Message deciphering method, system and article
First Claim
Patent Images
1. A method for decrypting encrypted messages sent by a transmission device to a first electronic device associated with a first trusted authority and to a second electronic device, the method comprising the steps of:
- a) associating a single joint identity with the first and the second electronic devices which is identificative of a common entity comprising the first and the second electronic devices;
b) executing, by the transmission device, a single encryption operation of a message in clear by using the joint identity and transmitting the encrypted message simultaneously to the first and the second electronic devices;
c) generating, by the first and the second electronic devices a first and a second decryption token, respectively, said tokens being obtained on the basis of quantities provided by at least said first trusted authority;
d) providing said first token to the second electronic device and said second token to the first electronic device; and
e) generating, by starting from said tokens, by the first and second electronic devices, a joint decryption key in order to decrypt the encrypted message.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for decrypting the encrypted messages sent by a transmission device to a first electronic device associated with a first trusted authority and to a second electronic device (ME). In one embodiment, first and second tokens are generated and exchanged, respectively, by the first and second electronic devices, which then generate a joint decryption key in order to decrypt the encrypted message.
42 Citations
39 Claims
-
1. A method for decrypting encrypted messages sent by a transmission device to a first electronic device associated with a first trusted authority and to a second electronic device, the method comprising the steps of:
-
a) associating a single joint identity with the first and the second electronic devices which is identificative of a common entity comprising the first and the second electronic devices;
b) executing, by the transmission device, a single encryption operation of a message in clear by using the joint identity and transmitting the encrypted message simultaneously to the first and the second electronic devices;
c) generating, by the first and the second electronic devices a first and a second decryption token, respectively, said tokens being obtained on the basis of quantities provided by at least said first trusted authority;
d) providing said first token to the second electronic device and said second token to the first electronic device; and
e) generating, by starting from said tokens, by the first and second electronic devices, a joint decryption key in order to decrypt the encrypted message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A communication system, comprising:
-
a first electronic device; and
a second electronic device communicatively coupled to the first electronic device, wherein;
the first and second electronic devices form a common entity configured to receive an encrypted message and decryption information;
the first electronic device is configured to generate a first decryption token based at least in part on the decryption information and to provide the first decryption token to the second electronic device;
the second electronic device is configured to generate a second decryption token based at least in part on the decryption information and to provide the second decryption token to the first electronic device; and
the common entity is configured to generate a joint decryption key for decrypting the encrypted message based at least in part on the first and second decryption tokens. - View Dependent Claims (24, 25, 26)
-
-
27. The communication system of 25, wherein a first identity is associated with the first electronic device, a second identity is associated with the second electronic device and the communication system is configured to generate a first public key by applying a first hash function to the first identity and a second public key by applying the first hash function to the second identity.
-
28. A common entity, comprising:
- means for receiving an encrypted message;
means for receiving encryption information;
a first electronic device having means for generating a first decryption token based at least in part on the received encryption information;
a second electronic device coupled to the first electronic device and having means for generating a second decryption token based at least in part on the received decryption information; and
means for generating a joint decryption key based at least in part on the first and second decryption tokens. - View Dependent Claims (29, 30)
- means for receiving an encrypted message;
-
31. A method of decrypting an encrypted message, comprising:
-
receiving an encrypted message directed to a common entity;
receiving decryption information associated with the common entity;
generating a first decryption token based at least in part on the received decryption information;
receiving a second decryption token; and
generating a joint decryption key based at least in part on the first and second decryption tokens. - View Dependent Claims (32, 33)
-
-
34. An electronic device, comprising:
-
means for receiving an encrypted message directed to the electronic device and to a second electronic device;
means for receiving decryption information from a first trusted authority;
means for generating a first decryption token based at least in part on received decryption information;
means for transmitting the first decryption token to the second electronic device;
means for receiving a second decryption token from the second electronic device; and
means for generating a joint decryption key based at least in part on the first and second decryption tokens. - View Dependent Claims (35, 36)
-
-
37. A computer readable-media storing-instructions for causing an electronic device to:
-
receive an encrypted message directed to a common entity;
receive decryption information associated with the common entity;
generate a first decryption token based at least in part on the received decryption information;
receive a second decryption token; and
generate a joint decryption key based at least in part on the first and second decryption tokens. - View Dependent Claims (38, 39)
-
Specification