×

Public key cryptosystem with roaming user capability

  • US 6,292,895 B1
  • Filed: 06/19/2000
  • Issued: 09/18/2001
  • Est. Priority Date: 11/25/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A system for sending an encrypted digital message from a client sender machine to a client recipient machine over a network, comprising:

  • a client computer operable to access a pop proxy, said client computer comprising;

    a pop proxy operable to access an Enabler computer program, said pop proxy further operable to transmit and receive an encrypted digital message to and from a pop server;

    a client memory operable to store said Enabler computer program;

    a client processor electrically connected to said client memory, said client processor operable to execute said Enabler computer program such that said client sender computer is directed by said Enabler computer program to communicate with a Server computer program located on said encryption server to;

    allow said user to enter a user identifier;

    transmit said user identifier to said encryption server to verify identity of said user;

    receive a private key encrypted with a passphrase from a database located in a memory of said encryption server, said private key having a corresponding public key, thereby forming a public/private key pair;

    use said passphrase to decrypt said encrypted private key at said client computer;

    retrieve a user recipient'"'"'s public key from said encryption server database;

    encrypt a digital message with said user recipient'"'"'s public key; and

    transmit said encrypted digital message to said user recipient;

    an encryption server, said encryption server operable to process requests from said pop proxy, said encryption server comprising;

    a server memory operable to store a Server computer program and a database, said database comprising a plurality of said user identifiers, encrypted private keys, and public keys; and

    a server processor electronically connected to said server memory, said server processor operable to execute said Server computer program such that said encryption server is directed by said Server computer program to communicate with said Enabler computer program to;

    receive and compare said user identifier against a plurality of user identifiers located in said database of said encryption server to verify said user identity;

    retrieve said encrypted private key from said encryption server database; and

    transmit said encrypted private key from said encryption server to said user'"'"'s pop proxy; and

    a network comprising said client sender computer, said encryption server, and said client recipient computer, wherein said network allows communication between said client sender pop proxy and said encryption server and further between said client sender pop proxy and said pop server.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×