Data encryption system and method
First Claim
1. A system for communicating encrypted messages, comprising:
- memory for storing a data file; and
a decryption application configured to authenticate a user and to receive a data packet, the data packet having a data message encrypted via an encrypted encryption key that is embedded within the data packet, the decryption application configured to decrypt the data message based on the embedded encryption key and to interface the decrypted data message with the user if the user is authenticated by the decryption application, wherein the decryption application is configured to recover the encryption key and to decrypt the data message based on data within the data packet and based on data within the data file, and wherein the decryption application controls access to the data within the data file based on whether the user is authenticated by the decryption application.
1 Assignment
0 Petitions
Accused Products
Abstract
An encryption system comprises memory for storing a data file and a decryption application. The decryption application is configured to authenticate a user and to receive a data packet. The data packet has a data message encrypted via an encrypted encryption key that is embedded within the data packet. The decryption application is configured to decrypt the data message based on the embedded encryption key and to interface the decrypted data message with the user if the user is authenticated by the decryption application. The decryption application is configured to recover the encryption key and to decrypt the data message based on data within the data packet and based on data within the data file, and the decryption application controls access to the data within the data file based on whether the user is authenticated by the decryption application.
71 Citations
29 Claims
-
1. A system for communicating encrypted messages, comprising:
-
memory for storing a data file; and
a decryption application configured to authenticate a user and to receive a data packet, the data packet having a data message encrypted via an encrypted encryption key that is embedded within the data packet, the decryption application configured to decrypt the data message based on the embedded encryption key and to interface the decrypted data message with the user if the user is authenticated by the decryption application, wherein the decryption application is configured to recover the encryption key and to decrypt the data message based on data within the data packet and based on data within the data file, and wherein the decryption application controls access to the data within the data file based on whether the user is authenticated by the decryption application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for communicating encrypted messages, comprising:
-
means for storing a data file;
means for receiving a data packet, the data packet having a data message and an encrypted encryption key, the data message encrypted via the encrypted encryption key, the data packet also having data that enables decryption of the encrypted encryption key;
means for authenticating a user;
means for accessing data within the data file if the user is authenticated via the authenticating step;
means for decrypting the encrypted encryption key based on the data that enables decryption of the encrypted encryption key;
means for decrypting the data message based on the encryption key;
means for interfacing the decrypted data message with the user; and
means for enabling at least one of the decrypting the data message means and the interfacing means based on the data accessed via the accessing.
-
-
16. A computer readable medium having a program, the program comprising:
-
logic receiving a data packet, the data packet having a data message and an encrypted encryption key, the data message encrypted via the encrypted encryption key, the data packet also having data that enables decryption of the encrypted encryption key;
logic for authenticating a user;
logic for accessing data within a data file if the user is authenticated via the authenticating step;
logic for decrypting the encrypted encryption key based on the data that enables decryption of the encrypted encryption key;
logic for decrypting the data message based on the encryption key;
logic for interfacing the decrypted data message with the user; and
logic for enabling at least one of the logic for decrypting the data message and the logic for interfacing based on the data accessed via the accessing.
-
-
17. A method for communicating encrypted messages, comprising the steps of:
-
storing a data file;
receiving a data packet, the data packet having a data message and an encrypted encryption key, the data message encrypted via the encrypted encryption key, the data packet also having data that enables decryption of the encrypted encryption key;
authenticating a user;
accessing data within the data file if the user is authenticated via the authenticating step;
decrypting the encrypted encryption key based on the data that enables decryption of the encrypted encryption key;
decrypting the data message based on the encryption key;
interfacing the decrypted data message with the user; and
enabling at least one of the decrypting the data message step and the interfacing step based on the data accessed via the accessing. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification