CA2579909A1 - System and method for determining a security encoding to be applied to outgoing messages - Google Patents
System and method for determining a security encoding to be applied to outgoing messages Download PDFInfo
- Publication number
- CA2579909A1 CA2579909A1 CA002579909A CA2579909A CA2579909A1 CA 2579909 A1 CA2579909 A1 CA 2579909A1 CA 002579909 A CA002579909 A CA 002579909A CA 2579909 A CA2579909 A CA 2579909A CA 2579909 A1 CA2579909 A1 CA 2579909A1
- Authority
- CA
- Canada
- Prior art keywords
- message
- security encoding
- encoding
- policy engine
- computing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/214—Monitoring or handling of messages using selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/58—Message adaptation for wireless communication
Abstract
A device comprising a processor is disclosed herein. In one broad aspect, the processor is configured to: determine whether a general message encoding configuration setting at the device is set to a first setting indicating that when a security encoding is to be applied to a message, the security encoding is to be established by a policy engine, wherein the established security encoding cannot be overridden by a security encoding selection algorithm at the device; and if the general message encoding configuration setting is set to the first setting, transmit the message to at least one message recipient via the policy engine such that the policy engine applies the security encoding to the message prior to the policy engine transmitting the message.
Claims (15)
1. A method of determining a security encoding to be applied to a message being sent by a user of a computing device, the method comprising the steps of:
a) identifying a message to be sent to at least one recipient;
b) determining, at the computing device, whether a general message encoding configuration setting thereon is set to a value that indicates that the security encoding to be applied to the identified message is to be established by a policy engine;
c) where the general message encoding configuration setting on the computing device is set to a value that indicates that the security encoding to be applied to the identified message is to be established by the policy engine, determining the security encoding to be applied to the identified message by querying the policy engine for the security encoding to be applied to the identified message;
d) applying the determined security encoding to the identified message; and e) transmitting the identified message to which the security encoding has been applied to the at least one recipient.
a) identifying a message to be sent to at least one recipient;
b) determining, at the computing device, whether a general message encoding configuration setting thereon is set to a value that indicates that the security encoding to be applied to the identified message is to be established by a policy engine;
c) where the general message encoding configuration setting on the computing device is set to a value that indicates that the security encoding to be applied to the identified message is to be established by the policy engine, determining the security encoding to be applied to the identified message by querying the policy engine for the security encoding to be applied to the identified message;
d) applying the determined security encoding to the identified message; and e) transmitting the identified message to which the security encoding has been applied to the at least one recipient.
2. The method of claim 1, wherein the policy engine resides on a device remote from the user's computing device.
3. The method of claim 1, wherein the policy engine is implemented in a PGP
Universal Server.
Universal Server.
4. The method of claim 1, further comprising the step of determining the security encoding to be applied to the identified message from a user-selected security encoding where the general message encoding configuration setting on the computing device is not set to a value that indicates that the security encoding to be applied to the identified message is to be established by the policy engine,
5. The method of claim 1, further comprising the step of determining the security encoding to be applied to the identified message in accordance with a security encoding selection algorithm where the general message encoding configuration setting on the computing device is not set to a value that indicates that the security encoding to be applied to the identified message is to be established by the policy engine.
6. The method of claim 5, wherein the identified message is derived from a message previously received by the user, and wherein the security encoding selection algorithm requires that the same security encoding to be applied to the identified message as the security encoding applied to the message previously received by the user.
7. The method of claim 5, wherein the security encoding selection algorithm requires that the security encoding to be applied to the message be determined based on the identity of one or more of the at least one recipient and the data in a recipient cache.
8. The method of claim 1, further comprising the step of determining the security encoding to be applied to the identified message in accordance with a specific security encoding configured as a default security encoding at the computing device where the general message encoding configuration setting on the computing device is not set to a value that indicates that the security encoding to be applied to the identified message is to be established by the policy engine.
9. The method of claim 1, wherein the applying of a security encoding for the message comprises one of: encrypting the message; signing the message;
encrypting and signing the message; neither encrypting nor signing the message.
encrypting and signing the message; neither encrypting nor signing the message.
10. The method of claim 1, wherein the computing device is one of: a desktop computer; a mobile device.
11. A computer-readable medium upon which a plurality of instructions are stored, the instructions for performing a method of determining a security encoding to be applied to a message being sent by a user of a computing device as claimed in claim 1.
12. A system for determining a security encoding to be applied to a message being sent by a user of a computing device, wherein the system comprises a policy engine connected to the computing device, and wherein the steps of the method as claimed in claim 1 are performed by the system.
13. The system of claim 12, wherein the policy engine resides on a device remote from the user's computing device.
14. The system of claim 12, wherein the policy engine is implemented in a PGP
Universal Server.
Universal Server.
15. The system of claim 12, wherein steps d) and e) of the method are performed by the policy engine.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US68605005P | 2005-06-01 | 2005-06-01 | |
US60/686,050 | 2005-06-01 | ||
PCT/CA2005/001664 WO2006128273A1 (en) | 2005-06-01 | 2005-10-31 | System and method for determining a security encoding to be applied to outgoing messages |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2579909A1 true CA2579909A1 (en) | 2006-12-07 |
CA2579909C CA2579909C (en) | 2011-10-04 |
Family
ID=37481170
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2579909A Active CA2579909C (en) | 2005-06-01 | 2005-10-31 | System and method for determining a security encoding to be applied to outgoing messages |
Country Status (7)
Country | Link |
---|---|
US (4) | US7640575B2 (en) |
EP (1) | EP1790113B1 (en) |
CN (1) | CN101027869B (en) |
AT (1) | ATE446629T1 (en) |
CA (1) | CA2579909C (en) |
DE (1) | DE602005017291D1 (en) |
WO (1) | WO2006128273A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8370896B2 (en) | 2005-06-01 | 2013-02-05 | Research In Motion Limited | System and method for determining a security encoding to be applied to outgoing messages |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8078740B2 (en) | 2005-06-03 | 2011-12-13 | Microsoft Corporation | Running internet applications with low rights |
US8185737B2 (en) | 2006-06-23 | 2012-05-22 | Microsoft Corporation | Communication across domains |
US20080083009A1 (en) * | 2006-09-29 | 2008-04-03 | Microsoft Corporation | Policy fault |
CN101641935B (en) * | 2007-01-08 | 2012-11-14 | S&C电力公司 | Power distribution system secure access communication system and method |
US20090183227A1 (en) * | 2008-01-11 | 2009-07-16 | Microsoft Corporation | Secure Runtime Execution of Web Script Content on a Client |
US8407335B1 (en) * | 2008-06-18 | 2013-03-26 | Alert Logic, Inc. | Log message archiving and processing using a remote internet infrastructure |
US20100020972A1 (en) * | 2008-07-22 | 2010-01-28 | Ernest Samuel Baugher | Wireless mobile device that permits toggling of whether to transmit information contained in SMS messages as encrypted or clear text |
US8275991B2 (en) * | 2009-07-10 | 2012-09-25 | Cahn Robert S | On-line membership verification |
US8879732B2 (en) * | 2010-10-13 | 2014-11-04 | Nokia Corporation | Dynamic content-based ciphering on a control channel |
AU2014332244A1 (en) * | 2013-10-07 | 2016-05-05 | Fornetix Llc | System and method for encryption key management, federation and distribution |
US10740746B2 (en) * | 2014-09-09 | 2020-08-11 | Sony Corporation | Secure NFC forwarding from a mobile terminal through an electronic accessory |
US20160241530A1 (en) * | 2015-02-12 | 2016-08-18 | Vonage Network Llc | Systems and methods for managing access to message content |
CN105429948B (en) * | 2015-10-28 | 2018-12-25 | 东莞酷派软件技术有限公司 | It is a kind of danger account recognition methods and device |
US11196892B2 (en) * | 2019-05-30 | 2021-12-07 | Microsoft Technology Licensing, Llc | Use of client compute for document processing |
WO2020242794A1 (en) | 2019-05-30 | 2020-12-03 | Microsoft Technology Licensing, Llc | Information barriers for sensitive information |
US11968188B2 (en) * | 2021-12-16 | 2024-04-23 | Bank Of America Corporation | Secure email transmission via treasury portal |
CN116033295B (en) * | 2022-11-11 | 2023-12-29 | 国家电网有限公司 | Communication processing system based on electric power mobile operation terminal |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB8918553D0 (en) | 1989-08-15 | 1989-09-27 | Digital Equipment Int | Message control system |
US5748735A (en) * | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
CZ11597A3 (en) * | 1994-07-19 | 1997-09-17 | Bankers Trust Co | Method of safe use of digital designation in a commercial coding system |
US5659615A (en) * | 1994-11-14 | 1997-08-19 | Hughes Electronics | Secure satellite receive-only local area network with address filter |
JPH1011509A (en) | 1996-06-26 | 1998-01-16 | Wacom Co Ltd | Electronic document security system, electronic stamping security system and electronic signature security system |
US6072942A (en) * | 1996-09-18 | 2000-06-06 | Secure Computing Corporation | System and method of electronic mail filtering using interconnected nodes |
US5983350A (en) * | 1996-09-18 | 1999-11-09 | Secure Computing Corporation | Secure firewall supporting different levels of authentication based on address or encryption status |
US6609196B1 (en) * | 1997-07-24 | 2003-08-19 | Tumbleweed Communications Corp. | E-mail firewall with stored key encryption/decryption |
US5999932A (en) * | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing |
US6732273B1 (en) | 1998-10-21 | 2004-05-04 | Lucent Technologies Inc. | Priority and security coding system for electronic mail messages |
US6760752B1 (en) * | 1999-06-28 | 2004-07-06 | Zix Corporation | Secure transmission system |
JP2001057551A (en) * | 1999-08-18 | 2001-02-27 | Nec Corp | Encryption communication system and encryption communication method |
