Method and system for sender-controlled messaging and content sharing
First Claim
1. A method for sending an object comprising:
- receiving the object at a sending device, wherein the object is a message or other content;
receiving user input at the sending device to set permissions and rules for the object, wherein a respective permission indicates a respective operation that a receiving device may perform on the object, and wherein a respective rule indicates an operation that the receiving device is required to perform when a specified condition occurs in connection with the object;
attaching the permissions and rules to the object;
generating a unique identifier for a portion of the object;
sending the portion of the object with the unique identifier to a server; and
sending, by the sending device, at least a remaining portion of the object encrypted with a symmetric key and the unique identifier to the receiving device, wherein the symmetric key is encrypted with a public key of the receiving device or a user associated with the receiving device.
2 Assignments
0 Petitions
Accused Products
Abstract
A messaging and content sharing platform that allows for sender-controlled permissions and rules. During operation, a sending device can receive user input to set permissions and rules for an object to be sent to a receiving device. The permissions and rules control how the object will be managed after leaving the sending device. A receiving device receives the object and complies with the permissions and rules associated with the object. Other features of the platform include a hierarchical view for group messaging, an attachment-only view of messages, large file attachments, and the ability to allow users to access external services such as social networking websites without logging in.
-
Citations
30 Claims
-
1. A method for sending an object comprising:
-
receiving the object at a sending device, wherein the object is a message or other content; receiving user input at the sending device to set permissions and rules for the object, wherein a respective permission indicates a respective operation that a receiving device may perform on the object, and wherein a respective rule indicates an operation that the receiving device is required to perform when a specified condition occurs in connection with the object; attaching the permissions and rules to the object; generating a unique identifier for a portion of the object; sending the portion of the object with the unique identifier to a server; and sending, by the sending device, at least a remaining portion of the object encrypted with a symmetric key and the unique identifier to the receiving device, wherein the symmetric key is encrypted with a public key of the receiving device or a user associated with the receiving device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 15, 17, 18, 19, 20, 21, 23, 24, 26, 27, 29, 30)
-
-
12. A method performed by a receiving device to receive an object comprising:
-
receiving at least a portion of the object encrypted with a symmetric key and a unique identifier at the receiving device, wherein the object is a message or other content, and wherein the symmetric key is encrypted with a public key of the receiving device or a user associated with the receiving device; requesting an additional portion of the object from a server, wherein the request includes the unique identifier, wherein the unique identifier is generated by the sending device for the additional portion of the object, and the additional portion of the object with the unique identifier is sent to the server by the sending device; generating the object based on at least the portion of the object and the additional portion of the object; extracting permissions and rules from the object, wherein the permissions and rules are set at the sending device according to user input received at the sending device, wherein a respective permission indicates a respective operation that the receiving device may perform on the object, and wherein a respective rule indicates an operation that the receiving device is required to perform when a specified condition occurs in connection with the object; and providing the object to a user. - View Dependent Claims (14)
-
-
16. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for sending an object, the method comprising:
-
receiving the object at a sending device, wherein the object is a message or other content; receiving user input at the sending device to set permissions and rules for the object, wherein a respective permission indicates a respective operation that a receiving device may perform on the object, and wherein a respective rule indicates an operation that the receiving device is required to perform when a specified condition occurs in connection with the object; attaching the permissions and rules to the object; generating a unique identifier for a portion of the object; sending the portion of the object with the unique identifier to a server; and sending, by the sending device, at least a remaining portion of the object encrypted with a symmetric key and the unique identifier to the receiving device, wherein the symmetric key is encrypted with a public key of the receiving device or a user associated with the receiving device.
-
-
22. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method executed by a receiving device to receive an encrypted object, the method comprising:
-
receiving at least a portion of the object encrypted with a symmetric key and a unique identifier at the receiving device, wherein the object is a message or other content, and wherein the symmetric key is encrypted with a public key of the receiving device or a user associated with the receiving device; requesting an additional portion of the object from a server, wherein the request includes the unique identifier, wherein the unique identifier is generated by the sending device for the additional portion of the object, and the additional portion of the object with the unique identifier is sent to the server by the sending device; generating the object based on at least the portion of the object and the additional portion of the object; extracting permissions and rules from the object, wherein the permissions and rules are set at the sending device according to user input received at the sending device, wherein a respective permission indicates a respective operation that the receiving device may perform on the object, and wherein a respective rule indicates an operation that the receiving device is required to perform when a specified condition occurs in connection with the object; and providing the object to a user.
-
-
25. A system comprising:
-
a processor; a memory; and a non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for sending an object, the method comprising; receiving the object at a sending device, wherein the object is a message or other content; receiving user input at the sending device to set permissions and rules for the object, wherein a respective permission indicates a respective operation that a receiving device may perform on the object, and wherein a respective rule indicates an operation that the receiving device is required to perform when a specified condition occurs in connection with the object; attaching the permissions and rules to the object; generating a unique identifier for a portion of the object; sending the portion of the object with the unique identifier to a server; and sending, by the sending device, at least a remaining portion of the object encrypted with a symmetric key and the unique identifier to the receiving device, wherein the symmetric key is encrypted with a public key of the receiving device or a user associated with the receiving device.
-
-
28. A system comprising:
-
a processor; a memory; and a non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for receiving an object, the method comprising; receiving at least a portion of the object encrypted with a symmetric key and a unique identifier at a receiving device, wherein the object is a message or other content, and wherein the symmetric key is encrypted with a public key of the receiving device or a user associated with the receiving device; requesting an additional portion of the object from a server, wherein the request includes the unique identifier, wherein the unique identifier is generated by the sending device for the additional portion of the object, and the additional portion of the object with the unique identifier is sent to the server by the sending device; generating the object based on at least the portion of the object and the additional portion of the object; extracting permissions and rules from the object, wherein the permissions and rules are set at the sending device according to user input received at the sending device, wherein a respective permission indicates a respective operation that the receiving device may perform on the object, and wherein a respective rule indicates an operation that the receiving device is required to perform when a specified condition occurs in connection with the object; and providing the object to a user.
-
Specification