System and method for enhanced data protection
First Claim
1. A method comprising, by an authentication server:
- receiving, from a sender computer system, an authentication header in relation to a network transmission initiated by the sender computer system, wherein the authentication header comprises;
an encrypted data subportion that includes an authorized recipient list and an encrypted first symmetric key, wherein the encrypted first symmetric key is encrypted via a second symmetric key; and
an encrypted third symmetric key that is distinct from the encrypted first symmetric key and the second symmetric key, wherein the encrypted data subportion is encrypted via the encrypted third symmetric key, wherein the encrypted third symmetric key is encrypted via a public key associated with the authentication server;
causing the received authentication header to be stored among a plurality of authentication headers in anticipation of recipient-initiated pre-access authentication;
receiving, from a recipient computer system, a recipient header in relation to an encrypted payload received by the recipient computer system from the sender computer system, wherein the recipient header comprises metadata and recipient authentication information;
causing the metadata of the recipient header to be correlated to the authentication header;
decrypting the encrypted third symmetric key via a private asymmetric key associated with the authentication server;
decrypting the encrypted data subportion via the decrypted encrypted third symmetric key; and
authenticating the recipient computer system as an authorized recipient of the encrypted payload based, at least in part, on a determined match between the recipient authentication information and the authorized recipient list of the decrypted encrypted data subportion.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key. The method further includes encrypting an author header comprising the encrypted first symmetric key and a recipient list via a third symmetric key, wherein the recipient list comprises at least one recipient. The method also includes encrypting the third symmetric key via a public asymmetric key associated with an authentication server. Furthermore, the method includes transmitting the encrypted author header and the encrypted third symmetric key to the authentication server for use in recipient-initiated pre-access authentication. In addition, the method includes transmitting the encrypted payload and the second symmetric key over a computer network to the at least one recipient.
126 Citations
17 Claims
-
1. A method comprising, by an authentication server:
-
receiving, from a sender computer system, an authentication header in relation to a network transmission initiated by the sender computer system, wherein the authentication header comprises; an encrypted data subportion that includes an authorized recipient list and an encrypted first symmetric key, wherein the encrypted first symmetric key is encrypted via a second symmetric key; and an encrypted third symmetric key that is distinct from the encrypted first symmetric key and the second symmetric key, wherein the encrypted data subportion is encrypted via the encrypted third symmetric key, wherein the encrypted third symmetric key is encrypted via a public key associated with the authentication server; causing the received authentication header to be stored among a plurality of authentication headers in anticipation of recipient-initiated pre-access authentication; receiving, from a recipient computer system, a recipient header in relation to an encrypted payload received by the recipient computer system from the sender computer system, wherein the recipient header comprises metadata and recipient authentication information; causing the metadata of the recipient header to be correlated to the authentication header; decrypting the encrypted third symmetric key via a private asymmetric key associated with the authentication server; decrypting the encrypted data subportion via the decrypted encrypted third symmetric key; and authenticating the recipient computer system as an authorized recipient of the encrypted payload based, at least in part, on a determined match between the recipient authentication information and the authorized recipient list of the decrypted encrypted data subportion. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An authentication system comprising a processor and memory, wherein the processor and the memory in combination are operable to perform a method comprising:
-
receiving, from a sender computer system, an authentication header in relation to a network transmission initiated by the sender computer system, wherein the authentication header comprises; an encrypted data subportion that includes an authorized recipient list and an encrypted first symmetric key, wherein the encrypted first symmetric key is encrypted via a second symmetric key; and an encrypted third symmetric key that is distinct from the encrypted first symmetric key and the second symmetric key, wherein the encrypted data subportion is encrypted via the encrypted third symmetric key, wherein the encrypted third symmetric key is encrypted via a public key associated with the authentication system; causing the received authentication header to be stored among a plurality of authentication headers in anticipation of recipient-initiated pre-access authentication; receiving, from a recipient computer system, a recipient header in relation to an encrypted payload received by the recipient computer system from the sender computer system, wherein the recipient header comprises metadata and recipient authentication information; causing the metadata of the recipient header to be correlated to the authentication header; decrypting the encrypted third symmetric key via a private asymmetric key associated with the authentication system; decrypting the encrypted data subportion via the decrypted encrypted third symmetric key; and authenticating the recipient computer system as an authorized recipient of the encrypted payload based, at least in part, on a determined match between the recipient authentication information and the authorized recipient list of the decrypted encrypted data subportion. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-program product comprising a non-transitory computer-usable medium having computer-readable program code embodied therein, the computer-readable program code adapted to be executed to implement a method comprising:
-
receiving, from a sender computer system, an authentication header in relation to a network transmission initiated by the sender computer system, wherein the authentication header comprises; an encrypted data subportion that includes an authorized recipient list and an encrypted first symmetric key, wherein the encrypted first symmetric key is encrypted via a second symmetric key; and an encrypted third symmetric key that is distinct from the encrypted first symmetric key and the second symmetric key, wherein the encrypted data subportion is encrypted via the encrypted third symmetric key, wherein the encrypted third symmetric key is encrypted via a public key associated with an authentication server; causing the received authentication header to be stored among a plurality of authentication headers in anticipation of recipient-initiated pre-access authentication; receiving, from a recipient computer system, a recipient header in relation to an encrypted payload received by the recipient computer system from the sender computer system, wherein the recipient header comprises metadata and recipient authentication information; causing the metadata of the recipient header to be correlated to the authentication header; decrypting the encrypted third symmetric key via a private asymmetric key associated with the authentication server; decrypting the encrypted data subportion via the decrypted encrypted third symmetric key; and authenticating the recipient computer system as an authorized recipient of the encrypted payload based, at least in part, on a determined match between the recipient authentication information and the authorized recipient list of the decrypted encrypted data subportion. - View Dependent Claims (16, 17)
-
Specification