System and Methods of Providing Secure Messaging Environment
A method for providing a secure messaging environment includes providing a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment; logging-into the client application; encrypting user-specific information using a personal encryption key; creating a ticket, said ticket comprising a continuously-updated key and an optional expiration setting from a server; and calling the server, the call comprising the ticket and a target method.
Latest Erasable, LLC Patents:
This application is a Continuation Application of U.S. Ser. No. 14/961,951 filed on 8 Dec. 2015 and claims priority of U.S. provisional patent application 62/096,084 filed in the U.S. Patent and Trademark Office on 23 Dec. 2014, the entireties of which are incorporated herein by reference.
FIELD OF INVENTIONThe present invention is directed to a system and methods of providing a secure messaging environment between two or more devices via a computer network, thereby ensuring secure data transmission, storage, and exchange. Encrypted data stored on a server may be viewed by one or more users of the secure messaging environment and is removeable from the server and the messaging environment.
BACKGROUND AND SUMMARY OF INVENTIONAccording to one embodiment of the present invention, a method for providing a secure messaging environment is provided comprising providing a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment; logging-into the client application; encrypting user-specific information using a personal encryption key; creating a ticket, the ticket comprising a continuously-updated key and an optional expiration setting from a server; and calling the server. The call to the server may comprise the ticket and a target method.
According to another embodiment, a method for providing a secure messaging environment is provided. A messaging environment in which two or more devices are connected via a network is provided, each device having a client application that provides a graphical user interface for displaying data within the messaging environment. A ticket is created, the ticket comprising a continuously-updated encryption key and an optional expiration setting from a server. Data is transmitted to the messaging environment, wherein the data comprises data files, text or word processing files, notes, text messages, voice messages or calls, photos, videos, lists, spreadsheets, web links, or webpages. The data is encrypted. The encrypted data is stored on a database. A new encryption key is created by encrypting 1) user-specific information or a user personal key and 2) a record ID for the stored data. The new encryption key is updated with each transmission of data to the messaging environment, thereby creating the continuously-updated encryption key. The data is diplsayed in the messaging environment and a client graphical user interface on a user device, thereby providing a continually-encrypted exchange of data in the messaging environment.
According to another embodiment, a system for providing a secure messaging environment is provided. A server provides a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment. The server encrypts messages sent to the messaging environment and creates a continually-changing encryption key by encrypting user-specific information or a user personal key and a record ID for a stored encrypted message. At least one database stores encrypted messages from the server with each message having a separate record ID.
An advantage of at least one embodiment of the present invention is that tickets may be used with an Internet Protocol (IP) restriction. Thus, it is impossible to use the same ticket on a different network.
Another advantage of at least one embodiment of the present invention is that a ticket may comprise user-specific information. Thus, it is not possible to use the same ticket for a different user. A user must be logged-in as a ticket owner in order to use a ticket.
Yet another advantage of at least one embodiment of the present invention is that a ticket may be protected with an expiration setting. There is no chance to use an expired ticket.
Another advantage of at least one embodiment of the present invention is that there is no way to decrypt all data on database with a single encryption key. Even if a key were compromised, it may allow at best access to a single record, but nothing more.
Another advantage of at least one embodiment of the present invention is that, even if an unauthorized third party (e.g., hacker) gets access to a database or server files, the third party will not have an encryption key for a specific record.
Another advantage of at least one embodiment of the present invention is that a data encryption key may use fragmented keys that are continuously changing and connect one device to another device, allowing for real-time encryption and data removal with nothing being stored on either device. A fragmented key may be composed of user data, server data, and an instance to create a new key that will continuously change.
Yet another advantage of at least one embodiment of the present invention is that, even if unauthorized third parties are on the same network as a server, they will not have be able to obtain a second level encryption key, unless both user parameters and a specific record ID are known.
In this detailed description, references to “one embodiment”, “an embodiment”, or “in embodiments” mean that the feature being referred to is included in at least one embodiment of the invention. Moreover, separate references to “one embodiment”, “an embodiment”, or “in embodiments” do not necessarily refer to the same embodiment; however, neither are such embodiments mutually exclusive, unless so stated. Thus, the invention can include any variety of combinations and/or integrations of the embodiments described herein.
