Secure short message service (SMS) communications
First Claim
1. A computer system, comprising:
- a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the computer system to perform operations comprising;
receiving an encrypted message from a first computing device and a key from a sender associated with the first computing device;
verifying the received key, at least in part, based on a comparison with a pre-determined key;
processing one or more factors associated with the sender in view of the verifying;
decrypting the encrypted message;
re-encrypting a result of the decrypting using a key of a receiver associated with a second computing device; and
providing the re-encrypted result to the receiver associated with the second computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and computer program products for providing secure messaging communications are disclosed. For example, a computer-implemented method may include receiving an encrypted message and a key from a sender associated with a first computing device where the encrypted message is generated by the first computing device, verifying the received key at least in part based on a comparison with a pre-determined key, processing one or more unique factors associated with the sender in view of verifying the received key, decrypting the encrypted message, re-encrypting a result of the decrypting using a key of a receiver associated with a second computing device, and sending the re-encrypted result to the receiver associated with the second computing device.
-
Citations
20 Claims
-
1. A computer system, comprising:
-
a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the computer system to perform operations comprising; receiving an encrypted message from a first computing device and a key from a sender associated with the first computing device; verifying the received key, at least in part, based on a comparison with a pre-determined key; processing one or more factors associated with the sender in view of the verifying; decrypting the encrypted message; re-encrypting a result of the decrypting using a key of a receiver associated with a second computing device; and providing the re-encrypted result to the receiver associated with the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause performance of operations comprising:
-
receiving an encrypted message and a key associated with a sender of the encrypted message from a first computing device; verifying the received key, at least in part, based on a comparison with a pre-determined key; processing one or more factors associated with the first computing device in view of the verifying; decrypting the encrypted message; re-encrypting a result of the decrypting using a key of a receiver associated with a second computing device; and providing the re-encrypted result to the receiver associated with the second computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method, comprising:
-
receiving, by one or more hardware processors, an encrypted message and a key from a first computing device; verifying, by one or more of the hardware processors, the received key, at least in part, based on a comparison with a pre-determined key; processing, by one or more of the hardware processors, one or more unique factors associated with a sender of the encrypted message in view of the verifying; decrypting, by one or more of the hardware processors, the encrypted message; re-encrypting, by one or more of the hardware processors, a result of the decrypting using a key of a receiver associated with a second computing device; and sending, by one or more of the hardware processors, the re-encrypted result to the receiver associated with the second computing device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification