摘要:
A system and method for processing messages being composed by a user of a computing device (e.g. a mobile device). Embodiments are described in which the performance of certain tasks is initiated before a direction is received from a user to send a message being composed by the user. This may involve, for example, “pre-fetching” security-related data that will be required in order to send a message that is in the process of being composed by the user securely. Such data may include security policy data, certificate data, and/or certificate status data, for example.
摘要:
A system for adding a redundancy check to an electronic message to discourage tampering and facilitate identification of altered messages provides a communication device for composing message content, a messaging module with a formatting and encoding layer for encoding the message content with header information in a series of message blocks, and an encryption layer for calculating a redundancy check value and inserting the value in one or more locations within the series of message blocks according a rule defined by a characteristic of the message content or the header information, and encrypting the message for delivery to a recipient. Upon receipt, the recipient communication device decrypts the message, extracts the redundancy check value from the message, and compares a calculated redundancy check value with the extracted redundancy check value to determine if the message had been altered before receipt.
摘要:
A method and system for providing e-mail messages to a receiving e-mail application. The e-mail messages as sent from a sending e-mail application being secure and in opaque signed format. The opaque signed e-mail messages being converted to clear signed e-mail messages by decoding extracting message content and digital signatures. The clear signed e-mails being sent to a receiving e-mail application.
摘要:
Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In exemplary embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.
摘要:
A portable adaptor for using a smart card of a first configuration with a smart card reader of a second configuration. For instance, the adaptor may enable use of a contactless smart card with a contact smart card reader, or vice versa. The adaptor is provided with a casing that is configured to engage a contact smart card or a contactless smart card, and where intended for use with a contact smart card reader is provided with an exterior portion that physically cooperates via a contact pad with a contact smart card reader. The adaptor is provided with an interface passing signals between a smart card of a first configuration and a smart card reader, of a second configuration. For instance, an interface for passing signals between a contact smart card and a contactless smart card reader or vice versa.
摘要:
A system and method for determining a security encoding to be applied to a message being sent by a user of a computing device, such as a mobile device, for example. In one broad aspect, the method comprises the steps of identifying a message to be sent to at least one recipient; determining, at the computing device, whether a general message encoding configuration setting thereon is set to a value that indicates that the security encoding to be applied to the identified message is to be established by a policy engine; where the general message encoding configuration setting on the computing device is set to a value that indicates that the security encoding to be applied to the identified message is to be established by the policy engine, determining the security encoding to be applied to the identified message by querying the policy engine for the security encoding to be applied to the identified message; applying the determined security encoding to the identified message; and transmitting the identified message to which the security encoding has been applied to the at least one recipient. In one embodiment, the policy engine is a PGP Universal Server.
摘要:
A system and method for generating keys that can be used for encrypting and decrypting PIN messages transmitted between mobile devices. In one embodiment, the method comprises defining a function f, where f(x,y)=f(y,x), and for each of first and second mobile devices, evaluating f with one of x and y having the value of the PIN of the respective mobile device. Each one of the first and second mobile devices can then compute a shared messaging key by evaluating f with the other of x and y having the value of the PIN of the other mobile device. The shared key can then be used specifically to encrypt and decrypt PIN messages transmitted between those two mobile devices.
摘要:
A wireless communication system which employs cryptographic functions requiring random data input in a mobile wireless device includes provisions for securely adding randomness to the mobile wireless device. Such added randomness can be securely provided during synchronizing sessions with a device user's base computer via secure wired and/or wireless connections. The new random data can be obtained by software and/or hardware random number generators accessible to the user's base computer and/or from accessible secure external sources (e.g., a secure website source of random data).
摘要:
Increasing security for a hand-held data processing device with communication functionality where such a device includes an access-ordered memory cache relating to communications carried out by the device. The hand-held data processing device has a locked state that is entered by the device receiving or initiating a trigger. On occurrence of the trigger to enter the locked state the memory cache is reordered so as to disrupt the access-ordering of the cache to obscure device traffic information and thus increase the security of the device in the locked state.
摘要:
A method for secure bidirectional communication between two systems is described. A first key pair and a second key pair are generated, the latter including a second public key that is generated based upon a shared secret. First and second public keys are sent to a second system, and third and fourth public keys are received from the second system. The fourth public key is generated based upon the shared secret. A master key for encrypting messages is calculated based upon a first private key, a second private key, the third public key and the fourth public key. For re-keying, a new second key pair having a new second public key and a new second private key is generated, and a new fourth public key is received. A new master key is calculated using elliptic curve calculations using the new second private key and the new fourth public key.