REMOTE ENCRYPTION METHOD AND CRYPTOGRAPHIC CENTER
First Claim
1. A remote encryption method executable by at least one processor of a cryptographic center, the cryptographic center connecting to a sending end and at least one receiving end, the method comprising:
- receiving data and a list from the send end, the list listing at least one receiving end to which the data is to be sent;
obtaining a public key corresponding to the at least one receiving end listed in the received list;
asymmetrically encrypting the received data using the obtained public key corresponding to the at least one receiving end; and
sending the encrypted data to the corresponding receiving end.
1 Assignment
0 Petitions
Accused Products
Abstract
A remote encryption method is executed by at least one processor of a cryptographic center. The cryptographic center connects to a sending end and to at least one receiving end. Data and a list listing at least one receiving end to which the data is to be sent are received from the sending end. A public key corresponding to the at least one receiving end listed in the received list is obtained. The received data is asymmetrically encrypted using the obtained public key corresponding to the at least one receiving end. The encrypted data is sent to the corresponding receiving end.
-
Citations
15 Claims
-
1. A remote encryption method executable by at least one processor of a cryptographic center, the cryptographic center connecting to a sending end and at least one receiving end, the method comprising:
-
receiving data and a list from the send end, the list listing at least one receiving end to which the data is to be sent; obtaining a public key corresponding to the at least one receiving end listed in the received list; asymmetrically encrypting the received data using the obtained public key corresponding to the at least one receiving end; and sending the encrypted data to the corresponding receiving end. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A cryptographic center comprising:
-
at least one processor; a connection device used to connect to a sending end and at least one receiving end; a storage device that stores one or more programs, when executed by the at least one processor, causers the at least one processor to; receive data and a list from the send end, the list listing at least one receiving end to which the data is to be sent; obtain a public key corresponding to the at least one receiving end listed in the received list; asymmetrically encrypt the received data using the obtained public key corresponding to the at least one receiving end; and send the encrypted data to the corresponding receiving end. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory storage medium having stored thereon instruction that, when executed by at least one processor of a cryptographic center, causers the at least one processor to perform a remote encryption method, the cryptographic center connecting to a sending end and at least one receiving end, the method comprising:
-
receiving data and a list from the send end, the list listing at least one receiving end to which the data is to be sent; obtaining a public key corresponding to the at least one receiving end listed in the received list; asymmetrically encrypting the received data using the obtained public key corresponding to the at least one receiving end; and sending the encrypted data to the corresponding receiving end. - View Dependent Claims (12, 13, 14, 15)
-
Specification