PROTECTING CONTENT FROM THIRD PARTY USING CLIENT-SIDE SECURITY PROTECTION
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each trusted user machine is configured to optionally apply security to messages. Rules determine when automatic protection is applied and the level of protection to apply. The trusted client automatically downloads the rules (or rules policies) from a trusted rules service and caches the rules locally. During composition, the rules analyze the message and automatically apply security template(s) to the message. The security template(s) encrypt the body of the message, but not the headers or subject. The untrusted message service processes the header and delivers the message to the correct recipient. The hosted service cannot view the contents of the message body, and only intended recipients of the protected message can view the message body. Offline protection is supported, and the user can override protection by the rules.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A system, comprising:
-
at least one processor; and memory coupled to the at least one processor, the memory comprising computer executable instructions that, when executed by the at least one processor, performs a method comprising; analyzing a message using one or more rules used to generate security for the message, wherein analyzing the message comprises; evaluating input during composition of the message; applying the one or more rules to the message; monitoring for changes to the input of the message; and when changes to the input are detected, reevaluating the input; applying the security to the message, wherein the security includes attaching one or more attributes of the security to the message; and sending the message to a recipient using an untrusted message service. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method comprising:
-
analyzing, by a trusted computing device, a message using one or more rules used to generate security for the message, wherein analyzing the message comprises; evaluating input during composition of the message; applying the one or more rules to the message; monitoring for changes to the input of the message; and when changes to the input are detected, reevaluating the input; applying the security to the message, wherein the security includes attaching one or more attributes of the security to the message; and sending the message to a recipient using an untrusted message service. - View Dependent Claims (33, 32, 33, 36, 37, 38, 39)
-
-
40. A messaging system comprising:
-
a computing device using an untrusted message service for transmitting a message; a rules component associated with the untrusted message service, wherein the rules component is configured to analyze the message using one or more rules, wherein analyzing the message comprises; evaluating input during composition of the message; applying the one or more rules to the message; monitoring for changes to the input of the message; and when changes to the input are detected, reevaluating the input; and a security component associated with the computing device, wherein the security component is configured to apply security to the message based on the one or more rules, wherein the security includes attaching one or more attributes of the security to the message.
-
Specification