ENCRYPTED TEXT MESSAGING SYSTEM AND METHOD THEREFOR
First Claim
Patent Images
1. A method for securing text messages comprising:
- adding an encryption-decryption module to a pair of cellular phones;
entering a text message on a first of the pair of cellular phones;
encrypting the text message on the first of the pair of cellular phones; and
transmitting the encrypted text message to a second of the pair of cellular phones.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for securing text messages ads an encryption-decryption module to a pair of cellular phones. A text message is entered on a first of the pair of cellular phones. The text message is encrypted on the first of the pair of cellular phones. The encrypted text message is transmitted to a second of the pair of cellular phones.
-
Citations
20 Claims
-
1. A method for securing text messages comprising:
-
adding an encryption-decryption module to a pair of cellular phones; entering a text message on a first of the pair of cellular phones; encrypting the text message on the first of the pair of cellular phones; and transmitting the encrypted text message to a second of the pair of cellular phones. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 14)
-
-
10. A method for securing text messages comprising:
-
adding an encryption-decryption module to a pair of cellular phones; selecting a desired recipient of a text message on a first of the pair of cellular phones; entering the text message on the first of the pair of cellular phones; encrypting the text message on the first of the pair of cellular phones, the text message encrypted using a public key; and transmitting the encrypted text message to a second of the pair of cellular phones. - View Dependent Claims (11, 12, 13, 15, 16)
-
-
18. A method for securing text messages comprising:
-
downloading a software encryption-decryption module to a pair of cellular phones; selecting a desired recipient of a text message on a first of the pair of cellular phones; entering the text message on the first of the pair of cellular phones; encrypting the text message on the first of the pair of cellular phones, the text message encrypted using a public key; transmitting the encrypted text message to a second of the pair of cellular phones; receiving the encrypted text message by the second of the pair of cellular phones; and decrypting the encrypted text message by the second of the pair of cellular phones using a private key. - View Dependent Claims (19, 20)
-
Specification