Method of encrypting and transferring data between a sender and a receiver using a network
First Claim
1. A method of encrypting and transferring data between senders and receivers over a network, the method comprising:
- receiving, by a server, an identifier of a receiver from a sender;
encrypting data to be transferred between the sender and the receiver using an encryption key;
retrieving, by the server, information specific to the receiver using the identifier of the receiver received from the sender;
encrypting the encryption key using the retrieved information specific to the receiver;
transferring the encrypted data and the encrypted encryption key over the network for receipt by the receiver;
receiving, by the server, from the receiver to which the encrypted data and the encrypted encryption key has been transferred, the identifier of the receiver and the encrypted encryption key;
retrieving, by the server, the information specific to the receiver using the identifier of the receiver received from the receiver, and using the retrieved information specific to the receiver to decrypt the encrypted encryption key; and
decrypting the encrypted data using the decrypted encryption key.
10 Assignments
0 Petitions
Accused Products
Abstract
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of a server receiving from the sender an identifier of the receiver; generating a transfer specific encryption key specific to the transfer; encrypting the data using the generated transfer specific encryption key; the server retrieving information specific to the receiver that is accessed according to the identifier of the receiver received from the sender, and using the retrieved information specific to the receiver to encrypt the transfer specific encryption key; transferring the encrypted data and the encrypted transfer specific encryption key over the network for receipt by the receiver; the server receiving from the receiver the encrypted transfer specific encryption key and identifier of the receiver; the server retrieving information specific to the receiver that is accessed according to the identifier of the receiver received from the receiver, and using the retrieved information specific to the receiver to decrypt the encrypted transfer specific encryption key; and decrypting the encrypted data using the decrypted transfer specific encryption key.
-
Citations
30 Claims
-
1. A method of encrypting and transferring data between senders and receivers over a network, the method comprising:
-
receiving, by a server, an identifier of a receiver from a sender; encrypting data to be transferred between the sender and the receiver using an encryption key; retrieving, by the server, information specific to the receiver using the identifier of the receiver received from the sender; encrypting the encryption key using the retrieved information specific to the receiver; transferring the encrypted data and the encrypted encryption key over the network for receipt by the receiver; receiving, by the server, from the receiver to which the encrypted data and the encrypted encryption key has been transferred, the identifier of the receiver and the encrypted encryption key; retrieving, by the server, the information specific to the receiver using the identifier of the receiver received from the receiver, and using the retrieved information specific to the receiver to decrypt the encrypted encryption key; and decrypting the encrypted data using the decrypted encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of encrypting and transferring data between senders and receivers using a network, the method performed by a server and comprising:
-
receiving from a sender an identifier of a receiver; retrieving information specific to the receiver using the identifier of the receiver received from the sender; encrypting, using the retrieved information specific to the receiver, an encryption key that is used to encrypt data to be transferred between the sender and the receiver; receiving from the receiver, to which the encrypted data and the encrypted encryption key have been transferred over the network, the identifier of the receiver and the encrypted encryption key; and retrieving the information specific to the receiver that is accessed according to the identifier of the receiver received from the receiver, and using the retrieved information specific to the receiver to decrypt the encrypted encryption key. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A system comprising:
-
one or more memories storing instructions; and one or more processors configured to execute the instructions to; receive from a sender an identifier of a receiver; retrieve information specific to the receiver using the identifier of the receiver received from the sender; encrypt, using the retrieved information specific to the receiver, an encryption key that is used to encrypt data to be transferred between the sender and the receiver; receive, from the receiver to which the encrypted data and the encrypted encryption key have been transferred over the network, the identifier of the receiver and the encrypted encryption key; and retrieve the information specific to the receiver that is accessed according to the identifier of the receiver received from the receiver, and use the retrieved information specific to the receiver to decrypt the encrypted encryption key. - View Dependent Claims (28, 29, 30)
-
Specification