ENHANCED MESSAGE SECURITY
0 Assignments
0 Petitions
Accused Products
Abstract
A secure messaging system and method includes receiving an encrypted message, the message having been encrypted using a token of a corresponding pervasive device; wirelessly verifying the presence of the pervasive device; and, if the presence can be verified, decrypting the message using the token. The verification step can include the steps of establishing a wireless link with the pervasive device; and, querying the pervasive device over the wireless link. The establishing step can include the step of establishing a Bluetooth link with the pervasive device. Furthermore, the querying step can include the step of requesting geographic coordinates which locate the pervasive device.
22 Citations
16 Claims
-
1-6. -6. (canceled)
-
7. A secure messaging method within a computer, the method comprising the steps of:
-
receiving, by a message recipient, an encrypted message from a message source, said message having been encrypted using a token identifying a corresponding pervasive device separate from the message source; wirelessly verifying the presence of said pervasive device; and
,upon verifying said presence, decrypting said message using said token using symmetric cryptography. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A computer-readable storage device having stored thereon a computer program for secured messaging, said computer program comprising a routine set of instructions for causing a computer to perform the steps of:
-
receiving, by a message recipient, an encrypted message from a message source, said message having been encrypted using a token identifying a corresponding pervasive device separate from the message source; wirelessly verifying the presence of said pervasive device; and
,upon verifying said presence, decrypting said message using said token using symmetric cryptography. - View Dependent Claims (13, 14, 15, 16)
-
Specification