-
公开(公告)号:US12113906B1
公开(公告)日:2024-10-08
申请号:US17993931
申请日:2022-11-24
申请人: Boris Reitman
发明人: Boris Reitman
CPC分类号: H04L9/3226 , H04L9/0838 , H04L9/085 , H04L9/3221 , H04L67/55
摘要: This invention enables asynchronous encrypted communication under a protection of a simple password which must be communicated out-of-band. The password is easily communicable in-person, by telephone or by a text message. The invention assumes that one of the parties has an online device, such as a smartphone. After the encrypted session has been established, it can be used for a variety of cryptographic applications, such as encrypting or decrypting messages, sharing of cryptographic keys, and verifying data. The invention also has the secondary benefit of authenticating both parties to each other.
-
公开(公告)号:US11870908B1
公开(公告)日:2024-01-09
申请号:US18130440
申请日:2023-04-04
申请人: Boris Reitman
发明人: Boris Reitman
CPC分类号: H04L9/3226 , H04L9/085 , H04L9/0838 , H04L9/3221 , H04L67/55
摘要: This invention enables asynchronous encrypted communication under a protection of a simple password which must be communicated out-of-band. The password is easily communicable in-person, by telephone or by a text message. The invention assumes that one of the parties has an online device, such as a smartphone. After the encrypted session has been established, it can be used for a variety of cryptographic applications, such as encrypting or decrypting messages, sharing of cryptographic keys, and verifying data. The invention also has the secondary benefit of authenticating both parties to each other.
-
公开(公告)号:US11658823B1
公开(公告)日:2023-05-23
申请号:US17083314
申请日:2020-10-29
申请人: Boris Reitman
发明人: Boris Reitman
CPC分类号: H04L9/3226 , H04L9/085 , H04L9/0838 , H04L9/3221 , H04L67/55
摘要: This invention enables asynchronous encrypted communication under a protection of a simple password which must be communicated out-of-band. The password is easily communicable in-person, by telephone or by a text message. The invention assumes that one of the parties has an online device, such as a smartphone. After the encrypted session has been established, it can be used for a variety of cryptographic applications, such as encrypting or decrypting messages, sharing of cryptographic keys, and verifying data. The invention also has the secondary benefit of authenticating both parties to each other.
-
-