Language selection

Search

Patent 2475561 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2475561
(54) English Title: METHOD AND APPARATUS FOR PROVIDING INTELLIGENT ERROR MESSAGING
(54) French Title: METHODE ET DISPOSITIF DE MESSAGERIE D'ERREUR INTELLIGENTE
Status: Granted
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04L 51/23 (2022.01)
  • H04W 24/04 (2009.01)
  • H04L 1/00 (2006.01)
  • H04L 9/28 (2006.01)
  • H04L 29/14 (2006.01)
  • H04W 12/04 (2009.01)
  • H04L 12/58 (2006.01)
(72) Inventors :
  • ADAMS, NEIL P. (Canada)
  • BROWN, MICHAEL S. (Canada)
  • LITTLE, HERBERT (Canada)
  • KIRKUP, MICHAEL G. (Canada)
  • BROWN, MICHAEL K. (Canada)
(73) Owners :
  • RESEARCH IN MOTION LIMITED (Canada)
(71) Applicants :
  • RESEARCH IN MOTION LIMITED (Canada)
(74) Agent:
(74) Associate agent:
(45) Issued: 2010-10-19
(22) Filed Date: 2004-07-22
(41) Open to Public Inspection: 2006-01-22
Examination requested: 2004-07-22
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): No

(30) Application Priority Data: None

Abstracts

English Abstract

A method and apparatus for providing intelligent am messaging is disclosed wherein a user of a mobile communications device is provided with descriptive error messaging information to assist the user in overcoming errors associated with the processing of electronic messages and data. For example, when the mobile device is being used to decrypt a cryptographically secured electronic message, and a problem is encountered, program logic of the device provides the user with (1) an indication of exactly what problem is preventing opening of the message, for example, a required cryptographic key is not available; (2) an indication of exactly what may be done to overcome the problem, for example, what utilities should be run on the device; and (3) exactly what data, if any, needs to be downloaded to the device, for example, what cryptographic keys should be downloaded.


French Abstract

Cet article présente une méthode et un dispositif destinés à fournir une messagerie AM intelligente grâce à laquelle l'utilisateur d'un appareil de communications mobile reçoit des renseignements descriptifs sur les messages d'erreur afin de l'aider à surmonter les erreurs associées au traitement des messages et des données électroniques. Par exemple, lorsque l'appareil mobile est utilisé pour déchiffrer un message électronique sécurisé par cryptage, et qu'un problème survient, la logique de programme de l'appareil présente à l'utilisateur (1) une indication exacte du problème qui empêche l'ouverture du message, par exemple, une clé de chiffrement requise est indisponible; (2) une indication de l'action à entreprendre, pour surmonter le problème, par exemple, quels utilitaires doivent être exécutés sur l'appareil; et (3) le cas échéant, exactement quelles données doivent être téléchargées sur l'appareil, par exemple, quelles clés de chiffrement sont à télécharger.

Claims

Note: Claims are shown in the official language in which they were submitted.



WHAT IS CLAIMED IS:


1. An electronic communications device comprising:
a receiver for receiving electronic messages;

a processor capable of processing said electronic messages; and

a memory storing computer program instructions which, when executed by the
processor, cause the processor to

determine if an electronic mail message received at the communications
device is encrypted,

if the received electronic mail message is encrypted, determine if an
encryption key for decrypting the received electronic mail message is
present on the electronic communications device, and

if the encryption key is not present on the electronic communications
device, automatically display an intelligent error message;

wherein said intelligent error message comprises an indication that the
encryption
key is not present on the electronic communications device and information on
how to retrieve the encryption key.


2. The electronic communications device of claim 1, wherein said intelligent
error message
further comprises information identifying a digital certificate that comprises
data for decrypting
the received electronic mail message.


3. The electronic communications device of claim 2, wherein the digital
certificate is
downloaded to the electronic communications device.


17


4. The electronic communications device of any one of claims 1 to 3, wherein
the electronic
communications device is connected via an interface to a host processor that
is capable of
performing operations in accordance with said intelligent error message.


5. The electronic communications device of claim 4, wherein said interface is
hard-wired.

6. The electronic communications device of claim 4, wherein said interface is
wireless.


7. The electronic communications device of any one of claims 1 to 6, wherein
the
encryption key is a private key of a public key private key pair.


8. A wireless communications device comprising:

a processor capable of processing electronic messages received by the wireless

communications device; and

a memory storing computer program instructions which, when executed by the
processor, cause the processor to

determine if an electronic mail message received by the wireless
communications device is encrypted,

if the received electronic mail message is encrypted, determine if an
encryption key for decrypting the received electronic mail message is
present on the wireless communications device, and

if the encryption key is not present on the wireless communications
device, automatically display an intelligent error message;

wherein said intelligent error message comprises an indication that the
encryption
key is not present on the wireless communications device and information on
how
to retrieve the encryption key.


18


9. The wireless communications device of claim 8, wherein said intelligent
error message
further comprises information identifying a digital certificate that comprises
data for decrypting
the received electronic mail message.


10. The wireless communications device of claim 9, wherein said digital
certificate is
downloaded to said wireless communications device from a host processor.


11. The wireless communications device of any one of claims 8 to 10, wherein
the encryption
key is a private key of a public key private key pair.


12. A method of processing electronic messages for viewing on a wireless
communications
device comprising:

receiving an electronic mail message on said wireless communications device;
processing the received electronic mail message for display on said wireless
communications device;

determining if the received electronic mail message is encrypted;

if the received electronic mail message is encrypted, determining if an
encryption key for
decrypting the received electronic mail message is present on the wireless
communications device; and

if the encryption key is not present on the wireless communications device,
automatically
displaying an intelligent error message on the wireless communications device;

wherein the intelligent error message comprises a first message indicating
that the
encryption key is not present on the wireless communications device and a
second
message providing detailed information how to retrieve the encryption key.


19


13. The method of claim 12, wherein said intelligent error message further
comprises a third
message comprising information identifying a digital certificate that
comprises data for
decrypting the electronic mail message.


14. The method of claim 12 or claim 13, wherein the encryption key is a
private key of a public
key private key pair.


15. The method of any one of claims 12 to 14, further comprising downloading
the digital
certificate to the wireless communications device.



Description

Note: Descriptions are shown in the official language in which they were submitted.



CA 02475561 2004-07-22

METHOD AND APPARATUS FOR PROVIDING INTELLIGENT ERROR
MESSAGING
BACKGROUND,' THE INVENTION

1. Field of the Invention

The present invention relates generally to mobile wireless communications
devices
capable of processing cryptographically secure messages and information. In
particular, the
disclosure is directed to a method and apparatus for providing a user of a
mobile wireless
communications device with descriptive error messaging information to assist
the user in
decrypting a cryptographically secured message where information necessary for
decrypting the
message, such as, for example, a particular private key(s), are not present on
the user's mobile
wireless communications device,

2. Related Art

Exchanging cryptographically secured electronic messages and data, such as,
for
example, e-mail messages, is well ]mown. Typically, the user of a device for
receiving such
cryptographically secured electronic information, such as, for example, a
mobile wireless
communications device, is provided with a store containing private keys,
certificates, and the
like, required for decrypting various cryptographically secured information.
Occasionally, the
secure message may be encrypted with a public key for which the store of the
mobile wireless
communications device does not include a corresponding private key or
certificate for decrypting
the message.

Existing e-mail processing software, such as, for example, Microsoft Outlook,
does not
provide any detailed information when a decryption error is detected. The
error messages
provided by such conventional systems are typically cryptic error messages
that do not describe

1


CA 02475561 2004-07-22

exactly what the problem is or what needs to be done to overcome the problem.
For example, in
an instance where a cryptographically secured e-mail message cannot be
decrypted because the
user's communication device (e.g., a wireless handheld device, desktop, etc.)
does not have the
corresponding private key of a public key private key pair, that is necessary
for properly

decrypting the message, conventional systems merely provide a cryptic, terse
and uninformative
message, such as, for example, "Can't open this item. Your digital ID name
cannot be found by
the underlying security system." Messages of this type provide the typical
user who is

unfamiliar with cryptographically secured messaging with little helpful
information for
remedying the problem so that the message can be decrypted and read. This
uninformative error
messaging tends to confuse and frustrate users who merely want to be able to
read the message.

