US20180316688A1 - System and Methods of Providing Secure Messaging Environment - Google Patents

System and Methods of Providing Secure Messaging Environment Download PDF

Info

Publication number
US20180316688A1
US20180316688A1 US15/795,701 US201715795701A US2018316688A1 US 20180316688 A1 US20180316688 A1 US 20180316688A1 US 201715795701 A US201715795701 A US 201715795701A US 2018316688 A1 US2018316688 A1 US 2018316688A1
Authority
US
United States
Prior art keywords
data
messaging environment
server
ticket
encryption key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/795,701
Inventor
Wendell Adams
Steven Kosbau
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Erasable LLC
Original Assignee
Erasable LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Erasable LLC filed Critical Erasable LLC
Priority to US15/795,701 priority Critical patent/US20180316688A1/en
Publication of US20180316688A1 publication Critical patent/US20180316688A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A method for providing a secure messaging environment includes providing a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment; logging-into the client application; encrypting user-specific information using a personal encryption key; creating a ticket, said ticket comprising a continuously-updated key and an optional expiration setting from a server; and calling the server, the call comprising the ticket and a target method.

Description

  • This application is a Continuation Application of U.S. Ser. No. 14/961,951 filed on 8 Dec. 2015 and claims priority of U.S. provisional patent application 62/096,084 filed in the U.S. Patent and Trademark Office on 23 Dec. 2014, the entireties of which are incorporated herein by reference.
  • FIELD OF INVENTION
  • The present invention is directed to a system and methods of providing a secure messaging environment between two or more devices via a computer network, thereby ensuring secure data transmission, storage, and exchange. Encrypted data stored on a server may be viewed by one or more users of the secure messaging environment and is removeable from the server and the messaging environment.
  • BACKGROUND AND SUMMARY OF INVENTION
  • According to one embodiment of the present invention, a method for providing a secure messaging environment is provided comprising providing a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment; logging-into the client application; encrypting user-specific information using a personal encryption key; creating a ticket, the ticket comprising a continuously-updated key and an optional expiration setting from a server; and calling the server. The call to the server may comprise the ticket and a target method.
  • According to another embodiment, a method for providing a secure messaging environment is provided. A messaging environment in which two or more devices are connected via a network is provided, each device having a client application that provides a graphical user interface for displaying data within the messaging environment. A ticket is created, the ticket comprising a continuously-updated encryption key and an optional expiration setting from a server. Data is transmitted to the messaging environment, wherein the data comprises data files, text or word processing files, notes, text messages, voice messages or calls, photos, videos, lists, spreadsheets, web links, or webpages. The data is encrypted. The encrypted data is stored on a database. A new encryption key is created by encrypting 1) user-specific information or a user personal key and 2) a record ID for the stored data. The new encryption key is updated with each transmission of data to the messaging environment, thereby creating the continuously-updated encryption key. The data is diplsayed in the messaging environment and a client graphical user interface on a user device, thereby providing a continually-encrypted exchange of data in the messaging environment.
  • According to another embodiment, a system for providing a secure messaging environment is provided. A server provides a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment. The server encrypts messages sent to the messaging environment and creates a continually-changing encryption key by encrypting user-specific information or a user personal key and a record ID for a stored encrypted message. At least one database stores encrypted messages from the server with each message having a separate record ID.
  • An advantage of at least one embodiment of the present invention is that tickets may be used with an Internet Protocol (IP) restriction. Thus, it is impossible to use the same ticket on a different network.
  • Another advantage of at least one embodiment of the present invention is that a ticket may comprise user-specific information. Thus, it is not possible to use the same ticket for a different user. A user must be logged-in as a ticket owner in order to use a ticket.
  • Yet another advantage of at least one embodiment of the present invention is that a ticket may be protected with an expiration setting. There is no chance to use an expired ticket.
  • Another advantage of at least one embodiment of the present invention is that there is no way to decrypt all data on database with a single encryption key. Even if a key were compromised, it may allow at best access to a single record, but nothing more.
  • Another advantage of at least one embodiment of the present invention is that, even if an unauthorized third party (e.g., hacker) gets access to a database or server files, the third party will not have an encryption key for a specific record.
  • Another advantage of at least one embodiment of the present invention is that a data encryption key may use fragmented keys that are continuously changing and connect one device to another device, allowing for real-time encryption and data removal with nothing being stored on either device. A fragmented key may be composed of user data, server data, and an instance to create a new key that will continuously change.
  • Yet another advantage of at least one embodiment of the present invention is that, even if unauthorized third parties are on the same network as a server, they will not have be able to obtain a second level encryption key, unless both user parameters and a specific record ID are known.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a flowchart of a method according to one embodiment of the present invention.
  • FIG. 2 is a screenshot of graphical user interface for displaying an Inbox and messaging area according to one embodiment of the present invention.
  • FIG. 3 is a screenshot of a messaging environment according to one embodiment of the present invention.
  • FIG. 4 is a flowchart of a method evaluation and ticket validation according to a specific embodiment of the present invention.
  • FIG. 5 is a flowchart of a filtering method according to a specific embodiment the present invention.
  • FIG. 6 is a flowchart of new ticket creation according to a specific embodiment of the present invention.
  • FIG. 7 is a flowchart of a method for clearing a message from the messaging environment according to one embodiment of the present invention.
  • FIG. 8A is a screenshot of a messaging environment according to one embodiment of the present invention in which a user clears or deletes a message from the messaging environment. FIG. 8B is a warning message or pop-up that is presented when a user deletes a message.
  • FIG. 9 is a screenshot of the messaging environment of FIG. 8A with the message cleared and removed from the messaging environment.
  • FIG. 10 is a screenshot of a messaging environment according to one embodiment of the present invention.
  • FIG. 11 is a screenshot of a real-time search of indexed data according to one embodiment of the present invention.
  • FIG. 12 is a schematic illustration of Application Programming Interface (API) calls in a client-server architecture according to an embodiment of the present invention.
  • FIG. 13 shows a representative hardware environment for practicing at least one embodiment of the present invention.
  • FIG. 14 shows a schematic diagram of a system according to an embodiment of the present invention.
  • DETAILED DESCRIPTION OF INVENTION
  • In this detailed description, references to “one embodiment”, “an embodiment”, or “in embodiments” mean that the feature being referred to is included in at least one embodiment of the invention. Moreover, separate references to “one embodiment”, “an embodiment”, or “in embodiments” do not necessarily refer to the same embodiment; however, neither are such embodiments mutually exclusive, unless so stated. Thus, the invention can include any variety of combinations and/or integrations of the embodiments described herein.
  • I. Messaging Environment
  • According to the present invention, a messaging environment is provided between two or more devices via a computer network (e.g., the Internet, wireless network). In specific embodiments, the devices may be an electronic or digital device including, but not limited to, a desktop computer, a laptop computer, a tablet computer, a smartphone, a gaming device, a wearable device (e.g., watch, sports band), any smart device, computer, tablet or phone having wireless access to the Internet, and the like. In a specific embodiment, the messaging environment and/or access thereto may be provided via a downloadable app.
  • In specific embodiments, the messaging environment may be synchronous or asynchronous. The messaging environment allows users of the devices to exchange data in the messaging environment. Data include, but are not limited to, data files, text or word processing files, text messages, voice messages or calls, notes, contacts, photos, videos, lists, spreadsheets, web links, webpages, and the like.
  • According to the present invention, a client (client-side or user-side application) on a user's device provides a graphical user interface for displaying data (e.g., one or more messages) in the messaging environment between two or more users. The client is in communication via the network with a server (server-side) and at least one database.
  • II. Overview
  • A method according to one embodiment of the present invention is illustrated in the flowchart of FIG. 1. A user logs into a client, 100. Each user has a personal encryption key, which in a specific embodiment does not change. User-specific information is encrypted using the personal encryption key, 105. Currently logged-in user-specific information may include at least one of a user ID, a user password, a user role, or any combination thereof.
  • The client prepares a ticket, 110, and calls the server: 1) every time a user logs into the client, and 2) every time the user sends and/or receives data (e.g., messages) in the messaging environment. Alternatively, or in addition thereto, a client may receive a ticket from the server.
  • The ticket may include a new, constantly-changing encryption key from the server as discussed below and an optional expiration setting. The call to the server includes the ticket and may also include a target method 112 (e.g., requesting an action). In specific embodiments, the ticket, or any part thereof, may comprise an encrypted string having numeric, alphabetical, and/or alphanumeric values or characters.
  • According to a specific embodiment of the present invention, the expiration setting may comprise a predefined period or event including, but not limited to, a time period, a logout, closing and/or reopening of an Inbox or a specific folder/icon, losing a network connection between the client and the server, or any combination thereof.
  • The client calls the server and the target method is evaluated to determine whether the call is public or private, 115.
  • If the call includes data sent from a user to the messaging environment, the call is private. The ticket from the client is validated by the server, 120. In specific embodiments, validation may comprise confirming the validity of at least one of the client Internet Protocol (IP) address, user-specific information, an expiration setting, whether the ticket is signed by the server, whether the ticket is in a valid format, or any combination thereof.
  • If the ticket is validated, the target method is filtered, 125; otherwise, if validation fails, the method is aborted. The target method may be filtered, for example, to determine whether it includes data to be stored.
  • If the call does not include data sent from the user to the messaging environment, the call is public. In specific embodiments, a public call may include encrypted user-specific information and information about the device on which a client resides. A public call is also filtered, 125.
  • If the call is public, a native method may be invoked. In specific embodiments, a native method may include confirming the user-specific information; determining the platform on which a client operates (e.g., iOS, Android); or confirming a user logging into a client, accessing a log-in screen, or navigating between screens in the graphical user interface. A native method may ensure that a user is logging in correctly and is not being spoofed.
  • If the call is private and includes a storage method (e.g., data to be stored), the data is encrypted. This filtering and encrypting may allow for storing, reading, and searching of encrypted data.
  • In specific embodiments, the data may be encrypted using an algorithm, 130, and stored on a server and/or at least one database, 135. The algorithm creates a new key by encrypting the currently logged-in user's personal key with a record ID for the stored data, 140. In specific embodiments, the record ID may include at least one of a server ID, database ID, network ID, or any combination thereof. Once encrypted and stored, the data may be displayed in the messaging environment, 145 from where it is viewed in the graphical user interface of a client (e.g., sender and receiver of a message). The new key identifies encrypted data and pulls it from the server and/or at least one database. Thus, each stored data is encrypted by a unique, newly-generated, constantly-changing key.
  • In a specific embodiment, the new key is forwarded to the client application, 150, and incorporated into a new ticket. The method may be repeated for each data (e.g., message) sent and/or received in the messaging environment, with each new (second, third, fourth, etc.) ticket being validated.
  • Thus, in specific embodiments, for each data or message transmitted in the messaging environment, two levels of encryption may occur: a first level using a personal encryption key, and a second level comprising a continually-changing key as data is sent, received, and viewed in the messaging environment.
  • In a specific embodiments, the user personal encryption key (e.g., first level) and/or each newly-generated encryption key (e.g., second level) may be saved using Apache SOLR™. Apache SOLR™ is a standalone enterprise search server with a REST-like API. Data may be put in (“indexed”) via JSON, XML, CSV or binary over HTTP. One may initiate queries via HTTP GET and receive JSON, XML, CSV or binary results.
  • Any effective encryption methodology may be used in the present invention. In specific embodiments, a 2-level 256 bit Advanced Encryption Standard (AES) encryption algorithm (based on libmcrypt (mcrypt of php) may be utilized.
