Decentralized authoritative messaging
First Claim
Patent Images
1. A system, comprising:
- a processor configured to;
receive, at a first device, a first encrypted communication from a second device during a secure communication session;
transmit, from the first device, a request to corroborate a validity of the first encrypted communication to at least one second device;
receive, at the first device, a response from the at least one second device that indicates the validity of the first encrypted communication; and
store, by the first device, the first encrypted communication in a secure memory when the validity of the first encrypted communication is corroborated by at least one second device; and
a memory coupled to the processor and configured to provide the processor with instructions.
4 Assignments
0 Petitions
Accused Products
Abstract
A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In particular, the secure chat client allows users to create, configure, and manage secure chat rooms. Furthermore, the secure chat client provides users with the ability to recover secure messages when they obtain a new device or otherwise lose communications.
159 Citations
17 Claims
-
1. A system, comprising:
-
a processor configured to; receive, at a first device, a first encrypted communication from a second device during a secure communication session; transmit, from the first device, a request to corroborate a validity of the first encrypted communication to at least one second device; receive, at the first device, a response from the at least one second device that indicates the validity of the first encrypted communication; and store, by the first device, the first encrypted communication in a secure memory when the validity of the first encrypted communication is corroborated by at least one second device; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, at a first device, a first encrypted communication from a second device during a secure communication session; transmitting from the first device, a request to corroborate a validity of the first encrypted communication to at least one second device; receiving, at the first device, a response from the at least one second device that indicates the validity of the first encrypted communication; and storing, by the first device, the first encrypted communication in a secure memory when the validity of the first encrypted communication is corroborated by at least one second device. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium comprising instructions that when, executed by at least one processor, perform the steps of:
-
receiving a first encrypted communication from a second device during a secure communication session; transmitting a request to corroborate a validity of the first encrypted communication to at least one second device; receiving, at the first device, a response from the at least one second device that indicates the validity of the first encrypted communication; and storing the first encrypted communication in a secure memory when the validity of the first encrypted communication is corroborated by at least one second device. - View Dependent Claims (14, 15, 16, 17)
-
Specification