In accordance with the teachings described herein, systems and methods are provided for securing data for transmission to a wireless device. The disclosed systems and methods may include an electronic messaging system used to send and receive data over a first network and also used to forward data t
In accordance with the teachings described herein, systems and methods are provided for securing data for transmission to a wireless device. The disclosed systems and methods may include an electronic messaging system used to send and receive data over a first network and also used to forward data to a wireless device operable in a second network. The electronic messaging system may receive an electronic message encrypted with a first encryption algorithm and addressed to a message recipient in the first network, the message recipient having an associated wireless device operable in the second network. The electronic messaging system may determine that the electronic message is to be transported across the second network to the wireless device, and in response to determining that the electronic message is to be transported across the second network, encrypt the electronic message using a second encryption algorithm and transmit the encrypted message over the second network to the wireless device, with the second encryption algorithm being a stronger encryption algorithm than the first encryption algorithm.
대표청구항▼
1. In an electronic messaging system operable to send and receive electronic messages over a wired local area network and also operable to redirect electronic messages over a wireless network to a wireless device, a method of encrypting electronic messages comprising: an enterprise server receiving
1. In an electronic messaging system operable to send and receive electronic messages over a wired local area network and also operable to redirect electronic messages over a wireless network to a wireless device, a method of encrypting electronic messages comprising: an enterprise server receiving an electronic message from an electronic messaging server, wherein the electronic message is protected by a first encryption algorithm and addressed to a message recipient in the wired local area network, the message recipient having an associated wireless device operable in the wireless network, the enterprise server having wireless device identification information of the associated wireless device stored therein for use in communicating with the wireless device using a higher-level connection with a wireless gateway that provides an interface with the wireless network;determining that the electronic message is to be transported across the wireless network to the wireless device; andthe enterprise server retrieving a public key from a public key look-up database that is associated with the wireless device and also generating a random session key,wherein in response to determining that the electronic message is to be transported across the wireless network to the wireless device, the method further comprises the enterprise server:converting the protected electronic message to a data structure recognizable by the wireless device;using the random session key to encrypt the data structure with a second encryption algorithm and using the public key to encrypt the random session key, the second encryption algorithm being a stronger security method than the first encryption algorithm;encapsulating the encrypted data structure and the encrypted random session key into one or more data packets along with the wireless identification information; andtransmitting the data packets over the higher-level connection to the gateway,wherein the transmitted encapsulated data structure is protected with first encryption algorithm and encrypted with the second encryption algorithm. 2. The method of claim 1, wherein the second encryption algorithm is a symmetric algorithm, wherein the gateway is configured to utilize the wireless device identification information to transmit the data packets containing the electronic message over the wireless network to the associated wireless device, andwherein the associated wireless device receiving the data packets is configured to refrain from decrypting the data structure until instructions to display the message are received. 3. The method of claim 2, wherein the second encryption algorithm is an advanced encryption standard-256 (AES-256) encryption algorithm. 4. The method of claim 1, wherein one of the first encryption algorithm is a triple data encryption standard (DES) encryption algorithm. 5. The method of claim 1, wherein the public key is received from a certificate authority. 6. The method of claim 1, further comprising: decrypting the electronic message on the associated device using a private encryption key. 7. The method of claim 1, wherein the encrypted data structure is stored on the wireless device in encrypted form, and wherein the wireless device is configured to refrain from decrypting the stored encrypted data structure until accessed by an electronic messaging application. 8. The method of claim 1, further comprising: determining if the electronic message received by the enterprise server is a classified message or an unclassified message; andencrypting the data structure using the second encryption algorithm only if the received electronic message is a classified message. 9. In an electronic messaging system having an electronic messaging server that is operable to send and receive data over a wired local area network (wired-LAN) and over a wired wide area network (wired-WAN), wherein the electronic messaging server and the wired-LAN are isolated from the wired-WAN by a firewall, a system for securing data for transmission to a wireless device, comprising: a public key look-up database for storing public encryption keys associated with a plurality of wireless devices;an enterprise server operable to forward electronic messages from the electronic messaging server over a wireless network to the wireless device, the wireless network being less secure when compared to transmissions within the wired-LAN;the enterprise server being further operable to:receive an electronic message from the electronic messaging system that is protected by a first encryption algorithm and addressed to a message recipient in the wired local area network, the message recipient having an associated wireless device operable in the wireless network, the enterprise server having wireless device identification information of the associated wireless device stored therein for use in communicating with the wireless device using a higher-level connection with a wireless gateway that provides an interface with the wireless network;determine that the electronic message is to be transported across the wireless network to the wireless device; andretrieve a public key from a public key look-up database that is associated with the wireless device and generate a random session key,wherein in response to a determination that the electronic message is to be transported across the wireless network to the wireless device, the enterprise server is further operable to:convert the protected electronic message to a data structure recognizable by the wireless device;using the random session key to encrypt the data structure with a second encryption algorithm and use the public key to encrypt the random session key, the second encryption algorithm being a stronger security method than the first encryption algorithm;encapsulate the encrypted data structure and the encrypted random session key into one or more data packets along with the wireless identification information; andforward the data packets for transmission over the higher-level connection to the gateway,wherein the transmitted encapsulated data structure is protected with the first encryption algorithm and encrypted with the second encryption algorithm. 10. The system of claim 9, wherein the second encryption algorithm is a symmetric algorithm. 11. The system of claim 10, wherein the second encryption algorithm is an advanced encryption standard (AES-256) encryption algorithm. 12. The system of claim 9, wherein the enterprise server is further operable to communicate with a certificate authority over the WAN to negotiate the public key for the wireless device and to store the public key in the public key look-up database.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (38)
Franson James D. (Ellicott City MD), Apparatus and method for quantum mechanical encryption for the transmission of secure communications.
Just, Michael K.; Van Oorschot, Paul, Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system.
Mariani,Riccardo; Motto,Silvano; Chiavacci,Monia, Dependable microcontroller, method for designing a dependable microcontroller and computer program product therefor.
Grube Gary W. (Palatine IL) Markison Timothy W. (Austin TX) Rybicki Mathew A. (Austin TX), Method and apparatus for detecting illicit RF data transmissions.
Krischer, Mark; Ryan, Philip J.; Webb, Michael J., Method and apparatus to provide inline encryption and decryption for a wireless station via data streaming over a fast network.
Godfrey,James A.; Little,Herbert A.; Brown,Michael K.; Adams,Neil P.; Cherry,Carl L.; Tyhurst,Timothy R.; Brown,Michael S., System and method for compressing secure e-mail for exchange with a mobile data communication device.
Hendrickson, Keith; Maguy, William; Prehn, Paul; Stamos, Nick; Su, Annie, System and method for measuring wireless device and network usage and performance metrics.
Brown, Michael S.; Adams, Neil P.; Brown, Michael K.; Kirkup, Michael G.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Fukuda, Isamu; Kawamata, Shigeaki; Roppongi, Jun; Kameda, Akihiro; Minohara, Kazuyuki; Fukuda, Nobuyuki, Apparatus and method for performing different cryptographic algorithms in a communication system.
Fukuda, Isamu; Kawamata, Shigeaki; Roppongi, Jun; Kameda, Akihiro; Minohara, Kazuyuki; Fukuda, Nobuyuki, Apparatus and method for performing different cryptographic algorithms in a communication system.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.