Secure communication tool for use alongside non-secure communications

ABSTRACT

A method of communicating through a less secure messaging system provides an option of masking messages sent from a second party to a first party so that they are unreadable when received by the first party. For some embodiments, it may be that they are visible, but unreadable, other embodiments, not visible. In either case, an authorization may be provided by the first party to make the masked messages readable messages, for many embodiments until a session rule makes the readable message a masked message again.

FIELD OF THE INVENTION

The present invention relates to a secure communication tool, possibly for use within a less secure environment, such as within unsecure messaging systems such as Apple Messages, Facebook Messenger or other traditionally unsecure messaging platforms having non-secure communications.

BACKGROUND OF THE INVENTION

The Apple Corporation recently released a product called Business Chat which allows businesses to chat with consumers through Messages. A different text bubble pallet, such as black and gray and instead of blue, is provided with that product which can indicate the consumer is messaging with a business rather than with an individual. The product hopes to expose advantages of a richer chat experience to businesses without forcing a user to install a different messaging application. The level of security provided by this new product is not known to the applicant.

Traditionally, if an individual has a Smartphone operating on the iOS platform and leaves that phone unlocked, anyone can pick up that phone and open Messages to then read any of the messages contained therein. Some of those messages may contain personal information such as Protect Health Information (PHI), which is protected under HIPAA, the Health Insurance Portability and Accountability Act, or other private data desired particularly by businesses and others not to become public. Short Message Service (SMS), also known as text messages, are typically unencrypted at some point during the delivery process, thus rendering an SMS channel insecure.

There are no access controls once Messages or Messenger is opened. Accordingly, there is a need in the marketplace for making traditionally less secure communication systems more secure, particularly both Facebook and Apple are each believed to have over two billion users.

SUMMARY OF THE INVENTION

It is a present object of many embodiments of the present invention to provide an improved communications tool for use with less secure messaging systems to make at least some messages or communications more secure.

It is another object of many embodiments of the present invention to provide an improved messaging tool for use with at least one of Messages and Facebook Messenger.

It is a present object of many embodiments of the present invention to provide an improved messaging tool.

Within traditionally unsecure environments such as Apple Messages, the applicant has discovered a way to provide for more secure communication preferably achieving at least one if not two if not three of the objectives: (a) providing encryption of data from one user to another, (b) encryption of the data at rest for at least one party, if not both, and/or (c) access controls as well, preferably while still permitting unsecure communications at the option of the user through the same communication tool.

Accordingly, in accordance with many embodiments of the present invention, a tool is provided for use such as with the Apple Messages application whereby the tool cooperates with that with system to provide a method of sending and/or receiving encrypted messages from one device to another for encryption. Continued possible encryption on at least one if not both ends can be provided so that stored information at rest is encrypted. Additionally, access controls and/or session rules are preferably provided within the messaging system itself so as to be able to positively identify a particular user and/or to permit access to at least certain messages.

Furthermore, some embodiments may provide a mechanism using traditional communication technology such as Apple Messages and/or Facebook Messenger to provide a secure messaging option so as to facilitate communications such as HIPAA regulated information for the medical industry, sufficient security to enable the financial industries to communicate with their customers as well, and/or other purpose, preferably while simultaneously permitting unsecured communication within the same channel. There may be additional markets which can benefit from this technology as well.

Messaging applications and tools have been around for many years. In more recent years Apple has allowed developers to insert apps within the Messages platform such as Open Table (which permits users to make restaurant reservations through the Messages platform) and can allow for the transmission of video, audio, images and/or other data. While many improvements are available through the app store for the Messages experience, the applicant is unaware of any capability of being able to provide security for at least some transmitted message through the Messages platform. Accordingly, at least one embodiment of the applicant's tool provides for encrypted messaging within this environment.

Such a capability provides not only for an ability for the users to maintain information confidential but can also comply with HIPAA and/or various financials security regulations for privacy and/or other privacy concerns that users and/or businesses might have.

Data received by the end user could be encrypted at rest in a cloud database server.

Some embodiments of the applicant's method and application envision data being sent from a user to the applicant where it is stored on the applicant's server in an encrypted form while also being sent to an intended recipient which could also have the app used thereon (and the message possibly be stored in an encrypted manner as well until access controls are sufficiently provided). At the applicant's server as well as on both of the sending (second party) and receiving (first party) devices, the data could be stored in a secured format so that it could be safe at rest.

Additionally, session rules could be provided in many different ways, possibly to specific messages. Specifically, when using the messaging service with a “secure” message which might otherwise appear, if the messaging service has not been used for a period of time such as ten minutes, then the secure message may be masked such as by having an overlay provided thereon where the message becomes unreadable and/or made at least partially unreadable to the point of not being able to discern the information contained therein until the user re-enters the authorization control such as a PIN, password and/or other authorization. The “secure message” could also be removed (so that it does not appear at all and there might not even been any indication that it does exist) until authorization is provided.

Other session rules could include logging out, placing the messaging tool in a background mode, allowing a period of time to elapse after entering the program, turning the screen off or some other action or inaction.

Not only can encryption be provided, but data may be protected specifically by the session rules to permit the timing out and/or other session rules being applied. At rest the data (for at least selected messages, while possibly still permitting access to less secure communications) could be stored in an encrypted form. The applicant believes this technology could be applied not only to Apple Messages but also to Facebook Messenger and possibly other messaging applications which are less secure than desired by the applicant for at least some messages.

What is particularly attractive about this technology is that a less secure messaging service can be utilized to provide a more secure environment for at least some messages possibly while still permitting communications of a non-sensitive nature in the traditional manner. Specifically, the less secure environments account for over two billion users across the world. These users are unlikely to change their messaging service to a different messaging service, but could greatly benefit from an ability to utilize secure communications within the communication programs they currently utilize. Additionally, unsecured messages could still be sent and received utilizing the exact same system for at least some embodiments.

Many text could contain some data which might be PHI such as a first name or last name, social security number and/or any of eighteen possible identifiers currently recognized as PHI. Others may be utilized.

Accordingly, once someone opens up their Messages or less secure communications portal, in order to read secure messages, at that time they may be able to provide a login or other authorization to read all or at least a plurality of secure messages. A separate authorization would not likely be needed to read unsecure messages. If they were to send a secure message, they may only need to touch an icon which may provide for security of that message not only when it is sent but also as it is stored on the device. As it relates to the Messages system, it may recognize that something is being sent but doesn't necessarily know what it is. It might be treated no different from the Messages program as SMS data and/or some type of audio or image or video file (except that it is encrypted).

After a period of time (or other session rules are applied) secure message(s) can then be masked such as by making it temporarily disappear, blurring the text, imposing a logo or other layer over it, imposing confidential over it while making it unreadable or doing something so that the text is not readable possibly while indicating that there is a secure message at that location which might be accessed. In order to access the message it is likely that the user can click on the message to then possibly then provide a PIN, an authorization code, a passcode, or some other authorization which, once properly entered, can then allow the user to view the content of the secure message(s).

This way the data at rest may be maintained in an encrypted format. Thus the data, even if someone improperly accessed someone's phone such as by picking it up and viewing it, they would be unable to view any of the secure messages as they would lack the access controls to access the data.

Accordingly, what this tool provides is a messaging tool within a less secure messaging environment to provide at least one of access controls to at least certain messages, encryption of data from one user to another and preferably the ability to maintain encryption of data at rest at least at one of the two of the sending and/or receiver. Text bubble may be color coded to reflect the encrypted nature of the message/communication when viewed.

Possible uses of this technology may include fitness, health, medical, finance and/or other industries.

While the applicant has investigated a need for this tool as it relates to the Apple Messages product and Facebook Messenger, it may be possible that other Android, Google or other messaging systems may also benefit from such technology.

In addition to time related session rules, such as a pure clock which ends the ability to view ten minutes later, an activity clock which starts on the counting down at the end of the last contact, a switch program which could then lock information if the Messages is put in a background mode or a lock screen mode. Other session rules could be applied as well.

The proposed tool provides a way to provide compliance with not only the financial industry and HIPAA but possibly other environments which also could benefit from securely communicating data from one party and another.

BRIEF DESCRIPTION OF THE DRAWINGS

The particular features and advantages of the invention as well as other objects will become apparent from the following description taken in connection with the accompanying drawings in which:

FIG. 1 is a screen shot showing a first embodiment of the present invention;

FIG. 2 is a screen shot showing the first embodiment of the present invention;

FIG. 3 is a screen shot showing the first embodiment of the present invention;

FIG. 4 is a flow chart showing operation of the preferred embodiment of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

FIG. 1 shows a screen shot of a Messages account showing conversation between two parties (first and second) with text bubbles portions 12,14,16 and 18 on an electronic device of first party such as a smartphone, tablet, etc. Text bubble 18 is shown as being confidential which shows a mask 20 disposed on top of an underlying text bubble 18. Other masks 20 are described above and could take on various forms, or the text bubble 18 might not be visible at all or provided in other forms.

Of course, the user of this capability is likely to have downloaded an app which can be acquired from the app store or other online store just by clicking on an icon 22 and then downloading from the app store so that the program possibly inserts an icon 24 and/or other icon within the screen 10. By tapping on the mask 20 or other location such as on icon 24 or other location, an access control box 26 may appear as shown in FIG. 2 into which one could enter a PIN and if the correct PIN is then entered then the text bubble 18 could then be viewed. Other authorizations as are known in the art could be provided as well.

It is possible that text bubble 18 could be a different color than non-secure text bubbles 12,14,16 to indicate its confidential nature. Once secure text bubble 18 is actually viewable for some embodiments, then the session rules can start then being applied if not already started so that if one of the session rules is met, the text bubble 18 is then covered back over or removed. Other similarly secured communications could also be covered back over with masks 20 and/or removed. Not only can sending text bubbles 18 be covered with mask 20, but also received text bubbles 14 could also be covered over with masks 20 or temporarily. Unsecured texts bubbles such as 12,16 would likely not be covered over or removed for many embodiments. They could remain viewable like they presently are provided. It may also be possible to subject unsecure text bubbles such as 12,16 to the security protocol such as by clicking on the icon 24 and performing a certain set of steps and/or performing other steps for at least some embodiments.

In order to send a secure message, it may be possible to add a second send button 30 other than traditional send button 28 so that a sender could select which of secure send button 30 and non-secure send button 28 communication to provide for any particular send.

The establishment of the secure communication is not particularly difficult particularly when the app is downloaded to the smart device by the user. At this point and/or at later points, security keys can be used for each of the users and/or each of the messages as well is well known within encryption technology.

FIG. 4 shown a flow chart showing a process of a presently preferred embodiment. Specifically, a party enters a less secure messaging service at step 100. At step 102 the applicant's tool may be downloaded, if not already done so, and/or implemented.

If a secure message is desired to be read at step 104, then a secure message or other icon or even a particular message can be clicked on. In the illustrated embodiment, message 18, mask 20, and/or icon 24 could be clicked on at step 106 so that authorization could be provided at step 108 such as using screen 26 to then remove the mask 20 and/or make visible the text bubble(s) 18 and possibly others in this conversation or even possibly up to all in the messaging program at step 110. They may appear with a different colored text bubble than unsecure or other text bubbles for some embodiments.

In order to send the secure message at step 112 user can either click on the icon 24 at step 114 and/or select a second send option 30 to send the message as opposed to an unsecure send message button 28 at step 114. The message can then be sent at step 116. Secure messages 18 or others can then subjected to session rules at step 118 which can be the same or different session rules which can apply to reading secured messages at step 110 which can include timing out after a period of inactivity, timing out after a period of opening either the Messages service at step 100, or the other time period, placing the Messages in the background mode, locking the screen and/or other session rules. Once the session rule is met, then the secure messages are preferably masked with masks 20 and/or temporarily removed until the user enters the appropriate authorization provided by the particularly embodiment which could include one of a variety of possibilities, whether it be a PIN or other authorization.

Remember this messaging tool may provide not only the ability to send encrypted messages within a less secure messaging protocol but also (and/or) provide an ability to store messages in an encrypted mode on each of the devices and the applicants server (remote) so that they are not visible without entering at least the authorization code as well as the ability to provide access controls so that a third party which lacks the authorization controls cannot access secure information merely by opening the less secure messaging application on a device of an individual such as if a third party picks up a smart phone and opens the Messages application, possibly while simultaneously permitting unsecured communications to proceed through the same application.

To the applicant knowledge, no party has the ability to provide this service.

For many embodiments, this tool is specifically differentiated from possible existing messaging systems designed to provide secure communication because the applicants technology is designed to be utilized within the framework of a less secure communication protocol which are presently widely accepted across the communications industry to the point of having somewhere over two billion users as it relates to Facebook Messenger and Apple Messages combined. These users are not likely to quickly switch messaging apps. Instead the applicant has developed a way to use those less secure messaging applications in a more secure manner. In many embodiments, both secure and non-secure communications can occur within the same platform, for which the applicant is unaware of any party performing such a capability.

Numerous alterations of the structure herein disclosed will suggest themselves to those skilled in the art. However, it is to be understood that the present disclosure relates to the preferred embodiment of the invention which is for purposes of illustration only and not to be construed as a limitation of the invention. All such modifications which do not depart from the spirit of the intention are intended to be included within the scope of the appended claims. 

Having thus set forth the nature of the invention, what is claimed herein is:
 1. A method of secure communication between a first party and a second party configured to exchange secure messages within a less secure messaging system, the less secure messaging system configured to exchange unsecured messages, wherein a secure communication tool is configured to cooperate with the less secure messaging system to enable communication of the secure messages over the less secure messaging system, the method comprising the steps of: (a) receiving one or more unsecure messages sent from the second party at an electronic device of the first party; (b) displaying the one or more unsecure messages on a screen of the electronic device of the first party; (c) receiving a secure message sent from the second party, the secure message containing at least one portion that was initially masked to be unreadable on the electronic device of the first party in accordance with the secure communication tool, wherein the secure message includes the at least one initially masked portion at the time that the secure message is received at the electronic device of the first party; (d) receiving an authorization from the first party to view the at least one initially masked portion of the received secure message as a readable message displayed on the screen of the electronic device; and (e) displaying, after receiving the authorization from the first party, the at least one initially masked portion of the secure message as a readable message on the screen of the electronic device.
 2. The method of claim 1 wherein the at least one initially masked portion of the secure message is not visible until the authorization is provided by the first party.
 3. The method of claim 1 wherein the at least one initially masked portion of the secure message comprises at least one encrypted portion when the secure message is received at the electronic device of the first party.
 4. The method of claim 3 further comprising decrypting the at least one initially masked portion of the secure message in response to receiving the authorization from the first party.
 5. The method of claim 1 wherein the authorization is one of a PIN number or a password.
 6. The method of claim 1 wherein one or more session rules are associated with communications between the first party and the second party, and further wherein the readable message corresponding to the at least one initially masked portion of the secure message is returned to an unreadable configuration at the electronic device of the first party if at least one session rule is satisfied.
 7. The method of claim 6 wherein the at least one session rule is selected from the group of logging out, placing a messaging program in a background mode, a set period of time elapsing after receiving the authorization from the first party, a set period of time elapsing after a last key entry, turning off the screen and ending the messaging program at the electronic device.
 8. The method of claim 6 further comprising receiving, for a second time, the authorization from the first party to make the at least one initially masked portion of the secure message readable so it can be viewed on the screen of the electronic device.
 9. The method of claim 1 further comprising displaying the at least one initially masked portion of the secure message on the screen of the electronic device in a manner that makes the at least one initially masked portion visible on the screen but not readable before the authorization is received from the first party.
 10. The method of claim 9 wherein the at least one initially masked portion of the secure message has an overlay preventing the first party from reading the at least one initially masked portion of the secure message until the authorization is received from the first party and the overlay removed.
 11. The method of claim 1 wherein the second party has a mask send key different from a normal send key, wherein the mask send key is used for creating the at least one initially masked portion of the secure message sent to the first party, while the normal send key is used for sending messages to the first party in the less secure messaging system.
 12. The method of claim 1 wherein a background color of the at least one initially masked portion of the secure message displayed on the screen of the electronic device is different than a background color of the one or more unsecure messages displayed on the screen of the electronic device.
 13. The method of claim 1 wherein the less secure messaging system comprises one of Facebook Messenger or Apple Messages.
 14. The method of claim 1 wherein the at least one initially masked portion of the secure message is stored on a remote server in an encrypted manner before the secure message is sent by the second party.
 15. An electronic device configured to communicate secure messages within a less secure messaging system, the less secure messaging system configured to exchange unsecured messages, wherein a secure communication tool is configured to cooperate with the less secure messaging system to enable communication of the secure messages over the less secure messaging system, the electronic device comprising: a user interface configured to receive an authorization from a first party; a receiver configured to receive unsecure and secure messages sent from a second party; and a screen configured to display the unsecure and secure messages, wherein the electronic device is further configured to: (a) receive, at the receiver, one or more unsecure messages sent from the second party; (b) display, on the screen, the one or more unsecure messages; (c) receive, at the receiver, a secure message sent from the second party, the secure message containing at least one portion that was initially masked to be unreadable on the electronic device in accordance with the secure communication tool, wherein the secure message includes the at least one initially masked portion at the time that the secure message is received at the electronic device; (d) receive, at the user interface, the authorization from the first party, wherein the authorization is required to view the at least one initially masked portion of the secure message as a readable message displayed on the screen; and (e) display, on the screen, the at least one initially masked portion of the secure message as a readable message after receiving the authorization from the first party at the user interface.
 16. The electronic device of claim 15 wherein the electronic device is further configured to receive, at the user interface, a user input for selectively using a messaging program that supports secure messages.
 17. The electronic device of claim 15 wherein the second party has a mask send key different from a normal send key, wherein the mask send key is used for sending the at least one initially masked portion of the secure message, while the normal send key is not used for sending masked portions of messages.
 18. The electronic device of claim 15 wherein the electronic device is further configured to return the readable message corresponding to the at least one initially masked portion of the secure message back to an unreadable configuration if at least one session rule is satisfied, and further wherein the at least one session rule is selected from the group of logging out, placing a messaging program in a background mode, a set period of time elapsing after receiving the authorization, a set period of time elapsing after a last key entry, turning off the screen, and ending the messaging program.
 19. The electronic device of claim 15 wherein the authorization is one of a PIN number or a password.
 20. The electronic device of claim 15 wherein the at least one initially masked portion of the secure message comprises at least one encrypted portion when the secure message is received at the electronic device. 