US 12,273,328 B2
Message transmitting system with hardware security module
Yuan Liou Hsu, New Taipei (TW); Tzu-Ang Kuo, Taipei (TW); and Chihhung Lin, Taoyuan (TW)
Assigned to INFOKEYVAULT TECHNOLOGY CO., LTD., Taipei (TW)
Filed by InfoKeyVault Technology Co., Ltd., Taipei (TW)
Filed on Jan. 18, 2022, as Appl. No. 17/577,411.
Claims priority of application No. 110103418 (TW), filed on Jan. 29, 2021.
Prior Publication US 2022/0247729 A1, Aug. 4, 2022
Int. Cl. H04L 9/40 (2022.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC H04L 63/0435 (2013.01) [H04L 9/0822 (2013.01); H04L 9/0827 (2013.01); H04L 9/0841 (2013.01); H04L 9/0877 (2013.01); H04L 9/0897 (2013.01); H04L 9/3247 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A message transmitting system, comprising:
a message exchange center;
at least a first user device and a second user device, which are both in communication with the message exchange center via a network for message exchange; and
a hardware security module, which is a secure digital memory card adapted to be inserted into the first user device,
wherein after the hardware security module is inserted into the first user device, the hardware security module generates a first key establishment combination including at least a first public-private key pair according to a key establishment algorithm, wherein a first private key of the first public-private key pair is only stored in the hardware security module, and a first public key of the first public-private key pair is sent to the message exchange center; and
wherein for transmitting a first message from the second user device to the first user device, the second user device obtains the first public key from the message exchange center, establishes or encrypts a shared key with the first public key, uses the shared key to encrypt a plaintext of the first message into a ciphertext of the first message, and transmits the ciphertext of the first message to the first user device via the message exchange center, wherein the first user device obtains the encrypted shared key from the second user device, uses a specific information, which includes the first private key stored in the hardware security module, to derive the shared key, and uses the shared key to decrypt the ciphertext of the first message to recover the plaintext of the first message.