US20130191633A1 - System and method for supporting multiple certificate status providers on a mobile communication device - Google Patents
System and method for supporting multiple certificate status providers on a mobile communication device Download PDFInfo
- Publication number
- US20130191633A1 US20130191633A1 US13/792,785 US201313792785A US2013191633A1 US 20130191633 A1 US20130191633 A1 US 20130191633A1 US 201313792785 A US201313792785 A US 201313792785A US 2013191633 A1 US2013191633 A1 US 2013191633A1
- Authority
- US
- United States
- Prior art keywords
- status information
- digital certificate
- mobile device
- request
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/66—Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Definitions
- This invention relates generally to the field of secure electronic messaging and in particular to checking the status of digital certificates.
- Known secure messaging clients including, for example, e-mail software applications operating on desktop computer systems, maintain a data store, or at least a dedicated data storage area, for secure messaging information such as digital certificates.
- a digital certificate normally includes the public key of an entity as well as identity information that is bound to the public key with one or more digital signatures.
- S/MIME Secure Multipurpose Internet Mail Extensions
- a public key is used to verify a digital signature on a received secure message and to encrypt a session key that was used to encrypt a message to be sent.
- public keys may be used to encrypt data or messages. If a public key is not available at the messaging client when required for encryption or digital signature verification, then the digital certificate, or at least the public key, must be loaded onto the messaging client before these operations can be performed.
- a digital certificate is checked against a Certificate Revocation List (CRL) to determine if the digital certificate has been revoked by its issuer.
- CRL Certificate Revocation List
- This check is typically performed when a digital certificate is first received and periodically thereafter, for example when a new CRL is received.
- CRLs tend to be relatively bulky, so that transfer of CRLs to messaging clients consume considerable communication resources, and storage of CRLs at a messaging client may consume significant memory space.
- CRL-based revocation status checks are also processor-intensive and time consuming. These effects can be particularly pronounced in messaging clients operating on wireless mobile communication devices, which operate within bandwidth-limited wireless communication networks and may have limited processing and memory resources.
- revocation status is updated in CRL-based systems only when a new CRL is distributed.
- Another scheme for digital certificate revocation status checking involves querying remote systems which maintain digital certificate revocation status information.
- a difficulty with this scheme is that it requires a separate request-response exchange for each remote system to be queried. These exchanges may cause significant time delays and consume significant amounts of available communication bandwidth, particularly for secure messaging clients operating on wireless mobile communication devices.
- Digital certificate validity checks may similarly be processor intensive and time consuming for messaging clients operating on constrained devices. Digital certificate validity checks may similarly be performed by remote systems and may be useful for such devices, but as described above, typical schemes are not particularly suitable when multiple remote systems are to be queried.
- a method of accessing multiple digital certificate status information providers to obtain digital certificate status information comprises the steps of receiving a request for digital certificate status information from a communication device, generating multiple service requests based upon the received request, each of the multiple service requests corresponding to a digital certificate status information provider, sending the generated multiple service requests to their corresponding digital certificate status information providers, receiving a response comprising digital certificate status information from at least one of the digital certificate status information providers, generating a response to the request for digital certificate status information using at least a portion of the received digital certificate status information, and sending the generated response to the request to the communication device.
- An apparatus for accessing multiple digital certificate status information providers to obtain digital certificate status information for a communication device comprises means for receiving a request regarding digital certificate status information from the communication device, means for generating multiple service requests based upon the received request, each generated service request corresponding to a digital certificate status information provider, means for sending the generated multiple service requests to their corresponding status information providers over a computer network, and means for receiving over a computer network a response containing digital certificate status information from at least one of the status information providers, wherein at least a portion of the received digital certificate status information is used in providing a status information response to the communication device.
- FIG. 1 is a block diagram of a messaging system
- FIG. 2 is a block diagram illustrating a secure e-mail message exchange in a messaging system.
- FIG. 3 is a block diagram of a system which supports multiple digital certificate status information providers.
- FIG. 4 is a flow diagram illustrating a method of supporting multiple digital certificate status information providers.
- FIG. 5 is a block diagram of a system having multiple proxy system client modules which support multiple digital certificate status information providers.
- FIG. 6 is a block diagram of a wireless mobile communication device.
- FIG. 7 is a block diagram illustrating a multiple messaging scheme utilizing an intermediate computer system.
- FIG. 8 is a block diagram showing an example communication system.
- FIG. 9 is a block diagram of an alternative example communication system.
- FIG. 10 is a block diagram of another alternative communication system.
- a secure message is a message that has been processed by a message sender, or possibly by an intermediate system between a message sender and a message receiver, to ensure one or more of data confidentiality, data integrity and user authentication.
- Common techniques for secure messaging include signing a message with a digital signature and/or encrypting a message.
- a secure message may be a message that has been signed, or encrypted, or encrypted and then signed, or signed and then encrypted according to variants of Secure Multipurpose Internet Mail Extensions (S/MIME).
- S/MIME Secure Multipurpose Internet Mail Extensions
- a messaging client allows a system on which it operates to receive and possibly also send messages, Messaging clients may operate on a computer system, a handheld device, or any other system or device with communications capabilities. Many messaging clients also have additional non-messaging functions.
- FIG. 1 is a block diagram of an exemplary messaging system. There are many different messaging system topologies, and the system shown in FIG. 1 is but one of many that may be used with the systems and methods disclosed herein.
- the system 10 includes a Wide Area Network (WAN) 12 , coupled to a computer system 14 , a wireless network gateway 16 and a corporate Local Area Network (LAN) 18 .
- the wireless network gateway 16 is also connected to a wireless communication network 20 in which a wireless mobile communication device 22 (“mobile device”), is configured to operate.
- a wireless mobile communication device 22 (“mobile device”)
- An exemplary mobile device 22 may be of the type disclosed in U.S. Pat. No, 6,278,442, entitled “HAND-HELD ELECTRONIC DEVICE WITH A KEYBOARD OPTIMIZED FOR USE WITH THE THUMBS,” the entire disclosure of which is incorporated herein by reference.
- the computer system 14 represents a desktop or laptop PC that is configured for connection to the WAN 12 .
- the WAN 12 can be a private network, or a larger publicly accessible network, such as the Internet.
- PCs such as the computer system 14 normally access the Internet through an Internet Service Provider (ISP), Application Service Provider (ASP) or the like.
- ISP Internet Service Provider
- ASP Application Service Provider
- the corporate LAN 18 is an example of a network-based messaging client. As shown, a corporate LAN 18 is normally located behind a security firewall 24 . Within the corporate LAN 30 is a message server 26 , running on a computer within the firewall 24 , that functions as the main interface for the corporation to exchange messages both within the LAN 18 and with other external messaging clients via the WAN 20 . Two of the most common message servers 26 are the MicrosoftTM Exchange and Lotus DominoTM server products. These servers are often used in conjunction with Internet mail routers that route and deliver mail. A message server 26 may extend beyond just message sending and receiving, providing such functionality as dynamic database storage engines that have predefined database formats for data like calendars, to-do lists, task lists, e-mail and documentation.
- the message server 26 provides messaging capabilities to one or more network computer systems 28 in the LAN 18 .
- a typical LAN includes multiple computer systems shown generally as computer systems 28 , each of which implements a messaging client, most often as a software application such as Microsoft OutlookTM, for messaging functions.
- messages are received by the message server 26 , distributed to the appropriate mailboxes for user accounts addressed in the received message, and can be accessed by a user through a computer in the one or more computer systems 28 .
- messaging clients in the LAN 18 operate on the computer systems 28 , there are also known messaging clients that operate in conjunction with handheld devices and other systems or devices with electronic messaging capabilities.
- a messaging client may also have additional non-messaging functions.
- the wireless network gateway 16 provides an interface to a wireless network 20 , through which messages may be exchanged with a mobile device 22 . Such functions as addressing of a mobile device 22 , encoding or otherwise transforming messages for wireless transmission, and any other required interface functions are performed by the wireless network gateway 16 . Where the wireless network gateway 16 is configured for operation in conjunction with more than one wireless network 20 , the wireless network gateway 16 may also determine a most likely network for locating a given user and track users as they roam between countries or networks.
- Any computer system with access to the WAN 12 may exchange messages with a mobile device 22 through the wireless network gateway 16 .
- private wireless network gateways such as wireless Virtual Private Network (VPN) routers could also be implemented to provide a private interface to a wireless network such as 20 .
- VPN Virtual Private Network
- a wireless VPN implemented in the LAN 18 provides a private interface from the LAN 18 to one or more mobile devices through the wireless network 20 .
- Such a private interface to wireless devices via the wireless network gateway 16 and/or the wireless network 20 can effectively be extended to entities outside the LAN 18 by providing a message forwarding or redirection system which operates with the message server 26 .
- incoming messages received by the message server 26 and addressed to a user that has a mobile device 22 are redirected through the wireless network interface, either a wireless VPN router, the gateway 16 or another interface, for example, to the wireless network 20 and to the user's mobile device 22 .
- An exemplary redirector system operating on the message server 26 may be of the type disclosed in U.S. Pat. No.
- wireless networks such as 20
- messages are normally delivered to and from mobile devices such as the mobile device 22 via RF transmissions between base stations in the wireless network 20 and mobile devices.
- Modern wireless networks typically serve thousands of subscribers, each subscriber having a mobile device.
- the wireless network 20 may be one of many different types of wireless network, such as a data-centric wireless network, a voice-centric wireless network or and a dual-mode networks that can support both voice and data communications over the same physical base stations.
- Dual-mode networks include, but are not limited to recently-developed Code Division Multiple Access (COMA) networks, the Groupe Special Mobile or the Global System for Mobile Communications (GSM) and the General Packet Radio Service (GPRS), and future third-generation (3G) networks like Enhanced Data rates for Global Evolution (EDGE) and Universal Mobile Telecommunications Systems (UMTS).
- GPRS is a data overlay on the GSM wireless network, operating in virtually every country in Europe.
- other wireless networks may also be used.
- data-centric networks include, but are not limited to the MobitexTM Radio Network (“Mobitex”) and the DataTACTTM Radio Network (“DataTAC”).
- Mobitex MobitexTM Radio Network
- DataTAC DataTACTTM Radio Network
- Examples of older voice-centric data networks include Personal Communication Systems (PCS) networks like CDMA, GSM, and Time Division Multiple Access (TDMA).
- PCS Personal Communication Systems
- TDMA Time Division Multiple Access
- the mobile device 22 may be a data communication device, a voice communication device, or a multiple-mode device capable of voice, data and other types of communications.
- An exemplary mobile device 22 is described in further detail below and with reference to FIG. 6 .
- an e-mail message is sent by an e-mail sender, possibly through a message server and/or a service provider system, and typically routed through the Internet to one or more message receivers.
- E-mail messages are normally sent unencrypted and use traditional Simple Mail Transfer Protocol (SMTP), RFC822 headers and MIME body parts to define the format of the e-mail message.
- SMTP Simple Mail Transfer Protocol
- RFC822 headers RFC822 headers and MIME body parts
- S/MIME and Pretty Good PrivacyTM are two public key secure e-mail messaging protocols that provide for both encryption, to protect data content, and signing, which both protects the integrity of a message and provides for sender authentication by a message receiver.
- Secure messages may also be encoded, compressed or otherwise processed in addition to being encrypted and/or signed.
- FIG. 2 is a block diagram illustrating a secure e-mail message exchange in a messaging system.
- the system includes an e-mail sender 30 , coupled to a WAN 32 and a wireless gateway 34 , which provides an interface between the WAN 32 and a wireless network 36 .
- a mobile device 38 is adapted to operate within the wireless network 36 .
- digital certificate status information providers 35 and 37 and a proxy system 39 are also shown in FIG. 2 , both coupled to the WAN 32 .
- the e-mail sender 30 may be a PC, such as the system 14 in FIG. 1 , or may be a network-connected computer, such as a computer system 28 in FIG. 1 .
- the e-mail sender 30 may also be another mobile device on which e-mail messages may be composed and sent.
- the WAN 32 , the wireless gateway 34 , the wireless network 36 , and the mobile device 38 are substantially the same as similarly labelled components in FIG. 1 .
- a message is encrypted using a one-time session key chosen by the e-mail sender 30 .
- the session key is used to encrypt the message body and is then itself encrypted using the public key of each addressed message receiver to which the message is to be sent.
- a message encrypted in this way includes an encrypted message body 44 and an encrypted session key 46 .
- a message sender such as e-mail sender 30 must have access to the public key of each entity to which an encrypted message is to be sent.
- a secure e-mail message sender such as 30 normally signs a message by taking a digest of the message and signing the digest using the sender's private key.
- a digest may for example, be generated by performing a check-sum, a Cyclic Redundancy Check (CRC), a digest algorithm such as Message Digest Algorithm 5 (MD5), a hash algorithm such as Secure Hashing Algorithm 1 (SHA-1), or some other preferably non-reversible operation on the message.
- CRC Cyclic Redundancy Check
- MD5 Message Digest Algorithm 5
- MD5 Message Digest Algorithm 5
- SHA-1 Secure Hashing Algorithm 1
- the signature private key is used for example to perform an encryption or other transformation operation on the digest to generate the digest signature.
- a digital signature including the digest and the digest signature, is then appended to the outgoing message, as shown at 42 .
- a digital certificate of the sender which includes the sender's public key and sender identity information that is bound to the public key with one or more digital signatures, and possibly any chained digital certificates and CRLs associated with the sender's digital certificate and any chained digital certificates, may also be attached to the secure message 40 .
- the secure e-mail message 40 sent by the e-mail sender 30 includes the digital signature 42 , as well as the encrypted message body 44 and the encrypted session key 46 , both of which are signed.
- digital certificates, CRLs and digital signatures are normally placed at the beginning of a message, and the message body is included in a file attachment.
- message components may place message components in a different order than shown or include additional and/or different components.
- a secure message such as 40 may include addressing information, such as “To:” and “From:” email addresses, and other header information.
- the secure e-mail message 40 When the secure e-mail message 40 is sent from the e-mail sender 30 , it is routed through the WAN 32 to the wireless network 36 and the mobile device 38 .
- the transmission path between the e-mail sender 30 and the mobile device 38 may also include additional or different components than those shown in FIG. 2 .
- the secure e-mail message 40 may be addressed to a mailbox or data store associated with a message server or data server which has been wirelessly enabled to forward or send received messages and data to the mobile device 38 .
- Further intermediate systems may also store and/or route the secure message to the mobile device 38 .
- the exemplary system as previously described and as disclosed in U.S. Pat. No. 6,219,694 is an example of one such system.
- the secure message 40 maybe routed or forwarded to the mobile device 38 through other transport mechanisms than the wireless gateway 34 .
- routing to the wireless network 36 may be accomplished using a wireless VPN router associated with the e-mail sender 30 , or, in the case of a message being received at an intermediate computer system or server and then forwarded to the mobile device 38 , with the computer system or server.
- the mobile device 38 may verify the digital signature 42 .
- the mobile device 38 uses a digital signature check algorithm corresponding to the signature generation algorithm used by the message sender, which may be specified in a message header or in the digital signature 42 , and the sender's public key. If a secure message includes the sender's digital certificate, then the sender's public key may be extracted from the digital certificate.
- the sender's public key may instead be retrieved from a local store, for example, where the public key was extracted from an earlier message from the sender and stored in a key store in the receivers local store or the sender's digital certificate is stored in the local store, or from a Public Key Server (PKS).
- PKS is a server that is normally associated with a Certificate Authority (CA) from which a digital certificate for an entity, including the entity's public key, is available.
- a PKS might reside within a corporate LAN such as LAN 18 of FIG. 1 , or anywhere on the WAN 32 , Internet or other network or system through which message receivers may establish communications with the PKS.
- the encrypted message body 44 is then decrypted before it can be displayed or further processed by a receiving messaging client operating on the mobile device 38 in FIG. 2 .
- a receiving messaging client uses its private key to decrypt the encrypted session key 46 and then uses the decrypted session key to decrypt the encrypted message body 44 and thereby recover the original message.
- an entity may have more than one associated cryptographic key pair, such as a signature private/public key pair and an encryption private/public key pair.
- the mobile device 38 may use one private key to decrypt the encrypted message body 44 , and a different private key to digitally sign an outgoing secure message.
- An encrypted message that is addressed to more than one receiver includes an encrypted version of the session key, for each receiver, that was encrypted using the public key of the receiver.
- Each receiver performs the same digital signature verification operations, but decrypts a different one of the encrypted session keys using its own private key.
- a sending messaging client should have access to the public key of any receiver to which an encrypted message is to be sent.
- a receiving messaging client should be able to retrieve the senders public key, which may be available to a messaging client through various mechanisms, in order to verify a digital signature in a signed message.
- the mobile device 38 is a receiver of the secure message 40 , the mobile device 38 may be enabled for two-way communications, and may therefore access public keys for both message sending and message receiving operations.
- Public keys are commonly provided in digital certificates.
- a digital certificate for any particular entity typically includes the entity's public key and identification information that is bound to the public key with a digital signature.
- Several types of digital certificates are currently in widespread use, including for example X.509 digital certificates which are typically used in S/MIME.
- PGP uses digital certificates with a slightly different format. Systems and methods discussed herein may be used with any of these types of digital certificate, as well as other types of digital certificates, both currently known types as well as others that may be developed in the future.
- the digital signature in a digital certificate is generated by the issuer of the digital certificate, and can be checked by a message receiver substantially as described above.
- a digital certificate sometimes includes an expiry time or validity period from which a messaging client may determine if the digital certificate has expired. Verification of the validity of a digital certificate may also involve tracing a certification path through a digital certificate chain, which includes a user's digital certificate as well as other digital certificates to verity that the user's digital certificate is authentic.
- a digital certificate may also be checked to ensure that it has not been revoked.
- digital certificate revocation status may be checked by consulting a CRL or by requesting digital certificate status information from a digital certificate revocation status information source.
- a user of the mobile device 38 may submit a revocation status request for any digital certificate stored at the mobile device 38 to one of the status information providers 35 and 37 .
- the provider 35 or 37 then returns revocation status information for that digital certificate to the mobile device 38 .
- a separate request is sent to each status provider.
- OCSP Online Certificate Status Protocol
- IETF Internet Engineering Task Force
- a request is submitted to a status information provider, generally referred to as an OCSP responder.
- an OCSP responder Upon receipt of a properly formatted request, an OCSP responder returns a response to the requestor.
- An OCSP request includes at least an OCSP protocol version number, a service request, and an identification of a target digital certificate to which the request is related.
- the version number identifies the version of OCSP with which the request complies.
- the service request specifies the type of service being requested.
- OCSP version 2 Online Revocation Status (ORS), Delegated Path Validation (DPV) and Delegated Path Discovery (DPD) services have been defined.
- ORS Online Revocation Status
- DPV Delegated Path Validation
- DPD Delegated Path Discovery
- target digital certificate information in an OCSP request includes a hash algorithm identifier, a hash of the ON of the digital certificate issuer generated using the hash algorithm, a hash of the issuer's public key, also generated using the hash algorithm, and the serial number of the target digital certificate.
- the request may or may not be signed by a requester. Further optional information may also be included in a request and processed by an OCSP responder.
- OCSP may be desirable in that it reduces the processing and memory resources necessary to check revocation status of a digital certificate relative to CRL-based revocation status checking.
- OCSP requests can be relatively long and thereby consume limited wireless communication resources. Request overhead can be particularly large when requests are submitted to more than one status provider, for example when an error message is returned in response to a request to a status provider.
- the proxy system 39 in conjunction with an appropriately enabled mobile device 38 , or possibly any other system on which a messaging client operates, may be used to optimize OCSP and similar protocols for multiple remote systems, as described in further detail below.
- FIG. 3 is a block diagram of a system which supports multiple digital certificate status information providers.
- the mobile device 38 includes a memory 52 , a messaging system 60 , a proxy system client module 62 , a user interface (UI) 64 , and a wireless transceiver 65 .
- the memory 52 includes a storage area for a digital certificate store 54 , as well as data stores such as an address book 56 in which messaging contact information is stored, and an application data store 58 which stores data associated with software applications on the mobile device 38 .
- Data stores 56 and 58 are illustrative examples of stores that may be implemented in a memory 52 on mobile device 38 .
- the memory 52 may also be used by other device systems in addition to those shown in FIG. 3 to store other types of data.
- the memory 52 is illustratively a writable store such as a RAM into which other device components may write data.
- the digital certificate store 54 is a storage area that is dedicated to storage of digital certificates on the mobile device 38 .
- Digital certificates may be stored in the digital certificate store 54 in the format in which they are received, or may alternatively be parsed or otherwise translated into a storage format before being written to the store 54 .
- the messaging system 60 is connected to the wireless transceiver 65 and is thus enabled for communications via a wireless network.
- the messaging system 60 may be a messaging client embodied in a software application.
- the proxy system client module 62 which may be implemented as a software application or component, may be coupled to the messaging system 60 , the digital certificate store 54 , and the mobile device's UI 64 , as shown. Revocation status for any of the digital certificates stored in the digital certificate store 54 , or those received by the messaging system 60 but not yet stored in the digital certificate store 54 , may be checked using the proxy system client module 62 .
- the UI 64 may include such UI components as a keyboard or keypad, a display, or other components which accept inputs from or provide outputs to a user of the mobile device 38 . Although shown as a single block in FIG. 3 , a mobile device 38 typically includes more than one UI, and the UI 64 therefore represents one or more user interfaces.
- the wireless network 36 , the wireless gateway 34 , the WAN 32 , and the status information providers 35 and 37 are substantially the same as similarly-labelled components in FIG. 2 .
- the proxy system 39 includes a proxy system service module or component 68 and status provider client modules 66 and 67 .
- the proxy system service component 68 is configured to exchange information with the proxy system client module 62
- the status provider client modules 66 and 67 are respectively adapted to exchange information with the status information providers 35 and 37 .
- the status provider client modules 66 and 67 and the proxy system service module 68 are preferably software applications or modules operating at the proxy system 39 . These software applications may be a single program, or may alternatively be separate programs executed independently.
- the messaging system 60 on the mobile device 38 receives and possibly sends secure messages via the wireless network 36 as described above.
- the messaging system 60 may retrieve a public key for an entity (i.e., a sender of a received message or a recipient of a message to be sent) from a digital certificate or a key store on the mobile device 38 .
- a public key for an entity (i.e., a sender of a received message or a recipient of a message to be sent) from a digital certificate or a key store on the mobile device 38 .
- the messaging system 60 or a user thereof may wish to check that a digital certificate containing the public key is valid and has not been revoked.
- Digital certificate checking operations may be performed automatically, when a digital certificate is received, for example, periodically, at predetermined or user-configurable intervals, or when invoked by a user through a UI 64 .
- Different types of digital certificate checking operations may also be dependent upon different controls. For instance, where the validity and revocation status of a digital certificate is checked when the digital certificate is first loaded onto the mobile device 38 , the digital certificate may be assumed to be valid until an expiry time or during a validity period specified in the digital certificate. However, its revocation status may thereafter be checked once every week.
- the proxy system client module 62 and service module 68 are preferably adapted to gather digital certificate status request information which is used to request status information for a digital certificate from all known status information providers.
- the proxy system client module 62 When a user of the mobile device 38 wishes to check the revocation status of a digital certificate, for example, the proxy system client module 62 , or possibly a software application which operates in conjunction with the proxy system client module 62 , may be invoked, by entering an appropriate command on a UI 64 such as a keyboard. The user may also specify the particular digital certificate to be checked, for instance using the serial number or subject name of the digital certificate. Alternatively, the proxy system client module 62 may access the digital certificate store 54 to display to the user a list of currently stored digital certificates, from which the user may select one or more digital certificates to be checked.
- the proxy system client module 62 then preferably either extracts from the selected digital certificates) or obtains from the user through a UI 64 , any information required by the proxy system service module 68 for a digital certificate revocation status check. Since the proxy system 39 provides an interface between the mobile device 38 and the status information providers 35 and 37 , requests and responses between the proxy system client module 62 and proxy system service module 68 need not conform to the protocol used between the status provider client modules 66 and 67 and the respective status information providers 35 and 37 . Therefore, although the status providers 35 and 37 and client modules 66 and 67 may support OCSP or a similar protocol, the proxy system service module 68 and client module 62 may support a more compact protocol involving less data exchange.
- the particular information extracted or obtained by the proxy system client module 62 is dependent upon the communication protocol implemented between the proxy system client module 62 and service module 68 .
- the proxy system client module 62 can preferably extract a digital certificate subject name, serial number, issuer name, and other digital certificate information from a digital certificate in the digital certificate store 54 . If digital certificates are first parsed and then parsed data is stored in the digital certificate store 54 , then such information may be extracted from the parsed data in the digital certificate store 54 by the proxy system client module 62 . If further information is required, a user may be prompted to enter the information.
- the status provider client modules 66 and 67 may format requests for the status information providers 35 and 37 based on only a serial number or subject name received by the proxy system service module 68 from the proxy system client module 62 .
- the proxy system client module 62 preferably gathers all information that is required for requests to any of the status information providers 35 and 37 .
- a request is formatted and sent to the proxy system service module 68 .
- the content of this request is also dependent upon the communication protocol used between the proxy system service module 68 and client module 62 . If more than one type of service is supported, then the request may specify which type of service is requested. In some implementations, only a single service may be supported, such that no service type need be specified.
- Information received by the proxy system service module 68 is preferably passed to each status provider client module 66 and 67 . This information is then used by the status provider client modules 66 and 67 to format a request for the respective status information providers 35 and 37 . If the revocation status information providers 35 and 37 and status provider client modules 66 and 67 support OCSP for example, information provided by the proxy system service module 68 , as well as any further required information, are formatted into an OCSP requests. In some cases, the information provided by the proxy system service module 68 may include all required information, whereas in other cases, further information may be extracted from other sources, such as the above example mapping table and included in the requests to the status information providers 35 and 37 .
- each provider may extract or use different information provided in the initial service request received by the proxy system service module 68 .
- the provider client module 66 requires only a subset of the information required by the provider client module 67
- each status provider client module 66 , 67 preferably extracts the information it requires from the initial request or retrieves the information it requires from the initial request, or from a version of the initial request, or parsed data extracted therefrom, stored to a data store at the proxy system 39 .
- the proxy system service module 68 is configured to pass any required information to each provider client module 66 and 67 .
- the length of the initial request may then be further reduced by configuring the proxy system client module 62 to include any information required by the provider client modules 66 and 67 in the initial request only once. Redundancy in, and thus the length of the initial request is thereby reduced, since common information required by more than one provider client module appears in the initial request only once, but can be extracted or retrieved by, or passed to, each provider client module 66 and 67 .
- the proxy system 39 requests digital certificate status information from multiple status information providers for which a provider client module has been implemented, responsive to a single initial request to the proxy system 39 .
- separate requests are submitted to each status information provider 35 and 37 by the mobile device 38
- a determination of the particular status information providers to which a request will be sent in response to an initial request from the mobile device 38 may be made in any of several ways.
- a proxy system 39 may send a request to every status information provider for which a provider client module has been implemented, or possibly to each status information provider in a default list stored at the proxy system 39 .
- a default, possibly user-configurable, list of status information providers may be stored at the mobile device 38 and included in the initial request sent from the mobile device 38 .
- the proxy system 39 may store the default list received in an initial request from the mobile device 38 , and then use the default list for subsequent initial requests from the mobile device 38 , until a new default list for the mobile device 38 is received.
- a user may select or specify status information providers to be used to provide the requested service.
- User-selected or specified status information providers in an initial request may over-ride any default list of status information providers.
- Preferred status information providers may also be included in each digital certificate stored in the digital certificate store 54 or received by the mobile device 38 and submitted to the proxy system service module 68 when such a digital certificate is a target digital certificate in an initial request.
- the status provider 37 may support an ORS or like service.
- each status information provider 35 and 37 which will be OCSP responders when the providers 35 and 37 and client modules 66 and 67 support OCSP, checks the request to ensure that it is formatted properly, that the requested service is a service that it is configured to provide, and that the request includes all of the information required for the requested service. If these conditions are not met, then a provider 35 or 37 may return an error message to its client module 66 or 67 .
- Each client module 66 and 67 may then perform error processing if it is so configured, including such operations as providing any missing required information, requesting missing information from the mobile device 38 through the proxy system service module 68 , or returning an error message to the proxy system service module 68 .
- the proxy system service module 68 Responsive to an error message from a client module 66 or 67 , the proxy system service module 68 preferably formats and sends an error message to the proxy system client module 62 as a response to its initial service request.
- Other conditions such as when a provider 35 or 37 receives an unsigned request but is configured to expect signed requests, or when a provider service is unable to respond, may also result in an error message being returned to a provider client module 66 or 67 . Since digital certificate status information is requested from multiple status information providers 35 and 37 however, error processing may possibly be invoked only when all status information providers 35 and 37 to which requests have been sent return an error message.
- a definitive response typically includes one of a plurality of status indications, such as a “valid” or like indication when a target digital certificate has not been revoked, a “revoked” indication when the target digital certificate has been revoked, or an “unknown” indication if the status provider 35 or 37 has no record or knowledge of the target digital certificate.
- responses may be received by more than one of the provider client modules 66 and 67 . Any responses are preferably passed to the proxy system client module 68 , which selects one of the responses to be used in preparing a response that will be returned to the proxy system client module 62 on the mobile device 38 .
- the proxy system service module 68 uses the first definitive response to prepare a response to the proxy system client module 62 . If no definitive response is received, then an error or similar response may be prepared by the proxy system service module 68 and returned to the proxy system client module 62 to indicate this result.
- selection criteria including a status information provider ranking list, for example, may also be used to control which one of multiple responses will be returned to the proxy system client module 62 or used to prepare a response to the proxy system client module 62 .
- a ranking may be established at the proxy system 39 or at the mobile device 38 , or specified in a digital certificate.
- Relative ranking may also be inherent in the ordering of status information providers in a list that is used to control the particular status information providers to which requests will be sent by the proxy system 39 , as described above.
- the proxy system client module 62 or another component on the mobile device 38 is configured to verify digital signatures on status responses
- the entire selected response, or possibly only the signed portions thereof may be forwarded to the proxy system client module 62 substantially unchanged. If only portions of a response are signed, then unsigned portions of the response are preferably removed by the proxy system service module 68 to reduce the size of the response sent to the proxy system client module 62 via the wireless network 36 .
- the proxy system service module 68 or the status provider client module 66 checks status response signatures on behalf of the mobile device 38 , then certain parts of the response, for example the status indication and the digital certificate serial number or subject name, may be extracted by the proxy system service module 68 and formatted into a response that is then sent to the proxy system client module 62 .
- the response from the proxy system service module 68 is then processed by the proxy system client module 62 or possibly another component on the mobile device 38 to determine whether or not the digital certificate has been revoked.
- proxy system client module 62 preferably does not preclude digital certificate validity and revocation status checks according to known techniques.
- digital certificate status checks involving remote systems such as the status information providers 35 and 37 may be complementary to other status check operations.
- FIG. 4 is a flow diagram illustrating a method of supporting multiple digital certificate status information providers.
- any digital certificates for which a status check is to be performed are identified. As described above, this step could be performed automatically or the digital certificates could be selected by a user.
- An initial request is then prepared and sent to the proxy system at step 82 .
- the initial request includes a list of status information providers to which a request should be sent, and possibly a ranking list that specifies an order of preference between subsequent responses from different status providers.
- a list of status information providers may be arranged in order of preference to provide both status information provider information and preference information.
- status information provider client modules at the proxy system prepare and send service requests to each status information provider, such as an OCSP responder.
- Each status information provider then checks its request to ensure that it is formatted properly, that the requested service, digital certificate revocation status in this example, is supported by the provider, and that all required information is included in the request. These checks are performed by each status information provider at step 86 .
- an error message is returned to the proxy system at step 88 .
- Error processing may then be executed at step 90 , to obtain further information when the request does not include all required information, for example, after which a new service request may be prepared and sent to the provider at step 84 .
- the status information provider When the request satisfies the conditions in step 86 , the status information provider returns a status indication to the proxy system at step 92 , in response to the service request from the proxy system.
- the steps 86 , 88 and 92 are preferably performed by each status information provider to which a request has been sent at step 84 .
- the proxy system selects one of the responses to be used in preparing a response to the requestor, the mobile device 38 in FIG. 3 , for example.
- the first definitive response is selected, or other selection criteria may be applied.
- the selected response, or at least parts thereof, is then returned to the requestor, as a response to the initial service request, at step 96 .
- a proxy system may also be enabled to provide its proxy service to multiple mobile devices, and a mobile device may be configured to communicate with more than one proxy system.
- FIG. 5 is a block diagram of a system having multiple proxy system client modules which support multiple digital certificate status information providers.
- the memory 102 , the data stores 104 , 106 , and 108 , the messaging system 110 , the UI 114 , the wireless transceiver 116 , the wireless network 118 , the wireless gateway 120 , and the WAN 122 are substantially the same as similarly labelled components in FIG. 3 .
- the mobile device 100 includes N client modules 112 , including the proxy system client module A 113 and the proxy system client module N 111 .
- the proxy system 128 includes corresponding proxy system service modules A and N, 132 and 136 . It should be appreciated that other proxy system client modules on the mobile device 100 may be supported by other proxy system service modules in the proxy system 128 , or by proxy system service modules in other proxy systems.
- the proxy system 128 also includes status provider client modules A and N, 130 and 134 , which are configured for communications with the status information provider A 126 and the status information provider N 124 , respectively.
- each proxy system client module 113 and 111 When the status of one or more digital certificates, such as revocation status for example, is to be checked, each proxy system client module 113 and 111 preferably extracts or otherwise obtains information required in a service request to its respective proxy system service module 132 and 136 .
- the status provider client modules 130 and 134 then use the information from the service request from the mobile device 100 , and possibly information available at the proxy system 128 , to prepare a service request to status information providers 126 and 124 .
- the proxy system service modules 132 and 136 are preferably configured such that only one of the responses returned by the status information providers 126 and 124 , or at least portions thereof, is reformatted if necessary and returned to the proxy system client modules 113 and 111 at the mobile device 100 .
- One of the responses may be selected according to any of the schemes described above.
- Each proxy system client module 113 and 111 may be adapted to collect request information and process response information for a different remote digital certificate status check protocol. However, the information collected by both proxy system client modules 113 and 111 may be combined into a single initial request to the proxy system 128 . Each proxy system service module 132 and 136 then extracts information from the service request required for a service request to its associated status information provider 126 and 124 .
- a multiple-client module system such as shown in FIG. 5 is particularly useful when a user wishes to check validity and/or revocation status of an entire digital certificate chain which includes digital certificates for which status information is available from different status information providers.
- separate requests for each digital certificate in the chain must be sent to the status information providers.
- only a single request need be sent from the mobile device 100 to obtain status information from any number of status information providers.
- FIG. 6 is a block diagram of a wireless mobile communication device.
- the mobile device 600 is preferably a two-way communication device having at least voice and data communication capabilities.
- the mobile device 600 preferably has the capability to communicate with other computer systems on the Internet.
- the mobile device may be referred to as a data messaging device, a two-way pager, a mobile telephone with data messaging capabilities, a wireless Internet appliance, or a data communication device (with or without telephony capabilities).
- a data messaging device a two-way pager
- a mobile telephone with data messaging capabilities a wireless Internet appliance
- a data communication device with or without telephony capabilities
- the mobile device 600 includes a transceiver 611 , a microprocessor 638 , a display 622 , a Flash memory 624 , a random access memory (RAM) 626 , auxiliary input/output (I/O) devices 628 , a serial port 630 , a keyboard 632 , a speaker 634 , a microphone 636 , a short-range wireless communications sub-system 640 , and other device sub-systems 642 .
- a transceiver 611 a microprocessor 638 , a display 622 , a Flash memory 624 , a random access memory (RAM) 626 , auxiliary input/output (I/O) devices 628 , a serial port 630 , a keyboard 632 , a speaker 634 , a microphone 636 , a short-range wireless communications sub-system 640 , and other device sub-systems 642 .
- RAM random access memory
- I/O auxiliary input/output
- the transceiver 611 includes transmit and receive antennas 616 , 618 , a receiver (Rx) 612 , a transmitter (Tx) 614 , one or more local oscillators (LOs) 613 , and a digital signal processor (DSP) 620 .
- the mobile device 600 includes a plurality of software modules 624 A- 624 N that can be executed by the microprocessor 638 (and/or the DSP 620 ), including a voice communication module 624 A, a data communication module 6248 , and a plurality of other operational modules 624 N for carrying out a plurality of other functions.
- the mobile device 600 is preferably a two-way communication device having voice and data communication capabilities.
- the mobile device 600 may communicate over a voice network, such as any of the analog or digital cellular networks, and may also communicate over a data network.
- the voice and data networks are depicted in FIG. 6 by the communication tower 619 .
- These voice and data networks may be separate communication networks using separate infrastructure, such as base stations, network controllers, etc., or they may be integrated into a single wireless network, References to the network 619 should therefore be interpreted as encompassing both a single voice and data network and separate networks.
- the communication subsystem 611 is used to communicate with the network 619 .
- the DSP 620 is used to send and receive communication signals to and from the transmitter 614 and receiver 612 , and may also exchange control information with the transmitter 614 and receiver 612 . If the voice and data communications occur at a single frequency, or closely-spaced set of frequencies, then a single LO 613 may be used in conjunction with the transmitter 614 and receiver 612 . Alternatively, if different frequencies are utilized for voice communications versus data communications, then a plurality of LOs 613 can be used to generate a plurality of frequencies corresponding to the network 619 . Although two antennas 616 , 618 are depicted in FIG. 6 , the mobile device 600 could be used with a single antenna structure. Information, which includes both voice and data information, is communicated to and from the communication module 611 via a link between the DSP 620 and the microprocessor 638 .
- a mobile device 600 intended to operate in a North American market may include a communication subsystem 611 designed to operate with the Mobitex or DataTAC mobile data communication networks and also designed to operated with any of a variety of voice communication networks, such as AMPS, TDMA, CDMA, PCS, etc.
- a mobile device 600 intended for use in Europe may be configured to operate with the GPRS data communication network and the GSM voice communication network.
- Other types of data and voice networks, both separate and integrated, may also be utilized with the mobile device 600 .
- the access requirements for the mobile device 600 may also vary.
- mobile devices are registered on the network using a unique identification number associated with each device.
- network access is associated with a subscriber or user of the mobile device 600
- a GPRS device typically requires a subscriber identity module (“SIM”), which is required in order to operate the mobile device 600 on a GPRS network.
- SIM subscriber identity module
- Local or non-network communication functions may be operable, without the SIM, but the mobile device 600 will be unable to carry out any functions involving communications over the network 619 , other than any legally required operations, such as ‘911’ emergency calling.
- the mobile device 600 may send and receive communication signals, preferably including both voice and data signals, over the network 619 .
- Signals received by the antenna 616 from the communication network 619 are routed to the receiver 612 , which provides for such operations as signal amplification, frequency down conversion, filtering, channel selection, and analog to digital conversion. Analog to digital conversion of the received signal allows more complex communication functions, such as digital demodulation and decoding to be performed using the DSP 620 .
- signals to be transmitted to the network 619 are processed, including modulation and encoding, for example, by the DSP 620 and are then provided to the transmitter 614 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission to the communication network 619 via the antenna 618 .
- a single transceiver 611 is shown in FIG. 6 for both voice and data communications, it is possible that the mobile device 600 may include two distinct transceivers, a first transceiver for transmitting and receiving voice signals, and a second transceiver for transmitting and receiving data signals. Multiple transceiver may also be provided in a mobile device adapted to operate within more than one communication network or multiple frequency bands.
- the DSP 620 In addition to processing the communication signals, the DSP 620 also provides for receiver and transmitter control. For example, the gain levels applied to communication signals in the receiver 612 and transmitter 614 may be adaptively controlled through automatic gain control algorithms implemented in the DSP 620 . Other transceiver control algorithms could also be implemented in the DSP 620 in order to provide more sophisticated control of the transceiver 611 .
- the microprocessor 638 preferably manages and controls the overall operation of the mobile device 600 .
- Many types of microprocessors or microcontrollers could be used here, or alternatively, a single DSP 620 could be used to carry out the functions of the microprocessor 638 .
- Low-level communication functions including at least data and voice communications, are performed through the DSP 620 in the transceiver 611 .
- Other, high-level communication applications such as a voice communication application 624 A, and a data communication application 624 B are stored in the Flash memory 624 for execution by the microprocessor 638 .
- the voice communication module 624 A may provide a high-level user interface operable to transmit and receive voice calls between the mobile device 600 and a plurality of other voice devices via the network 619 .
- the data communication module 624 B may provide a high-level user interface operable for sending and receiving data such as e-mail messages, files, organizer information, short text messages, etc., between the mobile device 600 and a plurality of other data devices via the network 619 .
- a secure messaging software application incorporating software modules corresponding to the messaging system 60 and the proxy system client module 62 or client modules 113 and 111 , for example, may operate in conjunction with the data communication module 624 B in order to implement the techniques described above.
- the microprocessor 638 also interacts with other device subsystems, such as the display 622 , the Flash memory 624 , the RAM 626 , the auxiliary input/output (I/O) subsystems 628 the serial port 630 , the keyboard 632 , the speaker 634 , the microphone 636 , the short-range communications subsystem 640 , and any of the other device subsystems generally designated as 642 .
- the modules 624 A-N are executed by the microprocessor 638 and may provide a high-level interface between a user and the mobile device 600 .
- This interface typically includes a graphical component provided through the display 622 , and an input/output component provided through the auxiliary I/O 628 , the keyboard 632 , the speaker 634 , or the microphone 636 .
- Such interfaces are designated generally as UI 64 and 114 in FIGS. 3 and 5 , respectively.
- Some of the subsystems shown in FIG. 6 perform communication-related functions, whereas other subsystems may provide “resident” or on-device functions.
- some subsystems, such as the keyboard 632 and the display 622 are used for both communication-related functions such as entering a text message for transmission over a data communication network, and device-resident functions such as a calculator or task list or other PDA type functions.
- Operating system software used by the microprocessor 638 is preferably stored in a non-volatile store such as Flash memory 624 .
- the Flash memory 624 may also include a file system for storing data.
- a storage area is also preferably provided in the Flash memory 624 to store digital certificates, address book entries and possibly other information required for messaging, shown as data stores 54 , 56 , and 58 in FIG. 3 or the data stores 104 , 106 , and 108 in FIG. 5 .
- the operating system, specific device applications or modules, or parts thereof, may be temporarily loaded into a volatile store, such as RAM 626 for faster operation.
- received communication signals may also be temporarily stored to RAM 626 , before permanently writing them to a file system located in the Flash memory 624 .
- An exemplary application module 624 N that may be loaded onto the mobile device 600 is a personal information manager (PIM) application providing PDA functionality, such as calendar events, appointments, and task items.
- PIM personal information manager
- This module 624 N may also interact with the voice communication module 624 A for managing phone calls, voice mails, etc., and may also interact with the data communication module 624 B for managing e-mail communications and other data transmissions.
- all of the functionality of the voice communication module 624 A and the data communication module 6248 may be integrated into the PIM module.
- the Flash memory 624 preferably provides a file system to facilitate storage of PIM data items on the device.
- the PIM application preferably includes the ability to send and receive data items, either by itself, or in conjunction with the voice and data communication modules 624 A and 624 B, via the wireless network 619 .
- the PIM data items are preferably seamlessly integrated, synchronized and updated, via the wireless network 619 , with a corresponding set of data items stored or associated with a host computer system, thereby creating a mirrored system for data items associated with a particular user.
- Flash memory 624 Although shown as a Flash memory 624 , those skilled in the art will appreciate that other types of non-volatile store, such as a battery backed-up RAM, for example, could be used in addition to or instead of the Flash memory 624 .
- the mobile device 600 may also be manually synchronized with a computer system by placing the mobile device 600 in an interface cradle, which couples the serial port 630 of the mobile device 600 to the serial port of the computer system.
- the serial port 630 may also be used to enable a user to set preferences through an external device or software application, to download other application modules 624 N for installation, and possibly to load digital certificates onto a mobile device. This wired download path may further be used to load an encryption key onto the device, which is a more secure method than exchanging encryption information via the wireless network 619 .
- Additional application modules 624 N may be loaded onto the mobile device 600 through the network 619 , through an auxiliary I/O subsystem 628 , through the serial port 630 , through the short-range communications subsystem 640 , or through any other suitable subsystem 642 , and installed by a user in the Flash memory 624 or RAM 626 .
- Such flexibility in application installation increases the functionality of the mobile device 600 and may provide enhanced on-device functions, communication-related functions, or both.
- secure communication applications may enable electronic commerce functions and other such financial transactions to be performed using the mobile device 600 .
- a received signal such as a text message or a web page download
- the transceiver 611 When the mobile device 600 is operating in a data communication mode, a received signal, such as a text message or a web page download, is processed by the transceiver 611 and provided to the microprocessor 638 , which preferably further processes the received signal for output to the display 622 , or, alternatively, to an auxiliary I/O device 628 .
- a digital certificate received by the transceiver 611 in response to a request to a PKS or attached to a secure message, for example, may be added to a digital certificate store in the Flash memory 624 if it has not already been stored. Validity and/or revocation status of such a digital certificate may also be checked as described above.
- a user of mobile device 600 may also compose data items, such as e-mail messages, using the keyboard 632 , which is preferably a complete alphanumeric keyboard laid out in the QWERTY style, although other styles of complete alphanumeric keyboards such as the known DVORAK style may also be used.
- User input to the mobile device 600 is further enhanced with a plurality of auxiliary I/O devices 628 , which may include a thumbwheel input device, a touchpad, a variety of switches, a rocker input switch, etc.
- the composed data items input by the user may then be transmitted over the communication network 619 via the transceiver 611 .
- the overall operation of the mobile device 600 is substantially similar to the data mode, except that received signals are preferably output to the speaker 634 and voice signals for transmission are generated by a microphone 636 .
- the secure messaging techniques described above might not necessarily be applied to voice communications.
- Alternative voice or audio I/O subsystems such as a voice message recording subsystem, may also be implemented on the mobile device 600 .
- voice or audio signal output is preferably accomplished primarily through the speaker 634
- the display 622 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information.
- the microprocessor 638 in conjunction with the voice communication module 624 A and the operating system software, may detect the caller identification information of an incoming voice call and display it on the display 622 .
- the short-range communications subsystem 640 may include an infrared device and associated circuits and components, or a short-range wireless communication module such as a BluetoothTM module or an 802.11 module to provide for communication with similarly-enabled systems and devices.
- a short-range wireless communication module such as a BluetoothTM module or an 802.11 module to provide for communication with similarly-enabled systems and devices.
- Bluetooth and “802.11” refer to sets of specifications, available from the Institute of Electrical and Electronics Engineers, relating to wireless personal area networks and wireless LANs, respectively.
- the above description also relates primarily to OCSP, although other protocols may similar be optimized through an intermediate proxy system which operates in conjunction with both remote systems and proxy system client modules. Such other protocols are not limited to digital certificate status check protocols.
- a proxy system and proxy system client modules may be configured to provide other services than digital certificate status check services.
- FIG. 7 is a block diagram illustrating a multiple messaging scheme utilizing an intermediate computer system.
- the proxy system may in general be an intermediate computer system 700 disposed between the mobile device 702 and status information providers ( 704 , 706 , 708 ).
- the intermediate computer system 700 exchanges data with the mobile device 702 and status information providers ( 704 , 706 , 708 ) via network connections 710 , 712 .
- the intermediate computer system 700 may perform proxy server functions, such as security, administrative control, and caching.
- the intermediate computer system 700 uses a status information provider data structure 720 in determining which status information providers are to receive a service request.
- a service request asks a status information provider to provide the status information.
- the data structure 720 may be populated with provider information that was sent by the mobile device 702 .
- provider information There are many other ways for populating the data structure 720 with provider information. For example, a mapping table may be stored in the data structure 720 which maintains a correspondence between digital certificate issuers and serial numbers and/or subject names.
- the intermediate computer system 700 may format requests for the status information providers based on only a serial number or subject name sent from the mobile device 702 .
- a service message handler 730 is used by the intermediate computer system 700 to generate multiple service requests 732 based upon a request received from the mobile device 702 .
- Each of the generated service requests corresponds to a status information provider and asks for status information from a provider.
- At least one of the responses from the status information providers ( 704 , 706 , 708 ) is used in reply to the mobile device's request for status information.
- FIGS. 8-10 describe additional uses of the systems and methods within different exemplary communication systems.
- FIG. 8 is a block diagram showing a communication system.
- a computer system 802 there is shown a computer system 802 , a WAN 804 , corporate LAN 806 behind a security firewall 808 , wireless infrastructure 810 , wireless networks 812 and 814 , and mobile devices 816 and 818 .
- the corporate-LAN 806 includes a message server 820 , a wireless connector system 828 , a data store 817 including at least a plurality of mailboxes 819 , a desktop computer system 822 having a communication link directly to a mobile device such as through physical connection 824 to an interface or connector 826 , and a wireless VPN router 832 . Operation of the system in FIG. 8 is described below with reference to the messages 833 , 834 and 836 .
- the computer system 802 is for example, a laptop, desktop or palmtop computer system configured for connection to the WAN 804 .
- a computer system may connect to the WAN 804 via an ISP or ASP.
- the computer system 802 may be a network-connected computer system that like the computer system 822 for example, accesses the WAN 804 through a LAN or other network,
- Many modem mobile devices are enabled for connection to a WAN through various infrastructure and gateway arrangements, so that the computer system 802 may also be a mobile device.
- the corporate LAN 806 is an illustrative example of a central, server-based messaging system that has been enabled for wireless communications.
- the corporate LAN 806 may be referred to as a ‘host system’, in that it hosts both a data store 817 with mailboxes 819 for messages, as well as possibly further data stores (not shown) for other data items, that may be sent to or received from mobile devices 816 and 818 , and the wireless connector system 828 , the wireless VPN router 832 , or possibly other components enabling communications between the corporate LAN 806 and one or more mobile devices 816 and 818 .
- a host system is one or more computers at, with, or in association with which a wireless connector system is operating.
- the corporate LAN 806 is one preferred embodiment of a host system in which the host system is a server computer running within a corporate network environment operating behind and protected by at least one security communications firewall 808 .
- Other possible central host systems include ISP, ASP and other service provider or mail systems.
- the desktop computer system 824 and interface/connector 826 may be located outside such host systems, wireless communication operations may be similar to those described below.
- the corporate LAN 806 implements the wireless connector system 828 as an associated wireless communications enabling component, which will normally be a software program, a software application, or a software component built to work with at least one message server 820 .
- the wireless connector system 828 is used to send user-selected information to, and to receive information from, one or more mobile devices 816 and 818 , via one or more wireless networks 812 and 814 .
- the wireless connector system 828 may be a separate component of a messaging system, as shown in FIG. 8 , or may instead be partially or entirely incorporated into other communication system components.
- the message server 820 may incorporate a software program, application, or component implementing the wireless connector system 828 , portions thereof, or some or all of its functionality.
- the message server 820 running on a computer behind the firewall 808 , acts as the main interface for the corporation to exchange messages, including for example electronic mail, calendaring data, voice mail, electronic documents, and other PIM data with a WAN 804 , such as the Internet,
- a WAN 804 such as the Internet
- the particular intermediate operations and computers are dependent upon the specific type of message delivery mechanisms and networks via which messages are exchanged, and therefore have not been shown in FIG. 8 .
- the functionality of the message server 820 may extend beyond message sending and receiving, providing such features as dynamic database storage for data like calendars, to-do lists, task lists, e-mail, and documentation, as described above.
- Message servers such as 820 normally maintain a plurality of mailboxes 819 in one or more data stores such as 817 for each user having an account on the server.
- the data store 817 includes mailboxes 819 for a number (“n”) of user accounts.
- Messages received by the message server 820 that identify a user, a user account, a mailbox, or possibly another address associated with a user, account or mailbox 819 , as a message recipient is typically stored in the corresponding mailbox 819 . If a message is addressed to multiple recipients or a distribution list, then copies of the same message may be stored to more than one mailbox 819 .
- the message server 820 may store a single copy of such a message in a data store accessible to all of the users having an account on the message server 820 , and store a pointer or other identifier in each recipient's mailbox 819 .
- each user then accesses his or her mailbox 819 and its contents using a messaging client such as Microsoft Outlook or Lotus Notes, which normally operates on a PC, such as the desktop computer system 822 , connected in the LAN 806 .
- a messaging client such as Microsoft Outlook or Lotus Notes, which normally operates on a PC, such as the desktop computer system 822 , connected in the LAN 806 .
- desktop computer system 822 is shown in FIG. 8 , those skilled in the art will appreciate that a LAN typically contains many desktop, notebook, and laptop computer systems.
- Each messaging client normally accesses a mailbox 819 through the message server 820 , although in some systems, a messaging client may enable direct access to the data store 817 and a mailbox 819 stored thereon by the desktop computer system 822 . Messages may also be downloaded from the data store 817 to a local data store on the desktop computer system 822 .
- the wireless connector system 828 operates in conjunction with the message server 820 .
- the wireless connector system 828 may reside on the same computer system as the message server 820 , or may instead be implemented on a different computer system.
- Software implementing the wireless connector system 828 may also be partially or entirely integrated with the message server 820 .
- the wireless connector system 828 and the message server 820 are preferably designed to cooperate and interact to allow the pushing of information to the mobile devices 816 , 818 .
- the wireless connector system 828 is preferably configured to send information that is stored in one or more data stores associated with the corporate LAN 806 to one or more of the mobile devices 816 , 818 , through the corporate firewall 808 and via the WAN 804 and one of the wireless networks 812 , 814 .
- a user that has an account and associated mailbox 819 in the data store 817 may also have a mobile device, such as 816 .
- messages received by the message server 820 that identify a user, account, or mailbox 819 are stored to a corresponding mailbox 819 by the message server 820 .
- messages received by the message server 820 and stored to the user's mailbox 819 are preferably detected by the wireless connector system 828 and sent to the user's mobile device 816 .
- This type of functionality represents a “push” message sending technique.
- the wireless connector system 828 may instead employ a “pull” technique, in which items stored in a mailbox 819 are sent to a mobile device 816 or 818 responsive to a request or access operation made using the mobile device, or some combination of both techniques.
- a wireless connector 828 thereby enables a messaging system including a message server 520 to be extended so that each user's mobile device 816 , 818 has access to stored messages of the message server 820 .
- This push technique uses a wireless friendly encoding, compression and encryption technique to deliver all information to a mobile device, thus effectively extending the company firewall 808 to include the mobile devices 816 and 818 .
- FIG. 8 there are several paths for exchanging information with a mobile device 816 , 818 from the corporate LAN 806 .
- One possible information transfer path is through the physical connection 824 such as a serial port, using an interface or connector 826 .
- This path is useful for example for bulk information updates often performed at initialization of a mobile device 816 , 818 or periodically when a user of a mobile device 816 , 818 is working at a computer system in the LAN 806 , such as the computer system 822 .
- PIM data is commonly exchanged over a such a connection as a serial port connected to a cradle in or upon which a mobile device 816 , 818 may be placed.
- the physical connection 824 may also be used to transfer other information from a desktop computer system 822 to a mobile device 816 , 818 , including private security keys (“private keys”) such as private encryption or digital signature keys associated with the desktop computer system 822 , or other relatively bulky information such as digital certificates and CRLs.
- private keys such as private encryption or digital signature keys associated with the desktop computer system 822
- other relatively bulky information such as digital certificates and CRLs.
- Private key exchange using the physical connection 824 and the connector or interface 826 allows a user's desktop computer system 822 and mobile device 816 or 818 to share at least one identity for accessing all encrypted and/or signed mail.
- the user's desktop computer system 822 and mobile device 816 or 818 can also thereby share private keys so that either the host system 822 or the mobile device 816 or 818 can process secure messages addressed to the user's mailbox or account on the message server 820 .
- the transfer of digital certificates and CRLs over such a physical connection is desirable in that they represent a large amount of the data that is required for S/MIME, PGP and other public key security methods.
- a user's own digital certificate, a chain of digital certificates used to verify the user's digital certificate, and a CRL, as well as digital certificates, digital certificate chains and CRLs for other users, may be loaded onto a mobile device 816 , 818 from the user's desktop computer system 822 .
- This loading of other user's digital certificates and CRLs onto a mobile device 816 , 818 allows a mobile device user to select other entities or users with whom they might be exchanging secure messages; and to pre-load the bulky information onto the mobile device through a physical connection instead of over the air, thus saving time and wireless bandwidth when a secure message is received from or to be sent to such other users, or when the status of a digital certificate is to be determined based on one or more CRLs, CRL-based status checks can also be avoided where the systems and methods described herein are employed.
- a physical path has also been used to transfer messages from mailboxes 819 associated with a message server 820 to mobile devices 816 and 818 .
- Another method for data exchange with the mobile devices 816 and 818 is over-the-air, through the wireless connector system 828 and using the wireless networks 812 and 814 .
- this could involve a Wireless VPN router 832 , if available in the network 806 , or alternatively, a traditional WAN connection to wireless infrastructure 810 that provides an interface to one or more wireless networks such as 814 .
- the Wireless VPN router 832 provides for creation of a VPN connection directly through a specific wireless network 812 to a wireless device 816 .
- Such a Wireless VPN router 832 may be used in conjunction with a static addressing scheme.
- IPV6 would provide enough IP addresses to dedicate an IP address to every mobile device 816 configured to operate within the network 812 and thus make it possible to push information to a mobile device 816 at-any time.
- a primary advantage of using a wireless VPN router 832 is that it could be an off-the-shelf VPN component which would not require wireless infrastructure 810 .
- a VPN connection may use a TCP/IP or UDP/IP connection to deliver messages directly to and from a mobile device 816 .
- wireless infrastructure 810 is preferably used. The wireless infrastructure 810 may also determine a most likely wireless network for locating a given user, and track users as they roam between countries or networks. In wireless networks such as 812 and 814 , messages are normally delivered to and from mobile devices via RF transmissions between base stations and the mobile devices.
- a plurality of connections to wireless networks 812 and 814 may be provided, including, for example, ISDN, Frame Relay or T1 connections using the TCP/IP protocol used throughout the Internet.
- the wireless networks 812 and 814 could represent distinct, unique and unrelated networks, or they could represent the same network indifferent countries, and may be any of different types of networks, including but not limited to, data-centric wireless networks, voice-centric wireless networks, and dual-mode networks that can support both voice and data communications over the same or similar infrastructure, such as any of those described above.
- more than one over-the-air information exchange mechanism may be provided in the corporate LAN 806 .
- the mobile devices 816 and 818 associated with users having mailboxes 819 associated with user accounts on the message server 820 are configured to operate on different wireless networks 812 and 814 .
- the wireless network 812 supports IPv6 addressing
- the wireless VPN router 832 may be used by the wireless connector system 828 to exchange data with any mobile device 816 operating within the wireless network 812 .
- the wireless network 814 may be a different type of wireless network, however, such as the Mobitex network, in which case information is instead exchanged with the mobile device 818 operating within the wireless network 814 via a connection to the WAN 804 and the wireless infrastructure 810 .
- the e-mail message 833 is intended for illustrative purposes only.
- the exchange of other types of information between the corporate LAN 806 is preferably also enabled by the wireless connector system 828 .
- the e-mail message 833 sent from the computer system 802 via the WAN 804 , may be fully in the clear, or signed with a digital signature and/or encrypted, depending upon the particular messaging scheme used. For example, if the computer system 802 is enabled for secure messaging using S/MIME, then the e-mail message 833 may be signed, encrypted, or both.
- E-mail messages such as 833 normally use traditional SMTP, RFC822 headers and MIME body parts to define the format of the e-mail message. These techniques are all well known to one in the art.
- the e-mail message 833 arrives at the message server 820 , which determines into which mailboxes 819 the e-mail message 833 should be stored.
- a message such as the e-mail message 833 may include a user name, a user account, a mailbox identifier, or other type of identifier that is mapped to a particular account or associated mailbox 819 by the message server 820 .
- recipients are typically identified using e-mail addresses corresponding to a user account and thus a mailbox 819 .
- the wireless connector system 828 sends or mirrors, via the wireless network 812 or 814 , certain user-selected data items or parts of data items from the corporate LAN 806 to the user's mobile device 816 or 818 , preferably upon detecting that one or more triggering events has occurred.
- a triggering event includes, but is not limited to, one or more of the following: screen saver activation at a user's networked computer system 822 , disconnection of the user's mobile device 816 or 818 from the interface 826 , or receipt of a command sent from a mobile device 816 or 818 to the host system to start sending one or more messages stored at the host system.
- the wireless connector system 828 may detect triggering events associated with the message server 820 , such as receipt of a command, or with one or more networked computer systems 822 , including the screen saver and disconnection events described above.
- triggering events associated with the message server 820 such as receipt of a command, or with one or more networked computer systems 822 , including the screen saver and disconnection events described above.
- data items selected by the user are preferably sent to the user's mobile device.
- the e-mail message 833 assuming that a triggering event has been detected, the arrival of the message 833 at the message server 820 is detected by the wireless connector system 828 .
- the wireless connector system 828 may register for advise syncs provided by the Microsoft Messaging Application Programming Interface (MAR) to thereby receive notifications when a new message is stored to a mailbox 819 .
- MAR Microsoft Messaging Application Programming Interface
- the wireless connector system 828 When a data item such as the e-mail message 833 is to be sent to a mobile device 816 or 818 , the wireless connector system 828 preferably repackages the data item in a manner that is transparent to the mobile device 816 or 818 , so that information sent to and received by the mobile device 816 or 818 appears similar to the information as stored on and accessible at the host system, LAN 806 in FIG. 8 .
- One preferred repackaging method includes wrapping received messages to be sent via a wireless network 812 or 814 in an electronic envelope that corresponds to the wireless network address of the mobile device 816 or 818 to which the message is to be sent.
- other repackaging methods could be used, such as special-purpose TCP/IP wrapping techniques.
- Such repackaging preferably also results in e-mail messages sent from a mobile device 816 or 818 appearing to come from a corresponding host system account or mailbox 819 even though they are composed and sent from a mobile device.
- a user of a mobile device 816 or 818 may thereby effectively share a single e-mail address between a host system account or mailbox 819 and the mobile device.
- Repackaging of the e-mail message 833 is indicated at 834 and 836 .
- Repackaging techniques may be similar for any available transfer paths or may be dependent upon the particular transfer path, either the wireless infrastructure 810 or the wireless VPN router 832 .
- the e-mail message 833 is preferably compressed and encrypted, either before or after being repackaged at 834 , to thereby provide for secure transfer to the mobile device 818 . Compression reduces the bandwidth required to send the message, whereas encryption ensures confidentiality of any messages or other information sent to the mobile devices 816 and 818 .
- messages transferred via a VPN router 832 might only be compressed and not encrypted, since a VPN connection established by the VPN router 832 is inherently secure.
- Messages are thereby securely sent, via either encryption at the wireless connector system 828 , which may be considered a non-standard VPN tunnel or a VPN-like connection, for example, or the VPN router 832 , to mobile devices 816 and 818 . Accessing messages using a mobile device 816 or 818 is thus no less secure than accessing mailboxes at the LAN 806 using the desktop computer system 822 .
- a repackaged message 834 or 836 arrives at a mobile device 816 or 818 , via the wireless infrastructure 810 , or via the wireless VPN router 832 , the mobile device 816 or 818 removes the outer electronic envelope from the repackaged message 834 or 836 , and performs any required decompression and decryption operations.
- Messages sent from a mobile device 816 or 818 and addressed to one or more recipients are preferably similarly repackaged, and possibly compressed and encrypted, and sent to a host system such as the LAN 806 . The host system may then remove the electronic envelope from the repackaged message, decrypt and decompress the message if desired, and route the message to the addressed recipients.
- Another goal of using an outer envelope is to maintain at least some of the addressing information in the original e-mail message 833 .
- the outer envelope used to route information to mobile devices 816 , 818 is addressed using a network address of one or more mobile devices, the outer envelope preferably encapsulates the entire original e-mail message 833 , including at least one address field, possibly in compressed and/or encrypted form. This allows original “To”, “From” and “CC” addresses of the e-mail message 833 to be displayed when the outer envelope is removed and the message is displayed on a mobile device 816 or 818 .
- the repackaging also allows reply messages to be delivered to addressed recipients, with the “From” field reflecting an address of the mobile device user's account or mailbox on the host system, when the outer envelope of a repackaged outgoing message sent from a mobile device is removed by the wireless connector system 828 .
- the users account or mailbox address from the mobile device 816 or 818 allows a message sent from a mobile device to appear as though the message originated from the users mailbox 819 or account at the host system rather than the mobile device.
- FIG. 9 is a block diagram of an alternative communication system, in which wireless communications are enabled by a component associated with an operator of a wireless network.
- the system includes a computer system 802 , WAN 804 , a corporate LAN 807 located behind a security firewall 808 , network operator infrastructure 840 , a wireless network 811 , and mobile devices 813 and 815 .
- the computer system 802 , the WAN 804 , the security firewall 808 , the message server 820 , the data store 817 , the mailboxes 819 , and the VPN router 835 are substantially the same as the similarly-labelled components in FIG. 8 .
- the VPN router 835 communicates with the network operator infrastructure 840 , it need not necessarily be a wireless VPN router in the system of FIG. 9 .
- the network operator infrastructure 840 enables wireless information exchange between the LAN 807 and the mobile devices 813 and 815 , respectively associated with the computer systems 842 and 852 and configured to operate within the wireless network 811 .
- a plurality of desktop computer systems 842 and 852 are shown, each having a physical connection 846 or 856 to an interface or connector 848 or 858 .
- a wireless connector system 844 or 854 is operating on or in conjunction with each computer system 842 and 852 .
- the wireless connector systems 844 and 854 are similar to the wireless connector system 828 described above, in that they enable data items, such as e-mail messages and other items that are stored in mailboxes 819 , and possibly data items stored in a local or network data store, to be sent from the LAN 807 to one or more of the mobile devices 813 and 815 .
- the network operator infrastructure 840 provides an interface between the mobile devices 813 and 815 and the LAN 807 .
- operation of the system shown in FIG. 9 is described below in the context of an e-mail message as an illustrative example of a data item that may be sent to a mobile device 813 or 815 .
- the message server 820 When an e-mail message 833 , addressed to one or more recipients having an account on the message server 820 , is received by the message server 820 , the message, or possibly a pointer to a single copy of the message stored in a central mailbox or data store, is stored in the mailbox 819 of each such recipient. Once the e-mail message 833 or pointer has been stored to a mailbox 819 , it may preferably be accessed using a mobile device 813 or 815 . In the example shown in FIG. 9 , the e-mail message 833 has been addressed to the mailboxes 819 associated with both desktop computer systems 842 and 852 and thus both mobile devices 813 and 815 .
- communication network protocols commonly used in wired networks such as the LAN 807 and/or the WAN 804 are not suitable or compatible with wireless network communication protocols used within wireless networks such as 811 .
- communication bandwidth, protocol overhead, and network latency which are primary concerns in wireless network communications, are less significant in wired networks, which typically have much higher capacity and speed than wireless networks. Therefore, mobile devices 813 and 815 cannot normally access the data store 817 directly.
- the network operator infrastructure 840 provides a bridge between the wireless network 811 and the LAN 807 .
- the network operator infrastructure 840 enables a mobile device 813 or 815 to establish a connection to the LAN 807 through the WAN 804 , and may, for example, be operated by an operator of the wireless network 811 or a service provider that provides wireless communication service for mobile devices 813 and 815 .
- a mobile device 813 or 815 establishes a communication session with the network operator infrastructure 840 using a wireless network compatible communication scheme, preferably a secure scheme such as Wireless Transport Layer Security (WTLS) when information should remain confidential, and a wireless web browser such as a Wireless Application Protocol (WAP) browser.
- WTLS Wireless Transport Layer Security
- WAP Wireless Application Protocol
- a user then requests, through manual selection or pre-selected defaults in the software residing in the mobile device, any or all information, or just new information, for example, stored in a mailbox 819 in the data store 817 at the LAN 807 .
- the network operator infrastructure 840 establishes a connection or session with a wireless connector system 844 , 854 , using Secure Hypertext Transfer Protocol (HTTPS), for example, if no session has already been established.
- HTTPS Secure Hypertext Transfer Protocol
- a session between the network operator infrastructure 840 and a wireless connector system 844 or 854 may be made via a typical WAN connection or through the VPN router 835 if available.
- the network operator infrastructure 840 and the wireless connector systems 844 and 854 may be configured so that a communication connection remains open once established.
- requests originating from mobile device A 813 and B 815 would be sent to the wireless connector systems 844 and 854 , respectively.
- a wireless connector system 844 or 854 retrieves requested information from a data store.
- the wireless connector system 844 or 854 retrieves the e-mail message 833 from the appropriate mailbox 819 , typically through a messaging client operating in conjunction with the computer system 842 or 852 , which may access a mailbox 819 either via the message server 820 or directly.
- a wireless connector system 844 or 854 may be configured to access mailboxes 819 itself, directly or through the message server 820 .
- other data stores both network data stores similar to the data store 817 and local data stores associated with each computer system 842 and 852 , may be accessible to a wireless connector system 844 or 854 , and thus to a mobile device 813 or 815 .
- the e-mail message 833 is sent to the network operator infrastructure 840 as shown at 860 and 862 , which then sends a copy of the e-mail message to each mobile device 813 and 815 , as indicated at 864 and 866 .
- Information is transferred between the wireless connector systems 844 and 854 and the network operator infrastructure 840 via either a connection to the WAN 804 or the VPN router 835 .
- the network operator infrastructure 840 communicates with the wireless connector systems 844 and 854 and the mobile devices 813 and 815 via different protocols, translation operations may be performed by the network operator infrastructure 840 . Repackaging techniques may also be used between the wireless connector systems 844 and 854 and the network operator infrastructure 840 , and between each mobile device 813 and 815 and the network operator infrastructure 840 .
- Messages or other information to be sent from a mobile device 813 or 815 may be processed in a similar manner, with such information first being transferred from a mobile device 813 or 815 to the network operator infrastructure 840 .
- the network operator infrastructure 840 then sends the information to a wireless connector system 844 or 854 for storage in a mailbox 819 and delivery to any addressed recipients by the message server 820 , for example, or may alternatively deliver the information to the addressed recipients.
- the above description of the system in FIG. 9 relates to pull-based operations.
- the wireless connector systems 844 and 854 and the network operator infrastructure may instead be configured to push data items to mobile devices 813 and 815 .
- a combined push/pull system is also possible. For example, a notification of a new message or a list of data items currently stored in a data store at the LAN 807 could be pushed to a mobile device 813 or 815 , which may then be used to request messages or data items from the LAN 807 via the network operator infrastructure 840 .
- each wireless network may have an associated wireless network infrastructure component similar to 840 .
- one or more of the wireless connector systems 844 and 854 is preferably configured to operate in conjunction with more than one of the computer systems 842 and 852 , or to access a data store or mailbox 819 associated with more than one computer system.
- the wireless connector system 844 may be granted access to the mailboxes 819 associated with both the computer system 842 and the computer system 852 . Requests for data items from either mobile device A 813 or B 815 are then processed by the wireless connector system 844 .
- This configuration is useful to enable wireless communications between the LAN 807 and the mobile devices 813 and 815 without requiring a desktop computer system 842 and 852 to be running for each mobile device user.
- a wireless connector system may instead be implemented in conjunction with the message server 820 to enable wireless communications.
- FIG. 10 is a block diagram of another alternative communication system.
- the system includes a computer system 802 , WAN 804 , a corporate LAN 809 located behind a security firewall 808 , an access gateway 880 , a data store 882 , wireless networks 884 and 886 , and mobile devices 888 and 890 .
- the computer system 802 , the WAN 804 , the security firewall 808 , the message server 820 , the data store 817 , the mailboxes 819 , the desktop computer system 822 , the physical connection 824 , the interface or connector 826 and the VPN router 835 are substantially the same as the corresponding components described above.
- the access gateway 880 and data store 882 provide mobile devices 888 and 890 with access to data items stored at the LAN 809 .
- a wireless connector system 878 operates on or in conjunction with the message server 820 , although a wireless connector system may instead operate on or in conjunction with one or more desktop computer systems 822 in the LAN 809 .
- the wireless connector system 878 provides for transfer of data items stored at the LAN 809 to one or more of the mobile devices 888 and 890 .
- These data items preferably include e-mail messages stored in mailboxes 819 in the data store 817 , as well as possibly other items stared in the data store 817 or another network data store or a local data store of a computer system such as 822 .
- an e-mail message 833 addressed to one or more recipients having an account on the message server 820 and received by the message server 820 are stored into the mailbox 819 of each such recipient.
- the external data store 882 preferably has a similar structure to, and remains synchronized with, the data store 817 .
- PIM information or data stored at data store 882 preferably is independently modifiable to the PIM information or data stored at the host system.
- the independently modifiable information at the external data store 882 may maintain synchronization of a plurality of data stores associated with a user (i.e., data on a mobile device, data on a personal computer at home, data at the corporate LAN, etc.).
- This synchronization may be accomplished, for example, through updates sent to the data store 882 by the wireless connector system 878 at certain time intervals, each time an entry in the data store 817 is added or changed, at certain times of day, or when initiated at the LAN 809 , by the message server 820 or a computer system 822 , at the data store 882 , or possibly by a mobile device 888 or 890 through the access gateway 880 .
- an update sent to the data store 882 some time after the e-mail message 833 is received indicates that the message 833 has been stored in a certain mailbox 819 in the store 817 , and a copy of the e-mail message is stored to a corresponding storage area in the data store 882 .
- the e-mail message 833 has been stored in the mailboxes 819 corresponding to the mobile devices 888 and 890 , one or more copies of the e-mail message, indicated at 892 and 894 in FIG. 10 , will be sent to and stored in corresponding storage areas or mailboxes in the data store 882 .
- updates or copies of stored information in the data store 817 may be sent to the data store 882 via a connection to the WAN 804 or the VPN router 835 .
- the wireless connector system 878 may post updates or stored information to a resource in the data store 882 via an HTTP post request.
- a secure protocol such as HTTPS or Secure Sockets Layer (SSL) may be used.
- SSL Secure Sockets Layer
- This copy of the data item could then be stored either in more than one corresponding location in the data store 882 , or a single copy may be stored in the data store 882 , with a pointer or other identifier of the stored data item being stored in each corresponding location in the data store 882 .
- the access gateway 880 is effectively an access platform, in that it provides mobile devices 888 and 890 with access to the data store 882 .
- the data store 882 may be configured as a resource accessible on the WAN 804
- the access gateway 880 may be an ISP system or WAP gateway through which mobile devices 888 and 890 connect to the WAN 804 .
- a WAP browser or other browser compatible with the wireless networks 884 and 886 may then be used to access the data store 882 , which is synchronized with the data store 817 , and download stored data items either automatically or responsive to a request from a mobile device 888 or 890 .
- copies of the e-mail message 833 which was stored in the data store 817 , are sent to the mobile devices 888 and 890 .
- a data store on each mobile device 888 and 890 is thereby synchronized with a portion, such as a mailbox 819 , of a data store 817 on a corporate LAN 809 . Changes to a mobile device data store are similarly reflected in the data stores 882 and 817 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- This application is a continuation of earlier filed nonprovisional applications having U.S. application Ser.
No 12/954,731 filed 26 Nov. 2010, which in turn is a continuation of U.S. application Ser. No. 10/508,631 filed Sep. 17, 2004, now U.S. Pat. No. 7,865,720, granted on Jan. 4, 2011, which in turn is a National Entry of International Application No. PCT/CA2003/000404 filed Mar. 20, 2003, which in turn claims priority to U.S. Provisional Patent Application No. 60/365,534 filed Mar. 20, 2002. This application claims priority under 35 U.S.C. 120 to aforementioned application Ser. No. 12/954,731 filed 26Nov. 2010 and said application Ser. No. 10/506,631 filed Sep. 17, 2004, National Entry of International Application No PCT/CA20031000404 filed Mar. 20, 2003, and said Application No. 60/365,534 filed Mar. 20, 2002, and incorporates by reference the disclosures of both said applications in their entirety. - 1. Technical Field
- This invention relates generally to the field of secure electronic messaging and in particular to checking the status of digital certificates.
- 2. Description of the State of the Art
- Known secure messaging clients including, for example, e-mail software applications operating on desktop computer systems, maintain a data store, or at least a dedicated data storage area, for secure messaging information such as digital certificates. A digital certificate normally includes the public key of an entity as well as identity information that is bound to the public key with one or more digital signatures. In Secure Multipurpose Internet Mail Extensions (S/MIME) messaging for example, a public key is used to verify a digital signature on a received secure message and to encrypt a session key that was used to encrypt a message to be sent. In other secure messaging schemes, public keys may be used to encrypt data or messages. If a public key is not available at the messaging client when required for encryption or digital signature verification, then the digital certificate, or at least the public key, must be loaded onto the messaging client before these operations can be performed.
- Typically, a digital certificate is checked against a Certificate Revocation List (CRL) to determine if the digital certificate has been revoked by its issuer. This check is typically performed when a digital certificate is first received and periodically thereafter, for example when a new CRL is received. However, CRLs tend to be relatively bulky, so that transfer of CRLs to messaging clients consume considerable communication resources, and storage of CRLs at a messaging client may consume significant memory space. CRL-based revocation status checks are also processor-intensive and time consuming. These effects can be particularly pronounced in messaging clients operating on wireless mobile communication devices, which operate within bandwidth-limited wireless communication networks and may have limited processing and memory resources. In addition, revocation status is updated in CRL-based systems only when a new CRL is distributed.
- Another scheme for digital certificate revocation status checking involves querying remote systems which maintain digital certificate revocation status information. A difficulty with this scheme is that it requires a separate request-response exchange for each remote system to be queried. These exchanges may cause significant time delays and consume significant amounts of available communication bandwidth, particularly for secure messaging clients operating on wireless mobile communication devices.
- Digital certificate validity checks may similarly be processor intensive and time consuming for messaging clients operating on constrained devices. Digital certificate validity checks may similarly be performed by remote systems and may be useful for such devices, but as described above, typical schemes are not particularly suitable when multiple remote systems are to be queried.
- According to an aspect of the invention, a method of accessing multiple digital certificate status information providers to obtain digital certificate status information comprises the steps of receiving a request for digital certificate status information from a communication device, generating multiple service requests based upon the received request, each of the multiple service requests corresponding to a digital certificate status information provider, sending the generated multiple service requests to their corresponding digital certificate status information providers, receiving a response comprising digital certificate status information from at least one of the digital certificate status information providers, generating a response to the request for digital certificate status information using at least a portion of the received digital certificate status information, and sending the generated response to the request to the communication device.
- An apparatus for accessing multiple digital certificate status information providers to obtain digital certificate status information for a communication device, according to another aspect of the invention, comprises means for receiving a request regarding digital certificate status information from the communication device, means for generating multiple service requests based upon the received request, each generated service request corresponding to a digital certificate status information provider, means for sending the generated multiple service requests to their corresponding status information providers over a computer network, and means for receiving over a computer network a response containing digital certificate status information from at least one of the status information providers, wherein at least a portion of the received digital certificate status information is used in providing a status information response to the communication device.
-
FIG. 1 is a block diagram of a messaging system -
FIG. 2 is a block diagram illustrating a secure e-mail message exchange in a messaging system. -
FIG. 3 is a block diagram of a system which supports multiple digital certificate status information providers. -
FIG. 4 is a flow diagram illustrating a method of supporting multiple digital certificate status information providers. -
FIG. 5 is a block diagram of a system having multiple proxy system client modules which support multiple digital certificate status information providers. -
FIG. 6 is a block diagram of a wireless mobile communication device. -
FIG. 7 is a block diagram illustrating a multiple messaging scheme utilizing an intermediate computer system. -
FIG. 8 is a block diagram showing an example communication system. -
FIG. 9 is a block diagram of an alternative example communication system. -
FIG. 10 is a block diagram of another alternative communication system. - A secure message is a message that has been processed by a message sender, or possibly by an intermediate system between a message sender and a message receiver, to ensure one or more of data confidentiality, data integrity and user authentication. Common techniques for secure messaging include signing a message with a digital signature and/or encrypting a message. For example, a secure message may be a message that has been signed, or encrypted, or encrypted and then signed, or signed and then encrypted according to variants of Secure Multipurpose Internet Mail Extensions (S/MIME).
- A messaging client allows a system on which it operates to receive and possibly also send messages, Messaging clients may operate on a computer system, a handheld device, or any other system or device with communications capabilities. Many messaging clients also have additional non-messaging functions.
-
FIG. 1 is a block diagram of an exemplary messaging system. There are many different messaging system topologies, and the system shown inFIG. 1 is but one of many that may be used with the systems and methods disclosed herein. - The
system 10 includes a Wide Area Network (WAN) 12, coupled to acomputer system 14, awireless network gateway 16 and a corporate Local Area Network (LAN) 18. Thewireless network gateway 16 is also connected to awireless communication network 20 in which a wireless mobile communication device 22 (“mobile device”), is configured to operate. An exemplarymobile device 22 may be of the type disclosed in U.S. Pat. No, 6,278,442, entitled “HAND-HELD ELECTRONIC DEVICE WITH A KEYBOARD OPTIMIZED FOR USE WITH THE THUMBS,” the entire disclosure of which is incorporated herein by reference. - The
computer system 14 represents a desktop or laptop PC that is configured for connection to theWAN 12. The WAN 12 can be a private network, or a larger publicly accessible network, such as the Internet. PCs such as thecomputer system 14 normally access the Internet through an Internet Service Provider (ISP), Application Service Provider (ASP) or the like. - The
corporate LAN 18 is an example of a network-based messaging client. As shown, acorporate LAN 18 is normally located behind asecurity firewall 24. Within thecorporate LAN 30 is amessage server 26, running on a computer within thefirewall 24, that functions as the main interface for the corporation to exchange messages both within theLAN 18 and with other external messaging clients via theWAN 20. Two of the mostcommon message servers 26 are the Microsoft™ Exchange and Lotus Domino™ server products. These servers are often used in conjunction with Internet mail routers that route and deliver mail. Amessage server 26 may extend beyond just message sending and receiving, providing such functionality as dynamic database storage engines that have predefined database formats for data like calendars, to-do lists, task lists, e-mail and documentation. - The
message server 26 provides messaging capabilities to one or morenetwork computer systems 28 in theLAN 18. A typical LAN includes multiple computer systems shown generally ascomputer systems 28, each of which implements a messaging client, most often as a software application such as Microsoft Outlook™, for messaging functions. In thenetwork 18, messages are received by themessage server 26, distributed to the appropriate mailboxes for user accounts addressed in the received message, and can be accessed by a user through a computer in the one ormore computer systems 28. Although messaging clients in theLAN 18 operate on thecomputer systems 28, there are also known messaging clients that operate in conjunction with handheld devices and other systems or devices with electronic messaging capabilities. Like themessage server 26, a messaging client may also have additional non-messaging functions. - The
wireless network gateway 16 provides an interface to awireless network 20, through which messages may be exchanged with amobile device 22. Such functions as addressing of amobile device 22, encoding or otherwise transforming messages for wireless transmission, and any other required interface functions are performed by thewireless network gateway 16. Where thewireless network gateway 16 is configured for operation in conjunction with more than onewireless network 20, thewireless network gateway 16 may also determine a most likely network for locating a given user and track users as they roam between countries or networks. - Any computer system with access to the
WAN 12 may exchange messages with amobile device 22 through thewireless network gateway 16. Alternatively, private wireless network gateways such as wireless Virtual Private Network (VPN) routers could also be implemented to provide a private interface to a wireless network such as 20. For example, a wireless VPN implemented in theLAN 18 provides a private interface from theLAN 18 to one or more mobile devices through thewireless network 20. - Such a private interface to wireless devices via the
wireless network gateway 16 and/or thewireless network 20 can effectively be extended to entities outside theLAN 18 by providing a message forwarding or redirection system which operates with themessage server 26. In this type of system, incoming messages received by themessage server 26 and addressed to a user that has amobile device 22 are redirected through the wireless network interface, either a wireless VPN router, thegateway 16 or another interface, for example, to thewireless network 20 and to the user'smobile device 22. An exemplary redirector system operating on themessage server 26 may be of the type disclosed in U.S. Pat. No. 6,219,694, entitled “SYSTEM AND METHOD FOR PUSHING INFORMATION FROM A HOST SYSTEM TO A MOBILE DATA COMMUNICATION DEVICE HAVING A SHARED ELECTRONIC ADDRESS,” the entire disclosure of which is incorporated herein by reference. - In wireless networks such as 20, messages are normally delivered to and from mobile devices such as the
mobile device 22 via RF transmissions between base stations in thewireless network 20 and mobile devices. Modern wireless networks typically serve thousands of subscribers, each subscriber having a mobile device. Thewireless network 20 may be one of many different types of wireless network, such as a data-centric wireless network, a voice-centric wireless network or and a dual-mode networks that can support both voice and data communications over the same physical base stations. Dual-mode networks include, but are not limited to recently-developed Code Division Multiple Access (COMA) networks, the Groupe Special Mobile or the Global System for Mobile Communications (GSM) and the General Packet Radio Service (GPRS), and future third-generation (3G) networks like Enhanced Data rates for Global Evolution (EDGE) and Universal Mobile Telecommunications Systems (UMTS). GPRS is a data overlay on the GSM wireless network, operating in virtually every country in Europe. In addition to these illustrative wireless networks, other wireless networks may also be used. - Other examples of data-centric networks include, but are not limited to the Mobitex™ Radio Network (“Mobitex”) and the DataTACT™ Radio Network (“DataTAC”). Examples of older voice-centric data networks include Personal Communication Systems (PCS) networks like CDMA, GSM, and Time Division Multiple Access (TDMA).
- The
mobile device 22 may be a data communication device, a voice communication device, or a multiple-mode device capable of voice, data and other types of communications. An exemplarymobile device 22 is described in further detail below and with reference toFIG. 6 . - Perhaps the most common We of messaging currently in use is e-mail. In a standard e-mail system, an e-mail message is sent by an e-mail sender, possibly through a message server and/or a service provider system, and typically routed through the Internet to one or more message receivers. E-mail messages are normally sent unencrypted and use traditional Simple Mail Transfer Protocol (SMTP), RFC822 headers and MIME body parts to define the format of the e-mail message. As described briefly above, a message that is routed to an addressed message receiver can be redirected to a mobile device. Since a wireless link cannot be physically secured in the same way as a wired connection, messages are often encrypted for transfer through a wireless network. Overall message security can be further enhanced if a secure transfer mechanism is also used between the message sender and each recipient.
- In recent years, secure messaging techniques have evolved to protect both the content and integrity of messages such as e-mail messages. S/MIME and Pretty Good Privacy™ (PGP™) are two public key secure e-mail messaging protocols that provide for both encryption, to protect data content, and signing, which both protects the integrity of a message and provides for sender authentication by a message receiver. Secure messages may also be encoded, compressed or otherwise processed in addition to being encrypted and/or signed.
-
FIG. 2 is a block diagram illustrating a secure e-mail message exchange in a messaging system. The system includes ane-mail sender 30, coupled to aWAN 32 and awireless gateway 34, which provides an interface between theWAN 32 and awireless network 36. Amobile device 38 is adapted to operate within thewireless network 36. Also shown inFIG. 2 are digital certificatestatus information providers proxy system 39, both coupled to theWAN 32. - The
e-mail sender 30 may be a PC, such as thesystem 14 inFIG. 1 , or may be a network-connected computer, such as acomputer system 28 inFIG. 1 . Thee-mail sender 30 may also be another mobile device on which e-mail messages may be composed and sent. TheWAN 32, thewireless gateway 34, thewireless network 36, and themobile device 38 are substantially the same as similarly labelled components inFIG. 1 . - According to secure messaging schemes such as S/MIME and PGP, a message is encrypted using a one-time session key chosen by the
e-mail sender 30. The session key is used to encrypt the message body and is then itself encrypted using the public key of each addressed message receiver to which the message is to be sent. As shown at 40, a message encrypted in this way includes an encrypted message body 44 and an encrypted session key 46. In this type of message encryption scheme, a message sender such ase-mail sender 30 must have access to the public key of each entity to which an encrypted message is to be sent. - A secure e-mail message sender such as 30 normally signs a message by taking a digest of the message and signing the digest using the sender's private key. A digest may for example, be generated by performing a check-sum, a Cyclic Redundancy Check (CRC), a digest algorithm such as Message Digest Algorithm 5 (MD5), a hash algorithm such as Secure Hashing Algorithm 1 (SHA-1), or some other preferably non-reversible operation on the message. In the example shown in
FIG. 2 , both the encrypted message body 44 and the encrypted session key 46 are used to generate a digest. This digest is then signed by thesender 30 using the sender's private key. The signature private key is used for example to perform an encryption or other transformation operation on the digest to generate the digest signature. A digital signature, including the digest and the digest signature, is then appended to the outgoing message, as shown at 42. A digital certificate of the sender, which includes the sender's public key and sender identity information that is bound to the public key with one or more digital signatures, and possibly any chained digital certificates and CRLs associated with the sender's digital certificate and any chained digital certificates, may also be attached to thesecure message 40. - The
secure e-mail message 40 sent by thee-mail sender 30 includes thedigital signature 42, as well as the encrypted message body 44 and the encrypted session key 46, both of which are signed. In the MIME secure messaging technique, digital certificates, CRLs and digital signatures are normally placed at the beginning of a message, and the message body is included in a file attachment. Messages generated by other secure messaging schemes may place message components in a different order than shown or include additional and/or different components. For example, a secure message such as 40 may include addressing information, such as “To:” and “From:” email addresses, and other header information. - When the
secure e-mail message 40 is sent from thee-mail sender 30, it is routed through theWAN 32 to thewireless network 36 and themobile device 38. The transmission path between thee-mail sender 30 and themobile device 38 may also include additional or different components than those shown inFIG. 2 . For example, thesecure e-mail message 40 may be addressed to a mailbox or data store associated with a message server or data server which has been wirelessly enabled to forward or send received messages and data to themobile device 38. Further intermediate systems may also store and/or route the secure message to themobile device 38. The exemplary system as previously described and as disclosed in U.S. Pat. No. 6,219,694 is an example of one such system. - In addition, the
secure message 40 maybe routed or forwarded to themobile device 38 through other transport mechanisms than thewireless gateway 34. For example, routing to thewireless network 36 may be accomplished using a wireless VPN router associated with thee-mail sender 30, or, in the case of a message being received at an intermediate computer system or server and then forwarded to themobile device 38, with the computer system or server. - Regardless of whether a signed message is sent directly to the
mobile device 38 or forwarded to themobile device 38 by intermediate systems or components, when a signed message is received, themobile device 38 may verify thedigital signature 42. In order to verify thedigital signature 42, themobile device 38 uses a digital signature check algorithm corresponding to the signature generation algorithm used by the message sender, which may be specified in a message header or in thedigital signature 42, and the sender's public key. If a secure message includes the sender's digital certificate, then the sender's public key may be extracted from the digital certificate. The sender's public key may instead be retrieved from a local store, for example, where the public key was extracted from an earlier message from the sender and stored in a key store in the receivers local store or the sender's digital certificate is stored in the local store, or from a Public Key Server (PKS). A PKS is a server that is normally associated with a Certificate Authority (CA) from which a digital certificate for an entity, including the entity's public key, is available. A PKS might reside within a corporate LAN such asLAN 18 ofFIG. 1 , or anywhere on theWAN 32, Internet or other network or system through which message receivers may establish communications with the PKS. - Although digital signature algorithms and digest algorithms may be publicly known, a sender signs an original message using its own private key. Therefore, an entity that alters an original message cannot generate a digital signature that can be verified with the sender's public key. If a sent message is altered by an attacker after it has been signed by a sender, then the digital signature verification based on the sender's public key fails. These mathematical operations do not prevent anyone from seeing the contents of the secure message, but do ensure that the message has not been tampered with because it was signed by the sender, and that the message was signed by the person as indicated in the “From” field of the message.
- When the
digital signature 42 has been verified, or sometimes even if digital signature versification fails, the encrypted message body 44 is then decrypted before it can be displayed or further processed by a receiving messaging client operating on themobile device 38 inFIG. 2 . A receiving messaging client uses its private key to decrypt the encrypted session key 46 and then uses the decrypted session key to decrypt the encrypted message body 44 and thereby recover the original message. Those skilled in the art will appreciate that an entity may have more than one associated cryptographic key pair, such as a signature private/public key pair and an encryption private/public key pair. Thus, themobile device 38 may use one private key to decrypt the encrypted message body 44, and a different private key to digitally sign an outgoing secure message. - An encrypted message that is addressed to more than one receiver includes an encrypted version of the session key, for each receiver, that was encrypted using the public key of the receiver. Each receiver performs the same digital signature verification operations, but decrypts a different one of the encrypted session keys using its own private key.
- Therefore, in a secure messaging system, a sending messaging client should have access to the public key of any receiver to which an encrypted message is to be sent. A receiving messaging client should be able to retrieve the senders public key, which may be available to a messaging client through various mechanisms, in order to verify a digital signature in a signed message. Although the
mobile device 38 is a receiver of thesecure message 40, themobile device 38 may be enabled for two-way communications, and may therefore access public keys for both message sending and message receiving operations. - Public keys are commonly provided in digital certificates. As described above, a digital certificate for any particular entity typically includes the entity's public key and identification information that is bound to the public key with a digital signature. Several types of digital certificates are currently in widespread use, including for example X.509 digital certificates which are typically used in S/MIME. PGP uses digital certificates with a slightly different format. Systems and methods discussed herein may be used with any of these types of digital certificate, as well as other types of digital certificates, both currently known types as well as others that may be developed in the future. The digital signature in a digital certificate is generated by the issuer of the digital certificate, and can be checked by a message receiver substantially as described above. A digital certificate sometimes includes an expiry time or validity period from which a messaging client may determine if the digital certificate has expired. Verification of the validity of a digital certificate may also involve tracing a certification path through a digital certificate chain, which includes a user's digital certificate as well as other digital certificates to verity that the user's digital certificate is authentic.
- A digital certificate may also be checked to ensure that it has not been revoked. As described above, digital certificate revocation status may be checked by consulting a CRL or by requesting digital certificate status information from a digital certificate revocation status information source. In the system of
FIG. 2 , a user of themobile device 38 may submit a revocation status request for any digital certificate stored at themobile device 38 to one of thestatus information providers provider mobile device 38. In order to query both of thestatus providers - Online Certificate Status Protocol (OCSP) is one scheme that provides for determination of digital certificate revocation status without requiring CRLs. Versions of OCSP have been defined, for example, in RFC 2560 and in the Internet Draft “Online Digital Certificate Status Protocol,
version 2”, both available from the Internet Engineering Task Force (IETF). OCSP is one of the most widely used digital certificate revocation status check protocols and is therefore used herein as an illustrative example of such schemes. The systems and methods described herein, however, may also be applicable to other types of digital certificate revocation status checking schemes involving retrieval of revocation status information from remote sources. - According to OCSP, a request is submitted to a status information provider, generally referred to as an OCSP responder. Upon receipt of a properly formatted request, an OCSP responder returns a response to the requestor. An OCSP request includes at least an OCSP protocol version number, a service request, and an identification of a target digital certificate to which the request is related.
- The version number identifies the version of OCSP with which the request complies. The service request specifies the type of service being requested. For
OCSP version 2, Online Revocation Status (ORS), Delegated Path Validation (DPV) and Delegated Path Discovery (DPD) services have been defined. Through the ORS service, a messaging client may obtain revocation status information for digital certificates. The DPV and DPD services effectively delegate digital certificate validation path-related processing to a remote system. - Normally, a target digital certificate is identified in an OCSP request using a hash of the distinguished name (ON) of the issuer of the digital certificate, as well as the serial number of the digital certificate. However, since multiple digital certificate issuers may use the same ON further identification information, in the form of a hash of the issuer's public key, is also included in the request. Therefore, target digital certificate information in an OCSP request includes a hash algorithm identifier, a hash of the ON of the digital certificate issuer generated using the hash algorithm, a hash of the issuer's public key, also generated using the hash algorithm, and the serial number of the target digital certificate.
- The request may or may not be signed by a requester. Further optional information may also be included in a request and processed by an OCSP responder.
- When a messaging client is operating on a mobile device, OCSP may be desirable in that it reduces the processing and memory resources necessary to check revocation status of a digital certificate relative to CRL-based revocation status checking. However, OCSP requests can be relatively long and thereby consume limited wireless communication resources. Request overhead can be particularly large when requests are submitted to more than one status provider, for example when an error message is returned in response to a request to a status provider. The
proxy system 39, in conjunction with an appropriately enabledmobile device 38, or possibly any other system on which a messaging client operates, may be used to optimize OCSP and similar protocols for multiple remote systems, as described in further detail below. -
FIG. 3 is a block diagram of a system which supports multiple digital certificate status information providers. Themobile device 38 includes amemory 52, amessaging system 60, a proxysystem client module 62, a user interface (UI) 64, and awireless transceiver 65. Thememory 52 includes a storage area for adigital certificate store 54, as well as data stores such as anaddress book 56 in which messaging contact information is stored, and anapplication data store 58 which stores data associated with software applications on themobile device 38.Data stores memory 52 onmobile device 38. Thememory 52 may also be used by other device systems in addition to those shown inFIG. 3 to store other types of data. - The
memory 52 is illustratively a writable store such as a RAM into which other device components may write data. Thedigital certificate store 54 is a storage area that is dedicated to storage of digital certificates on themobile device 38. Digital certificates may be stored in thedigital certificate store 54 in the format in which they are received, or may alternatively be parsed or otherwise translated into a storage format before being written to thestore 54. - The
messaging system 60 is connected to thewireless transceiver 65 and is thus enabled for communications via a wireless network. Themessaging system 60 may be a messaging client embodied in a software application. - The proxy
system client module 62, which may be implemented as a software application or component, may be coupled to themessaging system 60, thedigital certificate store 54, and the mobile device'sUI 64, as shown. Revocation status for any of the digital certificates stored in thedigital certificate store 54, or those received by themessaging system 60 but not yet stored in thedigital certificate store 54, may be checked using the proxysystem client module 62. - The
UI 64 may include such UI components as a keyboard or keypad, a display, or other components which accept inputs from or provide outputs to a user of themobile device 38. Although shown as a single block inFIG. 3 , amobile device 38 typically includes more than one UI, and theUI 64 therefore represents one or more user interfaces. - The
wireless network 36, thewireless gateway 34, theWAN 32, and thestatus information providers FIG. 2 . - The
proxy system 39 includes a proxy system service module orcomponent 68 and statusprovider client modules system service component 68 is configured to exchange information with the proxysystem client module 62, and the statusprovider client modules status information providers provider client modules system service module 68 are preferably software applications or modules operating at theproxy system 39. These software applications may be a single program, or may alternatively be separate programs executed independently. - In operation, the
messaging system 60 on themobile device 38 receives and possibly sends secure messages via thewireless network 36 as described above. When a signature on a received secure message is to be verified or a message is to be sent with an encrypted session key, themessaging system 60 may retrieve a public key for an entity (i.e., a sender of a received message or a recipient of a message to be sent) from a digital certificate or a key store on themobile device 38. Before the public key is used, however, themessaging system 60 or a user thereof may wish to check that a digital certificate containing the public key is valid and has not been revoked. - Digital certificate checking operations may be performed automatically, when a digital certificate is received, for example, periodically, at predetermined or user-configurable intervals, or when invoked by a user through a
UI 64. Different types of digital certificate checking operations may also be dependent upon different controls. For instance, where the validity and revocation status of a digital certificate is checked when the digital certificate is first loaded onto themobile device 38, the digital certificate may be assumed to be valid until an expiry time or during a validity period specified in the digital certificate. However, its revocation status may thereafter be checked once every week. - As described above, digital certificate status information requests to a remote information provider such as 35 or 37 may be relatively long and are therefore not optimal for implementation in a
mobile device 38 or other bandwidth-limited communication systems. Time delays and data transfers involved in submitting requests to each of multiple status information providers can be undesirable even for less constrained systems. The proxysystem client module 62 andservice module 68 are preferably adapted to gather digital certificate status request information which is used to request status information for a digital certificate from all known status information providers. - When a user of the
mobile device 38 wishes to check the revocation status of a digital certificate, for example, the proxysystem client module 62, or possibly a software application which operates in conjunction with the proxysystem client module 62, may be invoked, by entering an appropriate command on aUI 64 such as a keyboard. The user may also specify the particular digital certificate to be checked, for instance using the serial number or subject name of the digital certificate. Alternatively, the proxysystem client module 62 may access thedigital certificate store 54 to display to the user a list of currently stored digital certificates, from which the user may select one or more digital certificates to be checked. - The proxy
system client module 62 then preferably either extracts from the selected digital certificates) or obtains from the user through aUI 64, any information required by the proxysystem service module 68 for a digital certificate revocation status check. Since theproxy system 39 provides an interface between themobile device 38 and thestatus information providers system client module 62 and proxysystem service module 68 need not conform to the protocol used between the statusprovider client modules status information providers status providers client modules system service module 68 andclient module 62 may support a more compact protocol involving less data exchange. - The particular information extracted or obtained by the proxy
system client module 62 is dependent upon the communication protocol implemented between the proxysystem client module 62 andservice module 68. The proxysystem client module 62 can preferably extract a digital certificate subject name, serial number, issuer name, and other digital certificate information from a digital certificate in thedigital certificate store 54. If digital certificates are first parsed and then parsed data is stored in thedigital certificate store 54, then such information may be extracted from the parsed data in thedigital certificate store 54 by the proxysystem client module 62. If further information is required, a user may be prompted to enter the information. For example, if theproxy system 39 is configured to store a mapping table or like element which maintains a correspondence between digital certificate issuers and serial numbers and/or subject names, then the statusprovider client modules status information providers system service module 68 from the proxysystem client module 62. - The proxy
system client module 62 preferably gathers all information that is required for requests to any of thestatus information providers system client module 62, a request is formatted and sent to the proxysystem service module 68. The content of this request is also dependent upon the communication protocol used between the proxysystem service module 68 andclient module 62. If more than one type of service is supported, then the request may specify which type of service is requested. In some implementations, only a single service may be supported, such that no service type need be specified. - Information received by the proxy
system service module 68 is preferably passed to each statusprovider client module provider client modules status information providers status information providers provider client modules system service module 68, as well as any further required information, are formatted into an OCSP requests. In some cases, the information provided by the proxysystem service module 68 may include all required information, whereas in other cases, further information may be extracted from other sources, such as the above example mapping table and included in the requests to thestatus information providers - Since the status
provider client modules system service module 68. For example, if theprovider client module 66 requires only a subset of the information required by theprovider client module 67, then each statusprovider client module proxy system 39. Alternatively, the proxysystem service module 68 is configured to pass any required information to eachprovider client module system client module 62 to include any information required by theprovider client modules provider client module - Thus, the
proxy system 39 requests digital certificate status information from multiple status information providers for which a provider client module has been implemented, responsive to a single initial request to theproxy system 39. According to known techniques, separate requests are submitted to eachstatus information provider mobile device 38 - A determination of the particular status information providers to which a request will be sent in response to an initial request from the
mobile device 38 may be made in any of several ways. Aproxy system 39 may send a request to every status information provider for which a provider client module has been implemented, or possibly to each status information provider in a default list stored at theproxy system 39. Similarly, a default, possibly user-configurable, list of status information providers may be stored at themobile device 38 and included in the initial request sent from themobile device 38. In this case, theproxy system 39 may store the default list received in an initial request from themobile device 38, and then use the default list for subsequent initial requests from themobile device 38, until a new default list for themobile device 38 is received. Alternatively, a user may select or specify status information providers to be used to provide the requested service. User-selected or specified status information providers in an initial request may over-ride any default list of status information providers. Preferred status information providers may also be included in each digital certificate stored in thedigital certificate store 54 or received by themobile device 38 and submitted to the proxysystem service module 68 when such a digital certificate is a target digital certificate in an initial request. - In
FIG. 3 , thestatus provider 37 may support an ORS or like service. Upon receiving a request, eachstatus information provider providers client modules provider client module client module mobile device 38 through the proxysystem service module 68, or returning an error message to the proxysystem service module 68. Responsive to an error message from aclient module system service module 68 preferably formats and sends an error message to the proxysystem client module 62 as a response to its initial service request. Other conditions, such as when aprovider provider client module status information providers status information providers - If the request meets the above conditions, then a so-called “definitive” response is returned to the corresponding
provider client module status provider - Since a request is sent to each status information,
provider provider client modules system client module 68, which selects one of the responses to be used in preparing a response that will be returned to the proxysystem client module 62 on themobile device 38. In this configuration, the proxysystem service module 68 uses the first definitive response to prepare a response to the proxysystem client module 62. If no definitive response is received, then an error or similar response may be prepared by the proxysystem service module 68 and returned to the proxysystem client module 62 to indicate this result. Other selection criteria, including a status information provider ranking list, for example, may also be used to control which one of multiple responses will be returned to the proxysystem client module 62 or used to prepare a response to the proxysystem client module 62. Such a ranking may be established at theproxy system 39 or at themobile device 38, or specified in a digital certificate. Relative ranking may also be inherent in the ordering of status information providers in a list that is used to control the particular status information providers to which requests will be sent by theproxy system 39, as described above. - When a selected response from one of the
status information providers system client module 62 or another component on themobile device 38 is configured to verify digital signatures on status responses, then the entire selected response, or possibly only the signed portions thereof, may be forwarded to the proxysystem client module 62 substantially unchanged. If only portions of a response are signed, then unsigned portions of the response are preferably removed by the proxysystem service module 68 to reduce the size of the response sent to the proxysystem client module 62 via thewireless network 36. However, if the proxysystem service module 68 or the statusprovider client module 66 checks status response signatures on behalf of themobile device 38, then certain parts of the response, for example the status indication and the digital certificate serial number or subject name, may be extracted by the proxysystem service module 68 and formatted into a response that is then sent to the proxysystem client module 62. The response from the proxysystem service module 68 is then processed by the proxysystem client module 62 or possibly another component on themobile device 38 to determine whether or not the digital certificate has been revoked. - The presence of a proxy
system client module 62 preferably does not preclude digital certificate validity and revocation status checks according to known techniques. Thus, digital certificate status checks involving remote systems such as thestatus information providers -
FIG. 4 is a flow diagram illustrating a method of supporting multiple digital certificate status information providers. Atstep 80, any digital certificates for which a status check is to be performed are identified. As described above, this step could be performed automatically or the digital certificates could be selected by a user. An initial request is then prepared and sent to the proxy system atstep 82. In some instances, the initial request includes a list of status information providers to which a request should be sent, and possibly a ranking list that specifies an order of preference between subsequent responses from different status providers. As described above, a list of status information providers may be arranged in order of preference to provide both status information provider information and preference information. - At
step 84, status information provider client modules at the proxy system prepare and send service requests to each status information provider, such as an OCSP responder. Each status information provider then checks its request to ensure that it is formatted properly, that the requested service, digital certificate revocation status in this example, is supported by the provider, and that all required information is included in the request. These checks are performed by each status information provider atstep 86. - If the request does not satisfy these conditions, then an error message is returned to the proxy system at
step 88. Error processing may then be executed atstep 90, to obtain further information when the request does not include all required information, for example, after which a new service request may be prepared and sent to the provider atstep 84. - When the request satisfies the conditions in
step 86, the status information provider returns a status indication to the proxy system atstep 92, in response to the service request from the proxy system. Thesteps step 84. - At
step 94, the proxy system selects one of the responses to be used in preparing a response to the requestor, themobile device 38 inFIG. 3 , for example. As described above, the first definitive response is selected, or other selection criteria may be applied. The selected response, or at least parts thereof, is then returned to the requestor, as a response to the initial service request, atstep 96. - Although the system and method described above relate to the illustrative example of digital certificate revocation status checking, digital certificate validity checks, according to the DPV and DPD services of OCSP or other protocols, for example, may similarly be optimized for multiple status information providers through a proxy system client module and service module. A proxy system may also be enabled to provide its proxy service to multiple mobile devices, and a mobile device may be configured to communicate with more than one proxy system.
- In another embodiment, a
mobile device 100 andproxy system 128 include multiple client and service modules,FIG. 5 is a block diagram of a system having multiple proxy system client modules which support multiple digital certificate status information providers. InFIG. 5 , thememory 102, thedata stores messaging system 110, theUI 114, thewireless transceiver 116, thewireless network 118, thewireless gateway 120, and theWAN 122 are substantially the same as similarly labelled components inFIG. 3 . - The
mobile device 100 includesN client modules 112, including the proxy systemclient module A 113 and the proxy systemclient module N 111. Theproxy system 128 includes corresponding proxy system service modules A and N, 132 and 136. It should be appreciated that other proxy system client modules on themobile device 100 may be supported by other proxy system service modules in theproxy system 128, or by proxy system service modules in other proxy systems. Theproxy system 128 also includes status provider client modules A and N, 130 and 134, which are configured for communications with the statusinformation provider A 126 and the statusinformation provider N 124, respectively. - The system shown in
FIG. 5 operates substantially as described above. When the status of one or more digital certificates, such as revocation status for example, is to be checked, each proxysystem client module system service module provider client modules mobile device 100, and possibly information available at theproxy system 128, to prepare a service request tostatus information providers system service modules proxy system 128 are preferably configured such that only one of the responses returned by thestatus information providers system client modules mobile device 100. One of the responses may be selected according to any of the schemes described above. - Each proxy
system client module system client modules proxy system 128. Each proxysystem service module status information provider - A multiple-client module system such as shown in
FIG. 5 is particularly useful when a user wishes to check validity and/or revocation status of an entire digital certificate chain which includes digital certificates for which status information is available from different status information providers. In known systems, separate requests for each digital certificate in the chain must be sent to the status information providers. In the system ofFIG. 5 however, only a single request need be sent from themobile device 100 to obtain status information from any number of status information providers. -
FIG. 6 is a block diagram of a wireless mobile communication device. Themobile device 600 is preferably a two-way communication device having at least voice and data communication capabilities. Themobile device 600 preferably has the capability to communicate with other computer systems on the Internet. Depending on the functionality provided by the mobile device, the mobile device may be referred to as a data messaging device, a two-way pager, a mobile telephone with data messaging capabilities, a wireless Internet appliance, or a data communication device (with or without telephony capabilities). As mentioned above, such devices are referred to generally herein simply as mobile devices. - The
mobile device 600 includes a transceiver 611, amicroprocessor 638, adisplay 622, aFlash memory 624, a random access memory (RAM) 626, auxiliary input/output (I/O)devices 628, aserial port 630, akeyboard 632, aspeaker 634, amicrophone 636, a short-rangewireless communications sub-system 640, andother device sub-systems 642. The transceiver 611 includes transmit and receiveantennas Flash memory 624, themobile device 600 includes a plurality ofsoftware modules 624A-624N that can be executed by the microprocessor 638 (and/or the DSP 620), including avoice communication module 624A, a data communication module 6248, and a plurality of otheroperational modules 624N for carrying out a plurality of other functions. - The
mobile device 600 is preferably a two-way communication device having voice and data communication capabilities. Thus, for example, themobile device 600 may communicate over a voice network, such as any of the analog or digital cellular networks, and may also communicate over a data network. The voice and data networks are depicted inFIG. 6 by thecommunication tower 619. These voice and data networks may be separate communication networks using separate infrastructure, such as base stations, network controllers, etc., or they may be integrated into a single wireless network, References to thenetwork 619 should therefore be interpreted as encompassing both a single voice and data network and separate networks. - The communication subsystem 611 is used to communicate with the
network 619. TheDSP 620 is used to send and receive communication signals to and from the transmitter 614 andreceiver 612, and may also exchange control information with the transmitter 614 andreceiver 612. If the voice and data communications occur at a single frequency, or closely-spaced set of frequencies, then asingle LO 613 may be used in conjunction with the transmitter 614 andreceiver 612. Alternatively, if different frequencies are utilized for voice communications versus data communications, then a plurality ofLOs 613 can be used to generate a plurality of frequencies corresponding to thenetwork 619. Although twoantennas FIG. 6 , themobile device 600 could be used with a single antenna structure. Information, which includes both voice and data information, is communicated to and from the communication module 611 via a link between theDSP 620 and themicroprocessor 638. - The detailed design of the communication subsystem 611, such as frequency band, component selection, power level, etc., will be dependent upon the
communication network 619 in which themobile device 600 is intended to operate. Far example, amobile device 600 intended to operate in a North American market may include a communication subsystem 611 designed to operate with the Mobitex or DataTAC mobile data communication networks and also designed to operated with any of a variety of voice communication networks, such as AMPS, TDMA, CDMA, PCS, etc. amobile device 600 intended for use in Europe may be configured to operate with the GPRS data communication network and the GSM voice communication network. Other types of data and voice networks, both separate and integrated, may also be utilized with themobile device 600. - Depending upon the type of
network 619, the access requirements for themobile device 600 may also vary. For example, in the Mobitex and DataTAC data networks, mobile devices are registered on the network using a unique identification number associated with each device. In GPRS data networks, however, network access is associated with a subscriber or user of themobile device 600, A GPRS device typically requires a subscriber identity module (“SIM”), which is required in order to operate themobile device 600 on a GPRS network. Local or non-network communication functions (if any) may be operable, without the SIM, but themobile device 600 will be unable to carry out any functions involving communications over thenetwork 619, other than any legally required operations, such as ‘911’ emergency calling. - After any required network registration or activation procedures have been completed, the
mobile device 600 may send and receive communication signals, preferably including both voice and data signals, over thenetwork 619. Signals received by theantenna 616 from thecommunication network 619 are routed to thereceiver 612, which provides for such operations as signal amplification, frequency down conversion, filtering, channel selection, and analog to digital conversion. Analog to digital conversion of the received signal allows more complex communication functions, such as digital demodulation and decoding to be performed using theDSP 620. In a similar manner, signals to be transmitted to thenetwork 619 are processed, including modulation and encoding, for example, by theDSP 620 and are then provided to the transmitter 614 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission to thecommunication network 619 via theantenna 618. Although a single transceiver 611 is shown inFIG. 6 for both voice and data communications, it is possible that themobile device 600 may include two distinct transceivers, a first transceiver for transmitting and receiving voice signals, and a second transceiver for transmitting and receiving data signals. Multiple transceiver may also be provided in a mobile device adapted to operate within more than one communication network or multiple frequency bands. - In addition to processing the communication signals, the
DSP 620 also provides for receiver and transmitter control. For example, the gain levels applied to communication signals in thereceiver 612 and transmitter 614 may be adaptively controlled through automatic gain control algorithms implemented in theDSP 620. Other transceiver control algorithms could also be implemented in theDSP 620 in order to provide more sophisticated control of the transceiver 611. - The
microprocessor 638 preferably manages and controls the overall operation of themobile device 600. Many types of microprocessors or microcontrollers could be used here, or alternatively, asingle DSP 620 could be used to carry out the functions of themicroprocessor 638. Low-level communication functions, including at least data and voice communications, are performed through theDSP 620 in the transceiver 611. Other, high-level communication applications, such as avoice communication application 624A, and adata communication application 624B are stored in theFlash memory 624 for execution by themicroprocessor 638. For example, thevoice communication module 624A may provide a high-level user interface operable to transmit and receive voice calls between themobile device 600 and a plurality of other voice devices via thenetwork 619. Similarly, thedata communication module 624B may provide a high-level user interface operable for sending and receiving data such as e-mail messages, files, organizer information, short text messages, etc., between themobile device 600 and a plurality of other data devices via thenetwork 619. On themobile device 600, a secure messaging software application, incorporating software modules corresponding to themessaging system 60 and the proxysystem client module 62 orclient modules data communication module 624B in order to implement the techniques described above. - The
microprocessor 638 also interacts with other device subsystems, such as thedisplay 622, theFlash memory 624, theRAM 626, the auxiliary input/output (I/O)subsystems 628 theserial port 630, thekeyboard 632, thespeaker 634, themicrophone 636, the short-range communications subsystem 640, and any of the other device subsystems generally designated as 642. For example, themodules 624A-N are executed by themicroprocessor 638 and may provide a high-level interface between a user and themobile device 600. This interface typically includes a graphical component provided through thedisplay 622, and an input/output component provided through the auxiliary I/O 628, thekeyboard 632, thespeaker 634, or themicrophone 636. Such interfaces are designated generally asUI FIGS. 3 and 5 , respectively. - Some of the subsystems shown in
FIG. 6 perform communication-related functions, whereas other subsystems may provide “resident” or on-device functions. Notably, some subsystems, such as thekeyboard 632 and thedisplay 622 are used for both communication-related functions such as entering a text message for transmission over a data communication network, and device-resident functions such as a calculator or task list or other PDA type functions. - Operating system software used by the
microprocessor 638 is preferably stored in a non-volatile store such asFlash memory 624. In addition to the operating system andcommunication modules 624A-N, theFlash memory 624 may also include a file system for storing data. A storage area is also preferably provided in theFlash memory 624 to store digital certificates, address book entries and possibly other information required for messaging, shown asdata stores FIG. 3 or thedata stores FIG. 5 . The operating system, specific device applications or modules, or parts thereof, may be temporarily loaded into a volatile store, such asRAM 626 for faster operation. Moreover, received communication signals may also be temporarily stored toRAM 626, before permanently writing them to a file system located in theFlash memory 624. - An
exemplary application module 624N that may be loaded onto themobile device 600 is a personal information manager (PIM) application providing PDA functionality, such as calendar events, appointments, and task items. Thismodule 624N may also interact with thevoice communication module 624A for managing phone calls, voice mails, etc., and may also interact with thedata communication module 624B for managing e-mail communications and other data transmissions. Alternatively, all of the functionality of thevoice communication module 624A and the data communication module 6248 may be integrated into the PIM module. - The
Flash memory 624 preferably provides a file system to facilitate storage of PIM data items on the device. The PIM application preferably includes the ability to send and receive data items, either by itself, or in conjunction with the voice anddata communication modules wireless network 619. The PIM data items are preferably seamlessly integrated, synchronized and updated, via thewireless network 619, with a corresponding set of data items stored or associated with a host computer system, thereby creating a mirrored system for data items associated with a particular user. - Although shown as a
Flash memory 624, those skilled in the art will appreciate that other types of non-volatile store, such as a battery backed-up RAM, for example, could be used in addition to or instead of theFlash memory 624. - The
mobile device 600 may also be manually synchronized with a computer system by placing themobile device 600 in an interface cradle, which couples theserial port 630 of themobile device 600 to the serial port of the computer system. Theserial port 630 may also be used to enable a user to set preferences through an external device or software application, to downloadother application modules 624N for installation, and possibly to load digital certificates onto a mobile device. This wired download path may further be used to load an encryption key onto the device, which is a more secure method than exchanging encryption information via thewireless network 619. -
Additional application modules 624N may be loaded onto themobile device 600 through thenetwork 619, through an auxiliary I/O subsystem 628, through theserial port 630, through the short-range communications subsystem 640, or through any othersuitable subsystem 642, and installed by a user in theFlash memory 624 orRAM 626. Such flexibility in application installation increases the functionality of themobile device 600 and may provide enhanced on-device functions, communication-related functions, or both. For example, secure communication applications may enable electronic commerce functions and other such financial transactions to be performed using themobile device 600. - When the
mobile device 600 is operating in a data communication mode, a received signal, such as a text message or a web page download, is processed by the transceiver 611 and provided to themicroprocessor 638, which preferably further processes the received signal for output to thedisplay 622, or, alternatively, to an auxiliary I/O device 628. A digital certificate received by the transceiver 611, in response to a request to a PKS or attached to a secure message, for example, may be added to a digital certificate store in theFlash memory 624 if it has not already been stored. Validity and/or revocation status of such a digital certificate may also be checked as described above. A user ofmobile device 600 may also compose data items, such as e-mail messages, using thekeyboard 632, which is preferably a complete alphanumeric keyboard laid out in the QWERTY style, although other styles of complete alphanumeric keyboards such as the known DVORAK style may also be used. User input to themobile device 600 is further enhanced with a plurality of auxiliary I/O devices 628, which may include a thumbwheel input device, a touchpad, a variety of switches, a rocker input switch, etc. The composed data items input by the user may then be transmitted over thecommunication network 619 via the transceiver 611. - When the
mobile device 600 is operating in a voice communication mode, the overall operation of themobile device 600 is substantially similar to the data mode, except that received signals are preferably output to thespeaker 634 and voice signals for transmission are generated by amicrophone 636. In addition, the secure messaging techniques described above might not necessarily be applied to voice communications. Alternative voice or audio I/O subsystems, such as a voice message recording subsystem, may also be implemented on themobile device 600. Although voice or audio signal output is preferably accomplished primarily through thespeaker 634, thedisplay 622 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information. For example, themicroprocessor 638, in conjunction with thevoice communication module 624A and the operating system software, may detect the caller identification information of an incoming voice call and display it on thedisplay 622. - The short-
range communications subsystem 640 may include an infrared device and associated circuits and components, or a short-range wireless communication module such as a Bluetooth™ module or an 802.11 module to provide for communication with similarly-enabled systems and devices. Those skilled in the art will appreciate that “Bluetooth” and “802.11” refer to sets of specifications, available from the Institute of Electrical and Electronics Engineers, relating to wireless personal area networks and wireless LANs, respectively. - It will be appreciated that the above description relates to preferred embodiments by way of example only, as many other variations and examples may occur to those skilled in the art. For example, although digital certificate status checking according to aspects of the system and method are described primarily in the context of a wireless mobile communication device, the system and method are also applicable to messaging clients operating on other platforms, including those operating on desktop and laptop computer systems, networked computer workstations and other types of messaging clients for which digital certificate checks involving remote systems may be desired.
- The above description also relates primarily to OCSP, although other protocols may similar be optimized through an intermediate proxy system which operates in conjunction with both remote systems and proxy system client modules. Such other protocols are not limited to digital certificate status check protocols. A proxy system and proxy system client modules may be configured to provide other services than digital certificate status check services.
