Asynchronous encryption for secured electronic communications
First Claim
1. An asynchronous electronic communication method comprising:
- receiving, from a sender of a message, an initiation request for authentication;
generating an asymmetric key set having a key reference and comprising a private key and a public key;
storing the private key in a database with the key reference;
transmitting the public key to the sender, the public key for encrypting the message;
receiving a request from a recipient of the encrypted message for the private key;
authenticating an identity of the recipient; and
transmitting, in response to the recipient being authenticated, the private key to the recipient, the private key for decrypting the encrypted message.
1 Assignment
0 Petitions
Accused Products
Abstract
An asynchronous communication system and method are configured for secured communication between a sender and a recipient without a need for pre-arrangement of shared static encryption key secrets. In one embodiment a system receives an initiation request for authentication from a sender seeking to transmit a message. The system generates an asymmetric key set, which includes a private key and a public key associated with a key reference. The system stores the private key with the key reference and transmits the public key to the sender. The sender uses the public key to encrypt the message to be sent to the recipient. The system will then receive a request for the private key from a recipient of the encrypted message. The system will authenticate the recipient identity. Once authenticated, the system transmits the private key to the recipient, which uses the private key to decrypt the encrypted message.
52 Citations
15 Claims
-
1. An asynchronous electronic communication method comprising:
-
receiving, from a sender of a message, an initiation request for authentication;
generating an asymmetric key set having a key reference and comprising a private key and a public key;
storing the private key in a database with the key reference;
transmitting the public key to the sender, the public key for encrypting the message;
receiving a request from a recipient of the encrypted message for the private key;
authenticating an identity of the recipient; and
transmitting, in response to the recipient being authenticated, the private key to the recipient, the private key for decrypting the encrypted message. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer readable medium configured to store instructions executable by a processor, the instructions when executed by the processor to cause the processor to:
-
receive, from a sender of a message, an initiation request for authentication, generate an asymmetric key set having a key reference and comprising a private key and a public key, store the private key in a database with the key reference, and transmit the public key to the sender, the public key for encrypting the message. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An asynchronous electronic communication system comprising:
-
a receiver configured to receive an initiation request for authentication from a sender of a message and configured to receive a request from a recipient of an encrypted message for a private key;
a key generator configured to generate an asymmetric key set having a key reference and comprising the private key and a public key;
an authenticator configured to authenticate an identity of the recipient a storage configured to store the private key in a database with the key reference; and
a transmitter configured to transmit the public key to the sender, the public key for encrypting the message, and configured to transmit the private key to the recipient, the private key for decrypting the encrypted message, in response to the recipient being authenticated. - View Dependent Claims (12, 13, 14, 15)
-
Specification