Secure peer-to-peer messaging invitation architecture
First Claim
1. A method of securely exchanging personal identification numbers between a first mobile device and a second mobile device in a system including a wireless network and a routing server coupled to the wireless network, each mobile device having one or more communications applications and each mobile device further having a messaging application, the first mobile device having a first personal identification number and the second mobile device having a second personal identification number, the method comprising the steps of:
- encrypting the first personal identification number;
sending said encrypted first personal identification number from the first mobile device to the second mobile device using one of the communication applications;
decrypting said encrypted first personal identification number and storing the first personal identification number in a memory on the second mobile device;
encrypting the second personal identification number;
sending said encrypted second personal identification number from the second mobile device to the first mobile device using one of the communication applications; and
decrypting said encrypted second personal identification number and storing the second personal identification number in a memory on the first mobile device, whereby peer-to-peer messages are exchanged between the first mobile device and the second mobile device using said messaging applications, and wherein each peer-to-peer message contains one of the personal identification numbers and each peer-to-peer message is routed by the routing server based upon said one of the personal identification numbers.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and methods providing immediate peer-to-peer messaging between mobile devices in a wireless system. An invitation architecture is disclosed which enables the exchange of personal identification numbers (PINs) without requiring a user to directly access or provide his or her PIN. A messaging application encrypts its associated PIN before providing it to a messaging application on another mobile device through an existing communication application. The invitation architecture automatically manages the encryption, any requisite key exchanges, the composition of invitation and acceptance messages, and the decryption and storage of PINs.
102 Citations
31 Claims
-
1. A method of securely exchanging personal identification numbers between a first mobile device and a second mobile device in a system including a wireless network and a routing server coupled to the wireless network, each mobile device having one or more communications applications and each mobile device further having a messaging application, the first mobile device having a first personal identification number and the second mobile device having a second personal identification number, the method comprising the steps of:
-
encrypting the first personal identification number;
sending said encrypted first personal identification number from the first mobile device to the second mobile device using one of the communication applications;
decrypting said encrypted first personal identification number and storing the first personal identification number in a memory on the second mobile device;
encrypting the second personal identification number;
sending said encrypted second personal identification number from the second mobile device to the first mobile device using one of the communication applications; and
decrypting said encrypted second personal identification number and storing the second personal identification number in a memory on the first mobile device, whereby peer-to-peer messages are exchanged between the first mobile device and the second mobile device using said messaging applications, and wherein each peer-to-peer message contains one of the personal identification numbers and each peer-to-peer message is routed by the routing server based upon said one of the personal identification numbers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A peer-to-peer messaging system including a plurality of mobile devices, a wireless network, and a routing server coupled to the wireless network, each mobile device having one or more communication applications and each mobile device comprising:
-
a memory storing a first personal identification number; and
a messaging application, said messaging application including an encryption component for encrypting said first personal identification number and for embedding said encrypted first personal identification number into a communication for transmission to another mobile device using one of said communication applications, a decryption component for receiving an incoming communication from said another mobile device via said one of said communication applications, said incoming communication including an encrypted second personal identification number, and for extracting and decrypting said encrypted second personal identification number, a contact management component for automatically managing the exchange of invitations and acceptances with said another mobile device using said one of said communication applications, and a messaging component for sending and receiving peer-to-peer messages, whereby said peer-to-peer messages each include one of said personal identification numbers, and wherein said peer-to-peer messages are routed by the routing server based upon said one of said personal identification numbers. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A mobile device for engaging in peer-to-peer messaging with other mobile devices over a wireless network, the wireless network including a routing server, the mobile device comprising:
-
a communications subsystem for engaging in wireless communication with the wireless network;
memory, said memory storing a first personal identification number;
a processor connected to said memory and to said communications subsystem for controlling operation of said communications subsystem;
a communication application for composing and sending communications to the other mobile devices;
a messaging application, said messaging application including an encryption component for encrypting said first personal identification number and for embedding said encrypted first personal identification number into a communication for transmission to another mobile device using said communication application, a decryption component for receiving an incoming message from said another mobile device via said communication application, said incoming message including an encrypted second personal identification number, and for extracting and decrypting said encrypted second personal identification number, a contact management component for automatically managing the exchange of invitations and acceptances with said another mobile device using said communication applications, and a messaging component for sending and receiving peer-to-peer messages, whereby said peer-to-peer messages each include one of said personal identification numbers, and wherein said peer-to-peer messages are routed by the routing server based upon said one of said personal identification numbers. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification