The invention relates to methods and equipment for establishing data security in an e-mail service between an e-mail server and a mobile terminal.
Data security in an e-mail service is achieved by using cryptographic techniques in which traffic in a potentially insecure channel is encrypted using cryptographic information, commonly called encryption keys. A problem underlying the invention relates to distributing such encryption information. Prior art techniques for distributing the encryption information are commonly based on public key encryption techniques, such as Diffie-Hellman. A problem with this approach is that the parties have to trust the underlying mobile network and its operator, which they are surprisingly reluctant to do. Another problem is that mobile terminals tend to have small and restricted user interfaces.
An object of the present invention is to provide a method and an apparatus for implementing the method so as to alleviate the above problems. The object of the invention is achieved by the methods and equipment which are characterized by what is stated in the independent claims. Preferred embodiments of the invention are disclosed in the dependent claims.
The invention is partially based on the discovery of a surprising problem that has been found as a result of extensive market research. Although clients of mobile networks normally trust their mobile operators as regards voice calls, they are surprisingly reluctant to trust the mobile operators as regards data services, such as e-mail service. The reluctance to trust mobile operators in respect of data services makes public-key interchange schemes unattractive.
An aspect of the invention is a method for conveying e-mail traffic between an e-mail server and a mobile terminal, wherein the mobile terminal has an e-mail address under the e-mail server, and permanent terminal identity and a temporary identity in an access network. The method comprises the following steps:
The encryption information and the identifier of the mobile terminal are combined into a service activation code, which also includes checksum information so as to detect an incorrectly entered service activation code.
In an embodiment of the invention, the secure channel for conveying the encryption information is implemented as follows. The user of the mobile terminal may have a host system, such as an office terminal, which is coupled to the connectivity function via a private network. The private network requires authentication in order to grant access to users. In this embodiment the mobile terminal generates the encryption information and displays it on its display, and the user enters the encryption information to the host system that is coupled to the private network.
Alternatively, the mobile terminal user may have a trust relation with another person, such as a support technician, who is authenticated in the private network. For example, trust relation may be established in a voice call in which the support technician recognizes the voice of the mobile terminal user. The mobile terminal user then dictates the encryption information to the support technician who enters it via a host system coupled to the private network.
Thus the secure channel from the mobile terminal to the connectivity function comprises a short segment over which the encryption information is conveyed off-line to a human user that may be the user of the mobile terminal or someone Who trusts him/her. The off-line segment is a segment that is detached from public networks and is immune against hacking or eavesdropping via public networks. The off-line segment may be implemented visually, such that the mobile terminal displays the encryption information on its display, and the user enters it into a terminal of the private network. Alternatively, the encryption information may be conveyed on a detachable memory or via a short-range microwave connection, an example of which is known as Bluetooth. The secure channel also comprises a segment spanned by the private network. The secure channel may also comprise a segment spanned by a conventional voice call, if the mobile terminal user is distant from a terminal of the private network.
In the following the invention will be described in greater detail by means of preferred embodiments with reference to the attached drawings, in which
The invention is applicable to virtually any mobile e-mail system architecture.
Reference numeral 106 denotes a data network, such as an IP (Internet Protocol) network, which may be the common Internet or its closed subnetworks, commonly called intranets or extranets. Reference numeral 108 denotes an e-mail server and its associated database. There may be separate e-mail servers and/or server addresses for incoming and outgoing e-mail. The database stores an e-mail account, addressable by means of an e-mail address, that appears as a mailbox to the owner of the e-mail account. In order to communicate with mobile terminals 102, the data network 106 is connected, via a gateway 112 to an access network 114. The access network comprises a set of base stations 116 to provide wireless coverage over a wireless interface 118 to the mobile terminals 102.
Reference numeral 110 denotes a messaging centre that is largely responsible for providing the above-mentioned transparency between the host system 100 and the mobile terminal 102. The system architecture also comprises a connectivity function 120, whose task is to push e-mail messages to the mobile terminal. In the embodiment shown in
The mobile terminal 102 may be a pocket or laptop computer with a radio interface, a smart cellular telephone, or the like. Depending on implementation, the host system 100, if present, may have different roles. In some implementations the host system 100 is optional and may be a conventional office computer that merely acts as the mobile terminal user's principal computer and e-mail terminal. In other implementations the host system may act as a platform for a single user's connectivity function, in addition to being an office computer. In yet other implementations the host system 100 may comprise the connectivity function for several users. Thus it is a server instead of a normal office computer.
We assume here that the access network 114 is able to establish and maintain a tunnel 122 between the messaging centre 110 and the mobile terminal 102. For instance, the tunnel may be set up using GPRS Tunnelling Protocol (GTP) or its later derivatives, or any other suitable tunnelling protocol.
A real e-mail system supports a large number of mobile terminals 102 and tunnels 122. In order to keep track of which e-mail account and which tunnel belongs to which mobile terminal, the messaging centre 110 and the connectivity function collectively maintain an association 124, 124′ for each supported mobile terminal. Basically, each association 124, 124′ joins three fields, namely an e-mail address 124A assigned to the mobile terminal or its user, encryption information 124C and a temporary wireless identity 124D of the mobile terminal in the access network. The embodiment shown in
The service activation code is closely related to an encryption key to be used in future communications between the connectivity function 120 and the mobile terminal 102. The service activation code and the encryption key may be identical, or one may be a subset of the other, or the encryption key may be derived from the service activation code by means of some, preferably unpublished, algorithm. The fact that the service activation code and the encryption key are closely related to each other ensures that the terminal used in the authentication process is the terminal used to access the e-mail service afterwards.
Thus the idea of conveying the service activation code to the connectivity function 120 via the host system 100 solves both the security-related and user interface-related problems mentioned above. If there is no host system 100 that can authenticate the mobile terminal and its user. Instead, the user may enter the provisioning data to the connectivity function via some suitable connection. The provisioning data entered by the user may be checked by sending a trial e-mail message and attempting to read it. If the check succeeds, it is regarded as the authentication. Yet another way is to convey the service activation code to a dedicated support person who performs the authentication (eg by recognizing the person's face or voice) and enters the service activation code into the connectivity function 120. The connectivity function 120 now stores an association (item 124 in
The mobile terminal preferably generates the service activation code based on the encryption key, the mobile terminal's identifier and a checksum. A benefit of the checksum is that invalid service activation codes can be detected, considering the fact that the service activation code may be conveyed via channels that are immune to electrical eavesdropping but very prone to human errors. For example, the service activation code may be read visually from the mobile terminal's display and entered manually into another terminal.
The mobile terminal's identifier can be its IMEI, IMSI, MSISDN, or other network identifier. A benefit of encoding the mobile terminal's identifier and the encryption key into the service activation key is that the connectivity function 120 needs both to communicate with the mobile terminal. The connectivity function 120 needs the mobile terminal's identifier in order to send data to the mobile terminal. The connectivity function 120 also needs the encryption key because it is the mobile terminal's peer entity as regards encryption. As soon as the connectivity function 120 receives knowledge of the mobile terminal's identifier and the encryption key, it can send the mobile terminal a first message comprising service provisioning settings, after which it can begin sending user traffic, such as new e-mail messages, calendar information and the like.
As stated in the description of
It is readily apparent to a person skilled in the art that, as the technology advances, the inventive concept can be implemented in various ways. The invention and its embodiments are not limited to the examples described above but may vary within the scope of the claims.
Number | Date | Country | Kind |
---|---|---|---|
20045451 | Nov 2004 | FI | national |
20055038 | Jan 2005 | FI | national |
This application relies for priority upon Finnish Application No. 20045451, filed Nov. 22, 2004, and Finnish Application No. 20055038, filed Jan. 26, 2005, as well as U.S. Provisional Application Nos. 60/650,975 and 60/151,082, both filed Feb. 9, 2005, the contents of all of which are incorporated herein by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4831582 | Miller et al. | May 1989 | A |
4875159 | Cary et al. | Oct 1989 | A |
4897781 | Chang et al. | Jan 1990 | A |
5263157 | Janis | Nov 1993 | A |
5386564 | Shearer et al. | Jan 1995 | A |
5392390 | Crozier | Feb 1995 | A |
5572643 | Judson | Nov 1996 | A |
5581749 | Hossain et al. | Dec 1996 | A |
5600834 | Howard | Feb 1997 | A |
5613012 | Hoffman et al. | Mar 1997 | A |
5623601 | Vu | Apr 1997 | A |
5627658 | Connors et al. | May 1997 | A |
5630081 | Rybicki et al. | May 1997 | A |
5634053 | Noble et al. | May 1997 | A |
5647002 | Brunson | Jul 1997 | A |
5652884 | Palevich | Jul 1997 | A |
5666553 | Crozier | Sep 1997 | A |
5680542 | Mulchandani et al. | Oct 1997 | A |
5682524 | Freund et al. | Oct 1997 | A |
5684990 | Boothby | Nov 1997 | A |
5701423 | Crozier | Dec 1997 | A |
5704029 | Wright, Jr. | Dec 1997 | A |
5706502 | Foley et al. | Jan 1998 | A |
5710918 | Lagarde et al. | Jan 1998 | A |
5713019 | Keaten | Jan 1998 | A |
5715403 | Stefik | Feb 1998 | A |
5717925 | Harper | Feb 1998 | A |
5721908 | Lagarde et al. | Feb 1998 | A |
5721914 | DeVries | Feb 1998 | A |
5727202 | Kucala | Mar 1998 | A |
5729735 | Meyering | Mar 1998 | A |
5745360 | Leone et al. | Apr 1998 | A |
5752246 | Rogers et al. | May 1998 | A |
5757916 | MacDoran et al. | May 1998 | A |
5758150 | Bell et al. | May 1998 | A |
5758354 | Huang et al. | May 1998 | A |
5758355 | Buchanan | May 1998 | A |
5765171 | Gehani et al. | Jun 1998 | A |
5778346 | Frid-Neilsen et al. | Jul 1998 | A |
5787441 | Beckhardt | Jul 1998 | A |
5790425 | Wagle | Aug 1998 | A |
5790790 | Smith et al. | Aug 1998 | A |
5799318 | Cardinal et al. | Aug 1998 | A |
5832483 | Barker | Nov 1998 | A |
5857201 | Wright, Jr. et al. | Jan 1999 | A |
5870759 | Bauer et al. | Feb 1999 | A |
5909689 | Van Ryzin | Jun 1999 | A |
5943676 | Boothby | Aug 1999 | A |
5968131 | Mendez et al. | Oct 1999 | A |
6006274 | Hawkins et al. | Dec 1999 | A |
6023708 | Mendez et al. | Feb 2000 | A |
6044381 | Mendez et al. | Mar 2000 | A |
6085192 | Mendez et al. | Jul 2000 | A |
6131096 | Ng et al. | Oct 2000 | A |
6131116 | Riggins et al. | Oct 2000 | A |
6138124 | Beckhardt | Oct 2000 | A |
6141664 | Boothby | Oct 2000 | A |
6151606 | Mendez | Nov 2000 | A |
6212529 | Boothby et al. | Apr 2001 | B1 |
6219694 | Lazaridis et al. | Apr 2001 | B1 |
6223187 | Boothby et al. | Apr 2001 | B1 |
6233341 | Riggins | May 2001 | B1 |
6324542 | Wright, Jr. et al. | Nov 2001 | B1 |
6708221 | Mendez et al. | Mar 2004 | B1 |
6732101 | Cook | May 2004 | B1 |
6745326 | Wary | Jun 2004 | B1 |
6799190 | Boothby | Sep 2004 | B1 |
20020019225 | Miyashita | Feb 2002 | A1 |
20040205330 | Godfrey et al. | Oct 2004 | A1 |
20060265595 | Scottodiluzio | Nov 2006 | A1 |
Number | Date | Country |
---|---|---|
0 772 327 | May 1997 | EP |
WO 9824257 | Jun 1998 | WO |
WO 03007570 | Jan 2003 | WO |
WO 03098890 | Nov 2003 | WO |
WO 03098890 | Nov 2003 | WO |
WO 2004-045171 | May 2004 | WO |
Number | Date | Country | |
---|---|---|---|
20060240804 A1 | Oct 2006 | US |
Number | Date | Country | |
---|---|---|---|
60650975 | Feb 2005 | US | |
60651082 | Feb 2005 | US |