SECURE MESSAGING BY KEY GENERATION INFORMATION TRANSFER
First Claim
1. A device comprising:
- one or more processors to;
receive an instruction to send a message from the device to a second device;
communicate with a first server to obtain a first set of parameters and a first key based on the instruction to send the message from device to the second device;
send the first key to a second server;
establish a secure connection with the second server based on sending the first key;
determine a second set of parameters based on the first set of parameters,send, via the secure connection, the second set of parameters;
generate a second key based on the second set of parameters;
encrypt the message based on the second key; and
send the encrypted message to the second device,the second device being capable of receiving the second set of parameters from the second server to decrypt the encrypted message.
1 Assignment
0 Petitions
Accused Products
Abstract
A system is configured to receive a first authentication request from a first device, authenticate the first device, establish a secure connection with the first device based on authenticating the first device, and receive, via the secure connection with the first device, a set of parameters from the first device. The first device is capable of generating an encryption key for a secure message, intended for a second device, based on the set of parameters. The system is also configured to receive a second authentication request from a second device, authenticate the second device and establish a secure connection with the second device based on receiving the second authentication request, and send, via the secure connection with the second device, the set of parameters to the second device. The second user device is capable of generating a decryption key for the secure message based on the set of parameters.
-
Citations
23 Claims
-
1. A device comprising:
one or more processors to; receive an instruction to send a message from the device to a second device; communicate with a first server to obtain a first set of parameters and a first key based on the instruction to send the message from device to the second device; send the first key to a second server; establish a secure connection with the second server based on sending the first key; determine a second set of parameters based on the first set of parameters, send, via the secure connection, the second set of parameters; generate a second key based on the second set of parameters; encrypt the message based on the second key; and send the encrypted message to the second device, the second device being capable of receiving the second set of parameters from the second server to decrypt the encrypted message. - View Dependent Claims (2, 3, 4)
-
5. A computer-readable medium comprising:
a plurality of instructions which, when executed by one or more processors of a first device, cause the one or more processors to; receive an instruction to send a message from the first device to a second device; communicate with a first server to obtain a first set of parameters based on the instruction to send the message from the first device to the second device; determine a second set of parameters based on the first set of parameters; establish a secure connection with a second server; send, via the secure connection, the second set of parameters to the second server; receive a token from the second server, the token being associated with the second set of parameters; generate a key based on the second set of parameters; encrypt the message based on the key; embed the token within the encrypted message; and send the encrypted message with the token to the second device, the second device being capable of receiving the second set of parameters from the second server to decrypt the encrypted message based on sending the token to the second server. - View Dependent Claims (6, 7, 8, 9)
-
10. A method comprising:
-
receiving, by a first device, a secure message from a second device; communicating, by the first device, with a first server to receive a first key based on receiving the secure message; sending, by the first device, the first key to a second server; establishing, by the first device, a secure connection with the second server based on sending the first key; receiving, by the first device, a set of parameters, from the second server, via the secure connection, the set of parameters being provided to the second server by the second device; generating, by the first device, a second key based on the second set of parameters; and decrypting, by the first device, the secure message using the second key. - View Dependent Claims (11, 12, 13)
-
-
14. A system comprising:
one or more devices to; receive a first authentication request from a first device; authenticate the first device based on the first authentication request; establish a secure connection with the first device based on authenticating the first device; receive, via the secure connection, a set of parameters from the first device, the first device being capable of generating an encryption key for a secure message, intended for a second device based on the set of parameters; receive a second authentication request from the second device; authenticate the second device; establish a secure connection with the second device based on receiving the second authentication request; and send, via the secure connection with the second device, the set of parameters to the second device, the second device being capable of generating a decryption key for the secure message based on the set of parameters. - View Dependent Claims (15, 16, 17)
-
18. A computer-readable medium comprising:
a plurality of instructions which, when executed by one or more processors, cause the one or more processors to; establish a secure connection with a first device; receive, via the secure connection with the first device, a set of parameters from the first device, the first device being capable of generating an encryption key for a secure message, intended for a second device, based on the set of parameters; generate a token associated with the set of parameters; send the token to the first device; establish a secure connection with the second device; receive, via the secure connection with the second device, the token from the second device; identify the set of parameters associated with the token; and send, via the secure connection with the second device, the set of parameters to the second device, the second device being capable of generating a decryption key for the secure message based on the set of parameters. - View Dependent Claims (19, 20, 21, 22, 23)
Specification