1. Field of Technology
This application generally relates to communication systems capable of encoding messages for security purposes.
2. Related Art
Governments, and some corporations, typically use a security classification system to determine the sensitivity level of information in documents and email. Such security classification system varies between different countries and different organizations.
Once the classification level of information is set, it is important to make sure the appropriate security policies are uniformly always applied. When classifications are applied to email, what is needed is a method to enforce appropriate message encoding based on the classification status set (e.g., classification level, strength of encryption, etc.).
There is a prior solution for adding classification to Outlook (TM owned by Microsoft Corporation) messages. It is called “Classify” and is found on the World Wide Web at “markwilson.ca/products.html”. The product is a plug-in for Outlook™ which allows one to add classification to a message. However, the classification level is not necessarily tied to message encoding. Accordingly, there is no way to enforce, for example, that all “secret” and above messages must be encrypted.
Objects and advantages of the approach described herein will be better understood and appreciated in conjunction with the following detailed description of exemplary embodiments taken together with the accompanying drawings, of which:
To solve this problem, we allow the Information Technology (IT) Administrator (through IT Policy) to set a desired mapping between available classification statuses and the corresponding applicable message encoding levels. This could be an explicit mapping (such as “Secret”=“Encrypted”) or it could be a series of minimums (such as “Confidential”>=“Signed”).
This information could, for example, get “pushed” to a remote wireless communication device through such an IT Policy. Once resident on the device, when the user wants to send a message, the device application logic would look at the current classification level set by the user and compare the current message encoding to what it should be based on IT Policy. If it is unspecified, of course, it can just be sent as is. If it is specified, and the encoding currently specified for use is not at least of minimum required strength, the encoding would be automatically bumped up to the appropriate level (i.e., from Plaintext to Signed and Encrypted). Preferably this would be seamless to the user.
This enforced encoding logic also can be made more granular than just specifying the specific message encoding. For example, as a further variation, the IT Administrator could also (or instead) specify a “strength” level to indicate algorithms that should be used for the encryption. For example, a “Secret” classification may correspond to a “Strong” strength which could mean the public key algorithms used must be >=2048 bits and the symmetric algorithm must be AES-192 or above. But “Top Secret” classification may correspond to “Extra Strong” which would mean public key algorithms used must be >=4096 bits and the symmetric algorithm must be AES-256 or above.
These embodiments may be realized in hardware, software or a combination of hardware and software and provide a method for enhancing the ability to encode messages based on classification status (e.g., in a wireless communication device). The exemplary embodiments are realized at least in part, by executable computer program code which may be embodied in physical digital memory media.
An email sender 10 may, for example, be connected to an ISP (Internet service Provider) on which a user of the system has an account, located within a company, possibly connected to a local area network (LAN), and connected to the Internet 12, or connected to the Internet 12 through a large ASP (application service provider) such as America Online™ (AOL). Those skilled in the art will appreciate that the systems shown in
The message server 14 may be implemented, for example, on a network computer within the firewall of a corporation, a computer within an ISP or ASP system or the like, and acts as the main interface for email exchange over the Internet 12. Although other messaging systems might not require a message server system 14, a mobile device 100 configured for receiving and possibly sending email will normally be associated with an account on a message server. Perhaps the two most common message servers are Microsoft Exchange™ and Lotus Domino™. These products are often used in conjunction with Internet mail routers that route and deliver mail. These intermediate components are not shown in
The Wireless gateway 16 and infrastructure 18 provide a link between the Internet 12 and wireless network 20. The wireless infrastructure 18 determines the most likely network for locating a given user and tracks the users as they roam between countries or networks. A message is then delivered to the mobile device 100 via wireless transmission, typically at a radio frequency (RF), from a base station in the wireless network 20 to the mobile device 100. The particular network 20 may be virtually any wireless network over which messages may be exchanged with a mobile communication device.
As shown in
Regardless of the specific mechanism controlling forwarding of messages to mobile device 100, the message 22, or possibly a translated or reformatted version thereof, is sent to wireless gateway 16. The wireless infrastructure 18 includes a series of connections to wireless network 20. These connections could be Integrated Services Digital Network (ISDN), Frame Relay or Ti connections using the TCP/IP protocol used throughout the Internet. As used herein, the term “wireless network” is intended to include three different types of networks, those being (1) data-centric wireless networks, (2) voice-centric wireless networks and (3) dual-mode networks that can support both voice and data communications over the same physical base stations. Combined dual-mode networks include, but are not limited to, (1) Code Division Multiple Access (CDMA) networks, (2) the Group Special Mobile or the Global System for Mobile Communications (GSM) and the General Packet Radio Service (GPRS) networks, and (3) future third-generation (3G) networks like Enhanced Data-rates for Global Evolution (EDGE) and Universal Mobile Telecommunications Systems (UMTS). Some older examples of data-centric network include the Mobitex™ Radio Network and the DataTAC™ Radio Network. Examples of older voice-centric data networks include Personal Communication Systems (PCS) networks like GSM, and TDMA systems.
As depicted in
The mobile communication device 100 will also typically include a main control CPU 106 which operates under control of a stored program in program memory 108 (and which has access to data memory 110). CPU 106 also communicates with a conventional keyboard 112, display 114 (e.g., an LCD) and audio transducer or speaker 116. A portion of data memory 110a is available for storing IT Policy data used to control associated device operations. Suitable computer program executable code is stored in portions of program memory 108a to constitute the program logic for enforcing the IT Policy insofar as encoding according to message classification status capability is described below.
One exemplary encoding enforcement logic is depicted at
Suitable tests are made at decision points 302, 304, 306, 308, 310, 312, 314 and 316 to automatically detect which one of plural possible classification statuses have been associated with the message at hand. As will be appreciated, a code representing a particular classification status (i.e., classification level or strength of encryption) can be realized as a field appended to the body or header of a given message. Alternatively, a separate table or database of classification statuses may be maintained in association with other unique message identification data (e.g., sequential serial message numbers or the like). As will be appreciated, the number of decision points will depend upon the number of different classification statuses that are permitted in accordance with a given IT Policy.
In accordance with the IT Policy set forth at
If it is only desired to insure at least a minimum encoding level (i.e., to permit higher than minimum encoding levels if otherwise set by the user or system), then an exemplary “Check and Set” encoding level routine 500 is depicted at
As those in the art will appreciate, there may be many variations and modifications of the above described exemplary embodiments which yet retain some or all of the novel features and advantages of these embodiments. Accordingly, all such modifications and variations are intended to be included within the scope of the appended claims.