×

Method and apparatus for secure IM communications using an IM module

  • US 7,673,004 B1
  • Filed: 01/07/2005
  • Issued: 03/02/2010
  • Est. Priority Date: 08/31/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for enabling secure instant message (IM) communication, the method comprising:

  • receiving, at a first computer system configured to proxy IM communications within a first communications network between IM clients of the same IM network unmodified in each of a plurality of IM network protocols, a plurality of policies for each IM network in a plurality of IM networks that are applicable to characteristics of IMs associated with a corresponding IM network protocol in the plurality of IM network protocols, each policy received at the computer system defining;

    a set of characteristics pertaining to at least one IM network protocol in the plurality of IM network protocols or content of one or more IMs in the at least one IM network protocol in the plurality of IM network protocols, andan action to be performed using the computer system when one or more characteristics of at least one of the IMs handled by the computer system satisfy the set of characteristics defined in the policy;

    receiving, at the first computer system, an IM in a first IM network protocol in the plurality of IM network protocols from a first IM client associated with the first communications network, the IM being addressed to an instant messaging username;

    sending a query in at least one of the plurality of IM network protocols from the first computer system to the instant messaging username in response to performance of an action defined in at least one policy determined from the plurality of policies that are applicable to characteristics of IMs in the first IM network protocol based on one or more characteristics pertaining to the first IM network protocol of the IM or to content of the IM, the query requesting security capabilities of a second IM client associated with the instant messaging username;

    receiving, at the first computer system, a response in at least one of the plurality of IM network protocols to the query requesting security capabilities of the second IM client from a second computer system, the second computer system configured to proxy IM communications within a second communications network between IM clients of the same IM network unmodified in each of a plurality of IM network protocols, wherein the response to the query requesting security capabilities of the second IM client comprises security capabilities information of the second computer system configured to proxy IM communications within a second communications network between IM clients of the same IM network unmodified in each of a plurality of IM network protocols;

    determining, at the first computer system, whether the second IM client associated with the instant messaging username receives IMs through the second computer system via a public IM network using one of the plurality of IM network protocols based on the response;

    determining, at the first computer system, whether the second computer system is capable of receiving secure IM communications from the first computer system for the second IM client based on the response;

    based on positive determinations that the second IM client associated with the instant messaging username receives IMs through the second computer system and the second computer system is capable of receiving secure IM communications for the second IM client from the first computer system, encrypting at least a portion of the IM at the first computer system; and

    sending the encrypted at least a portion of the IM to the instant messaging username using the first computer system, wherein the second computer system receives the encrypted at least a portion of the IM, decrypts at least a portion of the IM, and sends the decrypted at least a portion of the IM to the instant messaging username.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×