Methods and systems for encouraging secure communications
First Claim
Patent Images
1. A method of securing communications, said method comprising:
- accessing a messaging service;
extracting, using at least one computer processor, identification information that identifies a user of the service;
receiving a single user interface input from the user;
obtaining a key pair comprising a public key and a private key, and submitting a request for a certificate to a certificate authority (CA) based on the key pair, wherein the key pair is obtained and the request for the certificate is submitted in response to the single user interface input without requiring further user interface inputs from the user;
receiving a verification code from the CA;
confirming, using the at least one processor, receipt of the verification code from said CA;
generating, using the at least one processor, a certificate for the user based on the verification code and the key pair; and
securing communications from the user based on the generated certificate.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present invention enable a user to engage in secure communications using digital certificates and other cryptographic technologies in an easy way with a minimum of distracting interaction. In some embodiments of the present invention, webmail is enabled to allow users to obtain and use S/MIME certificates to secure his or her e-mails. Embodiments of the present invention can also be implemented to other forms of messaging, such as text messages, instant messages, etc.
29 Citations
9 Claims
-
1. A method of securing communications, said method comprising:
-
accessing a messaging service; extracting, using at least one computer processor, identification information that identifies a user of the service; receiving a single user interface input from the user; obtaining a key pair comprising a public key and a private key, and submitting a request for a certificate to a certificate authority (CA) based on the key pair, wherein the key pair is obtained and the request for the certificate is submitted in response to the single user interface input without requiring further user interface inputs from the user; receiving a verification code from the CA; confirming, using the at least one processor, receipt of the verification code from said CA; generating, using the at least one processor, a certificate for the user based on the verification code and the key pair; and securing communications from the user based on the generated certificate. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus configured to provide secured communications, the apparatus comprising:
-
at least one computer processor; and a computer readable storage medium comprising executable instructions configured to cause the at least one computer processor to perform operations comprising; accessing a messaging service; extracting, using at least one computer processor, identification information that identifies a user of the service; receiving a single user interface input from the user; obtaining a key pair comprising a public key and a private key, and submitting a request for a certificate to a certificate authority (CA) based on the key pair, wherein the key pair is obtained and the request for the certificate is submitted in response to the single user interface input without requiring further user interface inputs from the user; receiving a verification code from the CA; confirming, using the at least one processor, receipt of the verification code from said CA; generating, using the at least one processor, a certificate for the user based on the verification code and the key pair; and securing communications from the user based on the generated certificate.
-
-
9. A non-transitory computer readable medium comprising executable program instructions that, when executed on one or more computer processors, cause the one or more computer processors to perform operations comprising:
-
accessing a messaging service; extracting identification information that identifies a user of the service; receiving a single user interface input from the user; obtaining a key pair comprising a public key and a private key, and submitting a request for a certificate to a certificate authority (CA) based on the key pair, wherein the key pair is obtained and the request for the certificate is submitted in response to the single user interface input without requiring further user interface inputs from the user; receiving a verification code from the CA; confirming receipt of the verification code from said CA; generating a certificate for the user based on the verification code and the key pair; and securing communications from the user based on the generated certificate.
-
Specification