MOBILE WORKFORCE APPLICATIONS WHICH ARE HIGHLY SECURE AND TRUSTED FOR THE US GOVERNMENT AND OTHER INDUSTRIES
First Claim
Patent Images
1. A method of providing secure communications between end-user devices comprising:
- communicating a message between a first device and a second device, said message providing an indication that the first device wishes to send a secure message to the second device;
enable downloading on demand of an application to the second device permitting the second device to decrypt a secure message sent by the first device;
agreeing upon, between the second device and the first device, at least one shared secret based on a handshake communication between the first and second devices; and
communicating, between the first device and the second device, an encrypted message that can be decrypted using said shared secret.
3 Assignments
0 Petitions
Accused Products
Abstract
A convenient, easy to use ubiquitous secure communications capability can automatically encrypt and decrypt messages without requiring any special intermediating security component such as gateways, proxy servers or the like. Trusted/secure applications for the mobile workforce can significantly improve productivity and effectiveness while enhancing personal and organizational security and safety.
-
Citations
3 Claims
-
1. A method of providing secure communications between end-user devices comprising:
-
communicating a message between a first device and a second device, said message providing an indication that the first device wishes to send a secure message to the second device; enable downloading on demand of an application to the second device permitting the second device to decrypt a secure message sent by the first device; agreeing upon, between the second device and the first device, at least one shared secret based on a handshake communication between the first and second devices; and communicating, between the first device and the second device, an encrypted message that can be decrypted using said shared secret. - View Dependent Claims (2, 3)
-
Specification