Business To Business Secure Mail
First Claim
Patent Images
1. A method for providing secure mail, the method comprising:
- receiving a protected message from a sender;
requesting a receiving user token from a trust broker;
submitting the receiving user token to an authorization server associated with the sender;
receiving a user license issued by the authorization server; and
decrypting the protected message using the user license.
2 Assignments
0 Petitions
Accused Products
Abstract
Business to business secure mail may be provided. Consistent with embodiments of the invention, a protected message may be received. The recipient may request a token from a trust broker, submit the token to an authorization server associated with the sender, receive a user license from the authorization server; and decrypt the protected message using the user license. The protected message may restrict actions that may be taken by the recipient, such as forwarding to other users.
45 Citations
20 Claims
-
1. A method for providing secure mail, the method comprising:
-
receiving a protected message from a sender; requesting a receiving user token from a trust broker; submitting the receiving user token to an authorization server associated with the sender; receiving a user license issued by the authorization server; and decrypting the protected message using the user license. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable medium which stores a set of instructions which when executed performs a method for providing secure communication, the method executed by the set of instructions comprising:
-
receiving, by a user associated with a receiving organization, a protected message from a user associated with a sending organization, wherein the protected message comprises a list of authorized recipients; determining whether the user associated with the receiving organization is included in the list of authorized recipients; in response to determining that the user associated with the receiving organization is included in the list of authorized recipients, requesting a user token from a trust broker; submitting the user token to an authorization server associated with the sending organization; receiving a user license from the authorization server associated with the sending organization; and using the received user license to decrypt the protected message for the user associated with the receiving organization. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for providing secure mail between organizations, the system comprising:
-
a memory storage; and a processing unit coupled to the memory storage, wherein the processing unit is operative to; receive, by a user associated with a receiving organization, a protected message from a user associated with a sending organization, wherein the protected message comprises a list of authorized recipients; determine whether the receiving organization comprises a rights certificate associated with the sending organization; in response to determining that the receiving organization does not comprise a rights certificate associated with the sending organization; request an organization token from a trust broker, send the organization token to an authorization server associated with the sending organization, receive the rights certificate associated with the sending organization, and cache the rights certificate associated with the sending organization; determine whether the user associated with the receiving organization is included in the list of authorized recipients; in response to determining that the user associated with the receiving organization is included in the list of authorized recipients, request a user token from a trust broker; send the user token to the authorization server associated with the sending organization; receive a user license from the authorization server associated with the sending organization; decrypt the protected message for the user associated with the receiving organization using the rights certificate and the user license; and enforce at least one restriction associated with the protected message.
-
Specification