×

System and method for enhanced data protection

  • US 9,954,832 B2
  • Filed: 04/22/2016
  • Issued: 04/24/2018
  • Est. Priority Date: 04/24/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising, by an authentication server:

  • receiving, from a recipient computer system, a recipient header in relation to an encrypted payload received by the recipient computer system from a sender computer system, wherein the recipient header comprises metadata and recipient authentication information;

    causing the metadata of the recipient header to be correlated to a particular authentication header of a plurality of stored authentication headers;

    wherein the particular authentication header comprises;

    an encrypted data subportion that includes an authorized recipient list and an encrypted first symmetric key, wherein the encrypted first symmetric key is encrypted via a second symmetric key; and

    an encrypted third symmetric key that is distinct from the encrypted first symmetric key and the second symmetric key, wherein the encrypted data subportion is encrypted via the encrypted third symmetric key, wherein the encrypted third symmetric key is encrypted via a public key associated with the authentication server;

    decrypting the encrypted third symmetric key via a private asymmetric key associated with the authentication server;

    decrypting the encrypted data subportion via the decrypted encrypted third symmetric key;

    authenticating the recipient computer system as an authorized recipient of the encrypted payload based, at least in part, on a determined match between the recipient authentication information and the authorized recipient list of the decrypted encrypted data subportion;

    responsive to the authenticating, encrypting the encrypted first symmetric key via a public asymmetric key associated with the recipient computer system to yield a doubly-encrypted first symmetric key; and

    transmitting the doubly-encrypted first symmetric key to the recipient computer system so that the encrypted payload can be decrypted by the recipient computer system.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×