Secure message forwarding with sender controlled decryption
First Claim
Patent Images
1. A method of storing and facilitating secure transmission of data comprising:
- receiving, by a processor of a service provider system, data encrypted by a sender system, wherein the service provider lacks the capability of decrypting the data as encrypted by the sender system;
storing, by the service provider system, the data as encrypted by the sender system;
receiving, by the service provider system, a request for the data, the request for the data received from a recipient system and independently of the sender system;
receiving, by the service provider system, authentication data, the authentication data received from the recipient system;
transmitting, by the service provider system, the authentication data, the authentication data transmitted to the sender system;
receiving, by the service provider system, an indication that the authentication data is valid, the indication received from the sender system;
as a result of receiving the indication that the authentication data is valid, determining the recipient system is authorized to receive the data; and
as a result of determining the recipient system is authorized to receive the data, transmitting the data as encrypted by the sender system, the data transmitted from the service provider system to the sender system configured to decrypt and transmit the data to the recipient system.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatuses, and computer program products are provided for facilitating the secure transmission and storage of data. In this regard, a method is provided that comprises causing data encrypted by a sender system to be received at a service provider system; causing the data as encrypted by the sender system to be stored at the service provider system; receiving a request for the data from a recipient system; determining the recipient system is authorized to receive the data; and causing the data as encrypted to be transmitted to the sender system.
15 Citations
55 Claims
-
1. A method of storing and facilitating secure transmission of data comprising:
-
receiving, by a processor of a service provider system, data encrypted by a sender system, wherein the service provider lacks the capability of decrypting the data as encrypted by the sender system; storing, by the service provider system, the data as encrypted by the sender system; receiving, by the service provider system, a request for the data, the request for the data received from a recipient system and independently of the sender system; receiving, by the service provider system, authentication data, the authentication data received from the recipient system; transmitting, by the service provider system, the authentication data, the authentication data transmitted to the sender system; receiving, by the service provider system, an indication that the authentication data is valid, the indication received from the sender system; as a result of receiving the indication that the authentication data is valid, determining the recipient system is authorized to receive the data; and as a result of determining the recipient system is authorized to receive the data, transmitting the data as encrypted by the sender system, the data transmitted from the service provider system to the sender system configured to decrypt and transmit the data to the recipient system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product comprising a non-transitory computer readable storage medium and computer program instructions stored therein, the computer program instructions comprising program instructions that, when executed by a processor of a service provider system, are configured to cause the service provider system to at least:
-
receive, by the processor of the service provider system, data encrypted by a sender system, wherein the service provider lacks the capability of decrypting the data as encrypted by the sender system; store, by the service provider system, the data as encrypted by the sender system; receive, by the service provider system, a request for the data, the request for the data received from a recipient system and independently of the sender system; receive, by the service provider system, authentication data, the authentication data received from the recipient system; transmit, by the service provider system, the authentication data, the authentication data transmitted to the sender system; receive, by the service provider system, an indication that the authentication data is valid, the indication received from the sender system; as a result of receiving the indication that the authentication data is valid, determine the recipient system is authorized to receive the data; and as a result of determining the recipient system is authorized to receive the data, transmit the data as encrypted by the sender system, the data transmitted from the service provider system to the sender system configured to decrypt and transmit the data to the recipient system.
-
-
10. A method of secure transmission of data between a sender system and a recipient system comprising:
-
encrypting data by a processor of a sender system; transmitting, by the sender system, the data as encrypted, the data as encrypted transmitted to a service provider system that lacks the capability of decrypting the data as encrypted by the sender system, wherein the service provider system is distinct from the sender system; receiving, by the sender system, authentication data generated by a recipient system and received from the service provider system; determining, by the sender system, that the authentication data is valid; transmitting, by the sender system, an indication that the authentication is valid, the indication transmitted to the service provider system; in response to transmitting the indication that the authentication data is valid, receiving, by the sender system, the data as encrypted by the sender system and received from the service provider system; decrypting, by the sender system, the data; and transmitting, by the sender system, the data as decrypted to the recipient system. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product comprising a non-transitory computer readable storage medium and computer program instructions stored therein, the computer program instructions comprising program instructions that, when executed by a processor of a sender system, are configured to cause the sender system to at least:
-
encrypt data by the processor of the sender system; transmit, by the sender system, the data as encrypted, the data as encrypted transmitted to a service provider system that lacks the capability of decrypting the data as encrypted by the sender system, wherein the service provider system is distinct from the sender system; receive, by the sender system, authentication data generated by a recipient system and received from the service provider system; determine, by the sender system, that the authentication data is valid; transmit, by the sender system, an indication that the authentication is valid, the indication transmitted to the service provider system; in response to transmitting the indication that the authentication data is valid, receive, by the sender system, the data as encrypted by the sender system and received from the service provider system; decrypt, by the sender system, the data; and transmit, by the sender system, the data as decrypted to the recipient system.
