Secure instant messaging system
First Claim
1. A method to secure communication of data across a computer network via a messaging system, the method comprising:
- receiving a public key and an identification of a first user associated with the public key, wherein the public key is issued to the first user;
determining, based on the identification of the first user, a list of users associated with the identification of the first user; and
sending the public key to a messaging client device that is associated with a second user included on the list of users, wherein the public key is usable to encrypt messages sent to the first user from the messaging client device.
7 Assignments
0 Petitions
Accused Products
Abstract
A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security certificates to users binding the user'"'"'s IM screen name to a public key, used by sending users to encrypt messages and files for the user. The CA uses a subscriber database to keep track of valid users and associated information, e.g. user screen names, user subscription expiration dates, and enrollment agent information. A user sends his certificate to an instant messaging server which publishes the user'"'"'s certificate to other users. Users encrypt instant messages and files using an encryption algorithm and the recipient'"'"'s certificate. A sending user can sign instant messages using his private signing key. The security status of received messages is displayed to recipients.
73 Citations
20 Claims
-
1. A method to secure communication of data across a computer network via a messaging system, the method comprising:
-
receiving a public key and an identification of a first user associated with the public key, wherein the public key is issued to the first user; determining, based on the identification of the first user, a list of users associated with the identification of the first user; and sending the public key to a messaging client device that is associated with a second user included on the list of users, wherein the public key is usable to encrypt messages sent to the first user from the messaging client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system to secure communication of data across a computer network, the system comprising:
-
a database storing identifications of messaging users; and a processor configured to perform operations comprising; receiving a public key and an identification of a first user associated with the public key, wherein the public key is issued to the first user; determining, based on the identification of the first user, a list of users associated with the identification of the first user; sending the public key to a second messaging client device that is associated with a second user included on the list of users; receiving an encrypted message from the second messaging client device, wherein the encrypted message is encrypted using the public key issued to the first user; and sending the encrypted message to a first messaging client device associated with the first user. - View Dependent Claims (11, 12, 13)
-
-
14. A method to secure communication of data across a computer network via a messaging system, comprising:
-
obtaining, at a first messaging client device of a first user via a messaging server, a second user public key associated with an identification of a second user, the second user using a second messaging client device, wherein the first user is associated to the identification of the second user by being listed on a list of users, the list of users being associated with the second user; encrypting an electronic message for the second user using the second user public key; and sending the encrypted message to the messaging server, wherein the encrypted message is configured to be decrypted using a second user private key associated with the second user. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification