System and method for secure end-to-end chat system
First Claim
Patent Images
1. A method of securely transferring data during a communications session, comprising:
- connecting to a communications server by sending a request over a communications protocol by providing a client id and a server key;
validating the connection by a challenge response sequence;
initiating a communications session by either randomly generating a symmetric key or generating a key based on a user provided passphrase;
broadcasting an encrypted message to a set of communications participants comprising of a randomly generated salt used for calculating the next key for the session;
inviting a new user to the session providing the initial key and an IVec using ECIES and sending a resynchronization message with the new IVec to the group for the new client to participate.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides an efficient secure end-to-end messaging system utilizing encrypted ephemeral messages. The method comprises the steps of using a combination of HTTPS for transport security, using symmetric key cryptography with rotating temporary keys for individual message security, and using elliptic curve cryptography for key derivation and message authentication. The key rotation scheme used provides forward secrecy even between messages and perfect forward secrecy between sessions.
-
Citations
5 Claims
-
1. A method of securely transferring data during a communications session, comprising:
-
connecting to a communications server by sending a request over a communications protocol by providing a client id and a server key; validating the connection by a challenge response sequence; initiating a communications session by either randomly generating a symmetric key or generating a key based on a user provided passphrase; broadcasting an encrypted message to a set of communications participants comprising of a randomly generated salt used for calculating the next key for the session; inviting a new user to the session providing the initial key and an IVec using ECIES and sending a resynchronization message with the new IVec to the group for the new client to participate. - View Dependent Claims (2, 3, 4, 5)
-
Specification