Secure email communication system
First Claim
Patent Images
1. A method of securing a digital data stream, the method comprising:
- receiving, at a host node, a first key of a first asymmetric key pair from a key store remote from the host node;
deciphering, at the host node, the first key of the first asymmetric key pair with a first key of a second asymmetric key pair;
receiving a dynamically generated key;
enciphering the digital data stream with the dynamically generated key;
enciphering the dynamically generated key with the first key of the first asymmetric key pair; and
storing the enciphered digital data stream and the enciphered dynamically generated key remotely from the host node and the key store.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for securing a digital data stream. A first key of a first asymmetric key pair from a key store remote from a host node is received at the host node. A dynamically generated key is received at the host node, which is used to encipher the digital data stream. The dynamically generated key is enciphered with the first key of the first asymmetric key pair. The enciphered digital data stream and the enciphered dynamically generated key are stored remotely from the host node and the key store.
82 Citations
43 Claims
-
1. A method of securing a digital data stream, the method comprising:
-
receiving, at a host node, a first key of a first asymmetric key pair from a key store remote from the host node; deciphering, at the host node, the first key of the first asymmetric key pair with a first key of a second asymmetric key pair; receiving a dynamically generated key; enciphering the digital data stream with the dynamically generated key; enciphering the dynamically generated key with the first key of the first asymmetric key pair; and storing the enciphered digital data stream and the enciphered dynamically generated key remotely from the host node and the key store. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of securing a digital data stream, the method comprising:
-
enciphering, at a key store, a first key of a first asymmetric key pair with a second key of a second asymmetric key pair; receiving, at a host node remote from the key store, the first key of the first asymmetric key pair from the key store; deciphering, at the host node, the first key of the first asymmetric key pair with a first key of a second asymmetric key pair; receiving a dynamically generated key; enciphering the digital data stream with the dynamically generated key; enciphering the dynamically generated key with the first key of the first asymmetric key pair; and storing the enciphered digital data stream and the enciphered dynamically generated key remotely from the host node and the key store. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of securing a digital data stream, the method comprising:
-
receiving, at a host node, a first key of a first asymmetric key pair from a key store remote from the host node; deciphering, at the host node, the first key of the first asymmetric key pair with a first key of a second asymmetric key pair; receiving a dynamically generated key; enciphering the digital data stream with the dynamically generated key; enciphering the dynamically generated key with the first key of the first asymmetric key pair; storing the enciphered digital data stream and the enciphered dynamically generated key remotely from the host node and the key store; receiving a credential from a user; generating a credential indicia using a one-way operation on the credential; and identifying, at the key store, a second key of the first asymmetric key pair using the credential indicia. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method of securing a digital data stream, the method comprising:
-
receiving, at a host node, a first key of a first asymmetric key pair from a key store remote from the host node; deciphering, at the host node, the first key of the first asymmetric key pair with a first key of a second asymmetric key pair; receiving a dynamically generated key; enciphering the digital data stream with the dynamically generated key; enciphering the dynamically generated key with the first key of the first asymmetric key pair; storing the enciphered digital data stream and the enciphered dynamically generated key remotely from the host node and the key store; receiving a second key of the first asymmetric key pair from the key store; deciphering the dynamically generated key with the second key of the first asymmetric key pair; and deciphering the digital data stream with the deciphered dynamically generated key. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A method of processing a digital data stream, the method comprising:
-
receiving, at a host node, a credential indicia corresponding to a user; receiving an enciphered digital data stream and an enciphered session key from a database node remote from the host node; receiving a first key of a first asymmetric key pair from a key store remote from the host node and the database node; deciphering, at the host node, the first key of the first asymmetric key pair with a first key of a second asymmetric key pair; deciphering the session key with the first key of the first asymmetric key pair; and deciphering the digital data stream with the deciphered session key. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
-
37. A communications security system comprising:
-
a key store comprising a paired key list relating a first asymmetric key pair with a user indicia and a credential indicia; a database node, remote from the key store, wherein the database node comprises a database containing an enciphered message and an enciphered session key; and a host node remotely coupled to the key store through a key port and the database node through a database port, wherein the host node is configured to receive a first key of the first asymmetric key pair from the key store, wherein the host node comprises; a data stream port; a dynamic key generation module; a first encipher module coupled to the key generation module, the data stream port, and the database port; a second encipher module coupled to the key generation module, the key port, and the database port; and a decipher module coupled between the second encipher module and the key port, wherein the decipher module is configured to decipher the first key of the first asymmetric key pair with a first key of a second asymmetric key pair. - View Dependent Claims (38, 39, 40, 41, 42, 43)
-
Specification