypt a message for sending to a remote device;
applying, by the cryptography application, a message authentication code (MAC) function to a device identifier of the user device and a variable negotiated between the user device and the remote device;
generating, by the cryptography application, a MAC value based on the applying;
encrypting, by the cryptography application, the message using an encryption key generated based on at least one of the device identifier or the variable;
passing, by the cryptography application, the encrypted message and the MAC value to the text messaging application; and
causing the text messaging application to transmit the encrypted message along with the MAC value to the remote device over a network, wherein the MAC value enables at least one of the message or a user of the user device to be authenticated by the remote device based on the MAC value.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and computer program products for providing secure messaging communications are disclosed. For example, a computer-implemented method may include receiving an encrypted message and a key from a sender associated with a first computing device where the encrypted message is generated by the first computing device, verifying the received key at least in part based on a comparison with a pre-determined key, processing one or more unique factors associated with the sender in view of verifying the received key, decrypting the encrypted message, re-encrypting a result of the decrypting using a key of a receiver associated with a second computing device, and sending the re-encrypted result to the receiver associated with the second computing device.
31 Citations
20 Claims
-
1. A system, comprising:
-
a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising; receiving, by a cryptography application of a user device from a text messaging application of the user device, a request to encrypt a message for sending to a remote device; applying, by the cryptography application, a message authentication code (MAC) function to a device identifier of the user device and a variable negotiated between the user device and the remote device; generating, by the cryptography application, a MAC value based on the applying; encrypting, by the cryptography application, the message using an encryption key generated based on at least one of the device identifier or the variable; passing, by the cryptography application, the encrypted message and the MAC value to the text messaging application; and causing the text messaging application to transmit the encrypted message along with the MAC value to the remote device over a network, wherein the MAC value enables at least one of the message or a user of the user device to be authenticated by the remote device based on the MAC value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, by a cryptography application of a user device from a text messaging application of the user device, a request to encrypt a message for sending to a remote device; applying, by the cryptography application, a message authentication code (MAC) function to a device identifier of the user device and a variable agreed upon between the user device and the remote device; generating, by the cryptography application, a MAC value based on the applying; encrypting, by the cryptography application, the message using an encryption key; passing, by the cryptography application, the encrypted message and the MAC value to the text messaging application; and transmitting, by the user device, the encrypted message along with the MAC value to the remote device over a network. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
receiving, by a cryptography component of the machine from a text messaging component of the machine, a request to encrypt a message for sending to a remote device; applying, by the cryptography component, a message authentication code (MAC) function to a device identifier of the machine and a variable negotiated between the machine and the remote device; generating, by the cryptography component, a MAC value based on the applying; encrypting, by the cryptography component, the message using an encryption key generated based on at least one of the device identifier or the variable; passing, by the cryptography component, the encrypted message and the MAC value to the text messaging component via a physical connection; and causing the text messaging component to transmit the encrypted message along with the MAC value to the remote device over a network. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification