SYSTEM, METHOD AND COMPUTER PRODUCT FOR SENDING ENCRYPTED MESSAGES TO RECIPIENTS WHERE THE SENDER DOES NOT POSSESS THE CREDENTIALS OF THE RECIPIENT
2 Assignments
0 Petitions
Accused Products
Abstract
A system for encrypting and decrypting messages using a browser in either a web or wireless device or secure message client software for transmission to or from a web server on the Internet connected to an email server or message server for the situation where the sender does not possess the credentials and public key of the recipients. The encryption and decryption is conducted using a standard web browser on a personal computer or a mini browser on a wireless device, or message client software on either a personal computer or wireless devices such that messages transmitted to the web or wireless browser or message client software can be completed and encrypted and signed by the user such that encrypted and signed data does not require credentials and public key of the recipients. A method for delivering and using private keys to ensure that such keys are destroyed after use is also provided. A method of transmitting encrypted messages to a web or wireless browser or message client and decrypting and verifying such messages by recipients who do not possess or who are not enrolled in a PKI and do not have private keys. A method for authenticating the sender/user of the browser, and a method for accessing or generating public and private keys for encrypting and decrypting messages for recipients who are not enrolled in a public key infrastructure.
-
Citations
30 Claims
-
1-17. -17. (canceled)
-
18. A computer program product operable on a network-connected device for exchanging PKI compliant messages between a sender and one or more recipients, whereby the sender does not have access to the PKI credentials of at least one of the one or more recipients, said at least one of the one or more recipients corresponding to a non-credentialed recipient, the system comprising:
-
(a) A Public Key Cryptographic utility linked to a browser or a client communication program, or forming part of the browser or the client communication program, the Public Key Cryptography utility being configured to perform one or more cryptographic operations including encrypting/decrypting data, authenticating data, and/or authenticating a sender, decrypting and/or verifying data, the Public Key Cryptography utility being configured on a computer of the sender to; (i) Perform one or more of such cryptographic operations so as to create an encrypted message for communication to the recipient; and (ii) Identify that the sender does not have access to the PKI credentials of the non-credentialed recipient, and thereby initiate the creation of a secret shared between the sender and the non-credentialed recipient; and Wherein the Public Key Cryptographic utility cooperates with a server to invite the recipient to provide the shared secret so as to;
(i) obtain the encrypted message in a decrypted form in a secure session with the server;
or (ii) activate a Public Key Cryptography utility linked to the second network-connected device or to the server so as to access a private key linked to the encrypted message thereby enabling the Public Key Cryptography utility to decrypt the encrypted message. - View Dependent Claims (19, 20)
-
-
21. A method for sending an encrypted email message from a sender computer to a non-credentialed recipient at a recipient computer via a communication network, said method comprising:
-
generating the encrypted email message at the sender computer; sending the encrypted email message to the recipient computer via the communication network; notifying the non-credentialed recipient of the encrypted email message; providing the non-credentialed recipient with a shared secret question and receiving a shared secret answer to the shared secret question from the non-credentialed recipient; and verifying the answer from the non-credentialed recipient and if verified providing the recipient computer with a decryption code for decrypting the encrypted email message. - View Dependent Claims (22, 23)
-
-
24. A system for sending an encrypted email message to a non-credentialed recipient at a recipient computer via a communication network, said system comprising:
-
an application configured for encrypting an email message; an application configured for sending the encrypted email message to the recipient computer via the communication network; an application configured for notifying the non-credentialed recipient of the encrypted email message; an application configured for providing the non-credentialed recipient with a shared secret question and receiving a shared secret answer to the shared secret question from the non-credentialed recipient; and said application including a component for verifying the answer from the non-credentialed recipient and if verified providing the recipient computer with a decryption code for decrypting the encrypted email message. - View Dependent Claims (25, 26)
-
-
27. A computer program product for sending an encrypted email message from a sender computer to a non-credentialed recipient at a recipient computer via a communication network, said computer program product comprising:
-
a storage medium configured for storing executable instructions; said executable instructions comprising instructions for, generating the encrypted email message at the sender computer; sending the encrypted email message to the recipient computer via the communication network; notifying the non-credentialed recipient of the encrypted email message; providing the non-credentialed recipient with a shared secret question and receiving a shared secret answer to the shared secret question from the non-credentialed recipient; and verifying the answer from the non-credentialed recipient and if verified providing the recipient computer with a decryption code for decrypting the encrypted email message. - View Dependent Claims (28, 29)
-
-
30-36. -36. (canceled)
Specification