PRIVATE LOCK INFRASTRUCTURE
First Claim
1. A method for the secure transmission of data comprising:
- a receiver creating a lock and key pair;
said receiver transmitting said lock to a sender;
said sender encrypting data using said lock to create an encryption cipher;
said sender transmitting said encryption cipher to said receiver; and
said receiver using said key to decrypt said lock.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for securely transmitting data from a sender to a receiver wherein a private lock is created by a receiver. The private lock is freely distributable while the key remains with the receiver. To receive encrypted data, the lock is sent to the sender who uses the lock to encrypt data. The sender sends the encrypted data to the receiver. When the receiver receives the encrypted data, he can decipher the message using his own key. In cases where there are multiple intended recipients, each recipient sends their lock to the sender and the sender encrypts the same data with each of the locks. The sender then sends the encrypted data to each of the recipients. Each recipient uses their own key to access the data. In some instances, the locks will be recognizable and each receiver will be able to identify his own lock while in other instances the locks will not be recognizable and the user will not know how many locks are on the data or the types of locks that are being used. In those cases, the receiver can still apply his own key to all locks to see if any of the locks open. By using the method and system of the present invention, the transmissions of data is more secure because of the reduced risk of keys being shared, lost or stolen, the role of certificate authority is eliminated, and the role of registration authority becomes optional.
-
Citations
18 Claims
-
1. A method for the secure transmission of data comprising:
-
a receiver creating a lock and key pair; said receiver transmitting said lock to a sender; said sender encrypting data using said lock to create an encryption cipher; said sender transmitting said encryption cipher to said receiver; and said receiver using said key to decrypt said lock. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for the secure transmission of data comprising:
-
a first party creating a lock and key pair; said first party transmitting said lock to a sender and transmitting said key to a receiver; said sender encrypting data using said lock to create an encryption cipher; said sender transmitting said encryption cipher to said receiver; and said receiver using said key to decrypt said lock. - View Dependent Claims (7)
-
-
8. A method for the secure transmission of data comprising:
-
a receiver creating a lock and key pair; said receiver transmitting said lock to a registration authority; a sender desiring to send data to said receiver retrieving said lock from said registration authority; said sender encrypting data using said lock to create an encryption cipher; said sender transmitting said encryption cipher to said receiver; and said receiver using said key to decrypt said lock. - View Dependent Claims (9, 10)
-
-
11. A method for the secure transmission of data comprising:
-
a lock and key pair; transmitting said lock to a sender; encrypting data using said lock to create an encryption cipher; transmitting said encryption cipher to said receiver; and using said key to decrypt said lock.
-
-
12. A method for the secure transmission of data comprising:
-
receiving a lock from a receiver who has created a lock and key pair; encrypting data using said lock to create an encryption cipher; transmitting said encryption cipher to said receiver, wherein said receiver uses said key to decrypt said lock.
-
-
13. A method for the secure transmission of data comprising:
-
a receiver creating a lock and key pair; said receiver transmitting said lock to a sender wherein said sender encrypts data using said lock to create an encryption cipher and sends said encryption cipher to said receiver; and said receiver using said key to decrypt said lock.
-
-
14. A system for the secure transmission of data comprising:
-
a sender; and a receiver, wherein said receiver creates a lock and key pair, transmits said lock to a sender for sender'"'"'s use in encrypting data with said lock to create an encryption cipher, receiving said encryption cipher, and decrypting said lock using said key. - View Dependent Claims (15, 16, 17)
-
-
18. A method for the secure transmission of data comprising:
-
creating a first lock paired to a first key and a second lock paired to a second key; using said first lock to encrypt data in a first encryption cipher; using said second lock to encrypt said first encryption cipher into a second encryption cipher; transmitting said second encryption cipher to one or more receivers wherein one of said one or more receivers uses said second key to decrypt said second lock and open said second cipher and the same or another of said one or more receivers uses said first key to decrypt said first lock and open said first cipher.
-
Specification