Secure peer-to-peer messaging invitation architecture
First Claim
1. A method implemented by a mobile device in a system comprising said mobile device, a wireless network and a routing server coupled to the wireless network, the mobile device having a user interface and one or more communications applications and further having a messaging application, the mobile device having a first personal identification number, the method comprising:
- receiving an invitation via one of the communications applications, the invitation including a question;
displaying the invitation including the question;
receiving through the user interface an answer in response to the question;
generating an encryption key using the answer;
encrypting the first personal identification number using said encryption key;
transmitting the encrypted first personal identification number in response to the received invitation;
receiving an encrypted second personal identification number in response to the transmitted first personal identification number; and
decrypting the encrypted second personal identification number,whereby peer-to-peer messages are sent and received by the mobile device using said messaging application, and wherein each transmitted peer-to-peer message contains the second personal identification number,each received peer-to-peer message contains the first personal identification number, and each peer-to-peer message is routed by the routing server based upon said personal identification numbers.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and methods providing immediate peer-to-peer messaging between mobile devices in a wireless system. An invitation architecture is disclosed which enables the exchange of personal identification numbers (PINs) without requiring a user to directly access or provide his or her PIN. A messaging application encrypts its associated PIN before providing it to a messaging application on another mobile device through an existing communication application. The invitation architecture automatically manages the encryption, any requisite key exchanges, the composition of invitation and acceptance messages, and the decryption and storage of PINs.
52 Citations
11 Claims
-
1. A method implemented by a mobile device in a system comprising said mobile device, a wireless network and a routing server coupled to the wireless network, the mobile device having a user interface and one or more communications applications and further having a messaging application, the mobile device having a first personal identification number, the method comprising:
-
receiving an invitation via one of the communications applications, the invitation including a question; displaying the invitation including the question; receiving through the user interface an answer in response to the question; generating an encryption key using the answer; encrypting the first personal identification number using said encryption key; transmitting the encrypted first personal identification number in response to the received invitation; receiving an encrypted second personal identification number in response to the transmitted first personal identification number; and decrypting the encrypted second personal identification number, whereby peer-to-peer messages are sent and received by the mobile device using said messaging application, and wherein each transmitted peer-to-peer message contains the second personal identification number, each received peer-to-peer message contains the first personal identification number, and each peer-to-peer message is routed by the routing server based upon said personal identification numbers. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method implemented by a mobile device in a system comprising said mobile device, a wireless network and a routing server coupled to the wireless network, the mobile device having one or more communications applications and further having a messaging application, the mobile device having a first personal identification number, the method comprising:
-
sending an invitation via one of the communications applications, the invitation including a question, the question having an answer; generating an encryption key using the answer; encrypting the first personal identification number using said encryption key; receiving an encrypted second personal identification number in response to the invitation; decrypting the second encrypted personal identification number; and transmitting the encrypted first personal identification number in response to receipt of the encrypted second personal identification number, whereby peer-to-peer messages are sent and received by the first mobile device using said messaging applications, and wherein each transmitted peer-to-peer message contains the second personal identification number, each received peer-to-peer message contains the first personal identification number, and each peer-to-peer message is routed by the routing server based upon said personal identification numbers.
-
-
7. A mobile device for use in a peer-to-peer messaging system comprising said mobile device, a wireless network, and a routing server coupled to the wireless network, the mobile device comprising:
-
a first memory storing a first personal identification number; one or more communication applications; a first encryption component configured to encrypt said first personal identification number and decrypt an encrypted second personal identification number using an encryption key; a first contact management component configured to receive an invitation via one of said one or more communication applications, the invitation including a question, display the invitation including the question, receive an answer via a user interface in response to the question, transmit the encrypted first personal identification number in response to the invitation, and receive the encrypted second personal identification number in response to transmission of the encrypted first personal identification number; and a first messaging application for sending and receiving peer-to-peer messages, whereby each transmitted peer-to-peer message includes the second personal identification number, each received peer-to-peer message includes the first personal identification number, and wherein said peer-to-peer messages are routed by the routing server based upon said personal identification numbers, wherein the first encryption component is configured to generate the encryption key using the answer. - View Dependent Claims (8, 9, 10, 11)
-
Specification