Enhanced message security
First Claim
1. A secure messaging system, comprising:
- a message source and a message recipient, communicatively linked to one another through a computer communications network;
a pervasive computing device personally associated with said message recipient;
at least one token which uniquely identifies said pervasive computing device;
a first wireless communications receiver/transmitter disposed in said message recipient, and a second wireless communications receiver/transmitter disposed in said pervasive computing device;
an encryption engine associated with said message source which has been configured to encrypt messages intended for said message recipient with said at least one token; and
, a decryption engine associated with said message recipient which has been configured to decrypt said messages with said at least one token only when a wireless link has been established between said first and second wireless receiver/transmitters.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure messaging system and method. The method can include the steps of receiving an encrypted message, the message having been encrypted using a token of a corresponding pervasive device; wirelessly verifying the presence of the pervasive device; and, if the presence can be verified, decrypting the message using the token. The verification step can include the steps of establishing a wireless link with the pervasive device; and, querying the pervasive device over the wireless link. In particular, the establishing step can include the step of establishing a Bluetooth link with the pervasive device. Furthermore, the querying step can include the step of requesting geographic coordinates which locate the pervasive device.
-
Citations
16 Claims
-
1. A secure messaging system, comprising:
-
a message source and a message recipient, communicatively linked to one another through a computer communications network;
a pervasive computing device personally associated with said message recipient;
at least one token which uniquely identifies said pervasive computing device;
a first wireless communications receiver/transmitter disposed in said message recipient, and a second wireless communications receiver/transmitter disposed in said pervasive computing device;
an encryption engine associated with said message source which has been configured to encrypt messages intended for said message recipient with said at least one token; and
,a decryption engine associated with said message recipient which has been configured to decrypt said messages with said at least one token only when a wireless link has been established between said first and second wireless receiver/transmitters. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A secure messaging method, the method comprising the steps of:
-
receiving an encrypted message, said message having been encrypted using a token of a corresponding pervasive device;
wirelessly verifying the presence of said pervasive device; and
,if said presence can be verified, decrypting said message using said token. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A machine readable storage having stored thereon a computer program for secured messaging, said computer program comprising a routine set of instructions for causing the machine to perform the steps of:
-
receiving an encrypted message, said message having been encrypted using a token of a corresponding pervasive device;
wirelessly verifying the presence of said pervasive device; and
,if said presence can be verified, decrypting said message using said token. - View Dependent Claims (13, 14, 15, 16)
-
Specification