Secure instant messaging
First Claim
1. A method, comprising:
- encrypting, by a sender messaging device, a challenge identifier that is stored in memory of the sender messaging device to generate an encrypted challenge message,wherein the encrypting is facilitated by an encryption module, the encryption module having initialized an encryption relationship with a recipient messaging device prior to the encrypting, andwherein the encrypting includes encrypting the challenge identifier with a first encryption key that is embedded in a first issuance license specific to the recipient messaging device;
communicating, by the sender messaging device, the encrypted challenge message via a peer to peer communication link to the recipient messaging device that decrypts the encrypted challenge message and encrypts the challenge identifier as a return challenge identifier to generate an encrypted challenge return, the recipient messaging device encrypting the challenge identifier with a second encryption key that is embedded in a second issuance license specific to the sender messaging device, wherein the first and second encryption keys are different encryption keys;
receiving, by the sender messaging device, the encrypted challenge return from the recipient messaging device;
decrypting, by the sender messaging device, the encrypted challenge return; and
verifying, by the sender messaging device, that the return challenge identifier matches the challenge identifier that is stored in the memory of the sender messaging device to establish that communications are secure when communicated via the peer-to-peer communication link.
2 Assignments
0 Petitions
Accused Products
Abstract
Secure instant messaging is described. In an embodiment, a messaging device encrypts a challenge identifier to generate an encrypted challenge message, and communicates the encrypted challenge message via a peer-to-peer communication link to a recipient messaging device. The recipient messaging device decrypts the encrypted challenge message and encrypts the challenge identifier as a return challenge identifier to generate an encrypted challenge return. The messaging device receives the encrypted challenge return from the recipient messaging device, decrypts the encrypted challenge return, and verifies that the return challenge identifier matches the challenge identifier to establish that communications are secure when communicated via the peer-to-peer communication link and, optionally, to establish control policies pertaining to a communication received at the recipient messaging device.
30 Citations
17 Claims
-
1. A method, comprising:
-
encrypting, by a sender messaging device, a challenge identifier that is stored in memory of the sender messaging device to generate an encrypted challenge message, wherein the encrypting is facilitated by an encryption module, the encryption module having initialized an encryption relationship with a recipient messaging device prior to the encrypting, and wherein the encrypting includes encrypting the challenge identifier with a first encryption key that is embedded in a first issuance license specific to the recipient messaging device; communicating, by the sender messaging device, the encrypted challenge message via a peer to peer communication link to the recipient messaging device that decrypts the encrypted challenge message and encrypts the challenge identifier as a return challenge identifier to generate an encrypted challenge return, the recipient messaging device encrypting the challenge identifier with a second encryption key that is embedded in a second issuance license specific to the sender messaging device, wherein the first and second encryption keys are different encryption keys; receiving, by the sender messaging device, the encrypted challenge return from the recipient messaging device; decrypting, by the sender messaging device, the encrypted challenge return; and verifying, by the sender messaging device, that the return challenge identifier matches the challenge identifier that is stored in the memory of the sender messaging device to establish that communications are secure when communicated via the peer-to-peer communication link. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An instant messaging system, comprising:
-
a peer-to-peer communication link; and a first messaging device configured to perform validation that encrypted instant messages are secure when communicated from the first messaging device to a second messaging device via the peer-to-peer communication link, wherein validation is facilitated by an encryption module, the encryption module having initialized an encryption relationship with the second messaging device prior to the validation, wherein; the first messaging device is further configured to encrypt a challenge identifier that is stored on the first messaging device with a first encryption key that is embedded in a first issuance license specific to the second messaging device to generate an encrypted challenge, and communicate the encrypted challenge via the peer-to-peer communication link to the second messaging device; the second messaging device is configured to decrypt the encrypted challenge, encrypt the challenge identifier as a return challenge identifier with a second encryption key that is embedded in a second issuance license specific to the first messaging device to generate an encrypted challenge return, and communicate the encrypted challenge return via the peer-to-peer communication link to the first messaging device; the first and second encryption keys being different encryption keys; and the first messaging device is further configured to decrypt the encrypted challenge return, and verify that the return challenge identifier matches the challenge identifier that is stored on the first messaging device to establish that the encrypted instant messages are secure when communicated via the peer-to-peer communication link. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. An article of manufacture comprising:
-
one or more computer readable media storing computer executable instructions that, when executed, direct an instant messaging device to; encrypt a challenge identifier that is stored on the instant messaging device to generate an encrypted challenge message, wherein the encrypting is facilitated by an encryption module, the encryption module having initialized an encryption relationship with a recipient messaging device prior to the encrypting, and wherein the encrypting includes encrypting the challenge identifier with a first encryption key that is embedded in a first issuance license specific to the recipient messaging device; communicate the encrypted challenge message via a peer to peer communication link to the recipient messaging device; decrypt an encrypted challenge return from the recipient messaging device, the recipient messaging device having encrypted the challenge identifier with a second encryption key that is embedded in a second issuance license specific to the sender messaging device, wherein the first and second encryption keys are different encryption keys; verify that a return challenge identifier received in the encrypted challenge return from the recipient messaging device matches the challenge identifier that is stored on the instant messaging device to establish that instant messages are secure when communicated via the peer-to-peer communication link; generate an instant message for communication to the recipient messaging device; encrypt the instant message with the first encryption key to generate an encrypted instant message; communicate the encrypted instant message as a secure communication to the recipient messaging device via the peer-to-peer communication link; receive a second encrypted instant message as a secure communication from the recipient messaging device via the peer to peer communication link; and decrypt the second encrypted instant message with a usage license corresponding to the first issuance license.
-
Specification