This problem is further exacerbated in systems employing certificates with
relatively
small validity protocols or by key inventories that have high rollover rates.
As described above,
the information typically provided by conventional e-mail processing software
tends only to
indicate the existence of a problem, for example, that a message cannot be
decrypted, but does
not provide the unsophisticated user with enough information to solve the
problem. In other
words, merely identifying the existence of a problem without providing any
remedial
information to assist the user in overcoming the problem is a fundamental
drawback of
conventional cryptographically secured electronic messaging systems, such as,
for example,
wireless handheld communications devices.

BRIEF SUMMARY OF THE INVENTION

In view of the foregoing, we have now recognized the need for a method and
apparatus
for providing detailed error messaging to enable the user of cryptographically
secured electronic
2


CA 02475561 2004-07-22

messaging not only to identify the existence of a fault or problem, but that
also provides
information to enable to user to correct the identified problem and to read
the encrypted message,
To this end, it is advantageous to provide sufficient understandable and
helpful

information to a user so that in most typical cryptographic error situations,
the user will be aware
of exactly what is causing the problem, how to overcome the problem and what,
if any,
additional information may be required to be downloaded to the user device to
overcome the
problem.

For example, according to a preferred embodiment of the invention, when a user
attempts
to open a cryptographically secured message on the user's wireless
communications device, and
a problem is encountered, the user is provided with at least the following:
(1) an indication of
exactly what problem is preventing opening of the message, for example, the
message is
encrypted but cannot be decrypted because the required private key is not
present on the user's
device; (2) an indication of how the problem may be solved, for example, the
user may update
the device's key store using certificate synchronization software in the
device's desktop manager;
and (3) indicating to the user exactly what information needs to be loaded on
to the user's device,
for example, the missing certificate corresponds to one of the following
serial number/issuer
pairs: XX, YY, etc.

The foregoing provides users who are typically unfamiliar with secured
messaging with
more than a cryptic error message that merely indicates the existence of a
problem. It provides
the uninitiated user with information that describes exactly what the problem
is, how to update
the user's device to solve the problem, and what information/data is required
to overcome the
problem. The solution provided herein will alleviate significant user
frustration and confusion
3


CA 02475561 2004-07-22

that typically occurs when only cryptic error messages are provided without
any useful
information for overcoming the problem being encountered.

These and other advantages attendant therewith are provided by exemplary
embodiments
of the invention wherein a method and apparatus for providing detailed error
messaging,
including information to assist a user in overcoming the error, includes:
identifying an error,
providing an error message identifying the existence of an error, the error
message including:
providing a detailed description of the source of the error; providing a
description of what
procedures may be undertaken by the user to overcome the error; and providing
an indication of
what information must be downloaded to the user's device to overcome the
problem.

BRIEF DESCRhN OF THE DRAWINGS

These and other objects and advantages of exemplary embodiments of the present
invention
will be better understood and appreciated in conjunction with the following
detailed description of
exemplary embodiments taken together with the accompanying drawings, in which:

FIG. i is an overall system wide schematic view of an exemplary wireless a-
mail
communication system incorporating a mobile wireless communications device
with the
descriptive error messaging in accordance with an exemplary embodiment of the
present invention;

FIG. 2 is a block diagram of a fu ther exemplary communication system
including multiple
networks and multiple mobile communication devices;

FIG. 3 is an abbreviated schematic diagram of hardware included within an
exemplary
mobile wireless communications device;

4


CA 02475561 2004-07-22

FIG. 4 is an abbreviated schematic Functional diagram of the hardware/software
utilized
to achieve updating of the mobile wireless communication device
key/certificate store in the
exemplary embodiment of FIG, 1;

FIG. 5 is and exemplary abbreviated schematic flow diagram of an error
messaging
program according to an exemplary embodiment of the present invention; and

FIG. 6A and 6B are illustrative depictions showing exemplary error messaging
in
accordance with the exemplary embodiments discussed above

DETAIL ED DESCBIPTION OF EXEMPLARY EMBODIMENTS
FIG. 1 is an overview of an example communication system in which a wireless
communication device may be used. One skilled in the art will appreciate that
there may be
hundreds of different topologies, but the system shown in FIG. 1 helps
demonstrate the operation
of the encoded message processing systems and methods described in the present
application.
There may also be many message senders and recipients. The simple system shown
in FIG. 1 is
for illustrative purposes only, and shows perhaps the most prevalent Internet
e-mail environment
where security is not generally used.

FIG. I shows an e-mail sender 10, the Internet 20, a message server system 40,
a wireless
gateway 85, wireless infrastructure 90, a wireless network 105 and a mobile
communication
device 100.

An e-mail sender system 10 may, for example, be connected to an ISP (Internet
Service
Provider) on which a user of the system 10 has an account, located within a
company, possibly
connected to a local area network (LAN), and connected to the Internet 20, or
connected to the
Internet 20 through a large ASP (application service provider) such as America
Online (AOL).


CA 02475561 2004-07-22

Those skilled in the art will appreciate that the systems shown in FIG. I may
instead be
connected to a wide area network (WAN) other than the Internet, although e-
mail transfers are
commonly accomplished through Internet-connected arrangements as shown in FIG.
1.

The message server 40 may be implemented, for example, on a network computer
within
the frewall of a corporation, a computer within an ISP or ASP system or the
like, and acts as the
main interface for e-mail exchange over the Internet 20. Although other
messaging systems
might not require a message server system 40, a mobile device 100 configured
for receiving and
possibly sending e-mail will nonnally'be associated with an account on a
message server.
Perhaps the two most common message servers are Microsoft Exchange' and Lotus
Domino.
These products are often used in conjunction with Internet mail routers that
route and deliver
mail. These intermediate components are not shown in FIG. 1, as they do not
directly play a role
in the secure message processing described below. Message servers such as
server 40 typically
extend beyond just e-mail sending and receiving; they also include dynamic
database storage
engines that have predefined database formats for data like calendars, to-do
lists, task lists, e-
mail and documentation.

The wireless gateway 85 and in&astrutcture 90 provide a link between the
Internet 20 and
wireless network 105. The wireless infrastructure 90 determines the most
likely network for
locating a given user and tracks the user as they roam between countries or
networks. A message
is then delivered to the mobile device 100 via wireless transmission,
typically at a radio
frequency (RF), from a base station in the wireless network 105 to the mobile
device 100, The
particular network 105 may be virtually any wireless network over which
messages may be
exchanged with a mobile communication device.

6


CA 02475561 2004-07-22

As shown in FIG. 1, a composed e-mail massage 15 is sent by the e-mail sender
10,
located somewhere on the Internet 20. This message 15 is normally fully in the
clear and uses
traditional Simple Mail Transfer Protocol (SMTP), RFC822 headers and
Multipurpose Internet
Mail Extension (MMM) body parts to define the format of the mail message.
These techniques
are all well known to those skilled in the art. The message 15 arrives at the
message server 40
and is normally stored in a message store. Most known messaging systems
support a so-called
"'pull" message access scheme, wherein the mobile device 100 must request that
stored messages
be forwarded by the message server to the mobile device 100. Some systems
provide for
automatic routing of such messages which are addressed using a specific e-mail
address
associated with the mobile device 100. In a preferred embodiment described in
further detail
below, messages addressed to a message server account associated with a host
system such as a
home computer or office computer which belongs to the user of a mobile device
100 are
redirected from the message server 40 to the mobile device 100 as they are
received.

Regardless of the specific mechanism controlling the forwarding of messages to
the
mobile device 100, the message 15, or possibly a translated or reformatted
version thereof, is
sent to the wireless gateway 85. The wireless infrastructure 90 includes a
series of connections
to wireless network 105. These connections could be Integrated Services
Digital Network
(ISDN), Frame Relay or Ti connections using the TCPI]P protocol used
throughout the Internet.
As used herein, the term "wireless network" is intended to include at least
one of three different
types of networks, those being (1) data-centric wireless networks, (2) voice-
centric wireless
networks and (3) dual-mode networks that can support both voice and data
communications over
the same physical base stations. Combined dual-mode networks include, but are
not limited to,
(1) Code Division Multiple Access (CDMA) networks, (2) the Groups Special
Mobile or the

7


CA 02475561 2004-07-22

Global System for Mobile Communications (GSM) and the General Packet Radio
Service
(GPRS) networks, and (3) future third-generation (3G) networks like Enhanced
Data-rates for
Global Evolution (EDGE) and Universal Mobile Telecommunications Systems
(UMTS). Some
older examples of data-centric network include the MobitexTM Radio Network and
the
DataTACTm Radio Network. Examples of older voice-centric data networks include
Personal
Communication Systems (PCS) networks like GSM, and TDMA systems.

