×

System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient

  • US 20050257057A1
  • Filed: 05/12/2004
  • Published: 11/17/2005
  • Est. Priority Date: 05/12/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method of exchanging PKI compliant messages between a sender and one or more recipients, whereby the sender is associated with a sender computer and each of the one or more recipients is associated with a recipient computer, whereby the sender does not have access to the PKI credentials of at least one of the one or more recipients, said at least one of the one or more recipients corresponding to a non-credentialed recipient, the method comprising the steps of:

  • (a) Activating a Public Key Cryptography utility linked to a browser or a client communication program, or forming part of the browser or the client communication program, the Public Key Cryptography utility being operable to perform one or more cryptographic operations consisting of encrypting/decrypting data, authenticating data, and/or authenticating a sender, decrypting and/or verifying data, the Public Key Cryptography utility thereby performing one or more of such cryptographic operations so as to create an encrypted message;

    (b) Sender sending the encrypted message to the non-credentialed recipient;

    (c) The Public Key Cryptography utility in response to (b);

    (i) identifying that the sender does not have access to the PKI credentials of the non-credentialed recipient; and

    (ii) thereby initiating the creation of a secret shared between the sender and the non-credentialed recipient; and

    (d) The non-credentialed recipient using the shared secret to either;

    (i) Obtain the encrypted message in a decrypted form in a secure session with a trusted intermediary;

    or (ii) Activate a further Public Key Cryptography utility on the recipient computer of the non-credentialed recipient or on a server computer, so as to access a private key linked to the encrypted message thereby enabling the Public Key Cryptography utility to decrypt the encrypted message.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×