System and method for ensuring user privacy in network communications
First Claim
1. A method for ensuring user privacy in network communications where a message is sent from a first user to a second user via a service provider, the message comprising a first and second portion, said first portion indicating an identification of the first user as the sender of the message and said second portion indicating the second user as the recipient of the message, the method comprising the steps of:
- reformatting the message such that the message identifies the service provider as the recipient of the message;
encrypting said second portion of the message that identifies the second user as the recipient of the message and sending the message to the service provider;
the service provider decrypting said second portion of the message that identifies the second user as the recipient and reformatting delivery information to indicate the service provider as the sender of the message from the service provider to the second user; and
encrypting a third portion of said delivery information that identifies the first user as the sender and sending the message to the second user;
wherein said step of reformatting the message comprises the step of replacing said second portion of said header with a third portion, wherein said third portion identifies the service provider as the recipient of the message.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for ensuring user privacy in a messaging system where a message is sent from a sender to a recipient via a service provider. Information pertaining to the identification of a sender and recipient of a message is encrypted so that a third party cannot determine who is sending the message to whom. Specifically, delivery information of the message is reformatted to indicate that the service provider is the recipient. The identification of the actual recipient is encrypted and sent along with the message to the service provider. Upon receipt, the service provider decrypts the actual recipient information to determine the identification of the actual recipient. The service provider reformats the delivery information to indicate that the actual recipient is the recipient of the message and that the service provider is the sender of the message. The identification of the actual sender is encrypted and sent along with the message to the actual recipient. The recipient receives the message from the service provider. The recipient may decrypt the encrypted identification of the actual sender to learn who sent the message. The message contents may optionally be encrypted as well to ensure message privacy as well as user privacy.
50 Citations
18 Claims
-
1. A method for ensuring user privacy in network communications where a message is sent from a first user to a second user via a service provider, the message comprising a first and second portion, said first portion indicating an identification of the first user as the sender of the message and said second portion indicating the second user as the recipient of the message, the method comprising the steps of:
-
reformatting the message such that the message identifies the service provider as the recipient of the message; encrypting said second portion of the message that identifies the second user as the recipient of the message and sending the message to the service provider; the service provider decrypting said second portion of the message that identifies the second user as the recipient and reformatting delivery information to indicate the service provider as the sender of the message from the service provider to the second user; and encrypting a third portion of said delivery information that identifies the first user as the sender and sending the message to the second user; wherein said step of reformatting the message comprises the step of replacing said second portion of said header with a third portion, wherein said third portion identifies the service provider as the recipient of the message. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for ensuring user privacy in network communications, where a message is sent from a first user to a second user, the method comprising the steps of:
-
receiving at a service provider a message from the first user, wherein the message comprises an identification of the service provider as the recipient and wherein an identification of the second user is encrypted; decrypting the identification of the second user; reformatting the message to identify the second user as the recipient; encrypting the identification of the first user; and sending the reformatted message to the second user. - View Dependent Claims (7)
-
-
8. A method for ensuring user privacy in network communications, where a message is sent from a first user to a second user, the message comprising a first and second portion, said first portion indicating an identification of the first user as the sender of the message and said second portion indicating the second user as the recipient of the message, the method comprising the steps of:
-
reformatting a message such that the message identifies the service provider as the recipient of the message; encrypting said second portion of the message that identifies the second user as the recipient of the message; and sending the message to the service provider for subsequent delivery to the user; wherein said reformatting step further comprises the step of reformatting the message to identify the service provider as the sender. - View Dependent Claims (9, 10)
-
-
11. A computer program product for use with a computer system, said computer program product comprising:
a computer usable medium having computer readable program code means embodied in said medium for causing the computer system to ensure user privacy in network communications, where a message is sent from a first user to a second user, said computer readable program code means comprising; computer readable program code means for causing the computer system to receive at a service provider a message from the first user, wherein the message comprises an identification of the service provider as the recipient and wherein an identification of the second user is encrypted; computer readable program code means for causing the computer system to decrypt the identification of the second user; computer readable program code means for causing the computer system to reformat the message to identify the second user as the recipient; computer readable program code means for causing the computer system to encrypt the identification of the first user; and computer readable program code means for causing the computer system to send the reformatted message to the second user; wherein said computer readable program code means for causing the computer system to reformat further comprises computer readable program code means for reformatting the message to identify the service provider as the sender. - View Dependent Claims (12)
-
13. A computer program product for use with a computer system, said computer program product comprising:
a computer usable medium having computer readable program code means embodied in said medium for causing the computer system to ensure user privacy in network communications, where a message is sent from a first user to a second user, the message comprising a first and second portion, said first portion indicating an identification of the first user as the sender of the message and said second portion indicating the second user as the recipient of the message, said computer readable program code means comprising; computer readable program code means for causing the computer system to reformat a message such that the message identifies the service provider as the recipient of the message; computer readable program code means for causing the computer system to encrypt said second portion of the message that identifies the second user as the recipient of the message; computer readable program code means for causing the computer system to send the message to the service provider for subsequent delivery to the users; computer readable program code means for causing the computer system to receive a second message from the service provider, wherein the second message has been reformatted by the service provider to encrypt the identification of the first user as the sender; and computer readable program code means for causing the computer system to decrypt said encrypted identification of the first user to determine the sender of the second message. - View Dependent Claims (14)
-
15. A computer program medium readable by a machine, tangibly embodying a program of instructions executable by the machine to perform method steps for ensuring user privacy in network communications, where a message is sent from a first user to a second user, said method steps comprising the steps of:
-
receiving at a service provider a message from the first user, wherein the message comprises an identification of the service provider as the recipient and wherein an identification of the second user is encrypted; causing the identification of the second user to be decrypted; reformatting the message to identify the second user as the recipient; causing the identification of the first user to be encrypted; and causing the reformatted message to be sent to the second user; wherein said step of reformatting further comprises a step of reformatting the message to identify the service provider as the sender. - View Dependent Claims (16)
-
-
17. A computer program medium readable by a machine, tangibly embodying a program of instructions executable by the machine to perform method steps for ensuring user privacy in network communications, where a message is sent from a first user to a second user, the message comprising a first and second portion, said first portion indicating an identification of the first user as the sender of the message and said second portion indicating the second user as the recipient of the message, said method steps comprising the steps of:
-
reformatting a message such that the message identifies the service provider as the recipient of the message; encrypting said second portion of the message that identifies the second user as the recipient of the message; sending the message to the service provider for subsequent delivery to the user; receiving a second message from the service provider wherein the second message has been reformatted by the service provider to encrypt the identification of the first user as the sender; and decrypting said encrypted identification of the first user to determine the sender of the second message. - View Dependent Claims (18)
-
Specification