Instant messaging private tags
First Claim
Patent Images
1. A system for decrypting a message comprising:
- a parser to parse a received data stream and identify and remove private tags from the received data stream, the private tags surrounding sensitive data; and
a decryption engine to decrypt the sensitive data based on information in the private tags, the information comprising a name and value pair identifying a decryption method to utilize in decrypting the sensitive data, the decryption engine further to determine a key associated with the name and value pair to decrypt the sensitive data and decrypt the sensitive data using the key identified by the name and value pair.
11 Assignments
0 Petitions
Accused Products
Abstract
Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided.
16 Citations
8 Claims
-
1. A system for decrypting a message comprising:
-
a parser to parse a received data stream and identify and remove private tags from the received data stream, the private tags surrounding sensitive data; and a decryption engine to decrypt the sensitive data based on information in the private tags, the information comprising a name and value pair identifying a decryption method to utilize in decrypting the sensitive data, the decryption engine further to determine a key associated with the name and value pair to decrypt the sensitive data and decrypt the sensitive data using the key identified by the name and value pair. - View Dependent Claims (2, 3)
-
-
4. A method comprising:
-
parsing a received data stream to identify private tags, the private tags surrounding sensitive data and identifying a name and value pair to utilize in decrypting the sensitive data; determining a key associated with the name and value pair; decrypting the sensitive data using the key associated with the name and value pair; and removing the private tags from the received data stream. - View Dependent Claims (5, 6)
-
-
7. A non-transitory computer readable medium storing computer program instructions, which, when executed on a processor, cause the processor to perform operations comprising:
-
parsing a received data stream to identify private tags, the private tags surrounding sensitive data and identifying a name and value pair to utilize in decrypting the sensitive data; determining a key associated with the name and value pair; decrypting the sensitive data using the key associated with the name and value pair; and removing the private tags from the received data stream. - View Dependent Claims (8)
-
Specification