Patent application number | Description | Published |
20110302405 | MOBILE WORKFORCE APPLICATIONS WHICH ARE HIGHLY SECURE AND TRUSTED FOR THE US GOVERNMENT AND OTHER INDUSTRIES - A convenient, easy to use ubiquitous secure communications capability can automatically encrypt and decrypt messages without requiring any special intermediating security component such as gateways, proxy servers or the like. Trusted/secure applications for the mobile workforce can significantly improve productivity and effectiveness while enhancing personal and organizational security and safety. | 12-08-2011 |
20120159323 | User Interface Systems And Methods For Input And Display Of Secure And Insecure Message Oriented Communications - Given the rise in popularity of communicating personal, private, sensitive, or vital peer-to-peer or peer-to-group information over potentially insecure text messaging infrastructure, it would be highly desirable to provide a solution that would enable the initiator and/or the consumer of these communiqués to determine the state of the privacy associated with the messages. The non-limiting technology herein provides systems and methods for enabling a consumer to graphically, linguistically, verbally, or programmatically, determine the privacy and security state of a communiqué and/or the privacy/security association with the at least one plurality of peers. Methods and systems provided by a computer application can enable a consumer to input message oriented data that will be subsequently communicated to at least one of a plurality of peers. Upon reception of the data, systems and methods are also describe to display the message oriented communiqué to the at least one peer consumer or other user. | 06-21-2012 |
20130275758 | SECURE MESSAGING - Given the rise in popularity of communicating personal, private, sensitive, or vital peer-to-peer or peer-to-group information over insecure text messaging infrastructure, it would be highly desirable to provide a lightweight solution that enables the exchange of information in a secure manner. The non-limiting technology herein provides systems and methods for the exchange of cryptographic material that can be used to encipher message-oriented communications between at least two peer devices. Once the cryptographic material is exchanged between cooperating peers, this lightweight solution can be used by common off the shelf hardware such as smartphones, tablets, feature phones, or special purpose machine to machine devices for private communications, such as command and control, location services, etc. using insecure voice or data communication paths, such as SMS. | 10-17-2013 |
20130282904 | SYSTEMS AND METHODS FOR ENABLING SECURE MESSAGING, COMMAND, AND CONTROL OF REMOTE DEVICES, COMMUNICATED VIA A SHORT MESSAGE SERVICE OR OTHER MESSAGE ORIENTED COMMUNICATIONS MEDIUMS - Given the rise in popularity of communicating personal, private, sensitive, or vital peer-to-peer or peer-to-group information over potentially insecure text messaging infrastructure, it would be desirable to provide a solution that enables the exchange of this type of information securely over at least one path via data and/or voice networks. Furthermore, it would be highly desirable to enable access to the secure exchange of information over the at least one path by a given entity, as well as other computer applications that the given entity may use. | 10-24-2013 |
20130283034 | SYSTEMS AND METHODS USING ONE TIME PADS DURING THE EXCHANGE OF CRYPTOGRAPHIC MATERIAL - A solution that enables the exchange of information in a secure manner over an insecure text messaging infrastructure provides part of the exchange as cryptographic material to be used to secure subsequent communications. The exchange of the cryptographic material is protected from malicious and nefarious parties. Systems and methods for the exchange of cryptographic material enable the parties involved in the exchange to have confidence that the material received was communicated from the originating party. Once the cryptographic material is successfully exchanged between cooperating peers, it can be used by smartphones, tablets, feature phones, or special purpose machine to machine devices for private communications, such as command and control, location services, etc. over insecure voice or data communication paths, such as SMS. | 10-24-2013 |
20130288721 | SYSTEMS AND METHODS ENABLING A SHORT MESSAGE SERVICE GATEWAY VIA CLOUD COMPUTING SERVICES - A solution enables the exchange of SMS or other short messaging information via alternate paths than cellular operators infrastructure and allows for communications with standard devices that may not be party to the additional service. | 10-31-2013 |
20130346750 | SYSTEM AND METHOD TO PROVIDE SECURE MULTIMEDIA MESSAGING BETWEEN PEER SYSTEMS - A lightweight solution enables the exchange of multimedia information in a secure manner. Exchanged cryptographic material can be used to encipher multimedia message-oriented communications between devices. This lightweight solution can be used by common off the shelf devices such as smartphones, tablets, feature phones, or special purpose machine to machine devices for private communications, such as command and control, location services, video, audio, electronic attachments, etc. using insecure voice or data communication paths, such as MMS. | 12-26-2013 |
20140025952 | HIDING CIPHERTEXT USING A LINGUISTICS ALGORITHM WITH DICTIONARIES - Encrypted communications is made to appear to be normal text so as to avoid undue attention to either the sender or recipient. Information can be hidden or embedded in innocuous documents using steganography wherein the information is masked within a larger document. Other approaches would translate the ciphertext into a form of normal looking text that would in effect be gibberish but would use normal words in at least one native language. There are many tradeoffs and benefits to be considered when attempting any form of encrypted communications. | 01-23-2014 |