Secure email communication system
First Claim
Patent Images
1. A method of securing a digital data stream, the method comprising:
- receiving, at a first location, a first key of a first asymmetric key pair from a remote key store;
deciphering the first key of the first asymmetric key pair with a first key of a second asymmetric key pair;
receiving a dynamically generated key;
enciphering the digital data stream with the dynamically generated key;
enciphering the dynamically generated key with the first key of the first asymmetric key pair; and
storing the enciphered digital data stream and the enciphered dynamically generated key.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for securing a digital data stream. A first key of a first asymmetric key pair from a key store remote from a host node is received at the host node. A dynamically generated key is received at the host node, which is used to encipher the digital data stream. The dynamically generated key is enciphered with the first key of the first asymmetric key pair. The enciphered digital data stream and the enciphered dynamically generated key are stored remotely from the host node and the key store.
-
Citations
16 Claims
-
1. A method of securing a digital data stream, the method comprising:
-
receiving, at a first location, a first key of a first asymmetric key pair from a remote key store; deciphering the first key of the first asymmetric key pair with a first key of a second asymmetric key pair; receiving a dynamically generated key; enciphering the digital data stream with the dynamically generated key; enciphering the dynamically generated key with the first key of the first asymmetric key pair; and storing the enciphered digital data stream and the enciphered dynamically generated key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A communications security system comprising:
-
a key store comprising a paired key list relating a first asymmetric key pair with at least one of a user indicia and a credential indicia; a database node, remote from the key store, wherein the database node comprises a database containing an enciphered message and an enciphered session key; and a host node remotely coupled to the key store through a key port and the database node through a database port, wherein the host node comprises; a data stream port; a dynamic key generation module; a first encipher module; a second encipher module; and a decipher module; wherein the host node is configured to receive a first key of the asymmetric key pair from the key store, and wherein the decipher module is configured to decipher the first key of the first asymmetric key pair with a first key of a second asymmetric key pair. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification