CROSS-REFERENCE TO RELATED APPLICATIONSThe present application is a continuation of U.S. application Ser. No. 13/897,865, filed on May 20, 2013, which claims priority to U.S. Provisional Patent Application No. 61/795,804, filed on Oct. 26, 2012, and U.S. Provisional Patent Application No. 61/688,712, filed on May 21, 2012.
BACKGROUND OF THE INVENTION1. Field of the Invention
The present invention relates to data transmission systems and, more particularly, to a system that provides identity and data theft protection.
2. Description of the Related Art
Messaging over the internet and mobile cellular networks has been growing at an astonishing rate over the last decade, and includes the transmission of additional date, such as sound, video, and picture files. A primary concern in the use of messaging systems is the security and integrity of such data transmission. While some solutions exist that perform encryption on transmitted data or require encryption keys, there is no way to know whether the receiving party is the intended target or whether a third party with unauthorized access has intercepted or broken the encryption. In addition, there is typically no way to ensure that the receiving party deletes sensitive messages or data as promised. Accordingly, there is a need in the art for a data transmission system that can verify the receiving party is authorized to receive the transmission and is actually the authorized party prior to data transmission, and that can ensure the appropriate deletion of received data after transmission.
BRIEF SUMMARY OF THE INVENTIONThe present invention comprises a secure messaging system that provides identity and data theft protection by requiring that devices participating in the transmission of data be paired via an exchange of media access control addresses (MAC addresses). By requiring the pairing of devices via exchanged MAC addresses before data can be transferred between devices, data transmission security is enhanced. In an embodiment of the present invention, sent data may also be deleted from a receiving device after it has been reviewed, such as by a remote sender, thereby further ensuring data security and protecting against identity theft. In the data transmission process according to the present invention, a request to transmit data, such as encrypted text, an image, sound, video, or music file, a check is first made to determine whether the sending and receiving devices have been paired. For example, a check may be made via a host server.
Once a paired relationship has been verified, data is sent to the receiving device in encrypted fashion along with instructions on how long the message is to be made available for viewing before automatic deletion. The message and the instructions are automatically decrypted by the receiving device and interpreted to provide the data and configure the deletion parameters. Alternatively, a sending device may transmit a delete instruction that deletes a received data file regardless of whether the file was reviewed, viewed or used.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING(S)The present invention will be more fully understood and appreciated by reading the following Detailed Description in conjunction with the accompanying drawings, in which:
FIG. 1 is a schematic of a secure messaging system according to the present invention implemented into two smart phones;
FIG. 2 is a schematic of a user device management module according to the present invention;
FIG. 3 is a schematic of data flow in a secure messaging system according to the present invention.
FIG. 4 is a schematic of message sending and receiving according to the present invention; and
FIG. 5 is a schematic of the hierarchy of servers according to the present invention.
DETAILED DESCRIPTION OF THE INVENTIONReferring now to the drawings, wherein like reference numerals refer to like parts throughout, there is seen inFIG. 1 a schematic of thesecure messaging system10 according to the present invention that is based in part on pairing ofdevices12 and14 using MAC addresses, with are device identifiers that are each uniquely associated with a network adapter to identify a device on a network. A typical MAC address consists of 12 hexadecimal numbers, typically formatted as follows XX:XX:XX:YY:YY:YY.System10 is designed to allow for the secure pairing of a sending (or receiving) device12running system10 with a receiving (or sending)device14 also implementingsystem10. It should be recognized by those of skill in the art that adevice implementing system10 may act as either a sending device12 or a receivingdevice14, or both, and have been assigned reference numerals as one or the other strictly for the purposes of illustrating an embodiment of the invention.System10 ensures that messages are sent to the correct person/device and that the sender is the person authorized to make the transmission.
As seen inFIG. 1, ahost server16 facilitatessystem10 in combination withdevices12 and14, preferably through the use of software installed on participatingdevices12 and14, such as an application that is downloaded and run on the sending and receivingdevices12 and14 that will be participating in data transmission or messaging. For example, the local device portions ofsystem10 may be implemented via a downloadable app for devices such as smartphones, tablets, laptops, desktop computers, as well as gaming systems, smart televisions, navigation systems, vehicular computers, and the like. Along these lines,system10 can be configured to require a conventional user identification and password for each user to provide added security and, as explained below, for a user to remotely accesshost16, such as if a participatingdevice12 or14 is lost.
Referring toFIG. 2,system10 contains adevice management module18 that manages authentications, subscriptions, user contacts, and ciphering, and is in communication with adatabase20 for storing and retrieving data associated with the various processes. Preferably,database20 is maintained remotely fromdevices12 and14 for additional security, such as in the “cloud” as that term is used in the field to refer to remotely positioned storage accessible via the internet. Preferably, messages themselves are not retained indatabase20 to improve security. For example, a user may request remote pairing with a particular contact stored withindatabase20 by usingmanagement module18 to retrieve the contact fromdatabase20.System10 then communicates the pairing request, which may be rejected or accepted bydevice14. If accepted, the MAC addresses are shared between the host files associated withdevices12 and14, and thus stored in the corresponding database files associated with the other device along with appropriate user identification (ID) information.
As seen inFIG. 3,system10 may be configured to operate over Extensible Messaging and Presence Protocol (XMPP)22 or Session Initiation Protocol (SIP)24 based networks, and includes module for performing authentication/paring26, messaging multiplexing28, encryption/decryption, and anLDAP database30.System10 further includes an application/web module32 for retrieving and using user information, pairing relationships, contacts, subscriptions, logs, and status information.
After at least one pair is achieved and stored indatabase20, a data transmission may be made usingsystem10. For example, as seen inFIG. 4, a user can select a contact frommanagement module18 and send a message that is encrypted bysystem10. If the receiving device's MAC address and user ID information are confirmed based on pre-configured pairing information indatabase20, the message is sent from sending device12 to the receivingdevice14 viasystem10. Thus, messages pass throughsystem10, which acts as a postmaster, and not directly between the devices.
Referring toFIG. 5,system10 employs a hierarchy of servers to accomplish securing message transmissions. More particularly, anauthentication server36 having access todatabase20 is in communication with anXMPP relay server38, apairing server40, a messagingrelay status server42, a plug-incontrol server44, and aweb server46.System10 may thus be used to provide user identification, such as in connection with a voice or video conferencing session, wherein one or more sessions are started by the participants. For example, the identity of the user/participants may be confirmed by checking the device MAC addresses of users after they have logged into the program.
System10 may further be programmed to control the amount of time that secure messages are available to the receiving device. For example, each message may be accompanied by a deletion parameter that is set by sending device12 and specifies when the message is to be automatically deleted by the receivingdevice14. In an additional embodiment of the present invention, sending device12 may remotely set the deletion trigger to cause immediate deletion of the message regardless of the status of the message on receivingdevice14, i.e., a message may be deleted before it has been read or viewed.
In a preferred embodiment of the present invention,system10 employs the hierarchy ofFIG. 5 to avoid the need for storage of data involved in the secure transmission. For example, picture, video, sound, and data files may be transmitted between and viewed usingdevices using system10. By not retaining the data associated with messaging files indevice12 or14, such as deleting or flushing immediately or as directed by users, such as after the messages have been read or accessed, there is total privacy and integrity during paired conversations.System10 may further be programmed to allow a user to remotely disable paired connection. For example, a user that loses device12 may accesssystem10 via the internet using the web server ofsystem10 to delete all paired connections fromsystem10.