Secure peer-to-peer messaging invitation architecture
First Claim
1. A method relating to a first communication device having a first personal identification number and a second communication device having a second personal identification number different from the first personal identification number, the method comprising:
- transmitting, by the first communication device to the second communication device, a first encryption key to enable the second communication device to encrypt the second personal identification number;
receiving, by the first communication device from the second communication device, the second personal identification number that has been encrypted by the second communication device using the first encryption key;
decrypting, by the first communication device, the encrypted second personal identification number;
receiving, by the first communication device from the second communication device, a second encryption key to enable the first communication device to encrypt the first personal identification number;
encrypting, by the first communication device, the first personal identification number using the second encryption key;
transmitting, by the first communication device to the second communication device, the encrypted first personal identification number; and
conducting, by the first communication device with the second communication device, a peer-to-peer messaging session by transmitting to the second communication device peer-to-peer messages that contain the second personal identification number and receiving from the second communication device peer-to-peer messages that contain the first personal identification number, each peer-to-peer message being routed by a routing server based on the respective first and second personal identification numbers.
4 Assignments
0 Petitions
Accused Products
Abstract
First and second communication devices respectively have first and second personal identification numbers (PINs). The first communication device transmits to the second communication device a first encryption key, and receives from the second communication device the second PIN that has been encrypted by the second communication device using the first encryption key. The first communication device receives from the second communication device a second encryption key, decrypts the encrypted second PIN, and encrypts the first PIN using the second encryption key, and transmits the encrypted first PIN to the second communication device. The first communication device conducts, with the second communication, device a peer-to-peer messaging session by transmitting to the second communication device peer-to-peer messages that contain the second PIN and receiving from the second communication device peer-to-peer messages that contain the first PIN. Each message is routed by a routing server based on the respective first and second PINs.
10 Citations
16 Claims
-
1. A method relating to a first communication device having a first personal identification number and a second communication device having a second personal identification number different from the first personal identification number, the method comprising:
-
transmitting, by the first communication device to the second communication device, a first encryption key to enable the second communication device to encrypt the second personal identification number; receiving, by the first communication device from the second communication device, the second personal identification number that has been encrypted by the second communication device using the first encryption key; decrypting, by the first communication device, the encrypted second personal identification number; receiving, by the first communication device from the second communication device, a second encryption key to enable the first communication device to encrypt the first personal identification number; encrypting, by the first communication device, the first personal identification number using the second encryption key; transmitting, by the first communication device to the second communication device, the encrypted first personal identification number; and conducting, by the first communication device with the second communication device, a peer-to-peer messaging session by transmitting to the second communication device peer-to-peer messages that contain the second personal identification number and receiving from the second communication device peer-to-peer messages that contain the first personal identification number, each peer-to-peer message being routed by a routing server based on the respective first and second personal identification numbers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A first mobile communication device having a first personal identification number and configured to communicate with a second communication device having a second personal identification number different from the first personal identification number, the first communication device comprising:
-
a processor; a memory; and a messaging application that is stored in the memory and executable by the processor to; transmit, to the second communication device, a first encryption key to enable the second communication device to encrypt the second personal identification number; receive, from the second communication device, the second personal identification number that has been encrypted by the second communication device using the first encryption key; decrypt the encrypted second personal identification number; receive, from the second communication device, a second encryption key to enable the first mobile communication device to encrypt the first personal identification number; encrypt the first personal identification number using the second encryption key; transmit, to the second communication device, the encrypted first personal identification number; and conduct a peer-to-peer messaging session with the second communication device, by transmitting to the second communication device peer-to-peer messages that contain the second personal identification number and receiving from the second communication device peer-to-peer messages that contain the first personal identification number. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification