Securing group communications
First Claim
Patent Images
1. A system comprising:
- a processor configured to;
generate a secure social feed by creating a feed file, wherein the feed file includes criteria that enables members of the secure social feed to decrypt encrypted published content;
obtain content for publication to the secure social feed;
generate a content key to encrypt the obtained content;
encrypt the obtained content using the content key; and
publish the encrypted content to the secure social feed, wherein a decoy image is posted to the secure social feed for users that are not authorized to view the encrypted content;
a memory coupled to the processor and configured to provide the processor with instructions.
5 Assignments
0 Petitions
Accused Products
Abstract
The secure messaging app described herein allows a user to create a secure social feed in order to share content with just a few friends or thousands of recipients. The user encrypts their content and then publishes the encrypted content to the secure social feed. Accordingly, only authorized recipients can decrypt and view the content. Furthermore, the user may administer the secure social feed to manage the addition and/or removal of users from the secure social feed. Further, the user periodically updates the parameters of the secure social feed to manage users'"'"' access to the feed.
392 Citations
13 Claims
-
1. A system comprising:
-
a processor configured to; generate a secure social feed by creating a feed file, wherein the feed file includes criteria that enables members of the secure social feed to decrypt encrypted published content; obtain content for publication to the secure social feed; generate a content key to encrypt the obtained content; encrypt the obtained content using the content key; and publish the encrypted content to the secure social feed, wherein a decoy image is posted to the secure social feed for users that are not authorized to view the encrypted content; a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
generate a secure social feed by creating a feed file, wherein the feed file includes criteria that enables members of the secure social feed to decrypt encrypted published content; obtain content for publication to the secure social feed; generate a content key to encrypt the obtained content; encrypt the obtained content using the content key; and publish the encrypted content to the secure social feed, wherein a decoy image is posted to the secure social feed for users that are not authorized to view the encrypted content. - View Dependent Claims (11)
-
-
12. A computer program product embodied in a non-transitory computer readable storage medium and comprising computer instructions for:
-
generate a secure social feed by creating a feed file, wherein the feed file includes criteria that enables members of the secure social feed to decrypt encrypted published content; obtain content for publication to the secure social feed; generate a content key to encrypt the obtained content; encrypt the obtained content using the content key; and publish the encrypted content to the secure social feed, wherein a decoy image is posted to the secure social feed for users that are not authorized to view the encrypted content. - View Dependent Claims (13)
-
Specification