  • III. Graphical User Interface of Client
  • An Inbox 200 is displayed in the client graphical user interface according to one embodiment of the present invention, as illustrated in the screenshot of FIG. 2. In a specific embodiment, the Inbox 200 may serve as a default screen when a user logs into the client and may display a list of other users with whom the user has sent and/or received messages. The Inbox may have a messaging area 205 that allows for a quick message creation or reply from the user. A messaging environment 300 is illustrated in the screenshot of FIG. 3 and, in embodiments, may be a drill-down screen from the messaging area 205 shown in FIG. 2 to display a specific conversation (e.g., exchange of messages) between two or more users.
  • One or more screens of the client graphical user interface may also display icons that provide additional features, for example, a Contacts List, an Outbox or Sent Box, a Trash folder, or other specific functions such as “Favorites”, “Phone”, “Add Contacts” and the like.
  • IV. Specific Embodiments of Target Method Evaluation and Filtering
  • In a specific embodiment, a call comprising data from a client to the server is illustrated in FIG. 4. The method is evaluated, 400. A public method is sent directly to an Execution Handler, 405. If a method is private, it is forwarded to a Ticket Adapter, 410, which validates the ticket format, 412 (for example, by determining if the IP is valid, the user is valid, the ticket is expired). If the validation is successful, the ticket is forwarded to the Execution Handler, 405, and then a Success Handler, 415. If validation is unsuccessful, access to the messaging environment is denied (e.g., Failure Handler 420).
  • FIG. 5 illustrates the processes performed by the Execution Handler 405 of FIG. 4. A target method is analyzed via Native Method Finder 500. If the method is public, the method is filtered (via an Input/Output filter 505) and a native method is executed (via Native Method Executer 510). If the method is private, a storage filter method is executed (via Filtered Method Executer 515) and the data is encrypted and stored as discussed above.
  • After method evaluation and filtering, a new ticket may be created, as illustrated in FIG. 6. A Success Handler 415 creates a new (second, third, etc.) ticket for a client via the Ticket Adapter 410. In a specific embodiment, the Response Handler may be code or a module that instructs how to handle data that is sent to the messaging environment. The Response Data comprises the data or message content. Everything is encrypted as it progresses to the messaging environment.
  • V. Clearing Data from the Server and Messaging Environment
  • According to the present invention, data (e.g. messages) in the messaging environment may be removed and cleared from the messaging environment and the server and/or at least one database.
  • As illustrated in the flowchart of FIG. 7, a user may request a specific message to be deleted, 700. The user may receive a warning, which in specific embodiments, may include a message, pop-up window, and/or sound, displayed or played in the client graphical user interface, 705. If approved, the message as well as the corresponding encrypted data are removed from the server and/or database, 710. The server and encryption key are updated, 715. Accordingly, the cleared message will not be capable of being viewed in the client graphical user interface (e.g., GUI of the sender and receiver), 720.
  • The method for clearing data (e.g., messages) is shown in the screenshots of FIGS. 8A-8B according to one embodiment of the present invention. As illustrated in FIG. 8A, a user may decide to clear or remove a message via the graphical user interface (e.g., by swiping or highlighting a specific message “Smash” 800 and tapping a “Clear” button or icon 805). In a specific embodiment, the user first may get a warning message 810, for example, audibly and/or visually by a pop-up window or message (as illustrated in FIG. 8B).
  • If approved, the data will be cleared from the server and/or databse, and the server and encryption key corresponding to the saved data will be updated. Accordingly, the message is removed not only from the server, but also from the messaging environment and from the GUI of user devices displaying that data (e.g., both sender and recipient), as illustrated in FIG. 9. Thus, a user no longer has access to the data. If a third party tried to spoof a user, the third party would be unable see the messages for the user. In the embodiment shown in FIG. 10, only encrypted characters are displayed; the message has been cleared and is inaccessible.
  • Since a user can only access the messaging environment when connected to the server, the message is cleared from the messaging environment and server at the same time, with nothing being stored. Accordingly, any cleared message is not recoverable.
  • VI. Real-Time Searching
  • FIG. 11 is a screenshot of a real-time search of a messaging environment according to one embodiment of the present invention. As discussed above, each newly-generated key is saved along with the corresponding stored encypted data (e.g., messages, contacts, and the like). According to the present invention, indexed searching of data is possible.
  • As illustrated, as a user begins to type in a search term in the client (e.g., “steve”), the server searches for encrypted data corresponding to that search term. In specific embodiments, Apache SOLR™ may be used to index data and respond to search queries.
  • VII. System Architecture and Computer Implementation
  • According to an embodiment of the present invention, communication between a client and a server may be based on Representational State Transfer (REST or RESTful) Application Programming Interface (API) calls. In a specific embodiment, all API calls may use secured hypertext terminal protocol (HTTPS), as illustrated in FIG. 12.
  • As will be appreciated by one skilled in the art based on this disclosure, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, a processor operating with software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
  • Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++, C#, Transact-SQL, XML, PHP or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • Computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute with the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified.
  • These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the functions/acts specified.
  • The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified.
  • Referring now to FIG. 13, a representative hardware environment for practicing at least one embodiment of the invention is depicted. This schematic drawing illustrates a hardware configuration of an information handling/computer system in accordance with at least one embodiment of the invention. The system comprises at least one processor or central processing unit (CPU) 10. The CPUs 10 are interconnected with system bus 12 to various devices such as a random access memory (RAM) 14, read-only memory (ROM) 16, and an input/output (I/O) adapter 18. The I/O adapter 18 can connect to peripheral devices, such as disk units 11 and tape drives 13, or other program storage devices that are readable by the system. The system can read the inventive instructions on the program storage devices and follow these instructions to execute the methodology of at least one embodiment of the invention. The system further includes a user interface adapter 19 that connects a keyboard 15, mouse 17, speaker 24, microphone 22, and/or other user interface devices such as a touch screen device (not shown) to the bus 12 to gather user input. Additionally, a communication adapter 20 connects the bus 12 to a data processing network 25, and a display adapter 21 connects the bus 12 to a display device 23 which may be embodied as an output device such as a monitor, printer, or transmitter, for example.
  • The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the root terms “include” and/or “have”, when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
  • As used herein, “in communication” includes physical and wireless connections that are indirect through one or more additional components (or over a network) or directly between the two components described as being in communication.
  • The corresponding structures, materials, acts, and equivalents of all means plus function elements in the claims below are intended to include any structure, or material, for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
  • FIG. 14 shows a schematic diagram of a system for providing a secure messaging environment according to an embodiment of the present invention. The system 900 includes a server 905 providing a messaging environment in which two or more devices (e.g., smart devices 915, 920) are connected via a network 930, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment. The server 905 encrypts messages sent to the messaging environment. The server creates a continually-changing encryption key by encrypting 1) user-specific information or a user personal key and 2) a record ID for a stored encrypted message. At least one database 910 stores the encrypted messages from the server, with each message having a separate record ID.
  • As used above “substantially,” “generally,” “about”, and other words of degree are relative modifiers intended to indicate permissible variation from the characteristic so modified. It is not intended to be limited to the absolute value or characteristic which it modifies but rather possessing more of the physical or functional characteristic than its opposite, and preferably, approaching or approximating such a physical or functional characteristic.
  • Those skilled in the art will appreciate that various adaptations and modifications of the exemplary and alternative embodiments described above can be configured without departing from the scope and spirit of the invention. Therefore, it is to be understood that, within the scope of the appended claims, the invention may be practiced other than as specifically described herein.

Claims (21)

What is claimed is:
1. A method for providing a secure messaging environment, comprising:
providing a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment;
logging-into the client application;
encrypting user-specific information using a personal encryption key;
creating a ticket, said ticket comprising a continuously-updated key and an optional expiration setting from a server; and
calling the server, said call comprising the ticket and a target method.
2. A method according to claim 1, wherein the personal encryption key does not change.
3. A method according to claim 1, wherein the user-specific information comprises a user ID, username, user role, or any combination thereof.
4. A method according to claim 1, wherein said optional expiration setting comprises a predefined setting comprising, a time period, a logout, closing and reopening of the Inbox or a specific folder/icon, losing a network connection between a client and the server, or any combination thereof.
5. A method according to claim 1, wherein if said call comprises data to the messaging environment, said method further comprises validating the ticket.
6. A method according to claim 5, wherein said data comprises data files, text or word processing files, notes, text messages, voice messages or calls, photos, videos, lists, spreadsheets, web links, or webpages.
7. A method according to claim 5, further comprising:
encrypting said data;
storing encrypted data on a database;
creating a new encryption key by encrypting user specification information and a record ID for the stored encrypted data; and
displaying said data in the messaging environment and a client graphical user interface on a user device, thereby providing a continually-encrypted exchange of messages in the messaging environment.
8. A method according to claim 7, further comprising creating a new ticket that incorporates said new encryption key.
9. A method according to claim 7, wherein creating new key is created by encrypting the user personal encryption key and a record ID.
10. A method according to claim 7, wherein said record ID comprises at least one of a server ID, a network ID, a database ID, or any combination thereof.
11. A method according to claim 1, further comprising clearing data from the messaging environment.
12. A method according to claim 11, wherein said clearing data comprises removing encrypted data from the server and/or database and updating the server and encryption key.
13. A method according to claim 11, wherein said cleared data is cleared from the messaging environment and server at the same time is not recoverable.
14. A method according to claim 5, further comprising indexing said encrypted data.
15. A method according to claim 14, further comprising conducting real-time search of a messaging environment, said server searching saved encrypted data corresponding to a search query.
16. A method according to claim 1, wherein said devices are selected from the group consisting of a tablet computer, a smartphone, a gaming device, and a wearable device.
17. A method for providing a secure messaging environment, comprising:
providing a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying data within the messaging environment;
creating a ticket, said ticket comprising a continuously-updated encryption key and an optional expiration setting from a server;
transmitting data to the messaging environment, wherein said data comprises data files, text or word processing files, notes, text messages, voice messages or calls, photos, videos, lists, spreadsheets, web links, or webpages;
encrypting said data;
storing encrypted data on a database;
creating a new encryption key by encrypting 1) user-specific information or a user personal key and 2) a record ID for the stored data, wherein said new encryption key is updated with each transmission of data to the messaging environment, thereby creating the continuously-updated encryption key; and
displaying said data in the messaging environment and a client graphical user interface on a user device, thereby providing a continually-encrypted exchange of data in the messaging environment.
18. A method according to claim 17, further comprising clearing data from the messaging environment by removing selected encrypted data from the server and updating the server and encryption key corresponding to the selected encrypted data.
19. A system for providing a secure messaging environment, comprising:
a server providing a messaging environment in which two or more smart devices are connected via a network, each smart device having a client application that provides a graphical user interface for displaying messages within the messaging environment,
said server creating a continually-changing encryption key comprising encrypted 1) user-specific information or a user personal encryption key and 2) a record ID for each stored encrypted message; and
at least one database for storing encrypted messages from said server with each message having a separate record ID.
20. A system according to claim 19, wherein said smart devices are selected from the group consisting of a tablet computer, a smartphone, a gaming device, and a wearable device.
21. A computer program product for providing a secure messaging environment, comprising:
a non-transitory computer readable storage medium;
first program instructions to provide a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment;
second program instructions to log into the client application;
third program instructions to encrypt user-specific information using a personal encryption key;
fourth program instructions to create a ticket, said ticket comprising a continuously-updated key and an optional expiration setting from a server; and
fifth program instructions to call the server, said call comprising the ticket and a target method,
wherein the first, second, third, fourth and fifth program instructions are stored on said non-transitory computer readable storage medium.
US15/795,701 2014-12-23 2017-10-27 System and Methods of Providing Secure Messaging Environment Abandoned US20180316688A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/795,701 US20180316688A1 (en) 2014-12-23 2017-10-27 System and Methods of Providing Secure Messaging Environment