-
-
21. A method of receiving data from a sender system at a recipient system comprising:
-
receiving, by a recipient system, a user input associated with retrieving data from a service provider system, wherein the service provider system stores the data that has been encrypted by a sender system, the service provider system lacks the capability of decrypting the data as encrypted by the sender system, and the service provider system is distinct from the sender system; providing, by a processor of the recipient system, authentication data, the authentication data provided to the service provider system, wherein the service provider system is operable to transmit the authentication data to the sender system, receive an indication that the authentication data is valid from the sender system, and as a result of receiving the indication that the authentication data is valid, transmit the data as encrypted to the sender system; and receiving, by the recipient system, the data, wherein the data is received from the sender system and the data has been decrypted by the sender system in response to the sender system having received the data as encrypted from the service provider system. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer program product comprising a non-transitory computer readable storage medium and computer program instructions stored therein, the computer program instructions comprising program instructions that, when executed by a processor of a recipient system, are configured to cause the recipient system to at least:
-
receive, by the recipient system, a user input associated with retrieving data from a service provider system, wherein the service provider system stores the data that has been encrypted by a sender system, the service provider system lacks the capability of decrypting the data as encrypted by the sender system, and the service provider system is distinct from the sender system; provide, by the processor of the recipient system, authentication data, the authentication data provided to the service provider system, wherein the service provider system is operable to transmit the authentication data to the sender system, receive an indication that the authentication data is valid from the sender system, and as a result of receiving the indication that the authentication data is valid, transmit the data as encrypted to the sender system; and receive, by the recipient system, the data, wherein the data is received from the sender system and the data has been decrypted by the sender system in response to the sender system having received the data as encrypted from the service provider system.
-
-
30. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least; receive, by a processor of a service provider system, data encrypted by a sender system, wherein the service provider system lacks the capability of decrypting the data as encrypted by the sender system; store, by the service provider system, the data as encrypted by the sender system; receive, by the service provider system, a request for the data, the request for the data received from a recipient system and independently of the sender system; receive, by the service provider system, authentication data, the authentication data received from the recipient system; transmit, by the service provider system, the authentication data, the authentication data transmitted to the sender system; receive, by the service provider system, an indication that the authentication data is valid, the indication received from the sender system; as a result of receiving the indication that the authentication data is valid, determine the recipient system is authorized to receive the data; and as a result of determining the recipient system is authorized to receive the data, transmit the data as encrypted by the sender system, the data transmitted from the service provider system to the sender system configured to decrypt and transmit the data to the recipient system. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37)
-
-
38. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least; encrypt data by a sender system; transmit, by the sender system, the data as encrypted, the data as encrypted transmitted to a service provider system that lacks the capability of decrypting the data as encrypted by the sender system, wherein the service provider system is distinct from the sender system; receive, by the sender system, authentication data generated by a recipient system and received from the service provider system; determine, by the sender system, that the authentication data is valid; transmit, by the sender system, an indication that the authentication is valid, the indication transmitted to the service provider system; in response to transmitting the indication that the authentication data is valid, receive, by the sender system, the data as encrypted by the sender system and received from the service provider system; decrypt, by the sender system, the data; and transmit, by the sender system, the data as decrypted to a recipient system. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least; receive, by a recipient system, a user input associated with retrieving data from a service provider system, wherein the service provider system stores the data that has been encrypted by a sender system, the service provider system lacks the capability of decrypting the data as encrypted by the sender system, and the service provider system is distinct from the sender system; provide authentication data, the authentication data provided to the service provider system, wherein the service provider system is operable to transmit the authentication data to the sender system, receive an indication that the authentication data is valid from the sender system, and as a result of receiving the indication that the authentication data is valid, transmit the data as encrypted to the sender system; and receive, by the recipient system, the data, wherein the data is received from the sender system and the data has been decrypted by the sender system in response to the sender system having received the data as encrypted from the service provider system. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55)
-
Specification