Claims
- 1. An enterprise system with secure wireless messaging, the system comprising:
an application service configured to process a message; a security service configured to use a cryptographic technique to transform between the message and a secure message that is based on the message; and a communication service configured to communicate the secure message with a mobile client using a public network.
- 2. The system of claim 1 wherein the secure message comprises an end-to-end secured message.
- 3. The system of claim 1 wherein the security service is configured further to provide a secure storage function and to provide a secure execution function.
- 4. The system of claim 1 further comprising an information service with information indicating occurrence of a triggering event that causes the system to push the secure message to the mobile client, and wherein:
the application service comprises a message generation service configured to generate a first message based on the information indicating occurrence of a triggering event; the security service comprises an encoding service configured to create a first secure message based on the first message using the cryptographic technique; and the communication service comprises a delivery service configured to deliver the first secure message to the mobile client using the public network.
- 5. The system of claim 4 wherein the information indicating occurrence of a triggering event is based on a request for a service.
- 6. The system of claim 4 wherein the message comprises an alert to notify a service provider that a service is required.
- 7. The system of claim 4 further configured to receive a second secure message that includes a response to the first secure message, wherein:
the communication service further comprises a reception service configured to receive a second secure message based on a second message from the mobile client using the public network; the security service further comprises a decoding service configured to recover the second message from the second secure message using the cryptographic technique; and the application service further comprises an interpretation service configured to interpret the second message.
- 8. The system of claim 7 wherein the response to the first secure message comprises an acknowledgement of the first secure message.
- 9. The system of claim 7 wherein the response to the first secure message comprises an authorization based on the first secure message.
- 10. The system of claim 9 wherein the authorization comprises a digital signature.
- 11. The system of claim 10 wherein the digital signature is based on a private key of a key pair, wherein the security service further comprises a certification service configured to communicate with a public key infrastructure to obtain certification of whether the public key is associated with a represented originator of the digitally signed second secure message.
- 12. The system of claim 11 wherein the public key infrastructure comprises a certification authority and the certification service is configured further to communicate with the certification authority.
- 13. The system of claim 11 wherein the public key infrastructure comprises a web of trust and the certification service is configured further to communicate with the web of trust.
- 14. The system of claim 1 further comprising an information service with enterprise information and wherein the secure message comprises a request of the mobile client to pull the enterprise information from the information service, wherein:
the communication service comprises a reception service configured to receive a secure message from the mobile client using the public network; the security service comprises a decoding service configured to recover a message based on the secure message from the secure message using the cryptographic technique; and the application service comprises a response service configured to generate a response message directed to the mobile client based on the enterprise information.
- 15. The system of claim 1 wherein the secure message comprises a notification.
- 16. The system of claim 1 wherein the cryptographic technique comprises a symmetric cryptographic technique.
- 17. The system of claim 1 wherein the cryptographic technique comprises an asymmetric cryptographic technique based on a private key and a public key.
- 18. The system of claim 17 wherein the security service further comprises a certification service configured to communicate with a public key infrastructure to obtain certification of whether the public key is associated with a represented originator of the secure message.
- 19. The system of claim 18 wherein the public key infrastructure comprises a certification authority and the certification service is configured further to communicate with the certification authority.
- 20. An enterprise system with secure wireless messaging, the system comprising:
an enterprise service configured to couple to a public network that is coupled to a wireless service; and a mobile client configured to couple to the wireless service; wherein the enterprise service is configured to generate a first secure message based on a triggering event indicative of a need for a service; the mobile client is configured to interpret the first secure message and to respond by generating a second secure message indicative of an availability to perform the needed service; and the enterprise service and the mobile client are configured to secure the first secure message and the second secure message using cryptographic methods and to transport the first secure message and the second secure message using the wireless service and the public network.
- 21. A method for secure wireless messaging between a mobile client and an enterprise service, the method comprising:
configuring the enterprise service to couple to a public network that is coupled to a wireless service; providing a mobile client configured to couple to the wireless service; providing the enterprise service with an enterprise application service configured to detect a triggering event and to generate a message that includes an alert based on the triggering event; providing the enterprise service with an enterprise security service configured to generate a secure message that is based on the message; providing the enterprise service with an enterprise gateway configured to push the secure message to the mobile client over the public network and the wireless service; providing the mobile client with a mobile security service configured to determine the message based on the secure message; and providing the mobile client with a client device configured to present the message to a user of the mobile client.
- 22. The method of claim 21 wherein generating a secure message that is based on the message comprises using symmetric cryptography to generate the secure message from the message.
- 23. The method of claim 22 wherein using symmetric cryptography comprises encrypting the message based on 3DES.
- 24. The method of claim 21 wherein generating a secure message that is based on the message comprises using asymmetric cryptography to generate a secure message from the message.
- 25. The method of claim 21 further comprising configuring the enterprise service to receive a second secure message generated by the mobile client based on the alert.
- 26. The method of claim 25 wherein the second secure message comprises an authorization that includes a digital signature.
- 27. The method of claim 21 wherein the triggering event comprises a request for a service.
- 28. The method of claim 21 wherein the triggering event comprises a request for enterprise information.
- 29. A computer program for providing secure wireless messaging between a mobile client and an enterprise service, the computer program comprising:
an application code segment configured to cause a computer to process a message; a security code segment configured to cause the computer to use a cryptographic technique to transform between the message and a secure message that is based on the message; and a communication code segment configured to cause the computer to communicate the secure message with a mobile client using a public network.
- 30. The computer program of claim 29 wherein the cryptographic technique comprises a symmetric cryptographic technique.
- 31. The computer program of claim 30 wherein the symmetric cryptographic technique is based on 3DES.
- 32. The computer program of claim 29 wherein the cryptographic technique comprises an asymmetric cryptographic technique.
- 33. The computer program of claim 29 further comprising an information code segment configured to store information indicating occurrence of a triggering event that causes the system to push the secure message to the mobile client, and wherein:
the application code segment comprises a message generation code segment configured to cause the computer to generate a first message based on the information indicating occurrence of a triggering event; the security code segment comprises an encoding code segment configured to cause the computer to create a first secure message based on the first message using the cryptographic technique; and the communication code segment comprises a delivery code segment configured to cause the computer to deliver the first secure message to the mobile client using the public network.
- 34. The computer program of claim 33 wherein the information indicating occurrence of a triggering event is based on a request for a service.
- 35. The computer program of claim 29 wherein the information indicating occurrence of a triggering event is based on a request for enterprise information.
- 36. The computer program of claim 33 wherein the message comprises an alert to notify a service provider that a service is required.
- 37. The computer program of claim 33 further configured to cause the computer to receive a second secure message that includes a response to the first secure message, wherein:
the communication code segment further comprises a reception code segment configured to cause the computer to receive a second secure message based on a second message from the mobile client using the public network; the security code segment further comprises a decoding code segment configured to cause the computer to recover the second message from the second secure message using the cryptographic technique; and the application code segment further comprises an interpretation code segment configured to cause the computer to interpret the second message.
- 38. The computer program of claim 37 wherein the response to the first secure message comprises an acknowledgement of the first secure message.
- 39. The computer program of claim 37 wherein the response to the first secure message comprises an authorization based on the first secure message.
- 40. The computer program of claim 39 wherein the authorization comprises a digital signature.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority from U.S. Provisional Application No. 60/406,921, filed Aug. 30, 2002, titled SECURE MESSAGING ARCHITECTURE, which hereby is incorporated by reference in its entirety for all purposes.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60406921 |
Aug 2002 |
US |