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201462096084P 2014-12-23 2014-12-23
US14/961,951 US9832208B1 (en) 2014-12-23 2015-12-08 System and methods of providing secure messaging environment
US15/795,701 US20180316688A1 (en) 2014-12-23 2017-10-27 System and Methods of Providing Secure Messaging Environment

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/961,951 Continuation US9832208B1 (en) 2014-12-23 2015-12-08 System and methods of providing secure messaging environment

Publications (1)

Publication Number Publication Date
US20180316688A1 true US20180316688A1 (en) 2018-11-01

Family

ID=60407697

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/961,951 Active 2036-02-20 US9832208B1 (en) 2014-12-23 2015-12-08 System and methods of providing secure messaging environment
US15/795,701 Abandoned US20180316688A1 (en) 2014-12-23 2017-10-27 System and Methods of Providing Secure Messaging Environment

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/961,951 Active 2036-02-20 US9832208B1 (en) 2014-12-23 2015-12-08 System and methods of providing secure messaging environment

Country Status (1)

Country Link
US (2) US9832208B1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101758013B1 (en) * 2016-03-03 2017-07-13 네이버 주식회사 Interaction for deleting query
US11579640B1 (en) 2019-06-30 2023-02-14 Smart Power Partners LLC Control attachment for an in-wall power adapter

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6580786B1 (en) * 2000-09-11 2003-06-17 Yahoo! Inc. Message store architecture
US20060034456A1 (en) * 2002-02-01 2006-02-16 Secure Choice Llc Method and system for performing perfectly secure key exchange and authenticated messaging
GB0513310D0 (en) * 2005-07-01 2005-08-03 Hodes Alan Electronic mail functionality enhancement
US8135645B2 (en) * 2005-12-06 2012-03-13 Microsoft Corporation Key distribution for secure messaging
US7890084B1 (en) * 2006-10-30 2011-02-15 Cellco Partnership Enterprise instant message aggregator
US9078128B2 (en) * 2011-06-03 2015-07-07 Apple Inc. System and method for secure identity service
US20150244520A1 (en) * 2014-02-21 2015-08-27 Safe Frontier Llc One-time-pad data encryption with media server
US20150350247A1 (en) * 2014-05-30 2015-12-03 Apple Inc. Efficient secure instant messaging

Also Published As

Publication number Publication date
US9832208B1 (en) 2017-11-28

Similar Documents

Publication Publication Date Title
US10944563B2 (en) Blockchain systems and methods for user authentication
US9264418B1 (en) Client-side spam detection and prevention
US8544072B1 (en) Single sign-on service
US11785464B2 (en) Media agnostic content access management
CN107006063B (en) System and method for portable storage device
US20140380478A1 (en) User centric fraud detection
US20140208405A1 (en) Simplified and Safe User Authentication
US9203826B1 (en) Authentication based on peer attestation
US9734324B2 (en) Managing a password
US11496446B1 (en) Protecting personally identifiable information submitted through a browser
US20180316688A1 (en) System and Methods of Providing Secure Messaging Environment
US11625368B1 (en) Data migration framework
Eriş et al. Forensic analysis of popular social media applications on android smartphones
US10218505B1 (en) Server based settings for client software with asymmetric signing
WO2021226596A1 (en) Using keyboard app to encrypt e-mail and other digital data
US10769265B2 (en) Managing passwords using steganography
US9940393B2 (en) Electronic personal assistant privacy
US10205599B2 (en) Methods and systems of increasing security quality of computing-device communications
US20180227327A1 (en) Secure content delivery over a domain portal
US10235541B2 (en) System and method for confidential data management
Amft et al. Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication
US20190222565A1 (en) Methods and systems for generating a symmetric key for mobile device encryption
US20220124166A1 (en) System and method for management of online intelligence personas
EP3358801B1 (en) Secure content delivery over a domain portal
Nurtdinova Security in mobile messaging

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION