Enterprise messaging platform
First Claim
Patent Images
1. A system, comprising:
- a processor configured to;
receive an encrypted digital security bubble encapsulation from a sender, wherein the encrypted digital security bubble encapsulation includes an encrypted message, an encrypted first key, a key identifier, and a time-to-live value;
decrypt the encrypted digital security bubble encapsulation;
retrieve a private key from a pool of private keys using the key identifier received in the digital security bubble encapsulation;
decrypt the encrypted first key using the private key retrieved from the pool of private keys;
decrypt the encrypted message using the first key to produce a decrypted message;
analyze the decrypted message to determine whether the decrypted message is compliant with a set of corporate policies; and
in response to determining that the decrypted message is compliant with the set of corporate policies, provide the encrypted digital security bubble encapsulation, including the encrypted message, the encrypted first key, the key identifier, and the time-to-live value to one or more recipients; and
a memory coupled to the processor and configured to provide the processor with instructions.
5 Assignments
0 Petitions
Accused Products
Abstract
A secure messaging platform for an enterprise environment is disclosed. The secure messaging platform enables users to exchange encrypted communications. Further, the secure messaging platform allows enterprise platforms to review the encrypted communications to ensure that they comply with company policies. Messages that comply with company policies may be provided to their intended recipients, while messages that fail to comply with company policies are not provided to their intended recipients. Additionally, the encrypted communications may be retained for a predetermined time.
-
Citations
27 Claims
-
1. A system, comprising:
-
a processor configured to; receive an encrypted digital security bubble encapsulation from a sender, wherein the encrypted digital security bubble encapsulation includes an encrypted message, an encrypted first key, a key identifier, and a time-to-live value; decrypt the encrypted digital security bubble encapsulation; retrieve a private key from a pool of private keys using the key identifier received in the digital security bubble encapsulation; decrypt the encrypted first key using the private key retrieved from the pool of private keys; decrypt the encrypted message using the first key to produce a decrypted message; analyze the decrypted message to determine whether the decrypted message is compliant with a set of corporate policies; and in response to determining that the decrypted message is compliant with the set of corporate policies, provide the encrypted digital security bubble encapsulation, including the encrypted message, the encrypted first key, the key identifier, and the time-to-live value to one or more recipients; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving an encrypted digital security bubble encapsulation from a sender, wherein the encrypted digital security bubble encapsulation includes an encrypted message, an encrypted first key, a key identifier, and a time-to-live value; decrypting the encrypted digital security bubble encapsulation; retrieving a private key from a pool of private keys using the key identifier received in the digital security bubble encapsulation; decrypting the encrypted first key using the private key retrieved from the pool of private keys; decrypting the encrypted message using the first key to produce a decrypted message; analyzing the decrypted message to determine whether the decrypted message is compliant with a set of corporate policies; and in response to determining that the decrypted message is compliant with the set of corporate policies, providing the encrypted digital security bubble encapsulation, including the encrypted message, the encrypted first key, the key identifier, and the time-to-live value to one or more recipients. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product embodied in a tangible non-transitory computer readable storage medium and comprising computer instructions for:
-
receiving an encrypted digital security bubble encapsulation from a sender, wherein the encrypted digital security bubble encapsulation includes an encrypted message, an encrypted first key, a key identifier, and a time-to-live value; decrypting the encrypted digital security bubble encapsulation; retrieving a private key from a pool of private keys using the key identifier received in the digital security bubble encapsulation; decrypting the encrypted first key using the private key retrieved from the pool of private keys; decrypting the encrypted message using the first key to produce a decrypted message; analyzing the decrypted message to determine whether the decrypted message is compliant with a set of corporate policies; and in response to determining that the decrypted message is compliant with the set of corporate policies, providing the encrypted digital security bubble encapsulation, including the encrypted message, the encrypted first key, the key identifier, and the time-to-live value to one or more recipients. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification