System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient
First Claim
1. A non-transitory computer program product operable on a network-connected device for exchanging PKI compliant messages between a sender and one or more recipients, whereby the sender does not have access to the PKI credentials of at least one of the one or more recipients, said at least one of the one or more recipients corresponding to a non- credentialed recipient, said non-transitory computer program product comprising:
- (a) a Public Key Cryptographic utility linked to a browser or a client communication program, or forming part of the browser or the client communication program, the Public Key Cryptography utility being configured to perform one or more cryptographic operations including encrypting/decrypting data, authenticating data, and/or authenticating a sender, decrypting and/or verifying data, the Public Key Cryptography utility being configured on a computer of the sender to;
(i) perform one or more of such cryptographic operations so as to create an encrypted message for communication to the recipient; and
(ii) identify that the sender does not have access to the PKI credentials of the non-credentialed recipient, and thereby initiate the creation of a secret shared between the sender and the non-credentialed recipient; and
wherein the Public Key Cryptographic utility cooperates with a server to invite the recipient to provide the shared secret so as to;
(i) obtain the encrypted message in a decrypted form in a secure session with the server;
or (ii) activate a Public Key Cryptography utility linked to the second network-connected device or to the server so as to access a private key linked to the encrypted message thereby enabling the Public Key Cryptography utility to decrypt the encrypted message.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for encrypting and decrypting messages using a browser in either a web or wireless device or secure message client software for transmission to or from a web server on the Internet connected to an email server or message server for the situation where the sender does not possess the credentials and public key of the recipients. The encryption and decryption is conducted using a standard web browser on a personal computer or a mini browser on a wireless device, or message client software on either a personal computer or wireless devices such that messages transmitted to the web or wireless browser or message client software can be completed and encrypted and signed by the user such that encrypted and signed data does not require credentials and public key of the recipients. A method for delivering and using private keys to ensure that such keys are destroyed after use is also provided. A method of transmitting encrypted messages to a web or wireless browser or message client and decrypting and verifying such messages by recipients who do not possess or who are not enrolled in a PKI and do not have private keys. A method for authenticating the sender/user of the browser, and a method for accessing or generating public and private keys for encrypting and decrypting messages for recipients who are not enrolled in a public key infrastructure.
-
Citations
7 Claims
-
1. A non-transitory computer program product operable on a network-connected device for exchanging PKI compliant messages between a sender and one or more recipients, whereby the sender does not have access to the PKI credentials of at least one of the one or more recipients, said at least one of the one or more recipients corresponding to a non- credentialed recipient, said non-transitory computer program product comprising:
-
(a) a Public Key Cryptographic utility linked to a browser or a client communication program, or forming part of the browser or the client communication program, the Public Key Cryptography utility being configured to perform one or more cryptographic operations including encrypting/decrypting data, authenticating data, and/or authenticating a sender, decrypting and/or verifying data, the Public Key Cryptography utility being configured on a computer of the sender to; (i) perform one or more of such cryptographic operations so as to create an encrypted message for communication to the recipient; and (ii) identify that the sender does not have access to the PKI credentials of the non-credentialed recipient, and thereby initiate the creation of a secret shared between the sender and the non-credentialed recipient; and wherein the Public Key Cryptographic utility cooperates with a server to invite the recipient to provide the shared secret so as to;
(i) obtain the encrypted message in a decrypted form in a secure session with the server;
or (ii) activate a Public Key Cryptography utility linked to the second network-connected device or to the server so as to access a private key linked to the encrypted message thereby enabling the Public Key Cryptography utility to decrypt the encrypted message. - View Dependent Claims (2, 3)
-
-
4. A method for sending an encrypted email message from a sender computer to a non-credentialed recipient at a recipient computer via a communication network, said method comprising:
-
generating an email message at the sender computer; retrieving one or more credentials associated with the non-credentialed recipient; if said one or more credentials are unavailable generating a shared secret question having a shared secret answer; utilizing a public key cryptography utility to encrypt said email message; sending the encrypted email message to the recipient computer via the communication network; notifying the non-credentialed recipient of the encrypted email message; providing the non-credentialed recipient with said shared secret question and receiving a shared secret answer to the shared secret question from the non-credentialed recipient; and verifying the answer from the non-credentialed recipient and if verified providing the recipient computer with a decryption code for decrypting the encrypted email message, said decryption code comprising a private key associated with a public key, and said private key being encoded based on said shared secret.
-
-
5. A system for sending an encrypted email message to a non-credentialed recipient at a recipient computer via a communication network, said system comprising:
-
an application configured for generating an email message; an application configured for retrieving one or more credentials associated with the non-credential recipient; an application configured for generating a shared secret question having a shared secret answer if said one or more credentials are unavailable; an application comprising a public key cryptography utility configured for encrypting said email message and sending the encrypted email message to the recipient computer via the communication network; an application configured for notifying the non-credentialed recipient of the encrypted email message; an application configured for providing the non-credentialed recipient with the shared secret question and receiving a shared secret answer to the shared secret question from the non-credentialed recipient; and said application including a component for verifying the answer from the non- credentialed recipient and if verified providing the recipient computer with a decryption code for decrypting the encrypted email message, wherein said decryption code comprises a private key associated with a public key, and said private key is encoded based on said shared secret.
-
-
6. A non-transitory computer program product for sending an encrypted email message from a sender computer to a non-credentialed recipient at a recipient computer via a communication network, said non-transitory computer program product comprising:
-
a storage medium configured for storing executable instructions; said executable instructions comprising instructions for, generating an email message at the sender computer; retrieving one or more credentials associated with the non-credentialed recipient; if said one or more credentials are unavailable generating a shared secret question having a shared secret answer; utilizing a public key cryptography utility to encrypt said email message; sending the encrypted email message to the recipient computer via the communication network; notifying the non-credentialed recipient of the encrypted email message; providing the non-credentialed recipient with the shared secret question and receiving a shared secret answer to the shared secret question from the non-credentialed recipient; and verifying the answer from the non-credentialed recipient and if verified providing the recipient computer with a decryption code for decrypting the encrypted email message, wherein said decryption code comprises a private key associated with a public key,and said public key cryptography utility, and said private key is encoded based on said shared secret.
-
-
7. A system for sending an encrypted email message to a non-credentialed recipient at a recipient computer via a communication network, said system comprising:
-
an email component configured to generate an email message; a credential retrieval component configured to retrieve one or more credentials associated with the non-credentialed recipient; a shared secret generation component configured to generate a shared secret question having a shared secret answer if said one or more credentials are unavailable; an encryption component comprising a public key cryptography utility configured to encrypt said email message; said email component being configured to send said encrypted email to the recipient computer via the communication network; a notification component configured to notify the non-credentialed recipient of the encrypted email message; a verification component configured to provide the non-credentialed recipient with the shared secret question; and said verification component being configured to receive a shared secret answer from the non-credentialed recipient and comprising a logic component configured to verify said shared secret answer from the non-credentialed recipient, and if verified, said verification component comprising a release component configured to release a decryption code for decrypting the encrypted email message at the recipient computer, wherein said decryption code comprises a private key associated with a public key in said public key cryptography utility, and said private key being encoded with said shared secret answer.
-
Specification