Enhanced message security
First Claim
1. A secure messaging method comprising the steps of:
- receiving from over a public computer communications network, by a receiving computing device of an intended message recipient, an encrypted message from a computing device of a message source, said message having been encrypted using an encryption key based on a token uniquely identifying a pervasive device personally associated with the message recipient and separate from the receiving computing device; and
,responding to the receipt of the encrypted message in the receiving computing device by establishing a short-range wireless link with the pervasive device, querying said pervasive device over said wireless link, obtaining by the receiving device from the pervasive device over the short-range wireless link a decryption key formulated based upon the token and decrypting said encrypted message received from the computing device of the message source, by the receiving computing device, using said obtained decryption key from the pervasive device from over the short range wireless link.
0 Assignments
0 Petitions
Accused Products
Abstract
A secure messaging system and method includes receiving an encrypted message, the message having been encrypted using a token of a corresponding pervasive device; wirelessly verifying the presence of the pervasive device; and, if the presence can be verified, decrypting the message using the token. The verification step can include the steps of establishing a wireless link with the pervasive device; and, querying the pervasive device over the wireless link. The establishing step can include the step of establishing a Bluetooth link with the pervasive device. Furthermore, the querying step can include the step of requesting geographic coordinates which locate the pervasive device.
-
Citations
8 Claims
-
1. A secure messaging method comprising the steps of:
-
receiving from over a public computer communications network, by a receiving computing device of an intended message recipient, an encrypted message from a computing device of a message source, said message having been encrypted using an encryption key based on a token uniquely identifying a pervasive device personally associated with the message recipient and separate from the receiving computing device; and
,responding to the receipt of the encrypted message in the receiving computing device by establishing a short-range wireless link with the pervasive device, querying said pervasive device over said wireless link, obtaining by the receiving device from the pervasive device over the short-range wireless link a decryption key formulated based upon the token and decrypting said encrypted message received from the computing device of the message source, by the receiving computing device, using said obtained decryption key from the pervasive device from over the short range wireless link. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer-readable storage device having stored thereon a computer program for secured messaging, said computer program comprising a set of instructions which when executed by a processor causes a computer to perform the steps of:
-
receiving from over a public computer communications network, by a receiving computing device of an intended message recipient, an encrypted message from a computing device of a message source, said message having been encrypted using an encryption key based on a token uniquely identifying a pervasive device personally associated with the message recipient and separate from the receiving computing device; and
,responding to the receipt of the encrypted message in the receiving computing device by establishing a short-range wireless link with the pervasive device, querying said pervasive device over said wireless link, obtaining by the receiving device from the pervasive device over the short-range wireless link a decryption key formulated based upon the token and decrypting said encrypted message received from the computing device of the message source, by the receiving computing device, using said obtained decryption key from the pervasive device from over the short range wireless link. - View Dependent Claims (6, 7, 8)
-
Specification