Language selection

Search

Patent 2434992 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2434992
(54) English Title: METHOD AND APPARATUS FOR PROVIDING AN ADAPTABLE SECURITY LEVEL IN AN ELECTRONIC COMMUNICATION
(54) French Title: METHODE ET APPAREIL PERMETTANT D'OFFRIR UN NIVEAU DE SECURITE ADAPTABLE DANS UNE COMMUNICATION ELECTRONIQUE
Status: Expired
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04L 9/30 (2006.01)
  • H04L 9/00 (2006.01)
(72) Inventors :
  • STRUIK, MARINUS (Canada)
(73) Owners :
  • BLACKBERRY LIMITED (Canada)
(71) Applicants :
  • CERTICOM CORP. (Canada)
(74) Agent: BLAKE, CASSELS & GRAYDON LLP
(74) Associate agent:
(45) Issued: 2014-08-26
(22) Filed Date: 2003-07-07
(41) Open to Public Inspection: 2005-01-07
Examination requested: 2008-06-30
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): No

(30) Application Priority Data: None

Abstracts

English Abstract

A method of communicating in a secure communication system, comprises the steps of assembling as message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.


French Abstract

Dans un système de communication sécurisée, une méthode de communication comprend les étapes d'assemblage comme message à un expéditeur, puis la détermination d'un niveau de sécurité et l'inclusion d'une indication du niveau de sécurité dans un entête du message. Le message est ensuite envoyé à un destinataire.

Claims

Note: Claims are shown in the official language in which they were submitted.


Claims:
1. A method performed by a communication device, said method comprising:
said communication device preparing a plurality of frames, each frame having a

header and data; and
on a frame-by-frame basis, said communication device processing each
individual
frame by:
determining a security level for said individual frame, the security level
indicating whether to provide encryption for said individual frame and whether
to provide
authenticity for said individual frame, thereby allowing different frames to
utilize
different security levels on said frame-by-frame basis; and
based on said security level, including security level data in the header of
said individual frame, said security level data indicating whether encryption
is being used
for said individual frame and whether authenticity is being used for said
individual frame;
and
said communication device providing the plurality of frames for transmission
to a
recipient.
2. The method according to claim 1, wherein said security level data include
one
or more security mode bits indicating a security mode.
3. The method according to claim 1 or claim 2, wherein said security level
data
include an indication of a parameter associated with a key to be used.
4. The method according to any one of claims 1 to 3, wherein said
communication
device provides the plurality of frames for transmission to multiple
recipients, and
determining said security level includes determining a minimum security level
to satisfy
all of the recipients, wherein said security level data are based on said
minimum security
level.

5. The method according to any one of claims 1 to 3, wherein said security
level
data enable a recipient device to identify said security level for said
individual frame and
to reject said individual frame if said security level does not comply with a
minimum
security level required by the recipient device.
6. The method according to any one of claims 1 to 5, wherein said security
level is
determined based on predetermined minimum requirements.
7. The method according to claim 6, wherein said predetermined minimum
requirements are determined among said communication device and at least one
recipient
device based on an agreed-upon rule.
8. The method according to any one of claims 1 to 7, wherein said security
level is
determined based upon content of said individual frame.
9. The method according to any one of claims 1 to 8, further comprising said
communication device encrypting the data for said individual frame according
to said
security level for the frame.
10. The method according to any one of claims 1 to 9, wherein said security
level
data include one or more integrity bits indicating an integrity level.
11. The method according to any one of claims 1 to 10, wherein said security
level data include an indication of a cryptographic algorithm parameter.
12. The method according to any one of claims 1 to 11, further comprising the
communication device signing the header and data for said individual frame
according to
said security level for said individual frame.
6


13. A computer-readable storage medium comprising computer-executable
instructions that are operable when executed by data processing apparatus to
perform
operations comprising:
preparing a plurality of frames, each frame having a header and data;
on a frame-by-frame basis processing each individual frame by:
determining a security level for said individual frame, the security level
indicating whether to provide encryption for said individual frame and whether
to provide
authenticity for said individual frame, thereby allowing different frames to
utilize
different security levels on said frame-by-frame basis; and
based on said security level, including security level data in the header of
said individual frame, said security level data indicating whether encryption
is being used
for said individual frame and whether authenticity is being used for said
individual frame;
and
providing the plurality of frames for transmission to a recipient.
14. The computer-readable storage medium according to claim 13, wherein said
security level data include one or more security mode bits indicating a
security mode.
15. The computer-readable storage medium according to claim 13 or claim 14,
wherein said security level data include an indication of a parameter
associated with a
key to be used.
16. The computer-readable storage medium according to any one of claims 13 to
15, wherein said plurality of frames are provided for transmission to multiple
recipients,
determining said security level includes determining a minimum security level
to satisfy
all of the recipients, and said security level data are based on said minimum
security
level.
17. The computer-readable storage medium according to any one of claims 13 to
16, wherein said security level is determined based on predetermined minimum
requirements.
7


18. The computer-readable storage medium according to claim 17, wherein said
predetermined minimum requirements arc determined based on an agreed-upon
rule.
19. The computer-readable storage medium according to any one of claims 13 to
18, wherein said security level is determined based upon content of said
individual frame.
20. The computer-readable storage medium according to any one of claims 13 to
19, the operations further comprising encrypting the data for said individual
frame
according to said security level for said individual frame.
21. The computer-readable storage medium according to any one of claims 13 to
20, wherein said security level data include one or more integrity bits
indicating an
integrity level.
22. The computer-readable storage medium according to any one of claims 13 to
21, wherein said security level data include an indication of a cryptographic
algorithm
parameter.
23. The computer-readable storage medium according to any one of claims 13 to
22, the operations further comprising signing the header and data for each
individual
frame according to said security level for the frame.
24. A method performed by a communication device, the method comprising:
said communication device receiving a plurality of frames, each frame having a

header and associated data, the header of each individual frame including
security level
data that indicate for that individual frame whether encryption has been
provided for the
individual frame and whether authenticity has been provided for the individual
frame,
such that different frames can utilize different security levels on a frame-by-
frame basis;
for each frame, said communication device:
8


identifying a security level for the frame based on the security level data in

the header of the frame;
checking said security level against predetermined security requirements
for said communication device; and
rejecting the frame if said security level does not meet said predetermined
security requirements.
25. The method according to claim 24, wherein said security level data include

one or more security mode bits indicating a security mode.
26. The method according to claim 24 or claim 25, wherein said security level
data include an indication of a parameter associated with a key to be used.
27. The method according to any one of claims 24 to 26, wherein said security
level is selected by another device based on said predetermined security
requirements for
said communication device.
28. The method according to claim 27, wherein said predetermined security
requirements are determined among said communication device and said other
device
based on an agreed-upon rule.
29. The method according to any one of claims 24 to 28, wherein said security
level data include one or more integrity bits indicating an integrity level.
30. The method according to any one of claims 24 to 29, wherein said security
level data include an indication of a cryptographic algorithm parameter.
31. The method according to any one of claims 24 to 30, further comprising
decrypting the frame according to said security level for the frame.
9


32. The method according to any one of claims 24 to 31, further comprising
verifying the authenticity of the frame according to said security level for
the frame.
33. A computer-readable storage medium comprising computer-executable
instructions that are operable when executed, by data processing apparatus of
a
communication device, to perform operations comprising:
receiving a plurality of frames, each individual frame having a header and
data,
the header of the individual frame including security level data that indicate
for the
individual frame whether encryption has been provided for the individual frame
and
whether authenticity has been provided for the individual frame, such that
different
frames can utilize different security levels on a frame-by-frame basis;
for each of the plurality of frames:
identifying a security level for the frame based on the security level data in

the header of the frame;
checking said security level against predetermined security requirements
for said communication device; and
rejecting the frame if said security level does not meet said predetermined
security requirements.
34. The computer-readable storage medium according to claim 33, wherein said
security level data include one or more security mode bits indicating a
security mode.
35. The computer-readable storage medium according to claim 33 or claim 34,
wherein said security level is selected by another device based on said
predetermined
security requirements for said communication device.
36. The computer-readable storage medium according to any one of claims 33 to
35, wherein said predetermined security requirements are determined among the
communication device and the other device based on an agreed-upon rule.


