System and Method for Securing an Electronic Communication
First Claim
1. A system for securing an electronic communication, the system comprising:
- a gateway server configured to;
receive and store a device identifier and a network address from a first computing device, wherein the device identifier identifies the first computing device and the network address is associated with the first computing device;
receive from a second computing device the network address for the first computing device and an encryption key request;
derive an encryption key from the device identifier for the first computing device;
and send the encryption key to the second computing device.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for securing an electronic communication comprises a gateway server configured to receive and store a device identifier and a network address from a first computing device. The device identifier identifies the first computing device, and the network address is associated with the first computing device. Thereafter, the gateway server receives from a second computing device the network address of the first computing device and an encryption key request. The gateway server derives from the device identifier for the first computing device an encryption key and sends the encryption key to the second computing device. A communication from the second computing device to the first computing device may thereafter be secured using the encryption key. A related method of securing an electronic communication is also disclosed.
-
Citations
20 Claims
-
1. A system for securing an electronic communication, the system comprising:
-
a gateway server configured to; receive and store a device identifier and a network address from a first computing device, wherein the device identifier identifies the first computing device and the network address is associated with the first computing device; receive from a second computing device the network address for the first computing device and an encryption key request; derive an encryption key from the device identifier for the first computing device; and send the encryption key to the second computing device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of securing an electronic communication, the method comprising:
-
receiving and storing at a gateway server store a device identifier and a network address from a first computing device, wherein the device identifier identifies the first computing device and the network address is associated with the first computing device; receiving from a second computing device the network address for the first computing device and an encryption key request; deriving from the device identifier an encryption key for the first computing device; and sending the encryption key to the second computing device. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method of securing an electronic communication, the method comprising:
-
sending from an originating computing device a request to a gateway server for an encryption key, the request including a network address for a recipient computing device, wherein the gateway server maintains a record of the network address and a device identifier for the recipient computing device; receiving an encryption key from the gateway server, wherein the encryption key is derived from the device identifier; encrypting the electronic communication using the encryption key; and transmitting the encrypted electronic communication to the recipient computing device. - View Dependent Claims (13, 14, 15)
-
-
16. A method of receiving a secured electronic communication, the method comprising:
-
providing from a recipient computing device to a gateway server a network address and a device identifier for the recipient computing device; receiving at the recipient computing device the secured electronic communication, wherein the secured electronic communication is encrypted by a sending computing device with a first encryption key derived from the device identifier by the gateway server; generating at the recipient computing device a second encryption key from the device identifier; and decrypting at the recipient computing device the secured electronic communication using the second encryption key. - View Dependent Claims (17, 18, 19, 20)
-
Specification