Cross-component message encryption
First Claim
1. At a mobile communication device, a method of processing an electronic message, said method comprising:
- receiving an initial part of an original message, said initial part of said original message having a size based on a size threshold in a policy established at a server associated with said mobile communication device;
detecting receipt of an instruction to;
encrypt a composite message, where said composite message includes a new message related to said original message and an entirely of said original message; and
add a cryptographic signature to said composite message;
obtaining a session key for use, at said server, in carrying out a request to encrypt said composite message;
transmitting, to said server;
said new message; and
said request to encrypt said composite message, said request including;
said session key;
an indication of said original message; and
a request for a hash of said composite message;
receiving, from said server, said hash;
obtaining a private cryptographic key;
employing said private cryptographic key to sign said hash, thereby forming a signed hash;
transmitting, to said server, said signed hash thereby, allowing said server to use said signed hash to form a signed encrypted composite message for transmission; and
providing, by the foregoing, maintenance of security considerations in view of bandwidth optimization measures.
4 Assignments
0 Petitions
Accused Products
Abstract
Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver'"'"'s end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, encrypt and sign the composite message. Conveniently, security considerations are maintained even in view of bandwidth optimization measures.
-
Citations
24 Claims
-
1. At a mobile communication device, a method of processing an electronic message, said method comprising:
-
receiving an initial part of an original message, said initial part of said original message having a size based on a size threshold in a policy established at a server associated with said mobile communication device; detecting receipt of an instruction to; encrypt a composite message, where said composite message includes a new message related to said original message and an entirely of said original message; and add a cryptographic signature to said composite message; obtaining a session key for use, at said server, in carrying out a request to encrypt said composite message; transmitting, to said server; said new message; and said request to encrypt said composite message, said request including; said session key; an indication of said original message; and a request for a hash of said composite message; receiving, from said server, said hash; obtaining a private cryptographic key; employing said private cryptographic key to sign said hash, thereby forming a signed hash; transmitting, to said server, said signed hash thereby, allowing said server to use said signed hash to form a signed encrypted composite message for transmission; and providing, by the foregoing, maintenance of security considerations in view of bandwidth optimization measures. - View Dependent Claims (2, 3, 4)
-
-
5. A mobile communication device comprising a processor adapted to:
-
receive an initial part of an original message, said initial part of said original message having a size based on a size threshold in a policy established at a server associated with said mobile communication device; detect receipt of an instruction to; encrypt a composite message, where said composite message includes a new message related to said original message and an entirely of said original message; and add a cryptographic signature to said composite message; obtain a session key for use, at said server, in carrying out a request to encrypt said composite message; arrange transmission, to said server, of; said new message; and said request to encrypt said composite message, the request including; said session key; an indication of said original message; and a request for a hash of said composite message; receive, from said server, said hash; obtain a private cryptographic key; employ said private cryptographic key to sign said hash, thereby forming a signed hash; transmit, to said server, said signed hash, thereby allowing said server to use said signed hash to form a signed encrypted composite message for transmission; and provide, by the foregoing, maintenance of security considerations in view of bandwidth optimization measures. - View Dependent Claims (6, 7, 8)
-
-
9. A non-transitory computer-readable medium containing computer-executable instructions that, when performed by a processor in a mobile communication device, cause said processor to:
-
receive an initial part of an original message, said initial part of said original message having a size based on a size threshold in a policy established at a server associated with said mobile communication device; detect receipt of an instruction to; encrypt a composite message, where said composite message includes a new message related to said original message and an entirely of said original message; and add a cryptographic signature to said composite message; obtain a session key for use, at said server, in carrying out a request to encrypt said composite message; arrange transmission, to said server; said new message; and said request to encrypt said composite message, the request including; said session key; an indication of said original message; and a request for a hash of said composite message; receive, from said server, said hash; obtain a private cryptographic key; employ said private cryptographic key to sign said hash, thereby forming a signed hash; transmit, to said server, said signed hash thereby, allowing said server to use said signed hash to form a signed encrypted composite message for transmission; and provide, by the foregoing, maintenance of security considerations in view of bandwidth optimization measures. - View Dependent Claims (10, 11, 12)
-
-
13. At a mail server having a processor, said server associated with a mobile communication device, a method of processing an electronic message, said method comprising:
-
splitting an entire original message into an initial part and a remaining part, said initial part having a size based on a size threshold in a policy established at said server; transmitting, to said mobile communication device, said initial part; detecting, by said processor, receipt, from said mobile communication device, of a message processing request for encryption of a composite message, where said composite message includes a new message related to said original message and said entire original message, said message processing request including; said new message; a session key for use in said encryption; and a request to sign said composite message; creating, by said processor, said composite message from said new message and said entire original message; employing said session key to encrypt, by said processor, said composite message to form an encrypted composite message; generating a hash of said composite message; transmitting, to said mobile communication device, said hash; receiving a signature, where said signature comprises said hash signed at said mobile communication device using a private key; adding said signature to said composite message, thereby forming a signed encrypted composite message; transmitting, via a communication subsystem, said signed encrypted composite message; and providing, by the foregoing, maintenance of security considerations in view of bandwidth optimization measures. - View Dependent Claims (14, 15, 16)
-
-
17. A mail server associated with a mobile communication device, said mail server comprising a processor adapted to:
-
split an entire original message into an initial part and a remaining part, said initial part having a size based on a size threshold in a policy established at said server; transmit, to said mobile communication device, said initial part; detect receipt, from said mobile communication device, of a message processing request for encryption of a composite message, where said composite message includes a new message related to said original message and said entire original message, said message processing request including; said new message; a session key for use in said encryption; and a request to sign said composite message; create said composite message from said new message and said entire original message; employ said session key to encrypt said composite message to form an encrypted composite message; generate a hash of said composite message; transmit, to said mobile communication device, said hash; receive a signature, where said signature comprises said hash signed at said mobile communication device using a private key; add said signature to said composite message, thereby forming a signed encrypted composite message; arrange transmission of said signed encrypted composite message; and provide, by the foregoing, maintenance of security considerations in view of bandwidth optimization measures. - View Dependent Claims (18, 19, 20)
-
-
21. A non-transitory computer-readable medium containing computer-executable instructions that, when performed by a mail server associated with a mobile communication device, said mail server including a processor, said instructions causing said processor to:
-
split an entire original message into an initial part and a remaining part, said initial part having a size based on a size threshold in a policy established at said server; transmit, to said mobile communication device, said initial part; detect receipt, from said mobile communication device, of a message processing request for encryption and transmission of a composite message, where said composite message includes a new message related to said original message and original message, said message processing request including; said new message; a session key for use in said encryption; and a request to sign said composite message; create said composite message from said new message and said entire original message; employing said session key to encrypt said composite message to form an encrypted composite message; generate a hash of said composite message; transmit, to said mobile communication device, said hash; receive a signature, where said signature comprises said hash signed at said mobile communication device using a private key; add said signature to said composite message, thereby forming a signed encrypted composite message; arrange transmission of said signed encrypted composite message; and provide, by the foregoing, maintenance of security considerations in view of bandwidth optimization measures. - View Dependent Claims (22, 23, 24)
-
Specification