-
FIG. 7 is a block diagram illustrating a multiple messaging scheme utilizing an intermediate computer system. As shown inFIG. 7 , the proxy system may in general be anintermediate computer system 700 disposed between themobile device 702 and status information providers (704, 706, 708). Theintermediate computer system 700 exchanges data with themobile device 702 and status information providers (704, 706, 708) vianetwork connections intermediate computer system 700 may perform proxy server functions, such as security, administrative control, and caching. - The
intermediate computer system 700 uses a status informationprovider data structure 720 in determining which status information providers are to receive a service request. A service request asks a status information provider to provide the status information. Thedata structure 720 may be populated with provider information that was sent by themobile device 702. There are many other ways for populating thedata structure 720 with provider information. For example, a mapping table may be stored in thedata structure 720 which maintains a correspondence between digital certificate issuers and serial numbers and/or subject names. In this example, theintermediate computer system 700 may format requests for the status information providers based on only a serial number or subject name sent from themobile device 702. - A
service message handler 730 is used by theintermediate computer system 700 to generatemultiple service requests 732 based upon a request received from themobile device 702. Each of the generated service requests corresponds to a status information provider and asks for status information from a provider. At least one of the responses from the status information providers (704, 706, 708) is used in reply to the mobile device's request for status information. - Still further examples of the wide scope of the systems and methods disclosed herein are illustrated in
FIGS. 8-10 .FIGS. 8-10 describe additional uses of the systems and methods within different exemplary communication systems. -
FIG. 8 is a block diagram showing a communication system. InFIG. 8 , there is shown acomputer system 802, aWAN 804,corporate LAN 806 behind asecurity firewall 808,wireless infrastructure 810,wireless networks mobile devices LAN 806 includes amessage server 820, awireless connector system 828, adata store 817 including at least a plurality ofmailboxes 819, adesktop computer system 822 having a communication link directly to a mobile device such as throughphysical connection 824 to an interface orconnector 826, and awireless VPN router 832. Operation of the system inFIG. 8 is described below with reference to themessages - The
computer system 802 is for example, a laptop, desktop or palmtop computer system configured for connection to theWAN 804. Such a computer system may connect to theWAN 804 via an ISP or ASP. Alternatively, thecomputer system 802 may be a network-connected computer system that like thecomputer system 822 for example, accesses theWAN 804 through a LAN or other network, Many modem mobile devices are enabled for connection to a WAN through various infrastructure and gateway arrangements, so that thecomputer system 802 may also be a mobile device. - The
corporate LAN 806 is an illustrative example of a central, server-based messaging system that has been enabled for wireless communications. Thecorporate LAN 806 may be referred to as a ‘host system’, in that it hosts both adata store 817 withmailboxes 819 for messages, as well as possibly further data stores (not shown) for other data items, that may be sent to or received frommobile devices wireless connector system 828, thewireless VPN router 832, or possibly other components enabling communications between thecorporate LAN 806 and one or moremobile devices corporate LAN 806 is one preferred embodiment of a host system in which the host system is a server computer running within a corporate network environment operating behind and protected by at least onesecurity communications firewall 808. Other possible central host systems include ISP, ASP and other service provider or mail systems. Although thedesktop computer system 824 and interface/connector 826 may be located outside such host systems, wireless communication operations may be similar to those described below. - The
corporate LAN 806 implements thewireless connector system 828 as an associated wireless communications enabling component, which will normally be a software program, a software application, or a software component built to work with at least onemessage server 820. Thewireless connector system 828 is used to send user-selected information to, and to receive information from, one or moremobile devices more wireless networks wireless connector system 828 may be a separate component of a messaging system, as shown inFIG. 8 , or may instead be partially or entirely incorporated into other communication system components. For example, themessage server 820 may incorporate a software program, application, or component implementing thewireless connector system 828, portions thereof, or some or all of its functionality. - The
message server 820, running on a computer behind thefirewall 808, acts as the main interface for the corporation to exchange messages, including for example electronic mail, calendaring data, voice mail, electronic documents, and other PIM data with aWAN 804, such as the Internet, The particular intermediate operations and computers are dependent upon the specific type of message delivery mechanisms and networks via which messages are exchanged, and therefore have not been shown inFIG. 8 . The functionality of themessage server 820 may extend beyond message sending and receiving, providing such features as dynamic database storage for data like calendars, to-do lists, task lists, e-mail, and documentation, as described above. - Message servers such as 820 normally maintain a plurality of
mailboxes 819 in one or more data stores such as 817 for each user having an account on the server. Thedata store 817 includesmailboxes 819 for a number (“n”) of user accounts. Messages received by themessage server 820 that identify a user, a user account, a mailbox, or possibly another address associated with a user, account ormailbox 819, as a message recipient is typically stored in thecorresponding mailbox 819. If a message is addressed to multiple recipients or a distribution list, then copies of the same message may be stored to more than onemailbox 819. Alternatively, themessage server 820 may store a single copy of such a message in a data store accessible to all of the users having an account on themessage server 820, and store a pointer or other identifier in each recipient'smailbox 819. In typical messaging systems, each user then accesses his or hermailbox 819 and its contents using a messaging client such as Microsoft Outlook or Lotus Notes, which normally operates on a PC, such as thedesktop computer system 822, connected in theLAN 806. Although only onedesktop computer system 822 is shown inFIG. 8 , those skilled in the art will appreciate that a LAN typically contains many desktop, notebook, and laptop computer systems. Each messaging client normally accesses amailbox 819 through themessage server 820, although in some systems, a messaging client may enable direct access to thedata store 817 and amailbox 819 stored thereon by thedesktop computer system 822. Messages may also be downloaded from thedata store 817 to a local data store on thedesktop computer system 822. - Within the
corporate LAN 806, thewireless connector system 828 operates in conjunction with themessage server 820. Thewireless connector system 828 may reside on the same computer system as themessage server 820, or may instead be implemented on a different computer system. Software implementing thewireless connector system 828 may also be partially or entirely integrated with themessage server 820. Thewireless connector system 828 and themessage server 820 are preferably designed to cooperate and interact to allow the pushing of information to themobile devices wireless connector system 828 is preferably configured to send information that is stored in one or more data stores associated with thecorporate LAN 806 to one or more of themobile devices corporate firewall 808 and via theWAN 804 and one of thewireless networks mailbox 819 in thedata store 817 may also have a mobile device, such as 816. As described above, messages received by themessage server 820 that identify a user, account, ormailbox 819 are stored to acorresponding mailbox 819 by themessage server 820. If a user has a mobile device, such as 816, messages received by themessage server 820 and stored to the user'smailbox 819 are preferably detected by thewireless connector system 828 and sent to the user'smobile device 816. This type of functionality represents a “push” message sending technique. Thewireless connector system 828 may instead employ a “pull” technique, in which items stored in amailbox 819 are sent to amobile device - The use of a
wireless connector 828 thereby enables a messaging system including a message server 520 to be extended so that each user'smobile device message server 820. Although the systems and methods described herein are not restricted solely to a push-based technique, a more detailed description of push-based messaging may be found in the United States Patent and incorporated by reference above. This push technique uses a wireless friendly encoding, compression and encryption technique to deliver all information to a mobile device, thus effectively extending thecompany firewall 808 to include themobile devices - As shown in
FIG. 8 , there are several paths for exchanging information with amobile device corporate LAN 806. One possible information transfer path is through thephysical connection 824 such as a serial port, using an interface orconnector 826. This path is useful for example for bulk information updates often performed at initialization of amobile device mobile device LAN 806, such as thecomputer system 822. For example, as described above, PIM data is commonly exchanged over a such a connection as a serial port connected to a cradle in or upon which amobile device physical connection 824 may also be used to transfer other information from adesktop computer system 822 to amobile device desktop computer system 822, or other relatively bulky information such as digital certificates and CRLs. - Private key exchange using the
physical connection 824 and the connector orinterface 826 allows a user'sdesktop computer system 822 andmobile device desktop computer system 822 andmobile device host system 822 or themobile device message server 820. The transfer of digital certificates and CRLs over such a physical connection is desirable in that they represent a large amount of the data that is required for S/MIME, PGP and other public key security methods. A user's own digital certificate, a chain of digital certificates used to verify the user's digital certificate, and a CRL, as well as digital certificates, digital certificate chains and CRLs for other users, may be loaded onto amobile device desktop computer system 822. This loading of other user's digital certificates and CRLs onto amobile device - In known “synchronization” type wireless messaging systems, a physical path has also been used to transfer messages from
mailboxes 819 associated with amessage server 820 tomobile devices - Another method for data exchange with the
mobile devices wireless connector system 828 and using thewireless networks FIG. 8 , this could involve aWireless VPN router 832, if available in thenetwork 806, or alternatively, a traditional WAN connection towireless infrastructure 810 that provides an interface to one or more wireless networks such as 814. TheWireless VPN router 832 provides for creation of a VPN connection directly through aspecific wireless network 812 to awireless device 816. Such aWireless VPN router 832 may be used in conjunction with a static addressing scheme. For example, if thewireless network 812 is an IP-based wireless network, then IPV6 would provide enough IP addresses to dedicate an IP address to everymobile device 816 configured to operate within thenetwork 812 and thus make it possible to push information to amobile device 816 at-any time. A primary advantage of using awireless VPN router 832 is that it could be an off-the-shelf VPN component which would not requirewireless infrastructure 810. A VPN connection may use a TCP/IP or UDP/IP connection to deliver messages directly to and from amobile device 816. - If a
wireless VPN router 832 is not available, then a link to aWAN 804, normally the Internet, is a commonly used connection mechanism that may be employed by thewireless connector system 828. To handle the addressing of themobile device 816 and any other required interface functions,wireless infrastructure 810 is preferably used. Thewireless infrastructure 810 may also determine a most likely wireless network for locating a given user, and track users as they roam between countries or networks. In wireless networks such as 812 and 814, messages are normally delivered to and from mobile devices via RF transmissions between base stations and the mobile devices. - A plurality of connections to
wireless networks wireless networks - In some implementations, more than one over-the-air information exchange mechanism may be provided in the
corporate LAN 806. InFIG. 8 for example, themobile devices users having mailboxes 819 associated with user accounts on themessage server 820 are configured to operate ondifferent wireless networks wireless network 812 supports IPv6 addressing, then thewireless VPN router 832 may be used by thewireless connector system 828 to exchange data with anymobile device 816 operating within thewireless network 812. Thewireless network 814 may be a different type of wireless network, however, such as the Mobitex network, in which case information is instead exchanged with themobile device 818 operating within thewireless network 814 via a connection to theWAN 804 and thewireless infrastructure 810. - Operation of the system in
FIG. 8 will now be described using an example of ane-mail message 833 sent from thecomputer system 802 and addressed to at least one recipient having both an account andmailbox 819 or like data store associated with themessage server 820 and amobile device e-mail message 833 is intended for illustrative purposes only. The exchange of other types of information between thecorporate LAN 806 is preferably also enabled by thewireless connector system 828. - The
e-mail message 833, sent from thecomputer system 802 via theWAN 804, may be fully in the clear, or signed with a digital signature and/or encrypted, depending upon the particular messaging scheme used. For example, if thecomputer system 802 is enabled for secure messaging using S/MIME, then thee-mail message 833 may be signed, encrypted, or both. - E-mail messages such as 833 normally use traditional SMTP, RFC822 headers and MIME body parts to define the format of the e-mail message. These techniques are all well known to one in the art. The
e-mail message 833 arrives at themessage server 820, which determines into whichmailboxes 819 thee-mail message 833 should be stored. As described above, a message such as thee-mail message 833 may include a user name, a user account, a mailbox identifier, or other type of identifier that is mapped to a particular account or associatedmailbox 819 by themessage server 820. For ane-mail message 833, recipients are typically identified using e-mail addresses corresponding to a user account and thus amailbox 819. - The
wireless connector system 828 sends or mirrors, via thewireless network corporate LAN 806 to the user'smobile device networked computer system 822, disconnection of the user'smobile device interface 826, or receipt of a command sent from amobile device wireless connector system 828 may detect triggering events associated with themessage server 820, such as receipt of a command, or with one or morenetworked computer systems 822, including the screen saver and disconnection events described above. When wireless access to corporate data for amobile device LAN 806, for example when thewireless connector system 828 detects the occurrence of a triggering event for a mobile device user, data items selected by the user are preferably sent to the user's mobile device. In the example of thee-mail message 833, assuming that a triggering event has been detected, the arrival of themessage 833 at themessage server 820 is detected by thewireless connector system 828. This may be accomplished, for example, by monitoring or queryingmailboxes 819 associated with themessage server 820, or, if themessage server 820 is a Microsoft Exchange server, then thewireless connector system 828 may register for advise syncs provided by the Microsoft Messaging Application Programming Interface (MAR) to thereby receive notifications when a new message is stored to amailbox 819. - When a data item such as the
e-mail message 833 is to be sent to amobile device wireless connector system 828 preferably repackages the data item in a manner that is transparent to themobile device mobile device LAN 806 inFIG. 8 . One preferred repackaging method includes wrapping received messages to be sent via awireless network mobile device mobile device mailbox 819 even though they are composed and sent from a mobile device. A user of amobile device mailbox 819 and the mobile device. - Repackaging of the
e-mail message 833 is indicated at 834 and 836. Repackaging techniques may be similar for any available transfer paths or may be dependent upon the particular transfer path, either thewireless infrastructure 810 or thewireless VPN router 832. For example, thee-mail message 833 is preferably compressed and encrypted, either before or after being repackaged at 834, to thereby provide for secure transfer to themobile device 818. Compression reduces the bandwidth required to send the message, whereas encryption ensures confidentiality of any messages or other information sent to themobile devices VPN router 832 might only be compressed and not encrypted, since a VPN connection established by theVPN router 832 is inherently secure. Messages are thereby securely sent, via either encryption at thewireless connector system 828, which may be considered a non-standard VPN tunnel or a VPN-like connection, for example, or theVPN router 832, tomobile devices mobile device LAN 806 using thedesktop computer system 822. - When a repackaged
message mobile device wireless infrastructure 810, or via thewireless VPN router 832, themobile device message mobile device LAN 806. The host system may then remove the electronic envelope from the repackaged message, decrypt and decompress the message if desired, and route the message to the addressed recipients. - Another goal of using an outer envelope is to maintain at least some of the addressing information in the
original e-mail message 833. Although the outer envelope used to route information tomobile devices original e-mail message 833, including at least one address field, possibly in compressed and/or encrypted form. This allows original “To”, “From” and “CC” addresses of thee-mail message 833 to be displayed when the outer envelope is removed and the message is displayed on amobile device wireless connector system 828. Using the users account or mailbox address from themobile device users mailbox 819 or account at the host system rather than the mobile device. -
FIG. 9 is a block diagram of an alternative communication system, in which wireless communications are enabled by a component associated with an operator of a wireless network. As shown inFIG. 9 , the system includes acomputer system 802,WAN 804, acorporate LAN 807 located behind asecurity firewall 808,network operator infrastructure 840, awireless network 811, andmobile devices computer system 802, theWAN 804, thesecurity firewall 808, themessage server 820, thedata store 817, themailboxes 819, and theVPN router 835 are substantially the same as the similarly-labelled components inFIG. 8 . However, since theVPN router 835 communicates with thenetwork operator infrastructure 840, it need not necessarily be a wireless VPN router in the system ofFIG. 9 . Thenetwork operator infrastructure 840 enables wireless information exchange between theLAN 807 and themobile devices computer systems wireless network 811. In theLAN 807, a plurality ofdesktop computer systems physical connection connector wireless connector system computer system - The
wireless connector systems wireless connector system 828 described above, in that they enable data items, such as e-mail messages and other items that are stored inmailboxes 819, and possibly data items stored in a local or network data store, to be sent from theLAN 807 to one or more of themobile devices FIG. 9 however, thenetwork operator infrastructure 840 provides an interface between themobile devices LAN 807. As above, operation of the system shown inFIG. 9 is described below in the context of an e-mail message as an illustrative example of a data item that may be sent to amobile device - When an
e-mail message 833, addressed to one or more recipients having an account on themessage server 820, is received by themessage server 820, the message, or possibly a pointer to a single copy of the message stored in a central mailbox or data store, is stored in themailbox 819 of each such recipient. Once thee-mail message 833 or pointer has been stored to amailbox 819, it may preferably be accessed using amobile device FIG. 9 , thee-mail message 833 has been addressed to themailboxes 819 associated with bothdesktop computer systems mobile devices - As those skilled in the art will appreciate, communication network protocols commonly used in wired networks such as the
LAN 807 and/or theWAN 804 are not suitable or compatible with wireless network communication protocols used within wireless networks such as 811. For example, communication bandwidth, protocol overhead, and network latency, which are primary concerns in wireless network communications, are less significant in wired networks, which typically have much higher capacity and speed than wireless networks. Therefore,mobile devices data store 817 directly. Thenetwork operator infrastructure 840 provides a bridge between thewireless network 811 and theLAN 807. - The
network operator infrastructure 840 enables amobile device LAN 807 through theWAN 804, and may, for example, be operated by an operator of thewireless network 811 or a service provider that provides wireless communication service formobile devices mobile device network operator infrastructure 840 using a wireless network compatible communication scheme, preferably a secure scheme such as Wireless Transport Layer Security (WTLS) when information should remain confidential, and a wireless web browser such as a Wireless Application Protocol (WAP) browser. A user then requests, through manual selection or pre-selected defaults in the software residing in the mobile device, any or all information, or just new information, for example, stored in amailbox 819 in thedata store 817 at theLAN 807. Thenetwork operator infrastructure 840 establishes a connection or session with awireless connector system network operator infrastructure 840 and awireless connector system VPN router 835 if available. When time delays between receiving a request from amobile device network operator infrastructure 840 and thewireless connector systems - In the system of
FIG. 9 , requests originating frommobile device A 813 andB 815 would be sent to thewireless connector systems network operator infrastructure 840, awireless connector system e-mail message 833, thewireless connector system e-mail message 833 from theappropriate mailbox 819, typically through a messaging client operating in conjunction with thecomputer system mailbox 819 either via themessage server 820 or directly. Alternatively, awireless connector system mailboxes 819 itself, directly or through themessage server 820. Also, other data stores, both network data stores similar to thedata store 817 and local data stores associated with eachcomputer system wireless connector system mobile device - If the
e-mail message 833 is addressed to the message server accounts ormailboxes 819 associated with bothcomputer systems devices e-mail message 833 is sent to thenetwork operator infrastructure 840 as shown at 860 and 862, which then sends a copy of the e-mail message to eachmobile device wireless connector systems network operator infrastructure 840 via either a connection to theWAN 804 or theVPN router 835. When thenetwork operator infrastructure 840 communicates with thewireless connector systems mobile devices network operator infrastructure 840. Repackaging techniques may also be used between thewireless connector systems network operator infrastructure 840, and between eachmobile device network operator infrastructure 840. - Messages or other information to be sent from a
mobile device mobile device network operator infrastructure 840. Thenetwork operator infrastructure 840 then sends the information to awireless connector system mailbox 819 and delivery to any addressed recipients by themessage server 820, for example, or may alternatively deliver the information to the addressed recipients. - The above description of the system in
FIG. 9 relates to pull-based operations. Thewireless connector systems mobile devices LAN 807 could be pushed to amobile device LAN 807 via thenetwork operator infrastructure 840. - If mobile devices associated with user accounts on the
LAN 807 are configured to operate within different wireless networks, then each wireless network may have an associated wireless network infrastructure component similar to 840. - Although separate, dedicated
wireless connector systems computer system FIG. 9 , one or more of thewireless connector systems computer systems mailbox 819 associated with more than one computer system. For example, thewireless connector system 844 may be granted access to themailboxes 819 associated with both thecomputer system 842 and thecomputer system 852. Requests for data items from eithermobile device A 813 orB 815 are then processed by thewireless connector system 844. This configuration is useful to enable wireless communications between theLAN 807 and themobile devices desktop computer system message server 820 to enable wireless communications. -
FIG. 10 is a block diagram of another alternative communication system. The system includes acomputer system 802,WAN 804, acorporate LAN 809 located behind asecurity firewall 808, anaccess gateway 880, adata store 882,wireless networks mobile devices computer system 802, theWAN 804, thesecurity firewall 808, themessage server 820, thedata store 817, themailboxes 819, thedesktop computer system 822, thephysical connection 824, the interface orconnector 826 and theVPN router 835 are substantially the same as the corresponding components described above. Theaccess gateway 880 anddata store 882 providemobile devices LAN 809. InFIG. 10 , awireless connector system 878 operates on or in conjunction with themessage server 820, although a wireless connector system may instead operate on or in conjunction with one or moredesktop computer systems 822 in theLAN 809. - The
wireless connector system 878 provides for transfer of data items stored at theLAN 809 to one or more of themobile devices mailboxes 819 in thedata store 817, as well as possibly other items stared in thedata store 817 or another network data store or a local data store of a computer system such as 822. - As described above, an
e-mail message 833 addressed to one or more recipients having an account on themessage server 820 and received by themessage server 820 are stored into themailbox 819 of each such recipient. In the system ofFIG. 10 , theexternal data store 882 preferably has a similar structure to, and remains synchronized with, thedata store 817. PIM information or data stored atdata store 882 preferably is independently modifiable to the PIM information or data stored at the host system. In this particular configuration the independently modifiable information at theexternal data store 882 may maintain synchronization of a plurality of data stores associated with a user (i.e., data on a mobile device, data on a personal computer at home, data at the corporate LAN, etc.). This synchronization may be accomplished, for example, through updates sent to thedata store 882 by thewireless connector system 878 at certain time intervals, each time an entry in thedata store 817 is added or changed, at certain times of day, or when initiated at theLAN 809, by themessage server 820 or acomputer system 822, at thedata store 882, or possibly by amobile device access gateway 880. - In the case of the
e-mail message 833, for example, an update sent to thedata store 882 some time after thee-mail message 833 is received indicates that themessage 833 has been stored in acertain mailbox 819 in thestore 817, and a copy of the e-mail message is stored to a corresponding storage area in thedata store 882. When thee-mail message 833 has been stored in themailboxes 819 corresponding to themobile devices FIG. 10 , will be sent to and stored in corresponding storage areas or mailboxes in thedata store 882. As shown, updates or copies of stored information in thedata store 817 may be sent to thedata store 882 via a connection to theWAN 804 or theVPN router 835. For example, thewireless connector system 878 may post updates or stored information to a resource in thedata store 882 via an HTTP post request. Alternatively, a secure protocol such as HTTPS or Secure Sockets Layer (SSL) may be used. Those skilled in the art will appreciate that a single copy of a data item stored in more than one location in a data store at theLAN 809 may instead be sent to thedata store 882. This copy of the data item could then be stored either in more than one corresponding location in thedata store 882, or a single copy may be stored in thedata store 882, with a pointer or other identifier of the stored data item being stored in each corresponding location in thedata store 882. - The
access gateway 880 is effectively an access platform, in that it providesmobile devices data store 882. Thedata store 882 may be configured as a resource accessible on theWAN 804, and theaccess gateway 880 may be an ISP system or WAP gateway through whichmobile devices WAN 804. A WAP browser or other browser compatible with thewireless networks data store 882, which is synchronized with thedata store 817, and download stored data items either automatically or responsive to a request from amobile device e-mail message 833, which was stored in thedata store 817, are sent to themobile devices mobile device mailbox 819, of adata store 817 on acorporate LAN 809. Changes to a mobile device data store are similarly reflected in thedata stores - The embodiments described herein are examples of structures, systems or methods having elements corresponding to the elements of the invention recited in the claims. This written description may enable those of ordinary skill in the art to make and use embodiments having alternative elements that likewise correspond to the elements of the invention recited in the claims. The intended scope of the invention thus includes other structures, systems or methods that do not differ from the literal language of the claims, and further includes other structures, systems or methods with insubstantial differences from the literal language of the claims.
