PROTECTING CONTENT FROM THIRD PARTY USING CLIENT-SIDE SECURITY PROTECTION
First Claim
1. A computer-implemented messaging system, comprising:
- a client for sending a message to a recipient using an untrusted message service; and
a security component for automatically applying security to the message in response to using the untrusted message service.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each trusted user machine is configured to optionally apply security to messages. Rules determine when automatic protection is applied and the level of protection to apply. The trusted client automatically downloads the rules (or rules policies) from a trusted rules service and caches the rules locally. During composition, the rules analyze the message and automatically apply security template(s) to the message. The security template(s) encrypt the body of the message, but not the headers or subject. The untrusted message service processes the header and delivers the message to the correct recipient. The hosted service cannot view the contents of the message body, and only intended recipients of the protected message can view the message body. Offline protection is supported, and the user can override protection by the rules.
-
Citations
20 Claims
-
1. A computer-implemented messaging system, comprising:
-
a client for sending a message to a recipient using an untrusted message service; and a security component for automatically applying security to the message in response to using the untrusted message service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented messaging system, comprising:
-
a trusted message client for sending a message to one or more recipients using an untrusted message service, the trusted client applying rules downloaded from a trusted rules service; and a trusted security component for automatically applying a security template to a portion of the message in response to evaluation of the message by the rules. - View Dependent Claims (11, 12, 13)
-
-
14. A computer-implemented method of processing messages, comprising:
-
composing a message in a trusted client for communication to a recipient via an untrusted message service; analyzing the message using a trusted rules service; applying a security template to the message based on results of the analysis; and sending the message to the recipient through the untrusted message service without exposing portions of the message at the untrusted message service based on the security template. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification