Method for generating secure symmetric encryption and decryption
First Claim
1. A method for encrypting electronic data transmitted by a sender server to a recipient device, the method comprising the steps of:
- generating a key for storing on the sender server;
transmitting a copy of the key to the recipient device, wherein the copy of the key is unique to and permanently installed on the recipient device;
encrypting electronic data from the sender server using the key; and
transmitting the encrypted electronic data from the sender server to the recipient device.
8 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a method for generating secure symmetric encryption/decryption via the Internet. The present method provides for a more advanced and sophisticated manner of preventing hackers from accessing sensitive and private information. Information is encrypted and decrypted using unique keys in combination with the recipient'"'"'s PIN numbers. Each unique key corresponds to one recipient and is locally stored on the recipient'"'"'s computer device. Thus, in order to decrypt information using the present invention, the recipient is required to provide the correct password while using the computer device that includes the unique key.
171 Citations
19 Claims
-
1. A method for encrypting electronic data transmitted by a sender server to a recipient device, the method comprising the steps of:
-
generating a key for storing on the sender server;
transmitting a copy of the key to the recipient device, wherein the copy of the key is unique to and permanently installed on the recipient device;
encrypting electronic data from the sender server using the key; and
transmitting the encrypted electronic data from the sender server to the recipient device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for encrypting an electronic document and a key corresponding to the electronic document such that an encrypted electronic document and an encrypted key are simultaneously transmitted to a recipient device, the method comprising the steps of:
-
(1) generating the encrypted electronic document by inputting an algorithm object, the key, and electronic document data into an encryption process; and
(2) generating the encrypted key by inputting the algorithm object, a salt, and key data into the encryption process, thereby encrypting both the electronic document and the key corresponding to the electronic document. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method for decrypting an encrypted electronic document and an encrypted key transmitted simultaneously from a sender server to a recipient device, the method comprising the steps of:
-
separating the encrypted electronic document and encrypted key on the recipient device;
inputting a user identification number having between 4 to 20 characters on the recipient device so that a unique password stored on the recipient device is called up, wherein the unique password includes at least 256 bits;
using the unique password so that the encrypted key becomes a decrypted key; and
using the decrypted key to decrypt the encrypted electronic document. - View Dependent Claims (17, 18, 19)
-
Specification