37. The computer-readable storage medium according to any one of claims 33 to
36, wherein said security level data include one or more integrity bits
indicating an
integrity level.
38. The computer-readable storage medium according to any one of claims 33 to
37, wherein said security level data include an indication of a cryptographic
algorithm
parameter.
39. The computer-readable storage medium according to any one of claims 33 to
38, the operations further comprising decrypting each frame according to said
security
level for the frame.
40. The computer-readable storage medium according to any one of claims 33 to
39, the operations further comprising verifying the authenticity of the frame
according to
said security level for the frame.
11

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02434992 2012-03-13
=
1 METHOD AND APPARATUS FOR PROVIDING AN ADAPTABLE
2 SECURITY LEVEL IN AN ELECTRONIC COMMUNICATION
3
4 BACKGROUND OF THE INVENTION
6 FIELD OF THE INVENTION
7 [0001] The present invention relates to a method and apparatus for
providing an adaptable
8 security level in an electronic communication.
9
DESCRIPTION OF THE PRIOR ART
11 [0002] In electronic communications, it is often necessary to
prevent an eavesdropper from
12 intercepting message. It is also desirable to have an indication of the
authenticity of a message,
13 that is a verifiable identification of the sender. These goals are
usually achieved through the use
14 of cryptography. Private key cryptography requires sharing a secret key
prior to initating
communications. Public key cryptography is generally preferred as it does not
require such a
16 shared secret key. Instead, each correspondent has a key pair including
a private key and a public
17 key. The public key may be provided by any convenient means, and does
not need to be kept
18 secret.
19 [0003] There are many variations in cryptographic algorithms, and
various parameters that
determine the precise implementation. In standards for wireless
communications, it has been
21 customary to set these parameters in advance for each frame type.
However, this approach limits
22 the flexibility of the parameters.
23 [0004] When one device is communicating with several other
devices, it will often need to
24 establish separate parameters for each communication.
[0005] It is an object of the present invention to obviate or mitigate the
above disadvantages.
26
27 SUMMARY OF THE INVENTION
28 100061 In accordance with one aspect, there is provided a method
performed by a
29 communication device and computer readable storage medium comprising
instructions for
1

CA 02434992 2012-03-13
1 preparing a plurality of frames, each frame having a header and data; and
on a frame-by-
2 frame basis, the communication device processing each individual frame
by: determining
3 a security level for that individual frame, the security level indicating
whether to provide
4 encryption for the individual frame and whether to provide authenticity
for the individual
frame, thereby allowing different frames to utilize different security levels
to adapt to the
6 nature of respective frames on the frame-by-frame basis; and based on the
security level,
7 including security level data in the header of that individual frame, the
security level data
8 indicating whether encryption is being used for the individual frame and
whether
9 authenticity is being used for the individual frame; and the
communication device
providing the plurality of frames for transmission to a recipient. In
accordance with
11 another aspect, there is provided a method performed by a communication
device and
12 computer readable storage medium comprising instructions for receiving a
plurality of
13 frames, each frame having a header and associated data, the header of
each individual
14 frame including security level data that indicate for that individual
frame whether
encryption has been provided for the individual frame and whether authenticity
has been
16 provided for the individual frame, such that different frames can
utilize different security
17 levels to adapt to the nature of respective frames on a frame-by-frame
basis; for each
18 frame, the communication device: identifying a security level for the
frame based on the
19 security level data in the header of the frame; checking the security
level against
predetermined security requirements for the communication device; and
rejecting the
21 frame if the security level does not meet the predetermined security
requirements.
22212935.1 lA

CA 02434992 2012-03-13
1
2
3
4 BRIEF DESCRIPTION OF THE DRAWINGS
[0007] These and other features of the preferred embodiments of the
invention will become
6 more apparent in the following detailed description in which reference is
made to the appended
7 drawings wherein:
8 [0008] Figure 1 is a schematic representation of a communication
system;
9 [0009] Figure 2 is a schematic representation of an information
frame exchanged in the
communication system of Figure 1;
11 [0010] Figure 3 is a schematic representation of a frame control
portion of the frame of
12 Figure 2;
13 [0011] Figure 4 is a schematic representation of a method performed
by a sender in Figure 1;
14 [0012] Figure 5 is a schematic representation of a method performed
by a recipient in Figure
1.
16
17 DESCRIPTION OF THE PREFERRED EMBODIMENTS
18 [0013] Referring to Figure 1, a communication system 10 includes a
pair of correspondents
19 12, 14 connected by a communication link 16. Each correspondent 12, 14
includes a respective
cryptographic unit 18, 20.
21 [0014] Each correspondent 12, 14 can include a processor 22, 24.
Each processor may be
22 coupled to a display and to user input devices, such as a keyboard,
mouse, or other suitable
23 devices. If the display is touch sensitive, then the display itself can
be employed as the user
24 input device. A computer readable storage medium is coupled to each
processor 22, 24 for
providing instructions to the processor 22, 24 to instruct and/or configure
processor 22, 24 to
26 perform steps or algorithms related to the operation of each
correspondent 12, 14, as further
27 explained below. The computer readable medium can include hardware
and/or software such as,
28 by way of example only, magnetic disks, magnetic tape, optically
readable medium such as CD
29 ROM's, and semi-conductor memory such as PCMCIA cards. In each case, the
medium may
2
McCarthy Tetrault LLP TDO-RED #8199673 v. I

CA 02434992 2003-07-07
1 take the form of a portable item such as a small disk, floppy diskette,
cassette, or it may take the
2 form of a relatively large or immobile item such as hard disk drive,
solid state memory card, or
3 RAM provided in a support system. It should be noted that the above
listed example mediums
4 can be used either alone or in combination.
[0015] Referring to Figure 2, a frame used in communications between the
correspondents
6 12, 14 is shown generally by the numeral 30. The frame 30 includes a
header 32 and data 34. The
7 header 32 includes information about the source and destination of the
frame 30 and is used for
8 processing frames. The header 32 may contain other control information as
will be understood
9 by those skilled in the art.
[0016] Referring to Figure 3, the header 32 also contains frame control
bits 33. The frame
11 control bits 33 include security bits 35, 36, and 37. Security bit 35
indicates whether encryption
12 is on or off. Security bits 36 and 37 together indicate the integrity
level, such as 0, 32, 64, or 128
13 bits. It will be recognized that providing security bits in each frame
allows the security level to
14 be modified on a frame-by-frame basis rather than on the basis of a pair
of correspondents,
therefore providing greater flexibility in organizing communications.
16 [0017] In order to provide security, certain minimum security
levels may be used. These
17 levels should be decided upon among all of the correspondents through an
agreed-upon rule.
18 This rule may be either static or dynamic.
19 [0018] In operation, the correspondent 12 performs the steps
shown in Figure 4 by the
numeral 100 to send information to the correspondent 14. First, the
correspondent 12 prepares
21 data and a header at step 102. Then it selects the security level at
step 104. The security level is
22 determined by considering the minimum security level required by the
recipient, the nature of the
23 recipient, and the kind of data being transmitted. If the security level
includes encryption, then
24 the correspondent 12 encrypts the data at step 106. If the security
level includes authentication,
then the correspondent 12 signs the data at step 108. Then the correspondent
12 includes bits
26 indicating the security level in the frame control at step 110. The
correspondent 12 then sends the
27 frame to the correspondent 14.
28 [0019] Upon receiving the frame, the correspondent 14 performs
the steps shown in Figure 5
29 by the numeral 120. The correspondent 14 first receives the frame at
step 122. It then extracts the
3
McCarthy Tetrault LLP TDO-RED #8199673 v 1

CA 02434992 2012-03-13
1 security bits at step 124. If the security bits indicate encryption, then
the correspondent 14
2 decrypts the data at step 126. If the security bits indicate
authentication, then the correspondent
3 14 verifies the signature at step 126. Finally, the correspondent 14
checks the security level to
4 ensure it meets predetermined minimum requirements. If either the
encryption or authentication
fails, or if the security level does not meet the minimum requirements, then
the correspondent 14
6 rejects the message.
7 [0020] It will be recognized that providing security bits and an
adjustable security level
8 provides flexibility in protecting each frame of the communication. It is
therefore possible for the
9 sender to decided which frames should be encrypted but not authenticated.
Since authentication
typically increases the length of a message, this provides a savings in
constrained environments
11 when bandwidth is at a premium.
12 [0021] In a further embodiment, the correspondent 12 wishes to send
the same message to
13 multiple recipients 14 with varying minimum security requirements. In
this case, the
14 correspondent 12 chooses a security level high enough to meet all of the
requirements. The
correspondent 12 then proceeds as in Figure 4 to assemble and send a message
with the security
16 level. The message will be accepted by each recipient since it meets
each of their minimum
17 requirements. It will be recognized that this embodiment provides
greater efficiency than
18 separately dealing with each recipient's requirements.
19 [0022] In another embodiment, a different number of security bits
are used. The actual
number of bits is not limited to any one value, but rather may be
predetermined for any given
21 application. The security bits should indicate the algorithm parameters.
They may be used to
22 determine the length of a key as 40 bits or 128 bits, the version of a
key to be used, or any other
23 parameters of the encryption system.
24 [0023] Although the invention has been described with reference to
certain specific
embodiments, various modifications thereof will be apparent to those skilled
in the art without
26 departing from the scope of the claims appended hereto.
27
28
4

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date 2014-08-26
(22) Filed 2003-07-07
(41) Open to Public Inspection 2005-01-07
Examination Requested 2008-06-30
(45) Issued 2014-08-26
Expired 2023-07-07

Abandonment History

There is no abandonment history.

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Registration of a document - section 124 $100.00 2003-07-07
Application Fee $300.00 2003-07-07
Maintenance Fee - Application - New Act 2 2005-07-07 $100.00 2005-06-30
Maintenance Fee - Application - New Act 3 2006-07-07 $100.00 2006-03-21
Maintenance Fee - Application - New Act 4 2007-07-09 $100.00 2007-06-22
Request for Examination $800.00 2008-06-30
Maintenance Fee - Application - New Act 5 2008-07-07 $200.00 2008-06-30
Maintenance Fee - Application - New Act 6 2009-07-07 $200.00 2009-06-11
Maintenance Fee - Application - New Act 7 2010-07-07 $200.00 2010-06-16
Maintenance Fee - Application - New Act 8 2011-07-07 $200.00 2011-06-14
Maintenance Fee - Application - New Act 9 2012-07-09 $200.00 2012-06-25
Maintenance Fee - Application - New Act 10 2013-07-08 $250.00 2013-06-25
Final Fee $300.00 2014-06-09
Maintenance Fee - Application - New Act 11 2014-07-07 $250.00 2014-06-18
Maintenance Fee - Patent - New Act 12 2015-07-07 $250.00 2015-07-06
Maintenance Fee - Patent - New Act 13 2016-07-07 $250.00 2016-07-05
Maintenance Fee - Patent - New Act 14 2017-07-07 $250.00 2017-07-03
Maintenance Fee - Patent - New Act 15 2018-07-09 $450.00 2018-07-02
Maintenance Fee - Patent - New Act 16 2019-07-08 $450.00 2019-06-28
Registration of a document - section 124 2019-11-26 $100.00 2019-11-26
Maintenance Fee - Patent - New Act 17 2020-07-07 $450.00 2020-07-06
Maintenance Fee - Patent - New Act 18 2021-07-07 $459.00 2021-07-02
Maintenance Fee - Patent - New Act 19 2022-07-07 $458.08 2022-07-01
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
BLACKBERRY LIMITED
Past Owners on Record
CERTICOM CORP.
STRUIK, MARINUS
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Abstract 2003-07-07 1 13
Description 2003-07-07 4 262
Claims 2003-07-07 1 27
Drawings 2003-07-07 4 81
Representative Drawing 2003-10-10 1 10
Cover Page 2004-12-13 1 33
Claims 2012-03-13 7 252
Description 2012-03-13 5 254
Claims 2013-06-04 7 244
Cover Page 2014-07-29 1 34
Correspondence 2003-08-25 1 26
Assignment 2003-07-07 3 117
Assignment 2003-09-26 3 99
Correspondence 2004-07-22 4 254
Correspondence 2004-08-04 1 13
Correspondence 2004-08-05 1 28
Fees 2005-06-30 1 35
Fees 2006-03-21 1 27
Fees 2007-06-22 1 28
Fees 2008-06-30 1 26
Prosecution-Amendment 2008-06-30 1 44
Prosecution-Amendment 2011-09-14 3 103
Prosecution-Amendment 2012-03-13 16 571
Prosecution-Amendment 2012-12-05 2 70
Prosecution-Amendment 2013-06-04 15 432
Prosecution-Amendment 2014-02-05 3 78
Prosecution-Amendment 2014-06-09 4 84
Correspondence 2014-06-09 4 86