Embodiments of the invention relate generally to e-mail communications, and more specifically to methods and systems that use RFID in the creation of e-mail.
E-mail has become a widely accepted a form of communication. Most households and nearly all businesses regularly use e-mail to communicate, resulting in billions of e-mail messages being sent each day. Once an e-mail is sent it can be generally be delivered very quickly, often within a few seconds. Still, e-mail differs from face to face communications or telephone conversations in that there is no real-time interaction between the parties. This makes it difficult to verify the identity of the sender. When an e-mail is sent, the recipient has no way of knowing if it was actually sent by the person identified as the sender, or by another person at the sender's computer, or by someone spoofing the sender's identification. Recently, viruses have become a problem for e-mail applications. Such viruses have been known to infect an e-mail application and send e-mails to the contacts stored in the address book of the e-mail application (e.g., Microsoft Outlook). The recipients have no way of knowing that the e-mail came from a virus infecting the user's computer, until it is too late and the e-mail message has been opened.
Conventional systems have attempted to use an authentication certificate to sign an e-mail. But the certificates are controlled by the system and are automatically sent with outgoing e-mail. With conventional systems using authentication certificates there is no way of checking or verifying the identity of the person sending the e-mail. Thus, a drawback the current technology is that the sender can be spoofed in various ways or subjected to viruses. With the current technology the recipient has no way of knowing whether a received e-mail message originated from the intended sender or an impostor.
What is needed is a way to authenticate the identity of an e-mail sender.
Embodiments disclosed herein address the above stated needs by providing systems, methods and computer products for authenticating the identity of an e-mail sender. Various embodiments of the invention allow the recipient of an e-mail to authenticate that the user was physically present at the time the e-mail was sent. In at least some embodiments the user composes an authenticated e-mail to be sent from a communication device such as a computer system, a two-way pager, a cellular telephone, or other such communication device capable of sending e-mail. The various embodiments detect an identity tag proximate the communication device, compose the e-mail to be sent from the communication device, and associate the authentication content to the e-mail in response to the identity tag being detected.
In some embodiments the identity tag may be detected wirelessly, for example, with the identity tag including an RFID device configured to be detected by an RFID reader of the computer system or other communication device sending the e-mail. The sensitivity of the RFID reader may be adjusted in order to control the distance that the identity tag can be detected and thus be considered proximate. The identity tag may be provided by the organization that owns or services the communication device or another trusted entity such as an authorized issuer associated with the user of the communication device.
The accompanying drawings, which are incorporated in and constitute part of the specification, illustrate various embodiments of the invention. Together with the general description, the drawings serve to explain the principles of the invention. In the drawings:
The following description of various exemplary embodiments of the invention is illustrative in nature and is not intended to limit the invention, its application, or uses. The various embodiments disclosed herein provide systems, methods and computer products for authenticating the identity of an e-mail sender by embedding content in the e-mail that identifies the user in a manner that is capable of verification.
RFID Device 101 may be implemented to either provide a passive response or an active response. Passive RFID tags use the received energy from the interrogation signal to generate a response. The detection range for passive RFID tags has been increasing over time as advances have been made in the technology. The detection range is around 15 to 20 feet at present, but may be either more or less, depending upon the configuration. Active RFID tags tend to have a considerably longer range than passive tags because they generate and transmit a response signal using power from a power supply of the active RFID tag (e.g., a battery). Active tags may be queried up to 200 feet or more. Various embodiments of the present invention may use either active RFID tags or passive RFID tags, depending upon the constraints, costs and other engineering considerations of the implementation.
The processor 201 is typically configured to communicate with an internal memory 203 via a bus 213 or other communication link. The internal memory 203 is often implemented as random access memory (RAM) and/or read only memory (ROM), but may be any form of memory or storage device suitable for storing data in the computer system 200. The storage memory 205 is used for storing computer software, operating systems, programs, routines, or code, including the instructions and data for carrying out activities of the various embodiments discussed herein. The storage memory 205 may be any of several types of storage devices including, for example, a hard disk, flash memory, RAM, ROM, registers, or removable media such as a magnetic or optical disk, or other storage medium known in the art. The memory 203 and 205 may comprise a combination of one or more storage devices or technologies.
The computer system 200 also includes one or more input/output (I/O) units such as user output 209 and user input 211. The user output 209 is often implemented as a monitor in the form of a liquid crystal display (LCD) screen or other type of display. The user output 209 also typically includes one or more audio speakers as well as the video monitor. The computer system 200 includes one or more user input devices 211. The user input devices 211 may include a keyboard, a mouse, a tablet surface and pen, a microphone and speech recognition routine, and/or other like types of input devices. The user output 209 and user input 211 may include other devices known to those of ordinary skill in the art and suitable for use with a computer system 200. Quite often the computer system 200 is configured to include data interface unit 207 for connecting to networks such as the Internet, to a local area network (LAN) or a wide area network (WAN), to the Public Switched Telephone System (PSTN) or to a wireless telephone network. Generally, e-mails from the computer system 200 are sent from the data interface via the Internet to a destination or addressee with another computer connected to the Internet. The data interface unit 207 may include a wired and/or wireless transmitter and receiver communicating in any of several standards and protocols known to those of ordinary skill in the art. Although the bus 213 is depicted as a single bus connecting all of the component parts of the system, the computer system 200 may include two or more separate buses, each connected to a subset of the system components.