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/792,785 US20130191633A1 (en) | 2002-03-20 | 2013-03-11 | System and method for supporting multiple certificate status providers on a mobile communication device |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US36553402P | 2002-03-20 | 2002-03-20 | |
US10/508,631 US7865720B2 (en) | 2002-03-20 | 2003-03-20 | System and method for supporting multiple certificate status providers on a mobile communication device |
CAPCT/CA2003/000404 | 2003-03-20 | ||
PCT/CA2003/000404 WO2003079627A2 (en) | 2002-03-20 | 2003-03-20 | System and method for supporting multiple certificate status providers on a mobile communication device |
US12/954,731 US8423763B2 (en) | 2002-03-20 | 2010-11-26 | System and method for supporting multiple certificate status providers on a mobile communication device |
US13/792,785 US20130191633A1 (en) | 2002-03-20 | 2013-03-11 | System and method for supporting multiple certificate status providers on a mobile communication device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/954,731 Continuation US8423763B2 (en) | 2002-03-20 | 2010-11-26 | System and method for supporting multiple certificate status providers on a mobile communication device |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130191633A1 true US20130191633A1 (en) | 2013-07-25 |
Family
ID=43757642
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/954,731 Expired - Lifetime US8423763B2 (en) | 2002-03-20 | 2010-11-26 | System and method for supporting multiple certificate status providers on a mobile communication device |
US13/792,785 Abandoned US20130191633A1 (en) | 2002-03-20 | 2013-03-11 | System and method for supporting multiple certificate status providers on a mobile communication device |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/954,731 Expired - Lifetime US8423763B2 (en) | 2002-03-20 | 2010-11-26 | System and method for supporting multiple certificate status providers on a mobile communication device |
Country Status (1)
Country | Link |
---|---|
US (2) | US8423763B2 (en) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8484462B2 (en) * | 2008-11-07 | 2013-07-09 | Lockheed Martin Corporation | System and method for establishing a self-realizing expandable communications network |
US8635442B2 (en) * | 2009-04-28 | 2014-01-21 | Adobe Systems Incorporated | System and method for long-term digital signature verification utilizing light weight digital signatures |
EP2423831A1 (en) * | 2010-08-27 | 2012-02-29 | Axel Springer Digital TV Guide GmbH | Recommender system with consistent profile application |
US9503269B2 (en) * | 2011-12-16 | 2016-11-22 | Motorola Solutions, Inc. | Utilizing a stapling technique with a server-based certificate validation protocol to reduce overhead for mobile communication devices |
US9344275B2 (en) | 2012-05-08 | 2016-05-17 | Arm Technologies Israel Ltd. | System, device, and method of secure entry and handling of passwords |
US8977856B2 (en) * | 2012-08-31 | 2015-03-10 | Blackberry Limited | Methods and apparatus for use in sharing credentials amongst a plurality of mobile communication devices |
US9473309B2 (en) * | 2013-01-29 | 2016-10-18 | Blackberry Limited | System and method for providing a trust framework using a secondary network |
US10038719B2 (en) * | 2014-04-29 | 2018-07-31 | Dell Products L.P. | Single-step custom configuration of a cloud client device |
US20160366124A1 (en) * | 2015-06-15 | 2016-12-15 | Qualcomm Incorporated | Configuration and authentication of wireless devices |
US10237306B1 (en) * | 2016-06-30 | 2019-03-19 | EMC IP Holding Company LLC | Communicating service encryption key to interceptor for monitoring encrypted communications |
US10033722B2 (en) * | 2016-11-21 | 2018-07-24 | Citrix Systems, Inc. | Mobile device using shared digital certificate for different managed enterprise applications and related methods |
US10977024B2 (en) * | 2018-06-15 | 2021-04-13 | Sierra Wireless, Inc. | Method and apparatus for secure software update |
US11343083B2 (en) | 2019-11-22 | 2022-05-24 | Baidu Usa Llc | Method for key sharing between accelerators in virtual channel |
US11558357B2 (en) | 2019-11-22 | 2023-01-17 | Baidu Usa Llc | Method for key sharing between accelerators with switch |
US11552790B2 (en) | 2019-11-22 | 2023-01-10 | Baidu Usa Llc | Method for key sharing between accelerators |
US11405336B2 (en) | 2019-11-22 | 2022-08-02 | Baidu Usa Llc | Method for key sharing between accelerators in virtual channel with switch |
US11457354B2 (en) * | 2019-12-10 | 2022-09-27 | Baidu Usa Llc | System and method to securely broadcast a message to accelerators |
US11728996B2 (en) * | 2019-12-10 | 2023-08-15 | Baidu Usa Llc | System and method to securely broadcast a message to accelerators using virtual channels with switch |
US11516010B2 (en) | 2019-12-10 | 2022-11-29 | Baidu Usa Llc | System and method to securely broadcast a message to accelerators using virtual channels |
US11411934B2 (en) * | 2019-12-10 | 2022-08-09 | Baidu Usa Llc | System and method to securely broadcast a message to accelerators with switch |
US11210136B2 (en) | 2019-12-10 | 2021-12-28 | Baidu Usa Llc | Systems and methods for an operating system module for a data processing accelerator |
Citations (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6134550A (en) * | 1998-03-18 | 2000-10-17 | Entrust Technologies Limited | Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths |
US6230266B1 (en) * | 1999-02-03 | 2001-05-08 | Sun Microsystems, Inc. | Authentication system and process |
US20010034833A1 (en) * | 2000-04-21 | 2001-10-25 | Isao Yagasaki | Certificating system for plurality of services and method thereof |
US6351812B1 (en) * | 1998-09-04 | 2002-02-26 | At&T Corp | Method and apparatus for authenticating participants in electronic commerce |
US20020026583A1 (en) * | 2000-08-25 | 2002-02-28 | Harrison Keith Alexander | Document transmission techniques IV |
US20020087479A1 (en) * | 2000-11-08 | 2002-07-04 | Peter Malcolm | Information management system |
US20020099663A1 (en) * | 2000-11-01 | 2002-07-25 | Kenji Yoshino | Content delivery system and content delivery method |
US20020116611A1 (en) * | 2000-10-31 | 2002-08-22 | Cornell Research Foundation, Inc. | Secure distributed on-line certification authority |
US20020166049A1 (en) * | 2000-12-22 | 2002-11-07 | Sinn Richard P. | Obtaining and maintaining real time certificate status |
US20020169954A1 (en) * | 1998-11-03 | 2002-11-14 | Bandini Jean-Christophe Denis | Method and system for e-mail message transmission |
US6487658B1 (en) * | 1995-10-02 | 2002-11-26 | Corestreet Security, Ltd. | Efficient certificate revocation |
US20030065921A1 (en) * | 2001-09-28 | 2003-04-03 | Chang Kae-Por F. | Authority-neutral certification for multiple-authority PKI environments |
US20030112772A1 (en) * | 2000-02-15 | 2003-06-19 | Spacenet, Inc. | System and method for acceleration of a secure transmission over satellite |
US20030212888A1 (en) * | 1998-08-26 | 2003-11-13 | Wildish Michael Andrew | System and method of looking up and validating a digital certificate in one pass |
US6671805B1 (en) * | 1999-06-17 | 2003-12-30 | Ilumin Corporation | System and method for document-driven processing of digitally-signed electronic documents |
US20040049675A1 (en) * | 1995-10-02 | 2004-03-11 | Silvio Micali | Physical access control |
US6842863B1 (en) * | 1999-11-23 | 2005-01-11 | Microsoft Corporation | Certificate reissuance for checking the status of a certificate in financial transactions |
US6883100B1 (en) * | 1999-05-10 | 2005-04-19 | Sun Microsystems, Inc. | Method and system for dynamic issuance of group certificates |
US20050114653A1 (en) * | 1999-07-15 | 2005-05-26 | Sudia Frank W. | Certificate revocation notification systems |
US20050114666A1 (en) * | 1999-08-06 | 2005-05-26 | Sudia Frank W. | Blocked tree authorization and status systems |
US20050154878A1 (en) * | 2004-01-09 | 2005-07-14 | David Engberg | Signature-efficient real time credentials for OCSP and distributed OCSP |
US20050154879A1 (en) * | 2004-01-09 | 2005-07-14 | David Engberg | Batch OCSP and batch distributed OCSP |
US6922776B2 (en) * | 2000-05-19 | 2005-07-26 | Networks Associates Technology, Inc. | Scalable system and method for management and notification of electronic certificate changes |
US6950933B1 (en) * | 2000-05-19 | 2005-09-27 | Networks Associates Technology, Inc. | Method and system for management and notification of electronic certificate changes |
US6970862B2 (en) * | 2001-05-31 | 2005-11-29 | Sun Microsystems, Inc. | Method and system for answering online certificate status protocol (OCSP) requests without certificate revocation lists (CRL) |
US6976271B1 (en) * | 2000-01-06 | 2005-12-13 | International Business Machines Corporation | Method and system for retrieving an anti-virus signature from one or a plurality of virus-free certificate authorities |
US7046991B2 (en) * | 2001-07-16 | 2006-05-16 | Research In Motion Limited | System and method for supporting multiple certificate authorities on a mobile communication device |
US7120793B2 (en) * | 2001-09-28 | 2006-10-10 | Globalcerts, Lc | System and method for electronic certificate revocation |
US7174456B1 (en) * | 2001-05-14 | 2007-02-06 | At&T Corp. | Fast authentication and access control method for mobile networking |
US7177839B1 (en) * | 1996-12-13 | 2007-02-13 | Certco, Inc. | Reliance manager for electronic transaction system |
US7318155B2 (en) * | 2002-12-06 | 2008-01-08 | International Business Machines Corporation | Method and system for configuring highly available online certificate status protocol responders |
US7353383B2 (en) * | 2002-03-18 | 2008-04-01 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on with cryptography |
US7500100B1 (en) * | 2003-09-10 | 2009-03-03 | Cisco Technology, Inc. | Method and apparatus for verifying revocation status of a digital certificate |
US7533257B2 (en) * | 2003-12-23 | 2009-05-12 | Electronics And Telecommunications Research Institute | Server authentication verification method on user terminal at the time of extensible authentication protocol authentication for internet access |
US7761467B2 (en) * | 2000-01-07 | 2010-07-20 | International Business Machines Corporation | Method and a system for certificate revocation list consolidation and access |
US20110213963A1 (en) * | 2010-02-26 | 2011-09-01 | Andrew Wnuk | Using an ocsp responder as a crl distribution point |
US8732457B2 (en) * | 1995-10-02 | 2014-05-20 | Assa Abloy Ab | Scalable certificate validation and simplified PKI management |
-
2010
- 2010-11-26 US US12/954,731 patent/US8423763B2/en not_active Expired - Lifetime
-
2013
- 2013-03-11 US US13/792,785 patent/US20130191633A1/en not_active Abandoned
Patent Citations (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8732457B2 (en) * | 1995-10-02 | 2014-05-20 | Assa Abloy Ab | Scalable certificate validation and simplified PKI management |
US20040049675A1 (en) * | 1995-10-02 | 2004-03-11 | Silvio Micali | Physical access control |
US6487658B1 (en) * | 1995-10-02 | 2002-11-26 | Corestreet Security, Ltd. | Efficient certificate revocation |
US7177839B1 (en) * | 1996-12-13 | 2007-02-13 | Certco, Inc. | Reliance manager for electronic transaction system |
US6134550A (en) * | 1998-03-18 | 2000-10-17 | Entrust Technologies Limited | Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths |
US20030212888A1 (en) * | 1998-08-26 | 2003-11-13 | Wildish Michael Andrew | System and method of looking up and validating a digital certificate in one pass |
US6351812B1 (en) * | 1998-09-04 | 2002-02-26 | At&T Corp | Method and apparatus for authenticating participants in electronic commerce |
US20020169954A1 (en) * | 1998-11-03 | 2002-11-14 | Bandini Jean-Christophe Denis | Method and system for e-mail message transmission |
US6230266B1 (en) * | 1999-02-03 | 2001-05-08 | Sun Microsystems, Inc. | Authentication system and process |
US6883100B1 (en) * | 1999-05-10 | 2005-04-19 | Sun Microsystems, Inc. | Method and system for dynamic issuance of group certificates |
US6671805B1 (en) * | 1999-06-17 | 2003-12-30 | Ilumin Corporation | System and method for document-driven processing of digitally-signed electronic documents |
US20050114653A1 (en) * | 1999-07-15 | 2005-05-26 | Sudia Frank W. | Certificate revocation notification systems |
US20050114666A1 (en) * | 1999-08-06 | 2005-05-26 | Sudia Frank W. | Blocked tree authorization and status systems |
US6842863B1 (en) * | 1999-11-23 | 2005-01-11 | Microsoft Corporation | Certificate reissuance for checking the status of a certificate in financial transactions |
US6976271B1 (en) * | 2000-01-06 | 2005-12-13 | International Business Machines Corporation | Method and system for retrieving an anti-virus signature from one or a plurality of virus-free certificate authorities |
US7761467B2 (en) * | 2000-01-07 | 2010-07-20 | International Business Machines Corporation | Method and a system for certificate revocation list consolidation and access |
US20030112772A1 (en) * | 2000-02-15 | 2003-06-19 | Spacenet, Inc. | System and method for acceleration of a secure transmission over satellite |
US20010034833A1 (en) * | 2000-04-21 | 2001-10-25 | Isao Yagasaki | Certificating system for plurality of services and method thereof |
US6922776B2 (en) * | 2000-05-19 | 2005-07-26 | Networks Associates Technology, Inc. | Scalable system and method for management and notification of electronic certificate changes |
US6950933B1 (en) * | 2000-05-19 | 2005-09-27 | Networks Associates Technology, Inc. | Method and system for management and notification of electronic certificate changes |
US20020026583A1 (en) * | 2000-08-25 | 2002-02-28 | Harrison Keith Alexander | Document transmission techniques IV |
US20020116611A1 (en) * | 2000-10-31 | 2002-08-22 | Cornell Research Foundation, Inc. | Secure distributed on-line certification authority |
US20020099663A1 (en) * | 2000-11-01 | 2002-07-25 | Kenji Yoshino | Content delivery system and content delivery method |
US20020087479A1 (en) * | 2000-11-08 | 2002-07-04 | Peter Malcolm | Information management system |
US20020166049A1 (en) * | 2000-12-22 | 2002-11-07 | Sinn Richard P. | Obtaining and maintaining real time certificate status |
US7415607B2 (en) * | 2000-12-22 | 2008-08-19 | Oracle International Corporation | Obtaining and maintaining real time certificate status |
US7174456B1 (en) * | 2001-05-14 | 2007-02-06 | At&T Corp. | Fast authentication and access control method for mobile networking |
US6970862B2 (en) * | 2001-05-31 | 2005-11-29 | Sun Microsystems, Inc. | Method and system for answering online certificate status protocol (OCSP) requests without certificate revocation lists (CRL) |
US7046991B2 (en) * | 2001-07-16 | 2006-05-16 | Research In Motion Limited | System and method for supporting multiple certificate authorities on a mobile communication device |
US7120793B2 (en) * | 2001-09-28 | 2006-10-10 | Globalcerts, Lc | System and method for electronic certificate revocation |
US20030065921A1 (en) * | 2001-09-28 | 2003-04-03 | Chang Kae-Por F. | Authority-neutral certification for multiple-authority PKI environments |
US7328344B2 (en) * | 2001-09-28 | 2008-02-05 | Imagitas, Inc. | Authority-neutral certification for multiple-authority PKI environments |
US7353383B2 (en) * | 2002-03-18 | 2008-04-01 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on with cryptography |
US7318155B2 (en) * | 2002-12-06 | 2008-01-08 | International Business Machines Corporation | Method and system for configuring highly available online certificate status protocol responders |
US7865721B2 (en) * | 2002-12-06 | 2011-01-04 | International Business Machines Corporation | Method and system for configuring highly available online certificate status protocol |
US7500100B1 (en) * | 2003-09-10 | 2009-03-03 | Cisco Technology, Inc. | Method and apparatus for verifying revocation status of a digital certificate |
US7533257B2 (en) * | 2003-12-23 | 2009-05-12 | Electronics And Telecommunications Research Institute | Server authentication verification method on user terminal at the time of extensible authentication protocol authentication for internet access |
US20050154879A1 (en) * | 2004-01-09 | 2005-07-14 | David Engberg | Batch OCSP and batch distributed OCSP |
US7966487B2 (en) * | 2004-01-09 | 2011-06-21 | Corestreet, Ltd. | Communication-efficient real time credentials for OCSP and distributed OCSP |
US20050154878A1 (en) * | 2004-01-09 | 2005-07-14 | David Engberg | Signature-efficient real time credentials for OCSP and distributed OCSP |
US20110213963A1 (en) * | 2010-02-26 | 2011-09-01 | Andrew Wnuk | Using an ocsp responder as a crl distribution point |
Non-Patent Citations (3)
Title |
---|
Faldella, Eugenio; Prandini, Marco; "A Novel Approach to On-Line Status Authentication of Public-Key Certificates", Proceedings of the 16th Annual Comptuer Security Applications Conference, 11-15 Dec 2000, pgs. 27-277. * |
Prandini, Marco; "Efficient Certificate Status Handling within PKIs: an Application to Public Administration Services", Proceedings of the 15th Annual Computer Security Applications Conference, 6-10 Dec 1999, pgs. 276-281. * |
Prasad, Vishwa; Potakamuri, Sreenivasa; Ahern, Michael; Lerner, Michah; Balabine, Igor; Dutta, Partha; "Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)", Proceedings of the 16th Annual Computer Security Applications Conference, 11-15 Dec 2000, pgs. 138-147. * |
Also Published As
Publication number | Publication date |
---|---|
US8423763B2 (en) | 2013-04-16 |
US20110072270A1 (en) | 2011-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7865720B2 (en) | System and method for supporting multiple certificate status providers on a mobile communication device | |
US8423763B2 (en) | System and method for supporting multiple certificate status providers on a mobile communication device | |
CA2479605C (en) | System and method for checking digital certificate status | |
US9807082B2 (en) | Certificate information storage system and method | |
US8539226B2 (en) | Certificate management and transfer system and method | |
US9628269B2 (en) | System and method for secure message key caching in a mobile communication device | |
US8019081B2 (en) | System and method for processing encoded messages | |
US7657736B2 (en) | System and method for compressing secure e-mail for exchange with a mobile data communication device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RESEARCH IN MOTION LIMITED, CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LITTLE, HERBERT A.;JANHUNEN, STEFAN E.;HOBBS, DALE J.;SIGNING DATES FROM 20030312 TO 20030317;REEL/FRAME:029961/0240 |
|
AS | Assignment |
Owner name: BLACKBERRY LIMITED, ONTARIO Free format text: CHANGE OF NAME;ASSIGNOR:RESEARCH IN MOTION LIMITED;REEL/FRAME:034161/0093 Effective date: 20130709 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064104/0103 Effective date: 20230511 |