Secure instant messaging
First Claim
1. A method, comprising:
- utilizing a digital rights management service of a messaging device to randomly generate a challenge identifier;
encrypting, at the messaging device, the challenge identifier with a first encryption key embedded in a first issuance license, thereby generating an encrypted challenge message, wherein the first issuance license is associated with a recipient messaging device located at a separate network location;
communicating, from the messaging device to the recipient messaging device, the encrypted challenge message via a peer-to-peer communication link without utilizing a centralized messaging service;
receiving, at the messaging device, an encrypted challenge return from the recipient messaging device, wherein the encrypted challenge return is a return challenge identifier encrypted with a second encryption key that is embedded in a second issuance license specific to the messaging device;
decrypting the encrypted challenge return thereby providing the return challenge identifier;
verifying that the return challenge identifier matches the challenge identifier;
responsive to the verifying, establishing that network communications are secure when transmitting communications with the recipient messaging device;
encrypting a communication to generate an encrypted communication that includes a control policy limiting use of the communication when received at the recipient messaging device; and
communicating, from the messaging device to the recipient messaging device, the encrypted communication via the peer-to-peer communication link.
2 Assignments
0 Petitions
Accused Products
Abstract
Secure instant messaging is described. In an embodiment, a messaging device encrypts a challenge identifier to generate an encrypted challenge message, and communicates the encrypted challenge message via a peer-to-peer communication link to a recipient messaging device. The recipient messaging device decrypts the encrypted challenge message and encrypts the challenge identifier as a return challenge identifier to generate an encrypted challenge return. The messaging device receives the encrypted challenge return from the recipient messaging device, decrypts the encrypted challenge return, and verifies that the return challenge identifier matches the challenge identifier to establish that communications are secure when communicated via the peer-to-peer communication link and, optionally, to establish control policies pertaining to a communication received at the recipient messaging device.
-
Citations
12 Claims
-
1. A method, comprising:
-
utilizing a digital rights management service of a messaging device to randomly generate a challenge identifier; encrypting, at the messaging device, the challenge identifier with a first encryption key embedded in a first issuance license, thereby generating an encrypted challenge message, wherein the first issuance license is associated with a recipient messaging device located at a separate network location; communicating, from the messaging device to the recipient messaging device, the encrypted challenge message via a peer-to-peer communication link without utilizing a centralized messaging service; receiving, at the messaging device, an encrypted challenge return from the recipient messaging device, wherein the encrypted challenge return is a return challenge identifier encrypted with a second encryption key that is embedded in a second issuance license specific to the messaging device; decrypting the encrypted challenge return thereby providing the return challenge identifier; verifying that the return challenge identifier matches the challenge identifier; responsive to the verifying, establishing that network communications are secure when transmitting communications with the recipient messaging device; encrypting a communication to generate an encrypted communication that includes a control policy limiting use of the communication when received at the recipient messaging device; and communicating, from the messaging device to the recipient messaging device, the encrypted communication via the peer-to-peer communication link. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. One or more computer readable storage devices comprising computer executable instructions stored thereon that, when executed, direct an instant messaging device to perform operations comprising:
-
utilizing a digital rights management service of the instant messaging device to randomly generate a challenge identifier; encrypting, at the instant messaging device, the challenge identifier with a first encryption key embedded in a first issuance license, thereby generating an encrypted challenge message, wherein the first issuance license is associated with a recipient messaging device located at a separate network location; communicating, from the instant messaging device to the recipient messaging device, the encrypted challenge message via a peer-to-peer communication link; receiving, at the instant messaging device, an encrypted challenge return from the recipient messaging device, wherein the encrypted challenge return is a return challenge identifier encrypted with a second encryption key that is embedded in a second issuance license specific to the instant messaging device; decrypting the encrypted challenge return thereby providing the return challenge identifier; validating that an instant message is secure when transmitted from the instant messaging device to the recipient messaging device via the peer-to-peer communication link by verifying that the return challenge identifier matches the challenge identifier; responsive to the validating, encrypting the instant message to generate an encrypted instant message which includes a control policy limiting use of the instant message; and communicating, from the instant messaging device to the recipient messaging device, the encrypted instant message via the peer-to-peer communication link. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification