SECURE DATA EXCHANGE USING MESSAGING SERVICE
First Claim
1. A receiving device for receiving secure communications, comprising:
- a signal interface for receiving an image, the image including a steganographically embedded symmetric key from the sender, the symmetric key being encrypted with a public key associated with the receiving device; and
processing hardware configured to decrypt the symmetric key with a private key stored on the receiving device and to further secure communications with the sender via the symmetric key, wherein the processing hardware is further configured to encrypt future communications from the receiving device using the symmetric key.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for securely communicating over a network includes a sending device and a receiving device. The sending device includes first processing hardware configured to encrypt a symmetric key associated with the sending device with a public key associated with a receiving device. The first processing hardware is further configured to steganographically embed the symmetric key into an image. The sending device further includes a first signal interface configured to send the image to the receiving device. The receiving device includes second signal interface for receiving the image from the sending device. The receiving device also includes second processing hardware configured to decrypt the symmetric key with a private key stored on the receiving device and to further secure communications with the sender via the symmetric key.
-
Citations
30 Claims
-
1. A receiving device for receiving secure communications, comprising:
-
a signal interface for receiving an image, the image including a steganographically embedded symmetric key from the sender, the symmetric key being encrypted with a public key associated with the receiving device; and processing hardware configured to decrypt the symmetric key with a private key stored on the receiving device and to further secure communications with the sender via the symmetric key, wherein the processing hardware is further configured to encrypt future communications from the receiving device using the symmetric key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A sending device for sending secure messages, comprising:
-
processing hardware configured to encrypt a symmetric key associated with the sending device with a public key associated with a receiving device and to steganographically embed the symmetric key into an image; and a signal interface configured to send the image to the receiving device, wherein the symmetric key is decryptable by a private key associated with the receiving device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for securely communicating over a non-secure network, comprising:
-
a sending device including; first processing hardware configured to encrypt a symmetric key associated with the sending device with a public key associated with a receiving device and to steganographically embed the symmetric key into an image; and a first signal interface configured to the image to the receiving device; and a receiving device including; a second signal interface for receiving the image from the sending device; and second processing hardware configured to decrypt the symmetric key with a private key stored on the receiving device and to further secure communications with the sender via the symmetric key. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A system for securely communicating in a network, comprising:
-
a sending device including; first processing hardware configured to encrypt a symmetric key associated with the sending device with a public key associated with a receiving device; and a first signal interface configured to send the encrypted symmetric key to the receiving device; and a receiving device including; a second signal interface for receiving the encrypted symmetric key from the sending device; and second processing hardware configured to decrypt the symmetric key with a private key stored on the receiving device and to further secure communications with the sender via the symmetric key. - View Dependent Claims (26, 27, 28, 29, 30)
-
Specification