System, device and method for dynamically securing instant messages
First Claim
1. A computer implemented method, comprising:
- intercepting an unencrypted instant messaging (IM) communication sent by an originating device for transmission over a wide area network to a remote destination device;
determining, using a first IM security device associated with the originating device, whether a second IM security device is available for the destination device, the determining including;
transmitting, in response to intercepting the unencrypted instant messaging communication, a discovery communication including data indicating that the unencrypted instant messaging communication can be encrypted according to one or more security protocols available at the first IM security device; and
determining whether a response message to the discovery communication is received from the second IM security device;
in response to determining that the second IM security device is available for the destination device;
transmitting a first negotiation communication to the second IM security device, the first negotiation communication including data for negotiating an encryption technique between the first and the second IM security devices to encrypt unencrypted instant messaging communications from the originating device to the destination device and to decrypt encrypted instant messaging communications from the destination device to the originating device;
receiving a second negotiation communication from the second IM security device, the second negotiation communication specifying the encryption technique;
encrypting the unencrypted instant messaging communication from the originating device using the encryption technique; and
transmitting the encrypted instant messaging communication to the destination device, wherein the encrypted instant messaging communication is decrypted by the second IM security device for delivery to the destination device.
9 Assignments
0 Petitions
Accused Products
Abstract
An Instant Messaging security system that encrypts Instant Messages sent by a Instant Messaging user to an Instant Messaging server by intercepting the messages, negotiating a preferred security algorithm and forwarding the encrypted messages to the server. The security system intercepts and decrypts encrypted messages sent by the server to the user. The security system is able to determine whether a receiving user is equipped with a similar security system without prior knowledge of network addresses, configuration or capability. The security system is transparent to the Instant Message service provider and may provide one or more indicators to users that messages are encrypted during forwarding.
-
Citations
17 Claims
-
1. A computer implemented method, comprising:
-
intercepting an unencrypted instant messaging (IM) communication sent by an originating device for transmission over a wide area network to a remote destination device; determining, using a first IM security device associated with the originating device, whether a second IM security device is available for the destination device, the determining including; transmitting, in response to intercepting the unencrypted instant messaging communication, a discovery communication including data indicating that the unencrypted instant messaging communication can be encrypted according to one or more security protocols available at the first IM security device; and determining whether a response message to the discovery communication is received from the second IM security device; in response to determining that the second IM security device is available for the destination device; transmitting a first negotiation communication to the second IM security device, the first negotiation communication including data for negotiating an encryption technique between the first and the second IM security devices to encrypt unencrypted instant messaging communications from the originating device to the destination device and to decrypt encrypted instant messaging communications from the destination device to the originating device; receiving a second negotiation communication from the second IM security device, the second negotiation communication specifying the encryption technique; encrypting the unencrypted instant messaging communication from the originating device using the encryption technique; and transmitting the encrypted instant messaging communication to the destination device, wherein the encrypted instant messaging communication is decrypted by the second IM security device for delivery to the destination device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
one or more data processors; and a data storage apparatus encoded with instructions that when executed by the one or more data processors cause the one or more data processors to perform operations comprising; intercepting an unencrypted instant messaging (IM) communication sent by an originating device for transmission over a wide area network to a remote destination device; determining, using a first IM security device associated with the originating device, whether a second IM security device is available for the destination device, the determining including; transmitting, in response to intercepting the unencrypted instant messaging communication, a discovery communication including data indicating that the unencrypted instant messaging communication can be encrypted according to one or more security protocols available at the first IM security device; and determining whether a response message to the discovery communication is received from the second IM security device; in response to determining that the second IM security device is available for the destination device; transmitting a first negotiation communication to the second IM security device, the first negotiation communication including data for negotiating an encryption technique between the first and the second IM security devices to encrypt unencrypted instant messaging communications from the originating device to the destination device and to decrypt encrypted instant messaging communications from the destination device to the originating device; receiving a second negotiation communication from the second IM security device, the second negotiation communication specifying the encryption technique; encrypting the unencrypted instant messaging communication from the originating device using the encryption technique; and transmitting the encrypted instant messaging communication to the destination device, wherein the encrypted instant messaging communication is decrypted by the second IM security device for delivery to the destination device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer storage medium encoded with a computer program, the program comprising instructions that when executed by one or more data processing apparatuses cause the one or more data processing apparatuses to perform operations, comprising:
-
intercepting an unencrypted instant messaging (IM) communication sent by an originating device for transmission over a wide area network to a remote destination device; determining, using a first IM security device associated with the originating device, whether a second IM security device is available for the destination device, the determining including; transmitting, in response to intercepting the unencrypted instant messaging communication, a discovery communication including data indicating that the unencrypted instant messaging communication can be encrypted according to one or more security protocols available at the first IM security device; and determining whether a response message to the discovery communication is received from the second IM security device; in response to determining that the second IM security device is available for the destination device; transmitting a first negotiation communication to the second IM security device, the first negotiation communication including data for negotiating an encryption technique between the first and the second IM security devices to encrypt unencrypted instant messaging communications from the originating device to the destination device and to decrypt encrypted instant messaging communications from the destination device to the originating device; receiving a second negotiation communication from the second IM security device, the second negotiation communication specifying the encryption technique; encrypting the unencrypted instant messaging communication from the originating device using the encryption technique; and transmitting the encrypted instant messaging communication to the destination device, wherein the encrypted instant messaging communication is decrypted by the second IM security device for delivery to the destination device. - View Dependent Claims (14, 15, 16, 17)
-
Specification