The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 16, 2019

Filed:

Oct. 01, 2015
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

Jan L. Camenisch, Thalwil, CH;

Anja Lehmann, Zurich, CH;

Gregory Neven, Oberrieden, CH;

Kai Samelin, Rueschlikon, CH;

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/32 (2006.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
H04L 63/0435 (2013.01); H04L 9/3226 (2013.01); H04L 63/061 (2013.01); H04L 63/083 (2013.01); H04L 63/18 (2013.01);
Abstract

Computer-implemented methods are provided for communicating message data from a sender computer to a receiver computer via a network. The sender computer encrypts the message data in dependence on a cryptographic key to produce a ciphertext, and establishes an access password for the ciphertext with a host computer connected to the network. The sender computer sends the ciphertext via the network to the host computer, and sends an email, containing the cryptographic key in cleartext, to the receiver computer via the network. The cryptographic key comprises a random cryptographic value which is independent of the access password. The host computer receives the ciphertext from the sender computer and stores the ciphertext in association with the access password. The receiver computer receives the email from the sender computer and sends an access request for the ciphertext, and an input password, to the host computer via the network. The host computer, on receiving the access request and the input password, sends the ciphertext to the receiver computer via the network if the input password equals the access password. The receiver computer decrypts the received ciphertext using the cryptographic key to obtain the message data.


Find Patent Forward Citations

Loading…