Secure transfer of information
First Claim
1. A method for secure transfer of information through a centralized system, the method taking place in said centralized system and the method comprising:
- maintaining in said centralized system user account information, a user account of a certain user comprising at least a user id and associated public and private keys, the private key being retrievable by utilizing a password of said certain user,via a communication link, receiving identification information relating to a recipient,retrieving the public key of said recipient from said user account information by utilizing said identification information,receiving information content addressed to said recipient,storing in said centralized system said information content for said recipient in encrypted form, wherein said information content is symmetrically encrypted with a random key, and the random key is asymmetrically encrypted with said retrieved public key,storing in the centralized system the random key in encrypted form, andnotifying said recipient of said encrypted information content stored in said centralized system, whereinonly part of the private key is stored in the user account information, and a combination of the stored part of the private key and the password forming a full private key.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a method for secure transfer of information through a centralized system. The method comprising: maintaining user account information, a user account of a certain user comprising at least a user id and associated public and private keys, the private key being retrievable by means of a password of said certain user; receiving (411) identification information relating to a recipient; retrieving public key of said recipient from said user account information by means of said identification information; receiving (412) information content addressed to said recipient; storing (415) said information content for said recipient in encrypted form, said retrieved public key having been used in connection with encrypting said information content; and notifying (416) said recipient of the stored information content.
-
Citations
16 Claims
-
1. A method for secure transfer of information through a centralized system, the method taking place in said centralized system and the method comprising:
-
maintaining in said centralized system user account information, a user account of a certain user comprising at least a user id and associated public and private keys, the private key being retrievable by utilizing a password of said certain user, via a communication link, receiving identification information relating to a recipient, retrieving the public key of said recipient from said user account information by utilizing said identification information, receiving information content addressed to said recipient, storing in said centralized system said information content for said recipient in encrypted form, wherein said information content is symmetrically encrypted with a random key, and the random key is asymmetrically encrypted with said retrieved public key, storing in the centralized system the random key in encrypted form, and notifying said recipient of said encrypted information content stored in said centralized system, wherein only part of the private key is stored in the user account information, and a combination of the stored part of the private key and the password forming a full private key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus, comprising:
-
a storage area configured to store user account information, a user account of a certain user comprising at least a user id and the associated public and private keys, the private key being retrievable by utilizing a password of said certain user, an input configured to receive identification information relating to a recipient and information content addressed to said recipient, a processor configured to retrieve public key of said recipient from said user account information by utilizing said identification information, and a second storage area configured to store said information content for said recipient in encrypted form, wherein said information content is symmetrically encrypted with a random key, and the random key is asymmetrically encrypted with said retrieved public key, the storage area being configured to store the random key in encrypted form, wherein the processor being further configured to notify said recipient of said encrypted information content stored in said apparatus, wherein the storage area is configured to store only part of the private key, and a combination of the stored part of the private key and the password forming a full private key. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A memory embodying a computer executable program code, which when executed by a processor of a centralized system is configured to control the centralized system to perform
maintaining in said centralized system user account information, a user account of a certain user comprising at least a user id and the associated public and private keys, the private key being retrievable by utilizing password of said certain user, receiving identification information relating to a recipient, retrieving public key of said recipient from said user account information by utilizing said identification information, receiving information content addressed to said recipient, storing in said centralized system said information content for said recipient in encrypted form, wherein said information content is symmetrically encrypted with a random key, and the random key is asymmetrically encrypted with said retrieved public key, storing in the centralized system the random key in encrypted form, and notifying said recipient of said encrypted information content stored in said centralized system, wherein only part of the private key is stored in the user account information, and combination of the stored part of the private key and the password forming a full private key.
Specification