Multi party messaging
First Claim
Patent Images
1. A system, comprising:
- a first interface configured to receive, from a user, an indication of a plurality of message recipients;
a second interface configured to;
request, from a first server, a plurality of public keys associated with the plurality of recipients;
a processor configured to;
encrypt a message containing one or more components using a symmetric key;
encrypt the symmetric key a plurality of times, using each of the respective public keys, to generate a plurality of encrypted symmetric keys;
encapsulate the encrypted message and the plurality of encrypted symmetric keys in an encapsulation, wherein the encapsulation includes, for at least some message recipients, at least one of an individual device identifier and an individual application identifier associated with the respective at least some recipients, and wherein the encapsulation is performed, at least in part, using a spreading function; and
transmit the encapsulation to a second server; and
a memory coupled to the processor and configured to provide the processor with instructions.
4 Assignments
0 Petitions
Accused Products
Abstract
Multi-party messaging is disclosed. A plurality of public keys is requested from a first server, wherein the plurality of public keys is associated with a plurality of recipients. A message containing one or more components is encrypted using a symmetric key. The symmetric key is encrypted, using each of the respective public keys, resulting in a plurality of encrypted symmetric keys. The encrypted message and the encrypted symmetric keys are encapsulated in an encapsulation. The encapsulation is transmitted to a second server.
40 Citations
18 Claims
-
1. A system, comprising:
-
a first interface configured to receive, from a user, an indication of a plurality of message recipients; a second interface configured to; request, from a first server, a plurality of public keys associated with the plurality of recipients; a processor configured to; encrypt a message containing one or more components using a symmetric key; encrypt the symmetric key a plurality of times, using each of the respective public keys, to generate a plurality of encrypted symmetric keys; encapsulate the encrypted message and the plurality of encrypted symmetric keys in an encapsulation, wherein the encapsulation includes, for at least some message recipients, at least one of an individual device identifier and an individual application identifier associated with the respective at least some recipients, and wherein the encapsulation is performed, at least in part, using a spreading function; and transmit the encapsulation to a second server; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, comprising:
-
receiving, from a user, an indication of a plurality of message recipients; requesting, from a first server, a plurality of public keys associated with the plurality of recipients; encrypting a message containing one or more components using a symmetric key; encrypting the symmetric key a plurality of times, using each of the respective public keys, to generate a plurality of encrypted symmetric keys; encapsulating the encrypted message and the plurality of encrypted symmetric keys in an encapsulation, wherein the encapsulation includes, for at least some message recipients, at least one of an individual device identifier and an individual application identifier associated with the respective at least some recipients, and wherein the encapsulation is performed, at least in part, using a spreading function; and transmitting the encapsulation to a second server. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product embodied in a non-transitory tangible computer readable storage medium and comprising computer instructions for:
-
receiving, from a user, an indication of a plurality of message recipients; requesting, from a first server, a plurality of public keys associated with the plurality of recipients; encrypting a message containing one or more components using a symmetric key; encrypting the symmetric key a plurality of times, using each of the respective public keys, to generate a plurality of encrypted symmetric keys; encapsulating the encrypted message and the plurality of encrypted symmetric keys in an encapsulation, wherein the encapsulation includes, for at least some message recipients, at least one of an individual device identifier and an individual application identifier associated with the respective at least some recipients, and wherein the encapsulation is performed, at least in part, using a spreading function; and transmitting the encapsulation to a second server. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification