Methods and systems for indicating trustworthiness of secure communications
First Claim
1. A method of indicating a trustworthiness of a received message, said method comprising:
- receiving, via a software program, a message comprising content that has been digitally signed by a digital signer with a digital signature;
accessing a set of cryptographically secure attestations by a third party entity, the third party entity being known to software that received the message;
successfully identifying a cryptographic key that was used to sign the message and an entity that holds the key, the successfully identifying comprising determining cryptographically secure bindings associated with the message, the cryptographically secure bindings being between said content, said message, and said digital signer, and between said digital signer and said third party entity;
successfully verifying that the digital signature of the message is cryptographically associated with the identified cryptographic key;
calculating, using one or more computer hardware processors, a set of indicia from the message and said cryptographically secure attestations;
presenting said indicia to a user; and
after the successfully identifying the cryptographic key and the successfully verifying that the digital signature of the message is cryptographically associated with the identified cryptographic key, requesting said user to modify the indicia that were calculated from the message.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present invention enable a message recipient or messaging system to indicate the trustworthiness of a message, especially messages that comprise content that has been digitally signed. In addition, embodiments may alter or control the message to change user behavior by preventing the user from doing things that the message would induce the user into doing. In some embodiments, various characteristics and indicia of the message are determined. For example, for e-mail messages having digitally signed content, certain embodiments may determine the entity or entities asserting a basis for trust, the status or role of the sender, the name of the sender, the affiliation of the sender, the messaging address the location, and the most recent status of the trust relationship. Based on the determined indicia, a plain language notification is composed and the message is displayed with the notification. For example, the notification may be displayed in a display bar above or below the message'"'"'s contents, or may appear as a pop-up window. In addition, in some embodiments, the recipient may provide his or her assessment of the indicia, such as the accuracy, reliability, and the trustworthiness of the indicia. The history of interactions between various parties related to the message may also be considered. For example, the history of interactions between the sender and recipient may be considered. The trustworthiness of the certification authority or other entity may also be considered.
100 Citations
27 Claims
-
1. A method of indicating a trustworthiness of a received message, said method comprising:
-
receiving, via a software program, a message comprising content that has been digitally signed by a digital signer with a digital signature; accessing a set of cryptographically secure attestations by a third party entity, the third party entity being known to software that received the message; successfully identifying a cryptographic key that was used to sign the message and an entity that holds the key, the successfully identifying comprising determining cryptographically secure bindings associated with the message, the cryptographically secure bindings being between said content, said message, and said digital signer, and between said digital signer and said third party entity; successfully verifying that the digital signature of the message is cryptographically associated with the identified cryptographic key; calculating, using one or more computer hardware processors, a set of indicia from the message and said cryptographically secure attestations; presenting said indicia to a user; and after the successfully identifying the cryptographic key and the successfully verifying that the digital signature of the message is cryptographically associated with the identified cryptographic key, requesting said user to modify the indicia that were calculated from the message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium comprising executable program code that configures a hardware processor to perform operations comprising:
-
receiving, via a software program, a message comprising content that has been digitally signed by a digital signer with a digital signature; accessing cryptographically secure attestations by a third party entity that is known to software that received the message; successfully identifying a cryptographic key that was used to sign the message and an entity that holds the key, the successfully identifying comprising determining cryptographically secure bindings associated with the message, the cryptographically secure bindings being between said content, said message, and said digital signer, and between said digital signer and said third party entity; successfully verifying the digital signature of the message is associated with the identified cryptographic key; calculating, using one or more computer hardware processors, a set of indicia from the message and said cryptographically secure attestations; presenting said indicia to a user; and after the successfully identifying the cryptographic key and the successfully verifying the digital signature of the message, requesting said user to modify the indicia that were calculated from the message.
-
-
14. A method of assessing trustworthiness of a received message, said method comprising:
-
receiving, via a software program, a message comprising content that is digitally signed by a digital signer; accessing one or more cryptographically secure attestations by a trusted entity; identifying a cryptographic key was used to sign the message and an entity that holds the key, the identifying comprising determining cryptographically secure bindings associated with the cryptographic key, the cryptographically secure bindings being between said content, said message, and said digital signer, and between said digital signer and said trusted entity; verifying that the message is cryptographically associated with the identified cryptographic key; calculating, using one or more computer hardware processors, one or more indicia from secure bindings associated with the cryptographic key, the calculation being based on said cryptographically secure attestations; determining at least one role from said indicia, the at least one role indicating a class of a sender; and modifying the message based on said role and said indicia presented to a recipient of the received message, the modified message including role-specific information that relates to the at least one role. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A non-transitory computer readable medium comprising executable program code that configures a hardware processor to perform operations comprising:
-
receiving, via a software program, a message comprising content and a digital signature; accessing one or more cryptographically secure attestations by a trusted entity; identifying a cryptographic key was used to sign the message and an entity that holds the key, the identifying comprising determining cryptographically secure bindings associated with the cryptographic key, the cryptographically secure bindings being between said content, said message, and said digital signer, and between said digital signer and said trusted entity; verifying that the digital signature is cryptographically associated with the identified cryptographic key; calculating, using one or more computer hardware processors, one or more indicia from secure bindings associated with the cryptographic key, the calculation being based on said cryptographically secure attestations; determining at least one role from said indicia, the at least one role indicating a class of a sender; and modifying the message based on said role and said indicia presented to a recipient of the received message, the modified message including role-specific information that relates to the at least one role.
-
Specification