Dynamically resolving recipients to retrieve public keys during send/receive
First Claim
1. A method for processing a message on a mobile device, comprising:
- storing a message designated to be encrypted during wireless communication on the mobile device during a period that the mobile device is unable to communicate with a server; and
upon the mobile device becoming able to communicate with the server,assessing messages stored on the mobile device, identifying the stored message designated to be encrypted during wireless communication, and identifying an intended recipient for the stored message designated to be encrypted during wireless communication, andgenerating a synchronization request for synchronizing between the mobile device and the server, the synchronization request comprising a request for a public key associated with the identified recipient of the stored message.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed that facilitate identifying messages generated on a mobile device while the device is offline as requiring encryption, storing the messages in a message outbox with a flag indicating that encryption is required, and identifying recipients of the flagged messages to generate a recipient list. The recipient list can be piggybacked on a server synchronization request when the mobile device enters a period of online activity, and a server can return public keys associated with identified recipients to permit an encryption component, such as a secure/multipurpose Internet mail extension protocol (S/MIME) encryption component, in the mobile device to encrypt the messages.
-
Citations
20 Claims
-
1. A method for processing a message on a mobile device, comprising:
-
storing a message designated to be encrypted during wireless communication on the mobile device during a period that the mobile device is unable to communicate with a server; and upon the mobile device becoming able to communicate with the server, assessing messages stored on the mobile device, identifying the stored message designated to be encrypted during wireless communication, and identifying an intended recipient for the stored message designated to be encrypted during wireless communication, and generating a synchronization request for synchronizing between the mobile device and the server, the synchronization request comprising a request for a public key associated with the identified recipient of the stored message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A tangible computer readable medium having instructions stored thereon that, if executed by a computing device, cause the computing device to perform operations comprising:
-
storing messages designated to be encrypted during wireless communication on the mobile device during a period that the mobile device is unable to communicate with a server; upon the mobile device becoming able to communicate with the server, assessing messages stored on the mobile device, identifying stored messages designated to be encrypted during wireless communication, and identifying intended recipients for the stored messages designated to be encrypted during wireless communication, and generating a synchronization request for synchronizing between the mobile device and the server, the synchronization request comprising a request for public keys associated with identified recipients of a plurality of the stored messages. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A mobile device, comprising:
-
a computing processor; and memory communicatively coupled with the computing processor, the memory comprising instructions executable on the computing processor to perform the following; storing a message on the mobile device during a period that the mobile device is unable to communicate with a server; associating the message with an identifier that indicates the message requires use of an encryption technique when transmitting; upon the mobile device becoming able to communicate with the server; assessing messages stored on the mobile device, identifying the stored message requiring use of an encryption technique when transmitting, and identifying an intended recipient for the stored message; generating a synchronization request for synchronizing between the mobile device and the server, the synchronization request comprising a request for a certificate associated with the identified recipient; transmitting the synchronization request; and receiving the certificate. - View Dependent Claims (19, 20)
-
Specification