Digital security bubble
First Claim
Patent Images
1. A system, comprising:
- a processor configured to;
receive an encrypted encapsulation from a sender, wherein the encrypted encapsulation includes an encrypted message, an encrypted first key, and a device identifier associated with an intended recipient wherein the processor is further configured to receive notification of the encrypted encapsulation from a security platform and download the encrypted encapsulation from the security platform in response to receiving the notification;
decrypt the encrypted encapsulation;
compare the received device identifier with a local device identifier;
decrypt the encrypted first key in response to a determination that the received device identifier matches the local device identifier;
decrypt the encrypted message using the first key to produce a decrypted message; and
provide the decrypted message to a recipient;
a memory coupled to the processor and configured to provide the processor with instructions.
4 Assignments
0 Petitions
Accused Products
Abstract
A digital security bubble encapsulation is received from a sender. The encrypted digital security bubble encapsulation includes an encrypted message, an encrypted first key, and an identifier associated with an intended recipient. The encrypted digital security bubble encapsulation is decrypted. The received identifier and a device identifier are compared. The encrypted first key is decrypted in response to a determination that the identifier received in the digital security bubble encapsulation matches the device identifier. The encrypted message is decrypted using the first key.
371 Citations
20 Claims
-
1. A system, comprising:
-
a processor configured to;
receive an encrypted encapsulation from a sender, wherein the encrypted encapsulation includes an encrypted message, an encrypted first key, and a device identifier associated with an intended recipient wherein the processor is further configured to receive notification of the encrypted encapsulation from a security platform and download the encrypted encapsulation from the security platform in response to receiving the notification;decrypt the encrypted encapsulation; compare the received device identifier with a local device identifier; decrypt the encrypted first key in response to a determination that the received device identifier matches the local device identifier; decrypt the encrypted message using the first key to produce a decrypted message; and provide the decrypted message to a recipient; a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
receiving an encrypted encapsulation from a sender, wherein the encrypted encapsulation includes an encrypted message, an encrypted first key, and a device identifier associated with an intended recipient wherein the processor is further configured to receive notification of the encrypted encapsulation from a security platform and download the encrypted encapsulation from the security platform in response to receiving the notification; decrypting the encrypted encapsulation; comparing the received device identifier with a local device identifier; decrypting the encrypted first key in response to a determination that the received device identifier matches the local device identifier; decrypting the encrypted message using the first key to produce a decrypted message; and providing the decrypted message to a recipient. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A computer program product embodied in a tangible computer readable storage medium and comprising computer instructions for:
-
receiving an encrypted encapsulation from a sender, wherein the encrypted encapsulation includes an encrypted message, an encrypted first key, and a device identifier associated with an intended recipient wherein the processor is further configured to receive notification of the encrypted encapsulation from a security platform and download the encrypted encapsulation from the security platform in response to receiving the notification; decrypting the encrypted encapsulation; comparing the received device identifier with a local device identifier; decrypting the encrypted first key in response to a determination that the received device identifier matches the local device identifier; decrypting the encrypted message using the first key to produce a decrypted message; and providing the decrypted message to a recipient. - View Dependent Claims (20)
-
Specification