Search

US-12621278-B2 - Method and system for providing a secure communication

US12621278B2US 12621278 B2US12621278 B2US 12621278B2US-12621278-B2

Abstract

A method and a system for providing a secure communication are disclosed. The method includes receiving a request to install an application for the secure communication between a first entity and a second entity. Next, the method includes generating a certificate for the secure communication between the first entity and the second entity. Next, the method includes extracting a first key and a second key from the certificate. Next, the method includes sharing the first key with the second entity for encryption of a message in the secure communication. Next, the method includes receiving the encrypted message from the second entity. Next, the method includes decrypting the encrypted message using the second key. Thereafter, the method includes displaying the decrypted message in the application.

Inventors

  • Devaraj Naga Chandra SEKHAR

Assignees

  • JPMORGAN CHASE BANK, N.A.

Dates

Publication Date
20260505
Application Date
20240903
Priority Date
20230914

Claims (18)

  1. 1 . A method for providing a secure communication, the method being implemented by at least one processor, the method comprising: receiving, by the at least one processor, a request to install an application for the secure communication between a first entity and a second entity; generating, by the at least one processor, a certificate for the secure communication between the first entity and the second entity; extracting, by the at least one processor, a first key and a second key from the certificate; sharing, by the at least one processor, the first key with the second entity for encryption of a message in the secure communication; receiving, by the at least one processor, the encrypted message from the second entity; decrypting, by the at least one processor, the encrypted message using the second key; and displaying, by the at least one processor via a display, the decrypted message in the application.
  2. 2 . The method as claimed in claim 1 , wherein when the first entity corresponds to a receiver of the message, the second entity corresponds to a sender of the message; and when the second entity corresponds to the receiver of the message, the first entity corresponds to the sender of the message.
  3. 3 . The method as claimed in claim 1 further comprising securing, by the at least one processor, the application with at least one authentication factor.
  4. 4 . The method as claimed in claim 1 , wherein the generating of the certificate corresponds to an importing of the certificate from a certificate authority.
  5. 5 . The method as claimed in claim 1 , wherein the first key corresponds to a public key and the second key corresponds to a private key.
  6. 6 . The method as claimed in claim 1 , wherein the sharing of the first key with the second entity comprises: receiving, by the at least one processor from the first entity, a request to securely connect with the second entity; sharing, by the at least one processor, the first key with the second entity for encryption of the message; and receiving, by the at least one processor from the second entity, an acknowledgment that indicates a successful receipt of the first key.
  7. 7 . A computing device configured to implement an execution of a method for providing a secure communication, the computing device comprising: a processor; a memory; and a communication interface coupled to each of the processor and the memory, wherein the processor is configured to: receive a request to install an application for the secure communication between a first entity and a second entity; generate a certificate for the secure communication between the first entity and the second entity; extract a first key and a second key from the certificate; share the first key with the second entity for encryption of a message in the secure communication; receive the encrypted message from the second entity; decrypt the encrypted message using the second key; and display, via a display, the decrypted message in the application.
  8. 8 . The computing device as claimed in claim 7 , wherein when the first entity corresponds to a receiver of the message, the second entity corresponds to a sender of the message; and when the second entity corresponds to the receiver of the message, the first entity corresponds to the sender of the message.
  9. 9 . The computing device as claimed in claim 7 , wherein the processor is further configured to secure the application with at least one authentication factor.
  10. 10 . The computing device as claimed in claim 7 , wherein the generation of the certificate corresponds to an importation of the certificate from a certificate authority.
  11. 11 . The computing device as claimed in claim 7 , wherein the first key corresponds to a public key and the second key corresponds to a private key.
  12. 12 . The computing device as claimed in claim 7 , wherein the processor is further configured to perform the sharing of the first key with the second entity by: receiving a request from the first entity to securely connect with the second entity; sharing the first key with the second entity for encryption of the message; and receiving an acknowledgment from the second entity that indicates a successful receipt of the first key.
  13. 13 . A non-transitory computer readable storage medium storing instructions for providing a secure communication, the storage medium comprising executable code which, when executed by a processor, causes the processor to: receive a request to install an application for the secure communication between a first entity and a second entity; generate a certificate for the secure communication between the first entity and the second entity; extract a first key and a second key from the certificate; share the first key with the second entity for encryption of a message in the secure communication; receive the encrypted message from the second entity; decrypt the encrypted message using the second key; and display, via a display, the decrypted message in the application.
