System and method for securing data
First Claim
1. In an electronic messaging system operable to send and receive electronic messages over a first network and also operable to redirect electronic messages over a second network to a wireless device, a method of encrypting electronic messages comprising:
- receiving an electronic message that is protected by a first encryption algorithm and addressed to a message recipient in the first network, the message recipient having an associated wireless device operable in the second network;
determining that the electronic message is to be transported across the second network to the wireless device; and
in response to determining that the electronic message is to be transported across the second network, encrypting the electronic message using a second encryption algorithm and transmitting the encrypted message over the second network to the associated wireless device, the second encryption algorithm being a more secure security method than the first encryption algorithm.
8 Assignments
0 Petitions
Accused Products
Abstract
In accordance with the teachings described herein, systems and methods are provided for securing data for transmission to a wireless device. The disclosed systems and methods may include an electronic messaging system used to send and receive data over a first network and also used to forward data to a wireless device operable in a second network. The electronic messaging system may receive an electronic message encrypted with a first encryption algorithm and addressed to a message recipient in the first network, the message recipient having an associated wireless device operable in the second network. The electronic messaging system may determine that the electronic message is to be transported across the second network to the wireless device, and in response to determining that the electronic message is to be transported across the second network, encrypt the electronic message using a second encryption algorithm and transmit the encrypted message over the second network to the wireless device, with the second encryption algorithm being a stronger encryption algorithm than the first encryption algorithm.
-
Citations
14 Claims
-
1. In an electronic messaging system operable to send and receive electronic messages over a first network and also operable to redirect electronic messages over a second network to a wireless device, a method of encrypting electronic messages comprising:
-
receiving an electronic message that is protected by a first encryption algorithm and addressed to a message recipient in the first network, the message recipient having an associated wireless device operable in the second network;
determining that the electronic message is to be transported across the second network to the wireless device; and
in response to determining that the electronic message is to be transported across the second network, encrypting the electronic message using a second encryption algorithm and transmitting the encrypted message over the second network to the associated wireless device, the second encryption algorithm being a more secure security method than the first encryption algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. In an electronic messaging system having an electronic messaging server that is operable to send and receive data over a local area network (LAN) and over a wide area network (WAN), wherein the electronic messaging server and the LAN are isolated from the WAN by a firewall, a system for securing data for transmission to a wireless device, comprising:
-
a public key look-up database for storing public encryption keys associated with a plurality of wireless devices;
an enterprise server operable to forward electronic messages from the electronic messaging server over a wireless network to a wireless device;
the enterprise server being further operable to receive an electronic message from the electronic messaging system that is protected by a first encryption algorithm and that is designated for delivery to the wireless device, access a public encryption key from the public key look-up database that is associated with the wireless device, and encrypt the electronic message using the public encryption key and a second encryption algorithm, the second encryption algorithm providing more protection than the first encryption algorithm. - View Dependent Claims (12, 13, 14)
-
Specification