US7069580B1 (en) * | 2000-06-16 | 2006-06-27 | Fisher-Rosemount Systems, Inc. | Function-based process control verification and security in a process control system |
CA2450601C (en) * | 2001-06-12 | 2012-10-16 | Research In Motion Limited | System and method for compressing secure e-mail for exchange with a mobile data communication device |
US7290141B2 (en) * | 2002-06-27 | 2007-10-30 | Nokia, Inc. | Authentication of remotely originating network messages |
JP4646913B2 (en) | 2003-08-12 | 2011-03-09 | リサーチ イン モーション リミテッド | System and method for indicating the strength of encryption |
US7266847B2 (en) * | 2003-09-25 | 2007-09-04 | Voltage Security, Inc. | Secure message system with remote decryption service |
CN1315350C (en) * | 2003-11-06 | 2007-05-09 | 惠州Tcl移动通信有限公司 | A method for improving handset short message security and handset implementing the same method |
US7640575B2 (en) * | 2005-06-01 | 2009-12-29 | Research In Motion Limited | System and method for determining a security encoding to be applied to outgoing messages |
-
2005
- 2005-10-31 US US11/261,701 patent/US7640575B2/en active Active
- 2005-10-31 DE DE602005017291T patent/DE602005017291D1/en active Active
- 2005-10-31 EP EP05850121A patent/EP1790113B1/en active Active
- 2005-10-31 CA CA2579909A patent/CA2579909C/en active Active
- 2005-10-31 AT AT05850121T patent/ATE446629T1/en not_active IP Right Cessation
- 2005-10-31 WO PCT/CA2005/001664 patent/WO2006128273A1/en not_active Application Discontinuation
- 2005-10-31 CN CN2005800327008A patent/CN101027869B/en active Active
-
2009
- 2009-12-22 US US12/644,889 patent/US8099759B2/en active Active
-
2011
- 2011-12-13 US US13/324,180 patent/US8370896B2/en active Active
-
2012
- 2012-12-28 US US13/729,123 patent/US8689286B2/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8370896B2 (en) | 2005-06-01 | 2013-02-05 | Research In Motion Limited | System and method for determining a security encoding to be applied to outgoing messages |
US8689286B2 (en) | 2005-06-01 | 2014-04-01 | Blackberry Limited | System and method for determining a security encoding to be applied to outgoing messages |
Also Published As
Publication number | Publication date |
---|---|
US8689286B2 (en) | 2014-04-01 |
CA2579909C (en) | 2011-10-04 |
US20120137341A1 (en) | 2012-05-31 |
WO2006128273A1 (en) | 2006-12-07 |
US8099759B2 (en) | 2012-01-17 |
ATE446629T1 (en) | 2009-11-15 |
DE602005017291D1 (en) | 2009-12-03 |
EP1790113B1 (en) | 2009-10-21 |
US7640575B2 (en) | 2009-12-29 |
US20060277592A1 (en) | 2006-12-07 |
EP1790113A4 (en) | 2007-10-17 |
US8370896B2 (en) | 2013-02-05 |
EP1790113A1 (en) | 2007-05-30 |
CN101027869A (en) | 2007-08-29 |
US20130167194A1 (en) | 2013-06-27 |
CN101027869B (en) | 2011-11-30 |
US20100100932A1 (en) | 2010-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2579909A1 (en) | System and method for determining a security encoding to be applied to outgoing messages | |
WO2018014723A1 (en) | Key management method, apparatus, device and system | |
US10230524B2 (en) | Securely transferring user information between applications | |
US20160197894A1 (en) | Method of generating a deniable encrypted communications via password entry | |
JP2018160919A (en) | Data security using request-supplied keys | |
US10567357B2 (en) | Secure transmission system with upgraded encryption strength | |
CN111130803B (en) | Method, system and device for digital signature | |
US9961056B2 (en) | Method of deniable encrypted communications | |
US8997179B2 (en) | Shared secret identification for secure communication | |
MXPA03010476A (en) | System and method for transmitting reduced information from a certificate to perform encryption operations. | |
US10075469B1 (en) | Assured encrypted delivery | |
WO2007062086A3 (en) | Domain name system security network | |
JP6289680B2 (en) | Packet transmission device, packet reception device, packet transmission program, and packet reception program | |
KR20140100989A (en) | Anonymous friend-making method, system, network server and storage medium | |
WO2006028488A3 (en) | Authentication of users and computer systems | |
WO2020164526A1 (en) | Control method for nodes in distributed system and related device | |
WO2020037577A1 (en) | Communication channel encrypting, decrypting, and establishing methods and apparatuses, memory, and terminal | |
US11595188B2 (en) | Method for storing a data file | |
CN103731423A (en) | Safe method for repeated data deleting | |
US20100169638A1 (en) | Communication system having message encryption | |
US9654455B2 (en) | Communication system, communication device, key management apparatus, and communication method | |
CN115001841A (en) | Identity authentication method, identity authentication device and storage medium | |
US10785025B1 (en) | Synchronization of key management services with cloud services | |
US9548969B2 (en) | Encryption/decryption method, system and device | |
CN105556890A (en) | Cryptographic processing method, cryptographic system, and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |