SECURE DOCUMENT DELIVERY
First Claim
1. A method for secure delivery of a document, the method comprising:
- creating, by a server, a key;
setting an expiration event for the key to expire;
sending the key from the server to a first client device to encrypt the document;
authenticating, by the server, a second client device;
determining if the expiration event has occurred;
deleting, by the server, the key if the expiration event has occurred; and
sending the key from the server to the authenticated second client device to decrypt the document if the expiration event has not yet occurred.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, machine-readable medium, and server to create a key, set an expiration event for the key to expire, send the key to a first client device to encrypt the document, authenticate a second client device that is in receipt of the encrypted document, delete the key if the expiration event has occurred, and send the key from to the authenticated second client device to decrypt the document if the expiration event has not yet occurred. For one embodiment, the key is used by client devices for encryption and decryption of the document only and is not otherwise accessible to the client devices. For one embodiment, the server facilitates sending the encrypted document to the second client device but does not retain a copy of the encrypted document.
-
Citations
35 Claims
-
1. A method for secure delivery of a document, the method comprising:
-
creating, by a server, a key; setting an expiration event for the key to expire; sending the key from the server to a first client device to encrypt the document; authenticating, by the server, a second client device; determining if the expiration event has occurred; deleting, by the server, the key if the expiration event has occurred; and sending the key from the server to the authenticated second client device to decrypt the document if the expiration event has not yet occurred. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for secure delivery of a document, the method comprising:
-
sending, by a first client device, a request to a server to create a key and an expiration event for the key to expire, wherein the server is to delete the key in response to the expiration event; receiving the key from the server; encrypting, by the first client device, the document using the key; causing the encrypted document to be sent to a second client device without the key; and sending instructions to the server on how to authenticate the second client device and enable the server to send the key to the authenticated second client device if the expiration event has not yet occurred. - View Dependent Claims (11, 12, 13)
-
-
14. A machine-readable storage medium storing instructions that, when executed, cause a server to perform a method comprising:
-
creating a key; setting an expiration event for the key to expire; sending the key to a first client device to encrypt a document; authenticating a second client device; determining if the expiration event has occurred; deleting the key if the expiration event has occurred; and sending the key to the authenticated second client device to decrypt the document if the expiration event has not yet occurred. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A machine-readable storage medium storing instructions that, when executed, cause a first client device to perform a method comprising:
-
sending a request to a server to create a key and an expiration event for the key to expire, wherein the server is to delete the key in response to the expiration event; receiving the key from the server; encrypting a document using the key; causing the encrypted document to be sent to a second client device without the key; and sending instructions to the server on how to authenticate the second client device and enable the server to send the key to the authenticated second client device if the expiration event has not yet occurred. - View Dependent Claims (24, 25, 26)
-
-
27. A server comprising:
-
a processor; and a memory, coupled to the processor, storing instructions, which when executed by the system, causes the processor to create a key, set an expiration event for the key to expire, send the key from the server to a first client device to encrypt the document, authenticate a second client device, determine if the expiration event has occurred, delete the key if the expiration event has occurred, and send the key from the server to the authenticated second client device to decrypt the document if the expiration event has not yet occurred. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35)
-
Specification