×

Generating an encrypted message for storage

  • US 9,219,604 B2
  • Filed: 04/18/2012
  • Issued: 12/22/2015
  • Est. Priority Date: 05/09/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for execution by a processing module of a first computing device, the method comprises:

  • obtaining, by the processing module, a second public key of a second computing device, wherein the second public key is part of a second public/private key pair of the second computing device;

    receiving, by the processing module, an encrypted secret exponent from the second computing device, wherein a secret exponent was encrypted using a shared secret key;

    determining, by the processing module, the shared secret key based on the second public key and a first private key of the first computing device using a first modulo prime polynomial function, wherein a first public key of the first computing device is generated from the first private key using a second modulo prime polynomial function and wherein the second public key is derived using the second modulo prime polynomial function on a second private key of the second public/private key pair;

    decrypting, by the processing module, the encrypted secret exponent using the shared secret key to recover the secret exponent;

    generating, by the processing module, an encryption key based on the secret exponent and a password;

    encrypting, by the processing module, a message using the encryption key to produce an encrypted message; and

    outputting, by the processing module, the encrypted message to the second computing device, wherein the second computing device generates the encryption key based on the secret exponent and the password.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×