Protecting content from third party using client-side security protection
First Claim
1. A computer-implemented messaging system, comprising:
- a computing device using an untrusted message service for sending a message to one or more recipients,wherein a rules component associated with the untrusted message service provides rules to a client device and is configured to supply one or more of modified rules and new rules to the client device to generate a security template;
wherein the security template allows exposure of a header portion and a subject portion of the message at the untrusted message service;
wherein the security template further prevents a body portion and message attachments of the message from being exposed at the untrusted message service; and
wherein the security template is configured to be applied by the client device in response to a determination that the untrusted message service is being used to send the message, wherein applying the security template includes attaching one or more attributes of the security to the message.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each trusted user machine is configured to optionally apply security to messages. Rules determine when automatic protection is applied and the level of protection to apply. The trusted client automatically downloads the rules (or rules policies) from a trusted rules service and caches the rules locally. During composition, the rules analyze the message and automatically apply security template(s) to the message. The security template(s) encrypt the body of the message, but not the headers or subject. The untrusted message service processes the header and delivers the message to the correct recipient. The hosted service cannot view the contents of the message body, and only intended recipients of the protected message can view the message body. Offline protection is supported, and the user can override protection by the rules.
-
Citations
18 Claims
-
1. A computer-implemented messaging system, comprising:
-
a computing device using an untrusted message service for sending a message to one or more recipients, wherein a rules component associated with the untrusted message service provides rules to a client device and is configured to supply one or more of modified rules and new rules to the client device to generate a security template; wherein the security template allows exposure of a header portion and a subject portion of the message at the untrusted message service; wherein the security template further prevents a body portion and message attachments of the message from being exposed at the untrusted message service; and wherein the security template is configured to be applied by the client device in response to a determination that the untrusted message service is being used to send the message, wherein applying the security template includes attaching one or more attributes of the security to the message. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method of processing messages, comprising:
-
receiving a message from a client to a recipient; analyzing the message using rules from a trusted rules service associated with an untrusted message service, wherein the rules provide for a security template that allows exposure of a header portion and a subject portion of the message at the untrusted message service and prevents a body portion and message attachments of the message from being exposed at the untrusted message service, and wherein the trusted rules service is configured to supply one or more of modified rules and new rules to the client; applying the security template to the message in response to a determination that the untrusted message service is being used to send the message, wherein applying the security template includes attaching one or more attributes of the security template to the message; and sending the message to the recipient using the untrusted message service. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method of processing messages, comprising:
-
using an untrusted message service, sending one or more messages from a client to one or more recipients; wherein a rules component associated with the untrusted message service provides rules to the client and is configured to supply one or more of modified rules and new rules to the client to generate a security template; wherein the security template allows exposure of a header portion and a subject portion of the message at the untrusted message service; and
wherein the security further prevents a body portion and message attachments of the message from being exposed at the untrusted message service; andwherein the security template is configured to be applied by the client device in response to a determination that the untrusted message service is being used to send the message, wherein applying the security template includes attaching one or more attributes of the security template to the message. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification