Secure peer-to-peer messaging invitation architecture
First Claim
1. A method implemented by a mobile device in a system comprising said mobile device, a wireless network and a routing server coupled to the wireless network, the mobile device having a user interface and a plurality of communications applications and further having a messaging application, the mobile device having a first personal identification number, the method comprising:
- receiving an invitation via one of the communications applications, the invitation including a question;
displaying the question;
receiving through the user interface a received answer in response to the question;
encrypting the first personal identification number;
transmitting the received answer and the encrypted first personal identification number in response to the received invitation;
receiving an encrypted second personal identification number in response to the transmitted received answer and first personal identification number;
generating an encryption key using the received answer; and
decrypting the encrypted second personal identification number using said encryption key,whereby peer-to-peer messages are sent and received by the mobile device using said messaging application, and wherein each transmitted peer-to-peer message contains the second personal identification number, each received peer-to-peer message contains the first personal identification number, and each peer-to-peer message is routed by the routing server based upon said personal identification numbers.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and methods providing immediate peer-to-peer messaging between mobile devices in a wireless system. An invitation architecture is disclosed which enables the exchange of personal identification numbers (PINs) without requiring a user to directly access or provide his or her PIN. A messaging application encrypts its associated PIN before providing it to a messaging application on another mobile device through an existing communication application. An invitation process for exchanging encrypted PINs involves receiving an invitation containing a question, obtaining user input of an answer, and transmitting the answer back to the sender with an encrypted PIN. The sender confirms the received answer is correct and replies with its encrypted PIN.
14 Citations
11 Claims
-
1. A method implemented by a mobile device in a system comprising said mobile device, a wireless network and a routing server coupled to the wireless network, the mobile device having a user interface and a plurality of communications applications and further having a messaging application, the mobile device having a first personal identification number, the method comprising:
-
receiving an invitation via one of the communications applications, the invitation including a question; displaying the question; receiving through the user interface a received answer in response to the question; encrypting the first personal identification number; transmitting the received answer and the encrypted first personal identification number in response to the received invitation; receiving an encrypted second personal identification number in response to the transmitted received answer and first personal identification number; generating an encryption key using the received answer; and decrypting the encrypted second personal identification number using said encryption key, whereby peer-to-peer messages are sent and received by the mobile device using said messaging application, and wherein each transmitted peer-to-peer message contains the second personal identification number, each received peer-to-peer message contains the first personal identification number, and each peer-to-peer message is routed by the routing server based upon said personal identification numbers. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method implemented by a mobile device in a system comprising said mobile device, a wireless network and a routing server coupled to the wireless network, the mobile device having one or more communications applications and further having a messaging application, the mobile device having a first personal identification number, the method comprising:
-
sending an invitation via one of the communications applications, the invitation including a question, the question having a stored answer; generating an encryption key using the stored answer; encrypting the first personal identification number using said encryption key; receiving a received answer and an encrypted second personal identification number in response to the invitation; confirming that the received answer matches the stored answer; decrypting the second encrypted personal identification number; and transmitting the encrypted first personal identification number in response to receipt of the encrypted second personal identification number, whereby peer-to-peer messages are sent and received by the mobile device using said messaging application, and wherein each transmitted peer-to-peer message contains the second personal identification number, each received peer-to-peer message contains the first personal identification number, and each peer-to-peer message is routed by the routing server based upon said personal identification numbers.
-
-
7. A mobile device for use in a peer-to-peer messaging system comprising said mobile device, a wireless network, and a routing server coupled to the wireless network, the mobile device comprising:
-
a first memory storing a first personal identification number; one or more communication applications; a first encryption component configured to encrypt said first personal identification number and decrypt an encrypted second personal identification number; a first contact management component configured to receive an invitation via one of said one or more communication applications, the invitation including a question, display the invitation including the question, receive a received answer via a user interface in response to the question, transmit the received answer and the encrypted first personal identification number in response to the invitation, and receive the encrypted second personal identification number in response to transmission of the encrypted received answer and first personal identification number; and a first messaging application for sending and receiving peer-to-peer messages, whereby each transmitted peer-to-peer message includes the second personal identification number, each received peer-to-peer message includes the first personal identification number, and wherein said peer-to-peer messages are routed by the routing server based upon said personal identification numbers, wherein said first encryption component generates an encryption key using the received answer and decrypts said second personal identification number using said encryption key. - View Dependent Claims (8, 9, 10)
-
-
11. A peer-to-peer messaging system, comprising two mobile devices including a first mobile device and a second mobile device, the second mobile device comprising:
-
a second memory storing a second personal identification number and a stored answer, one or more communication applications, a second encryption component configured to generate an encryption key using said stored answer, encrypt said second personal identification number using said encryption key and decrypt an encrypted first personal identification number, a second contact management component configured to send an invitation to the first mobile device using said one of said communication applications, receive an acceptance from said first mobile device containing a received answer, receive the encrypted first personal identification number from the first mobile device, confirm that the received answer matches said stored answer, and transmit the encrypted second personal identification number to the first mobile device, a second messaging application for sending and receiving peer-to-peer messages.
-
Specification