×

Method of decrypting encrypted information for unsecure phone

  • US 9,049,025 B1
  • Filed: 06/20/2011
  • Issued: 06/02/2015
  • Est. Priority Date: 06/20/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a server, registration information of a plurality of devices, including information indicating whether each device is a secure device having encryption and decryption capabilities or a non-secure device not having encryption and decryption capabilities;

    distributing, by a key management server, to the server and to the secure devices, respective encryption and decryption keys;

    receiving, in the server, information encrypted by and sent from one of the secure devices to an intended recipient device through a communication network, the encrypted information being accompanied with information identifying the intended recipient and the encrypted information being encrypted using the respective secure device encryption key that is different from the encryption keys used by other secure devices;

    determining in the server, based on the recipient information and the registration information, whether a device of the intended recipient is a secure or a non-secure device; and

    upon determining that the intended recipient device is a non-secure device;

    storing the encrypted information with a reference identifier identifying the encrypted information;

    sending a notification message to the intended recipient device, the notification message including;

    (a) a flag indicating that the server received the encrypted information addressed to the intended recipient device and, (b) the reference identifier;

    receiving a response to the notification message from the intended recipient device, the response including the reference identifier and a token acquired by the intended recipient device from an authentication and authorization system connected to the communication network via direct communication between the intended recipient device and the authentication and authorization systems, wherein the authentication and authorization system is different from the server;

    after receiving the response, authenticating the intended recipient device by the server, based on the token received in the response to the notification message by communicating with the authentication and authorization system through the communication network;

    decrypting the encrypted information identified by the reference identifier included in the response using the decryption key of the secure device wherein the decryption key of the secure device is different from the token;

    establishing, by the server, a secured network connection between the server and the intended recipient device; and

    sending the decrypted information, to the intended recipient device, via the established secured network connection;

    wherein at least one of the decrypting and sending steps is responsive to the server determining, based on the communication with the authentication and authorization system, that the token is valid.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×