I. Messaging EnvironmentAccording to the present invention, a messaging environment is provided between two or more devices via a computer network (e.g., the Internet, wireless network). In specific embodiments, the devices may be an electronic or digital device including, but not limited to, a desktop computer, a laptop computer, a tablet computer, a smartphone, a gaming device, a wearable device (e.g., watch, sports band), any smart device, computer, tablet or phone having wireless access to the Internet, and the like. In a specific embodiment, the messaging environment and/or access thereto may be provided via a downloadable app.
In specific embodiments, the messaging environment may be synchronous or asynchronous. The messaging environment allows users of the devices to exchange data in the messaging environment. Data include, but are not limited to, data files, text or word processing files, text messages, voice messages or calls, notes, contacts, photos, videos, lists, spreadsheets, web links, webpages, and the like.
According to the present invention, a client (client-side or user-side application) on a user's device provides a graphical user interface for displaying data (e.g., one or more messages) in the messaging environment between two or more users. The client is in communication via the network with a server (server-side) and at least one database.
II. OverviewA method according to one embodiment of the present invention is illustrated in the flowchart of
The client prepares a ticket, 110, and calls the server: 1) every time a user logs into the client, and 2) every time the user sends and/or receives data (e.g., messages) in the messaging environment. Alternatively, or in addition thereto, a client may receive a ticket from the server.
The ticket may include a new, constantly-changing encryption key from the server as discussed below and an optional expiration setting. The call to the server includes the ticket and may also include a target method 112 (e.g., requesting an action). In specific embodiments, the ticket, or any part thereof, may comprise an encrypted string having numeric, alphabetical, and/or alphanumeric values or characters.
According to a specific embodiment of the present invention, the expiration setting may comprise a predefined period or event including, but not limited to, a time period, a logout, closing and/or reopening of an Inbox or a specific folder/icon, losing a network connection between the client and the server, or any combination thereof.
The client calls the server and the target method is evaluated to determine whether the call is public or private, 115.
If the call includes data sent from a user to the messaging environment, the call is private. The ticket from the client is validated by the server, 120. In specific embodiments, validation may comprise confirming the validity of at least one of the client Internet Protocol (IP) address, user-specific information, an expiration setting, whether the ticket is signed by the server, whether the ticket is in a valid format, or any combination thereof.
If the ticket is validated, the target method is filtered, 125; otherwise, if validation fails, the method is aborted. The target method may be filtered, for example, to determine whether it includes data to be stored.
If the call does not include data sent from the user to the messaging environment, the call is public. In specific embodiments, a public call may include encrypted user-specific information and information about the device on which a client resides. A public call is also filtered, 125.
If the call is public, a native method may be invoked. In specific embodiments, a native method may include confirming the user-specific information; determining the platform on which a client operates (e.g., iOS, Android); or confirming a user logging into a client, accessing a log-in screen, or navigating between screens in the graphical user interface. A native method may ensure that a user is logging in correctly and is not being spoofed.
If the call is private and includes a storage method (e.g., data to be stored), the data is encrypted. This filtering and encrypting may allow for storing, reading, and searching of encrypted data.
In specific embodiments, the data may be encrypted using an algorithm, 130, and stored on a server and/or at least one database, 135. The algorithm creates a new key by encrypting the currently logged-in user's personal key with a record ID for the stored data, 140. In specific embodiments, the record ID may include at least one of a server ID, database ID, network ID, or any combination thereof. Once encrypted and stored, the data may be displayed in the messaging environment, 145 from where it is viewed in the graphical user interface of a client (e.g., sender and receiver of a message). The new key identifies encrypted data and pulls it from the server and/or at least one database. Thus, each stored data is encrypted by a unique, newly-generated, constantly-changing key.
In a specific embodiment, the new key is forwarded to the client application, 150, and incorporated into a new ticket. The method may be repeated for each data (e.g., message) sent and/or received in the messaging environment, with each new (second, third, fourth, etc.) ticket being validated.
