Method and system for encrypting electronic message using secure ad hoc encryption key
First Claim
Patent Images
1. A method implemented in a processor system for a sender to encrypt an electronic message prior to sending to a receiver, comprising the steps of:
- generating an ad hoc public key and private key asymmetric key pair that is uniquely associated with both the sender and the receiver;
encrypting the private key, the private key known only to the sender;
creating an index value that is uniquely associated with the key pair and both the sender and the receiver, the index value utilized for key retrieval;
storing in a key server at least the encrypted private key together with the associated index value; and
encrypting the electronic message by utilizing the public key.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for encrypting an electronic message to a receiver by utilizing a sender generated ad hoc asymmetric key pair whose private key is encrypted and known only to the sender. The key pair is uniquely associated with both the sender and the receiver and is stored in a key server. A method and system for decrypting an encrypted electronic message by authenticating the receiver to the sender and having the sender retrieve and decrypt the encrypted private key. The above methods and systems utilizing an ad hoc symmetric key instead of an ad hoc asymmetric key pair.
-
Citations
20 Claims
-
1. A method implemented in a processor system for a sender to encrypt an electronic message prior to sending to a receiver, comprising the steps of:
-
generating an ad hoc public key and private key asymmetric key pair that is uniquely associated with both the sender and the receiver; encrypting the private key, the private key known only to the sender; creating an index value that is uniquely associated with the key pair and both the sender and the receiver, the index value utilized for key retrieval; storing in a key server at least the encrypted private key together with the associated index value; and encrypting the electronic message by utilizing the public key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method implemented in a processor system for a receiver to decrypt an encrypted electronic message received from a sender, comprising the steps of:
-
authenticating the receiver to the sender; deriving an index value that is uniquely associated with an ad hoc public key and private key asymmetric key pair, the key pair uniquely associated with both the sender and the receiver; retrieving an encrypted private key from a key server by utilizing the index value, the private key known only to the sender; and decrypting the encrypted electronic message by utilizing the encrypted private key. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A processor system for a sender to encrypt an electronic message prior to sending to a receiver, comprising:
-
means for generating an ad hoc public key and private key asymmetric key pair that is uniquely associated with both the sender and the receiver; means for encrypting the private key, the private key known only to the sender; means for creating an index value that is uniquely associated with the key pair and both the sender and the receiver, the index value utilized for key retrieval; means for storing in a key server at least the encrypted private key together with the associated index value; and means for encrypting the electronic message by utilizing the public key. - View Dependent Claims (15, 16, 17)
-
-
18. A processor system for a receiver to decrypt an encrypted electronic message received from a sender, comprising:
-
means for authenticating the receiver to the sender; means for deriving an index value that is uniquely associated with an ad hoc public key private key asymmetric key pair, the key pair uniquely associated with both the sender and the receiver; means for retrieving an encrypted private key from a key server by utilizing the index value, the private key known only to the sender; and means for decrypting the encrypted electronic message by utilizing the encrypted private key. - View Dependent Claims (19, 20)
-
Specification