Secure PKI proxy and method for instant messaging clients
First Claim
1. A method for facilitating instant messaging comprising:
- intercepting instant messages to or from an instant messaging client; and
applying a public key based cryptographic operation on the intercepted instant messages using at least one of a private key associated with an instant message originator and a public key associated with an instant message recipient, to produce at least one end to end PKI secured instant message packet.
1 Assignment
0 Petitions
Accused Products
Abstract
Briefly, an instant messaging secure PKI proxy provides public key-based secure instant messaging by intercepting messages to or from an instant messaging client, such as an instant messaging client running on a client device, and applies a public key-based cryptographic operation on the intercepted instant messages using at least a private key associated with an instant message originator or a public key associated with an instant message originator to produce an end-to-end public key infrastructure secured instant message. As such, the device and methods provide non-services repudiation and public key-based encryption services for content of instant messages during an instant message session helping to insure that the information will not be disclosed to unauthorized parties and assuring that the identities of all the participants are known and trusted without impairing local messaging clients.
-
Citations
25 Claims
-
1. A method for facilitating instant messaging comprising:
-
intercepting instant messages to or from an instant messaging client; and
applying a public key based cryptographic operation on the intercepted instant messages using at least one of a private key associated with an instant message originator and a public key associated with an instant message recipient, to produce at least one end to end PKI secured instant message packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for facilitating instant messaging comprising:
-
receiving PKI encrypted instant message traffic;
decrypting the PKI encrypted instant message traffic, by a first centralized instant messaging secure proxy using a corresponding private decryption key of the centralized instant messaging proxy;
re-encrypting, by the first centralized instant messaging secure proxy, the instant message traffic using a public encryption key associated with a second centralized instant messaging secure proxy to produce PKI re-encrypted instant message traffic; and
sending, by the second centralized instant messaging secure proxy, the PKI re-encrypted instant message traffic to the instant message recipient.
-
-
11. The method of claim 11 including the steps of:
-
intercepting instant messages to or from an instant messaging client; and
applying a public key based cryptographic operation on the intercepted instant messages using at least a public encryption key associated with a centralized instant messaging proxy to produce a PKI encrypted instant message. - View Dependent Claims (12)
-
-
13. An instant messaging device comprising:
an instant messaging secure PKI proxy including;
a secure instant messaging payload analyzer operative to at least determine a type of public key based cryptographic operation to perform on intercepted instant messages in response to evaluation of at least one of;
a secure buddy list, instant messaging type data, instant messaging direction data and an instant messaging packet payload; and
a public key based cryptographic engine, operatively coupled to the secure instant messaging payload analyzer, to perform a selected typed of public key based cryptographic operation on the intercepted instant messages. - View Dependent Claims (14, 15, 16, 17, 18)
-
19. A storage medium containing executable instructions that when executed by one of more processing devices, causes the one or more processing devices to:
-
intercept instant messages to or from an instant messaging client; and
apply a public key based cryptographic operation on the intercepted instant messages using at least one of a private key associated with an instant message originator and a public key associated with an instant message recipient, to produce at least one end to end PKI secured instant message packet. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification