-
公开(公告)号:US11095662B2
公开(公告)日:2021-08-17
申请号:US15689239
申请日:2017-08-29
Applicant: Wickr Inc.
Inventor: Arjun Bhatnagar , Christopher Howell
Abstract: The present disclosure describes a method, system, and non-transitory computer readable medium that includes instructions that permit users of different secure communication networks to exchange secure communications. A secure communication platform includes a user database that allows users from different secure communication networks to access keys for recipients outside of their network. Additionally, the secure communication platform provides a high degree of trust regarding the sender's identity, allowing the receiving network to trust the sender.
-
公开(公告)号:US11025440B2
公开(公告)日:2021-06-01
申请号:US16732475
申请日:2020-01-02
Applicant: Wickr Inc.
Inventor: Robert Statica , Christopher A. Howell , Kara Lynn Coppa
Abstract: Determining whether to allow access to a message is disclosed. A message is received from a sender. The message is associated with a first time-to-live (TTL) value. A determination is made that the first time-to-live value has not been exceeded. The determination is made at least in part by obtaining an external master clock time. In response to the determination, access is allowed to the message.
-
公开(公告)号:US10778432B2
公开(公告)日:2020-09-15
申请号:US15806465
申请日:2017-11-08
Applicant: Wickr Inc.
Inventor: Thomas Michael Leavy , Joël Alwen
Abstract: The present application describes a method, system, and non-transitory computer-readable medium for end-to-end encryption during a secure communication session. According to the present disclosure, a first device initializes a secure communication session with at least one second device. Initializing the secure communication session includes transmitting an invitation to a secure communication session to the at least one second device. The first device subsequently receives the token from the at least one second device and validates the token. When the token is invalid, the first devices terminates the secure communication session. However, when the token is valid, the first device performs a three-way handshake with the at least one second device to negotiate a first encryption key and a second encryption key. The first encryption key is used to encrypt communication data transmitted by the first device and the second encryption key is used to decrypt communication data received from the at least one second device.
-
公开(公告)号:US10567349B2
公开(公告)日:2020-02-18
申请号:US14314018
申请日:2014-06-24
Applicant: Wickr Inc.
Inventor: Robert Statica , Christopher A. Howell , Kara Lynn Coppa
Abstract: Determining whether to allow access to a message is disclosed. A message is received from a sender. The message is associated with a first time-to-live (TTL) value. A determination is made that the first time-to-live value has not been exceeded. The determination is made at least in part by obtaining an external master clock time. In response to the determination, access is allowed to the message.
-
公开(公告)号:US10382197B1
公开(公告)日:2019-08-13
申请号:US15240981
申请日:2016-08-18
Applicant: Wickr Inc.
Inventor: Robert Statica , Christopher A. Howell
Abstract: A first public key associated with a first recipient is requested from a server. The first public key is received, as is an associated first key reference value. The first public key is used in conjunction with securing a first message. The first public key is destroyed. A second public key associated with the first recipient is requested from the server. A second public key and an associated second key reference value are received. The second public key is different from the first public key and the first key reference value is different from the second key reference value. The second public key is used in conjunction with the securing of a second message and the second public key is destroyed.
-
公开(公告)号:US20190245682A1
公开(公告)日:2019-08-08
申请号:US15889343
申请日:2018-02-06
Applicant: Wickr Inc.
Inventor: Joël Alwen
CPC classification number: H04L9/085 , H04L9/0861 , H04L9/16 , H04L9/3247 , H04L63/0428
Abstract: The present application describes a method, system, and non-transitory computer-readable medium for exchanging encrypted communications using hybrid encryption. According to the present disclosure, a first device receives an encrypted communication from a second device. The encrypted communication includes a first encrypted secret, a second encrypted secret, a first signature, and a second signature. The first device verifies the first signature and the second signature, and, when the first and second signatures are valid, decrypts the first encrypted secret using a first encryption algorithm and the second encrypted secret using a second encryption algorithm. The first device combines the first decrypted secret and the second decrypted secret to recover a first communication and provides the first communication to a user of the first device.
-
公开(公告)号:US10263964B2
公开(公告)日:2019-04-16
申请号:US15964848
申请日:2018-04-27
Applicant: Wickr Inc.
Inventor: Christopher Howell , Robert Statica , Kara Lynn Coppa
Abstract: Determining whether to allow access to a message is disclosed. A message is received from a sender. The message is associated with a first time-to-live (TTL) value. A determination is made that the first time-to-live value has not been exceeded. The determination is made at least in part by obtaining an external master clock time. In response to the determination, access is allowed to the message.
-
公开(公告)号:US10248799B1
公开(公告)日:2019-04-02
申请号:US14839845
申请日:2015-08-28
Applicant: Wickr Inc.
Inventor: Thomas Michael Leavy , Robert Statica
Abstract: Screen capture mitigation is disclosed. A first finger of a user is detected in a first designated region of a display. Content is displayed when the first finger is detected in the first designated region of the display. Periodically, a determination is made whether the first finger is detected in the first designated region of the display. The content is ceased to be displayed in response to a determination that the first finger is outside the first designated region of the display.
-
公开(公告)号:US20190020632A1
公开(公告)日:2019-01-17
申请号:US15647576
申请日:2017-07-12
Applicant: Wickr Inc.
Inventor: Thomas Michael Leavy , Joël Alwen , Christopher Howell
Abstract: A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.
-
公开(公告)号:US20180367540A1
公开(公告)日:2018-12-20
申请号:US15331728
申请日:2016-10-21
Applicant: Wickr Inc.
Inventor: Darlene Miranda
Abstract: The present disclosure describes a system, method, and non-transitory computer readable medium that secures communications based upon a permission level associated with the content of the communication, a receiver's device, and a receiver's instantiation of a secure collaboration app. This approach effectively binds the communication to a permission level and a combination of the receiver's device and application, thereby ensuring only authorized users are able to decrypt and access the content of the communication.
-
-
-
-
-
-
-
-
-