  14. 14 . The storage medium as claimed in claim 13 , wherein when the first entity corresponds to a receiver of the message, and the second entity corresponds to a sender of the message; and when the second entity corresponds to the receiver of the message, the first entity corresponds to the sender of the message.
  15. 15 . The storage medium as claimed in claim 13 , wherein when executed by the processor, the executable code further causes the processor to secure the application with at least one authentication factor.
  16. 16 . The storage medium as claimed in claim 13 , wherein the generation of the certificate corresponds to an importation of the certificate from a certificate authority.
  17. 17 . The storage medium as claimed in claim 13 , wherein the first key corresponds to a public key and the second key corresponds to a private key.
  18. 18 . The storage medium as claimed in claim 13 , wherein when executed by the processor, the executable code further causes the processor to perform the sharing of the first key with the second entity by: receiving a request from the first entity to securely connect with the second entity; sharing the first key with the second entity for encryption of the message; and receiving an acknowledgment from the second entity that indicates a successful receipt of the first key.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS This application claims priority benefit from Indian Application No. 202311061949, filed on Sep. 14, 2023 in the India Patent Office, which is hereby incorporated by reference in its entirety. FIELD OF THE DISCLOSURE This technology generally relates to methods and systems for providing a secure communication, and more particularly to methods and systems for providing the secure communication between a first entity and a second entity using a certificate-based encryption and decryption mechanism. BACKGROUND INFORMATION The following description of the related art is intended to provide background information pertaining to the field of the present disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admission of the prior art. As is generally known, in the new era of the digital world, a user's day-to-day tasks are performed using a communication device such as smart phone, tablet, mobile phone, and the like. The user's day-to-day tasks may include shopping activities, financial transaction-related activities, messaging activities, communication activities, and the like. To perform these tasks, the user may get various types of notifications or alerts via different supported channels. A notification in the form of a short message service (SMS) is one such notification, which plays an important role in communicating the necessary information to the user. For instance, the SMS notification may be received for any service request such as a banking service request or a financial service request. Further, the use of the SMS-based service is one of the traditional ways to enable communication between users. The major drawback in the conventional process of receiving and sending SMS or messages is the problem associated with the security of the SMS. SMS messages or notifications reach from one end to the other end through various short message service center (SMSC) channels and vendors' supports, which pose a threat of middle-man attack. Further, there are various third-party applications, which may also read SMS in the inbox based on allowed read permission. Also, any unauthenticated user may access confidential information like one time password (OTP) related to financial transactions, in case of a mobile phone loss situation, which may lead to a huge loss to the user. Therefore, sensitive services such as financial banking services or user personal sensitive communication are required to be secure to prevent any loss to the user. Hence, in view of these and other existing limitations, there arises an imperative need to provide an efficient solution to overcome the above-mentioned limitations and to provide a method and system for providing a secure communication between different entities such as users or organizations. SUMMARY The present disclosure, through one or more of its various aspects, embodiments, and/or specific features or sub-components, provides, inter alia, various systems, servers, devices, methods, media, programs, and platforms for providing a secure communication between two parties. According to an aspect of the present disclosure, a method for providing a secure communication is disclosed. The method is implemented by at least one processor. The method includes receiving, by the at least one processor, a request to install an application for the secure communication between a first entity and a second entity. Next, the method includes generating, by the at least one processor, a certificate for the secure communication between the first entity and the second entity. Next, the method includes extracting, by the at least one processor, a first key and a second key from the certificate. Next, the method includes sharing, by the at least one processor, the first key with the second entity for encryption of a message in the secure communication. Next, the method includes receiving, by the at least one processor, the encrypted message from the second entity. Next, the method includes decrypting, by the at least one processor, the encrypted message using the second key. Thereafter, the method includes displaying, by the at least one processor via a display, the decrypted message in the application. In accordance with an exemplary embodiment, when the first entity corresponds to a receiver of the message, the second entity may correspond to a sender of the message; and when the second entity corresponds to the receiver of the message, the first entity may correspond to the sender of the message. In accordance with an exemplary embodiment, the method may further include securing, by the at least one processor, the application with at least one multi-factor authentication factor. In accordance with an exemplary embodiment, the ge