Digital security bubble
First Claim
Patent Images
1. A system, comprising:
- a processor configured to;
request an identifier associated with a first recipient, wherein the identifier comprises at least one of an application identifier and a device identifier;
encrypt a message, to be sent to at least the first recipient, using a first key;
encrypt the first key using a second key associated with the first recipient,wherein the processor is configured to obtain the second key and the identifier from a server;
encapsulate the encrypted message, the encrypted first key, and the identifier in a digital security bubble encapsulation; and
transmit the digital security bubble encapsulation to the first recipient; and
a memory coupled to the processor and configured to provide the processor with instructions.
4 Assignments
0 Petitions
Accused Products
Abstract
A digital security bubble encapsulation is disclosed. A first key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a second key. The second key is encrypted using the first key. The encrypted message, the encrypted second key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.
-
Citations
20 Claims
-
1. A system, comprising:
-
a processor configured to; request an identifier associated with a first recipient, wherein the identifier comprises at least one of an application identifier and a device identifier; encrypt a message, to be sent to at least the first recipient, using a first key; encrypt the first key using a second key associated with the first recipient, wherein the processor is configured to obtain the second key and the identifier from a server; encapsulate the encrypted message, the encrypted first key, and the identifier in a digital security bubble encapsulation; and transmit the digital security bubble encapsulation to the first recipient; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
requesting an identifier associated with a first recipient, wherein the identifier comprises at least one of an application identifier and a hardware identifier; encrypting a message, to be sent to at least the first recipient, using a first key; encrypting the first key using a second key associated with the first recipient, wherein the second key and the identifier are obtained from a server; encapsulating the encrypted message, the encrypted first key, and the identifier in a digital security bubble encapsulation; and transmitting the digital security bubble encapsulation to the first recipient. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A computer program product embodied in a tangible computer readable storage medium and comprising computer instructions for:
-
requesting an identifier associated with a first recipient, wherein the identifier comprises at least one of an application identifier and a hardware identifier; encrypting a message, to be sent to at least a the first recipient, using a first key; encrypting the first key using a second key associated with the first recipient, wherein the second key and the identifier are obtained from a server; encapsulating the encrypted message, the encrypted first key, and an the identifier in a digital security bubble encapsulation; and transmitting the digital security bubble encapsulation to the first recipient.
-
Specification