Thus, in specific embodiments, for each data or message transmitted in the messaging environment, two levels of encryption may occur: a first level using a personal encryption key, and a second level comprising a continually-changing key as data is sent, received, and viewed in the messaging environment.
In a specific embodiments, the user personal encryption key (e.g., first level) and/or each newly-generated encryption key (e.g., second level) may be saved using Apache SOLR™. Apache SOLR™ is a standalone enterprise search server with a REST-like API. Data may be put in (“indexed”) via JSON, XML, CSV or binary over HTTP. One may initiate queries via HTTP GET and receive JSON, XML, CSV or binary results.
Any effective encryption methodology may be used in the present invention. In specific embodiments, a 2-level 256 bit Advanced Encryption Standard (AES) encryption algorithm (based on libmcrypt (mcrypt of php) may be utilized.
III. Graphical User Interface of ClientAn Inbox 200 is displayed in the client graphical user interface according to one embodiment of the present invention, as illustrated in the screenshot of
One or more screens of the client graphical user interface may also display icons that provide additional features, for example, a Contacts List, an Outbox or Sent Box, a Trash folder, or other specific functions such as “Favorites”, “Phone”, “Add Contacts” and the like.
IV. Specific Embodiments of Target Method Evaluation and FilteringIn a specific embodiment, a call comprising data from a client to the server is illustrated in
After method evaluation and filtering, a new ticket may be created, as illustrated in
According to the present invention, data (e.g. messages) in the messaging environment may be removed and cleared from the messaging environment and the server and/or at least one database.
As illustrated in the flowchart of
The method for clearing data (e.g., messages) is shown in the screenshots of
If approved, the data will be cleared from the server and/or databse, and the server and encryption key corresponding to the saved data will be updated. Accordingly, the message is removed not only from the server, but also from the messaging environment and from the GUI of user devices displaying that data (e.g., both sender and recipient), as illustrated in
Since a user can only access the messaging environment when connected to the server, the message is cleared from the messaging environment and server at the same time, with nothing being stored. Accordingly, any cleared message is not recoverable.
VI. Real-Time SearchingAs illustrated, as a user begins to type in a search term in the client (e.g., “steve”), the server searches for encrypted data corresponding to that search term. In specific embodiments, Apache SOLR™ may be used to index data and respond to search queries.
VII. System Architecture and Computer ImplementationAccording to an embodiment of the present invention, communication between a client and a server may be based on Representational State Transfer (REST or RESTful) Application Programming Interface (API) calls. In a specific embodiment, all API calls may use secured hypertext terminal protocol (HTTPS), as illustrated in
As will be appreciated by one skilled in the art based on this disclosure, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, a processor operating with software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++, C#, Transact-SQL, XML, PHP or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute with the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the functions/acts specified.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified.
Referring now to
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the root terms “include” and/or “have”, when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
As used herein, “in communication” includes physical and wireless connections that are indirect through one or more additional components (or over a network) or directly between the two components described as being in communication.
The corresponding structures, materials, acts, and equivalents of all means plus function elements in the claims below are intended to include any structure, or material, for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
As used above “substantially,” “generally,” “about”, and other words of degree are relative modifiers intended to indicate permissible variation from the characteristic so modified. It is not intended to be limited to the absolute value or characteristic which it modifies but rather possessing more of the physical or functional characteristic than its opposite, and preferably, approaching or approximating such a physical or functional characteristic.
Those skilled in the art will appreciate that various adaptations and modifications of the exemplary and alternative embodiments described above can be configured without departing from the scope and spirit of the invention. Therefore, it is to be understood that, within the scope of the appended claims, the invention may be practiced other than as specifically described herein.
Claims
1. A method for providing a secure messaging environment, comprising:
- providing a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment;
- logging-into the client application;
- encrypting user-specific information using a personal encryption key;
- creating a ticket, said ticket comprising a continuously-updated key and an optional expiration setting from a server; and
- calling the server, said call comprising the ticket and a target method.
2. A method according to claim 1, wherein the personal encryption key does not change.
3. A method according to claim 1, wherein the user-specific information comprises a user ID, username, user role, or any combination thereof.
