SECURING COMMUNICATIONS SENT BY A FIRST USER TO A SECOND USER
First Claim
1. A computer-implemented method of securing communications sent by a first user to a second user, the method comprising:
- receiving, by a first user from a trusted third party, at least one public cryptographic value corresponding to the first user and at least one private cryptographic value corresponding to the first user;
providing, by the first user to a second user, a plurality of values corresponding to an identification device identified by an identifier;
deriving, by the first user, a shared key, using the at least one private cryptographic value of the first user, and at least one of the plurality of values corresponding to the identification device identified by the identifier; and
protecting communications sent by the first user to the second user with the shared key.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method of securing communications sent by a first user to a second user may include receiving, by a first user from a trusted third party, at least one public cryptographic value corresponding to the first user and at least one private cryptographic value corresponding to the first user, providing, by the first user to a second user, a plurality of values corresponding to an identification device identified by an identifier, deriving, by the first user, a shared key, using the at least one private cryptographic value of the first user, and at least one of the plurality of values corresponding to the identification device identified by the identifier and protecting communications sent by the first user to the second user with the shared key.
-
Citations
20 Claims
-
1. A computer-implemented method of securing communications sent by a first user to a second user, the method comprising:
-
receiving, by a first user from a trusted third party, at least one public cryptographic value corresponding to the first user and at least one private cryptographic value corresponding to the first user; providing, by the first user to a second user, a plurality of values corresponding to an identification device identified by an identifier; deriving, by the first user, a shared key, using the at least one private cryptographic value of the first user, and at least one of the plurality of values corresponding to the identification device identified by the identifier; and protecting communications sent by the first user to the second user with the shared key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer system for providing secure communications among a plurality of users, the system comprising:
-
an identification device, wherein the identification device is identified by an identifier and the identification device comprises a memory; a first computing device that is arranged and configured to process instructions to store a plurality of values on the identification device identified by the identifier; a second computing device; and a third computing device that is arranged and configured to; provide at least one public cryptographic value to the first computing device and the second computing device, and provide at least one private cryptographic value to the first computing device and the second computing device; wherein the first computing device is operable to derive a shared key from the at least one private cryptographic value provided to the first computing device and at least one of the plurality of values stored on the identification device identified by the identifier, and wherein the second computing device is operable to derive the shared key from the at least one private cryptographic value provided to the second computing device and at least one of another plurality of values stored on the identification device identified by the identifier. - View Dependent Claims (15)
-
-
16. A recordable storage medium having recorded and stored thereon instructions that, when executed, perform the actions of:
-
receiving, by a first user from a trusted third party, at least one public cryptographic value corresponding to the first user and at least one private cryptographic value corresponding to the first user; providing, by the first user to a second user, a plurality of values corresponding to an identification device identified by an identifier; deriving, by the first user, a shared key, using the at least one private cryptographic value of the first user, and at least one of the plurality of values corresponding to the identification device identified by the identifier; and protecting communications sent by the first user to the second user with the shared key. - View Dependent Claims (17, 18, 19, 20)
-
Specification