The computer system 200 either includes, or is connected to, an RFID reader 215. The RFID reader 215 is configured to detect an RFID identity tag 120 in close proximity, that is, within its detection range. The RFID reader 215 may include circuitry configured to transmit an interrogation signal to other RFID tags in the vicinity, such as the RFID device 101 of
The RFID tag, such as RFID device 101 of identity tag 120, to be used with RFID reader 215 may be an inductively coupled RFID tag which uses energy from the magnetic field generated by the RFID reader. The coil antenna of the RFID tag translates the magnetic energy into an electrical signal which is communicated to the logic of RFID reader 215. To respond to the interrogation signal of another reader, the RFID tag of reader 215 modulates the magnetic field, transmitting e-mail data back to the reader which sent the interrogation signal. The RFID tag used in RFID reader 215 may be implemented as a capacitively coupled RFID as the detection and transmission ranges increase for these devices. Capacitively coupled RFID tags do not have a coil antenna, instead using silicon circuitry to perform the function of the coil antenna.
Although
The method begins at 301 and proceeds to 303 where an identity tag is procured. The identity tag may be an RFID identity tag such as that shown in
The installation of the application software in 305 may entail the application software being downloaded, or otherwise programmed into, the communication device. This may be done in any of several different manners, for example, by having the application software initially loaded onto the communication devices in the factory, purchased by the user from a brick-and-mortar store on floppy disks, downloaded from the Internet, or otherwise installed onto the communication device. The application software may be in the form of a software product or any computer readable program stored on an electronically readable medium (e.g., a compact disk, a DVD, a floppy disk, a dongle memory, a memory chip, or the like). The application software may either work in conjunction with an e-mail application or the application software may be part of a functioning e-mail application, including web based e-mail (e.g., Lotus Notes, Apple-mail, Microsoft Outlook or Outlook Express, Eudora, Mozilla Thunderbird, Pegasus, Claris, Blitzmail, Pronto Mail, Yahoo! Mail, or the like). In addition to the software application program itself, any drivers which may be needed are also loaded. For example, if a driver is needed for the program to communicate with the RFID receiver or detector, the driver is loaded in 305. After installing the application software of the e-mail authentication program the method proceeds to 307 to register the RFID identity tag with the application software.
In 307 the identity tag is registered with the application software. This allows the application software to recognize that the identity tag matches the default settings of the e-mail. For example, an e-mail application may be configured to automatically place a signature line at the end of an e-mail, tailored to include information of the user (e.g., the user's contact phone number, website, etc.). By registering the identity tag with the application software it can be verified that the person sending the e-mail matches the e-mail address and signature line inserted in the e-mail. In some embodiments, the identity tag of more than one person may be registered with the software application. Once the identity tag is registered with the application software the method proceeds to 309.
In 309 the various settings for the options and parameters of the application software are set up. This may be done at the time the application software is loaded on the machine, or the software settings may be altered at a later time by the user or administrator. The user may be presented with an option to either customize the application software themselves or install a default version of the configuration options. If the user opts to customize the configuration, then the system may present a set of options for setting up the application to the user. The options available to the user may include any type of features affecting the performance, operation or appearance of the application program. Such features may include options for setting up the menuing system, for specifying the buttons to be used in controlling the program, for configuring the RFID reader, and options for setting up the actual e-mail itself such as specifying how the authentication content is to be presented in the e-mail (e.g., as an attachment or as a notification within the e-mail). The settings also control the look and feel of the application, allowing the user to tailor the menus and controls for the application to be convenient for the user. For example, the setting may be configured to prompt a user with a query as to whether or not an e-mail is to include authentication content. Alternatively, the settings may be configured to automatically include authentication content with each e-mail rather than prompting the user each time an e-mail is created. Another setting may specify whether authentication content is to be included only in e-mails originally created on the user's computer or is also to be included in e-mails being forwarded or returned.
In 309 the user may select the form used for the authentication content. In some embodiments the authentication content may be a file (e.g., an executable file, a data file, a text file or the like) attached or embedded in the e-mail. In some embodiments the authentication content may be in the form of an Internet address—that is, a Uniform Resource Locator (URL)—which directs the person receiving the e-mail to a website where the sender's identification can be verified. In other embodiments the authentication content may be in the form of a watermark, a label, a seal, or any other type of information associated with the e-mail which verifies the sender's identification. There may be many other settings for the options and parameters of the application software specifying nearly every user-controllable aspect of the application program and the authentication content. Once the settings have been chosen the method proceeds to 311.
In 311 the user or administrator may specify the proximity settings for the system. The proximity settings affect the manner in which the detector (RFID reader 215) detects an identity tag (e.g., RFID identity tag 120). For example, the sensitivity of the reader may be adjusted to control the distance at which an identity tag is within the detection range and is considered proximate. By tweaking the reader sensitivity control the reader may be set to only detect identity tags which are very close (e.g., a few inches), or within typical operator range (e.g., within three feet or so) or in the same room or general location (e.g., within 20 feet or so). The proximity settings may also include the option to have an indicator of proximity such as an icon on a toolbar of the computer desktop which indicates the identity badge is within proximity, or an audible beep indicating that the identity badge has been detected and recognized. Once the proximity settings have been specified in 311 the method proceeds to 313 and ends.
In 411 it is determined whether the system has detected an identity tag—for example, the RFID identity tag 120 of
In 417 the authentication content is attached to the e-mail. By “attached,” as this term is used herein, it is meant that the authentication content is included as an attachment to the e-mail, is encoded within, embedded in or otherwise associated with the e-mail. The authentication content may be a file attached to the e-mail or embedded within it or additional data encoded with the message, such as in the header fields of the e-mail. Such a file or header may be an executable file, a data file, a text file or other type of file configured to inform the person receiving e-mail that the sender of the e-mail has been authenticated. In some embodiments, instead of a file attachment the authentication content may be provided in the form of a URL Internet address which directs the person receiving the e-mail to a website where the sender's identification can be verified. The authentication content may alternatively be in the form of a watermark, a label, a seal, or any other type of information associated with the e-mail which verifies the sender's identification. The authentication content is attached in response to the detection of the identity tag and some aspect of the e-mail being composed. The detection of an identity card proximate to the system is a requirement for the authentication content to be attached. If an identity card has been detected, then the authentication content may be attached to an e-mail when the system determines that an e-mail is being composed, or other activity occurs during the creation of an e-mail (e.g., the user hits the “send” button to send an e-mail). Once the authentication content has been attached to the e-mail the method proceeds to 419 to send the e-mail. Upon sending the e-mail in 419, the method proceeds to 421 and ends.
In 507 it is determined whether the newly received e-mail has authentication content attached to it. If, in 507, it is determined that no authentication content is attached to the newly received e-mail the method proceeds along the “NO” branch to 509 and the e-mail is treated as a non-authenticated e-mail. However, if it is determined in 507 that there is authentication content attached to the received e-mail the method proceeds to 511 along the “YES” branch. In 511 application program contacts the issuer of the identity tag (e.g., a governmental agency such as the U.S. Post Office, Verisign, IBM, etc.) to verify that the authentication content is not fraudulent. In some embodiments the application software may prompt the user who has received the e-mail as to whether or not the issuer should be contacted to verify the identity of the sender in 511. In other embodiments the issuer is contacted automatically, for example, in response to the e-mail being received or else upon opening the e-mail. Contacting the issuer to verify the identity of the sender helps to prevent the authentication content from being forged. In some embodiments it is preferable that the URL or other contact information at which the issuer is contacted is stored in the computer system of the person receiving the e-mail, rather than being included in the authentication content of the received e-mail. This helps to prevent the issuer's URL from being spoofed. If the issuer's URL is included in the authentication content it may be encoded using a secure encryption code to avoid being altered or falsified.
Once the issuer has been contacted in 511 the method proceeds to 513 to determine whether the issuer verifies the sender's identity or not. If, in 513, the issuer cannot verify the sender's identity the method proceeds to 509 and the e-mail is treated as a non-authenticated e-mail. After 509 the method proceeds to 517 and ends. However, if it is determined back in 513 that the issuer can verify the identity of the sender based on the authentication content of the received e-mail, the method proceeds from 513 to 515 along the “YES” branch. In 515 a label or other indication of verification may be associated with the e-mail. The method then proceeds to 517 and ends. In some embodiments, the various functions outlined above for practicing the invention may be done either in the e-mail application program itself or by a separate application program working in conjunction with the e-mail application.
Various steps and activities may be included or excluded as described herein, or may be performed in a different order, with the rest of the activities still remaining within the scope of at least one exemplary embodiment. For example, a particular user receiving an e-mail may not care to contact the issuer to verify the authentication content. In such instances the blocks 511 and 513 of
The processing units, processors and controllers described herein (e.g., processor 201 of
The use of the word “exemplary” in this disclosure is intended to mean that the embodiment or element so described serves as an example, instance, or illustration, and is not necessarily to be construed as preferred or advantageous over other embodiments or elements. The terms “software application” and/or “application program” as used herein, are intended to mean any software application or routine that performs or implements an embodiment of the invention. The description of the invention provided herein is merely exemplary in nature, and thus, variations that do not depart from the gist of the invention are intended to be within the scope of the embodiments of the present invention. Such variations are not to be regarded as a departure from the spirit and scope of the present invention.
The present application claims priority from and incorporates by reference in its entirety the copending application “RF Tag-Based E-Mail Autogenerator” filed Aug. 17, 2006 and accorded U.S. Ser. No. 11/465,223.