4. A method according to claim 1, wherein said optional expiration setting comprises a predefined setting comprising, a time period, a logout, closing and reopening of the Inbox or a specific folder/icon, losing a network connection between a client and the server, or any combination thereof.
5. A method according to claim 1, wherein if said call comprises data to the messaging environment, said method further comprises validating the ticket.
6. A method according to claim 5, wherein said data comprises data files, text or word processing files, notes, text messages, voice messages or calls, photos, videos, lists, spreadsheets, web links, or webpages.
7. A method according to claim 5, further comprising:
- encrypting said data;
- storing encrypted data on a database;
- creating a new encryption key by encrypting user specification information and a record ID for the stored encrypted data; and
- displaying said data in the messaging environment and a client graphical user interface on a user device, thereby providing a continually-encrypted exchange of messages in the messaging environment.
8. A method according to claim 7, further comprising creating a new ticket that incorporates said new encryption key.
9. A method according to claim 7, wherein creating new key is created by encrypting the user personal encryption key and a record ID.
10. A method according to claim 7, wherein said record ID comprises at least one of a server ID, a network ID, a database ID, or any combination thereof.
11. A method according to claim 1, further comprising clearing data from the messaging environment.
12. A method according to claim 11, wherein said clearing data comprises removing encrypted data from the server and/or database and updating the server and encryption key.
13. A method according to claim 11, wherein said cleared data is cleared from the messaging environment and server at the same time is not recoverable.
14. A method according to claim 5, further comprising indexing said encrypted data.
15. A method according to claim 14, further comprising conducting real-time search of a messaging environment, said server searching saved encrypted data corresponding to a search query.
16. A method according to claim 1, wherein said devices are selected from the group consisting of a tablet computer, a smartphone, a gaming device, and a wearable device.
17. A method for providing a secure messaging environment, comprising:
- providing a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying data within the messaging environment;
- creating a ticket, said ticket comprising a continuously-updated encryption key and an optional expiration setting from a server;
- transmitting data to the messaging environment, wherein said data comprises data files, text or word processing files, notes, text messages, voice messages or calls, photos, videos, lists, spreadsheets, web links, or webpages;
- encrypting said data;
- storing encrypted data on a database;
- creating a new encryption key by encrypting 1) user-specific information or a user personal key and 2) a record ID for the stored data, wherein said new encryption key is updated with each transmission of data to the messaging environment, thereby creating the continuously-updated encryption key; and
- displaying said data in the messaging environment and a client graphical user interface on a user device, thereby providing a continually-encrypted exchange of data in the messaging environment.
18. A method according to claim 17, further comprising clearing data from the messaging environment by removing selected encrypted data from the server and updating the server and encryption key corresponding to the selected encrypted data.
19. A system for providing a secure messaging environment, comprising:
- a server providing a messaging environment in which two or more smart devices are connected via a network, each smart device having a client application that provides a graphical user interface for displaying messages within the messaging environment,
- said server creating a continually-changing encryption key comprising encrypted 1) user-specific information or a user personal encryption key and 2) a record ID for each stored encrypted message; and
- at least one database for storing encrypted messages from said server with each message having a separate record ID.
20. A system according to claim 19, wherein said smart devices are selected from the group consisting of a tablet computer, a smartphone, a gaming device, and a wearable device.
21. A computer program product for providing a secure messaging environment, comprising:
- a non-transitory computer readable storage medium;
- first program instructions to provide a messaging environment in which two or more devices are connected via a network, each device having a client application that provides a graphical user interface for displaying messages within the messaging environment;
- second program instructions to log into the client application;
- third program instructions to encrypt user-specific information using a personal encryption key;
- fourth program instructions to create a ticket, said ticket comprising a continuously-updated key and an optional expiration setting from a server; and
- fifth program instructions to call the server, said call comprising the ticket and a target method,
- wherein the first, second, third, fourth and fifth program instructions are stored on said non-transitory computer readable storage medium.
Type: Application
Filed: Oct 27, 2017
Publication Date: Nov 1, 2018
Applicant: Erasable, LLC (Northville, MI)
Inventors: Wendell Adams (Portage, MI), Steven Kosbau (Northville, MI)
Application Number: 15/795,701