US 12,032,713 B1
Systems and methods for sending and receiving encrypted submessages
Reynaldo Medina, III, San Antonio, TX (US); and Arthur Smith, Fredericksburg, TX (US)
Assigned to United Services Automobile Association, San Antonio, TX (US)
Filed by United Services Automobile Association (USAA), San Antonio, TX (US)
Filed on Nov. 3, 2022, as Appl. No. 18/052,265.
Application 18/052,265 is a continuation of application No. 16/931,053, filed on Jul. 16, 2020, granted, now 11,544,397.
Application 16/931,053 is a continuation of application No. 16/231,221, filed on Dec. 21, 2018, granted, now 10,719,620, issued on Jul. 21, 2020.
Application 16/231,221 is a continuation of application No. 12/101,025, filed on Apr. 10, 2008, granted, now 10,169,598, issued on Jan. 1, 2019.
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 21/60 (2013.01); H04L 9/06 (2006.01); H04L 9/14 (2006.01); H04L 9/40 (2022.01); H04L 45/00 (2022.01)
CPC G06F 21/6218 (2013.01) [G06F 21/602 (2013.01); H04L 9/0618 (2013.01); H04L 9/14 (2013.01); H04L 45/00 (2013.01); H04L 63/0428 (2013.01); H04L 63/18 (2013.01); G06F 2221/2107 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method comprising:
generating, by a server, a first submessage comprising a first portion of content stored onto a first computer;
generating, by the server, a second submessage comprising a second portion of the content;
encrypting, by the server, the first submessage and the second submessage;
transmitting, by the server, the encrypted first submessage to a second computer via a first path;
transmitting, by the server, the encrypted second submessage to the second computer via a second path, wherein the first submessage and the second submessage are transmitted to the second computer in a batched manner; and
transmitting, by the server, an encryption key to the second computer, wherein the encryption key is transmitted to the second computer in real time, wherein the encryption key indicates a decrypting algorithm to decrypt the encrypted first submessage, wherein the encryption key indicates another decryption algorithm to decrypt the encrypted second submessage, and wherein the second computer recreates the content by decrypting the encrypted first submessage.