SECURE PEER-TO-PEER MESSAGING INVITATION ARCHITECTURE
First and second communication devices respectively have first and second personal identification numbers (PINs). The first communication device transmits to the second communication device a first encryption key, and receives from the second communication device the second PIN that has been encrypt...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
24.02.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | First and second communication devices respectively have first and second personal identification numbers (PINs). The first communication device transmits to the second communication device a first encryption key, and receives from the second communication device the second PIN that has been encrypted by the second communication device using the first encryption key. The first communication device receives from the second communication device a second encryption key, decrypts the encrypted second PIN, and encrypts the first PIN using the second encryption key, and transmits the encrypted first PIN to the second communication device. The first communication device conducts, with the second communication, device a peer-to-peer messaging session by transmitting to the second communication device peer-to-peer messages that contain the second PIN and receiving from the second communication device peer-to-peer messages that contain the first PIN. Each message is routed by a routing server based on the respective first and second PINs. |
---|---|
Bibliography: | Application Number: US20100940721 |