SECURE EMAIL COMMUNICATION SYSTEM
First Claim
Patent Images
1. A method of securing a digital data stream, the method comprising:
- receiving, at a host node, a first key of a first asymmetric key pair from a key store remote from the host node;
receiving a dynamically generated key;
enciphering the digital data stream with the dynamically generated key;
enciphering the dynamically generated key with the first key of the first asymmetric key pair; and
storing the enciphered digital data stream and the enciphered dynamically generated key remotely from the host node and the key store.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for securing a digital data stream. A first key of a first asymmetric key pair from a key store remote from a host node is received at the host node. A dynamically generated key is received at the host node, which is used to encipher the digital data stream. The dynamically generated key is enciphered with the first key of the first asymmetric key pair. The enciphered digital data stream and the enciphered dynamically generated key are stored remotely from the host node and the key store.
-
Citations
27 Claims
-
1. A method of securing a digital data stream, the method comprising:
-
receiving, at a host node, a first key of a first asymmetric key pair from a key store remote from the host node; receiving a dynamically generated key; enciphering the digital data stream with the dynamically generated key; enciphering the dynamically generated key with the first key of the first asymmetric key pair; and storing the enciphered digital data stream and the enciphered dynamically generated key remotely from the host node and the key store. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of processing a digital data stream, the method comprising:
-
receiving, at a host node, a credential indicia corresponding to a user; receiving an enciphered digital data stream and an enciphered session key from a database node remote from the host node; receiving a first key of a first asymmetric key pair from a key store remote from the host node and the database node; deciphering the session key with the first key of the first asymmetric key pair; and deciphering the digital data stream with the deciphered session key. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A communications security system comprising:
-
a key store comprising a paired key list relating a first asymmetric key pair with a user indicia and a credential indicia; a database node, remote from the key store, wherein the database node comprises a database containing an enciphered message and an enciphered session key; and a host node remotely coupled to the key store through a key port and the database node through a database port, wherein the host node comprises; a data stream port; a dynamic key generation module; a first encipher module coupled to the key generation module, the data stream port, and the database port; and a second encipher module coupled to the key generation module, the key port, and the database port. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
Specification