Method and system for event notification for wireless PDA devices
First Claim
1. A method for transmitting verified notification messages from a service provider to a PID (personal information device) user, the method comprising the steps of:
- registering a plurality of users and providing each of the users with respective public and private encryption keys;
receiving a message from a first user of the plurality of users, the message signed with the first user'"'"'s private encryption key;
verifying a signature of the message by using the first user'"'"'s public encryption key;
verifying the first user has an authority to transmit notification messages; and
transmitting the message to at least a second user of the plurality of users, the message signed with the second user'"'"'s private encryption key, wherein the second user verifies the signature by using the second user'"'"'s public encryption key.
9 Assignments
0 Petitions
Accused Products
Abstract
A method for transmitting verified notification messages from a service provider to a PID (personal information device) user. The method includes the step of registering a plurality of users and providing each of the users with respective public and private encryption keys. A message is then received from a first user of the plurality of users. The received message is signed with the first user'"'"'s private encryption key. A signature of the message is verified by using the first user'"'"'s public encryption key. The authority of the first user to transmit notification messages is then verified. The message is then resigned with the second user'"'"'s private encryption key and transmitted to at least a second user of the plurality of users, wherein the second user verifies the signature by using the second user'"'"'s public encryption key. Thus, the encryption provides a reliable means for differentiating between regular notifications and emergency notifications and is secure for authenticating and authorizing the messages sent from the service provider. A priority can be assigned to the message in accordance with a priority indicated by the first user. The message can be transmitted with the assigned priority to the second user, thereby allowing the second user to process the message in accordance with the assigned priority. The encryption keys can be stored in a database of the service provider.
-
Citations
28 Claims
-
1. A method for transmitting verified notification messages from a service provider to a PID (personal information device) user, the method comprising the steps of:
-
registering a plurality of users and providing each of the users with respective public and private encryption keys;
receiving a message from a first user of the plurality of users, the message signed with the first user'"'"'s private encryption key;
verifying a signature of the message by using the first user'"'"'s public encryption key;
verifying the first user has an authority to transmit notification messages; and
transmitting the message to at least a second user of the plurality of users, the message signed with the second user'"'"'s private encryption key, wherein the second user verifies the signature by using the second user'"'"'s public encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer readable media having computer readable instructions for implementing a method for transmitting verified notification messages from a service provider to a PID (personal information device) user, the instructions when executed by a computer system cause the service provider to perform a method comprising the steps of:
-
a) registering a plurality of users and providing each of the users with respective public and private encryption keys;
b) receiving a message from a first user of the plurality of users, the message signed with the first user'"'"'s private encryption key;
c) verifying a signature of the message by using the first user'"'"'s public encryption key;
d) verifying the first user has an authority to transmit notification messages; and
e) transmitting the message to at least a second user of the plurality of users, wherein the second user verifies the signature by using the second user'"'"'s public encryption key. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A verified notification system for allowing a service provider to send emergency message notifications to personal information devices, comprising a computer system having a processor coupled to a memory via a bus, the memory having computer readable instructions stored therein, which when executed by the computer system, cause service provider to perform the steps of:
-
a) registering a plurality of users and providing each of the users with respective public and private encryption keys;
b) receiving a message from a first user of the plurality of users, the message signed with the first user'"'"'s private encryption key;
c) verifying a signature of the message by using the first user'"'"'s public encryption key;
d) verifying the first user has an authority to transmit notification messages; and
e) transmitting the message to at least a second user of the plurality of users, wherein the second user verifies the signature by using the first user'"'"'s public encryption key. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
Specification