FIG. 2 is a block diagram of a further example communication system including
multiple
networks and multiple mobile communication devices. The system of FIG. 2 is
substantially
similar to the FIG. 1 system, but includes a host system 300, a redirection
program 45, a mobile
device cradle 65, a wireless virtual private network (VPN) router 75, an
additional wireless
network 110 and multiple mobile communication devices 100. As described above
in conjunction
with FIG. 1, FIG. 2 represents an overview of a sample network topology.
Although the encoded
message processing systems and methods described herein may be applied to
networks having
many different topologies, the network of FIG. 2 is useibl in understanding an
automatic e-mail
redirection system mentioned briefly above.

The central host system 300 will typically be a corporate office or other LAN,
but may
instead be a home office computer or some other private system where mail
messages are being
exchanged. Within the host system 300 is the message server 400, running on
some computer
within the firewall of the host system, that acts as the main interface for
the host system to
exchange e-mail with the Internet 20. In the system of FIG. 2, the redirection
program 45
enables redirection of data items from the server 400 to a mobile
communication device 100.
Although the redirection program 45 is shown to reside on the same machine as
the message
server 400 for ease of presentation, there is no requirement that it must
reside on the message

8


CA 02475561 2004-07-22

server. The redirection program 45 and the message server 400 are designed to
co-operate and
interact to allow the pushing of information to mobile devices 100. In this
installation, the
redirection program 45 takes confidential and non-confidential corporate
information for a
specific user and redirects it out through the corporate firewall to mobile
devices 100. A more
detailed description of the redirection software 45 may be, found in the
commonly assigned
United States Patent 6,219,694 ("the '694 Patent"), entitled "System and
Method for Pushing
Information From A Host System To A Mobile Data Communication Device Having A
Shared
Electronic Address", and issued to the assignee of the instant application on
April 17, 2001
which is hereby incorporated into the present application by reference. This
push technique may
use a wireless friendly encoding, compression and encryption technique to
deliver all
information to a mobile device, thus effectively extending the security
firewall to include each
mobile device 100 associated with the host system 300.

As shown in FIG. 2, there may be many alternative paths for getting
information to the
mobile device 100. One method for loading information onto the mobile device
100 is through a
port designated 50, using a device cradle 65. This method tends to be useful
for bulk
information updates often performed at initialization of a mobile device 100
with the host system
300 or a computer 35 within the system 300. The other main method for data
exchange is over-
the-air using wireless networks to deliver the information. As shown in FIG.
2, this may be
accomplished through a wireless VPN router 75 or through a traditional
Internet connection 95 to
a wireless gateway 85 and a wireless infrastructure 90, as described above.
The concept of a
wireless VPN router 75 is new in the wireless industry and implies that a VPN
connection could
be established directly through a specific wireless network 110 to a mobile
device 100. The
possibility of using a wireless VPN router 75 has only recently been available
and could be used

9


CA 02475561 2004-07-22

when the new Internet Protocol (IP) Version 6 (IPV6) arrives into IP-based
wireless networks.
This new protocol will provide enough IP addresses to dedicate an IP address
to every mobile
device 100 and thus make it possible to push information to a mobile device
100 at any time. A
principal advantage of using this wireless VPN router 75 is that it could be
an off-the-shelf VPN
component, thus it would not require a separate wireless gateway 85 and
wireless infrastructure
90 to be used. A VPN connection would preferably be a Transmission Control
Protocol
(TCP)/IP or User Datagram Protocol (UDP)/IP connection to deliver the messages
directly to the
mobile device 100. If a wireless VPN 75 is not available then a link 95 to the
Internet 20 is the
most common connection mechanism available and has been described above.

In the automatic redirection system of FIG. 2, a composed e-mail message 15
leaving the
e-mail sender 10 arrives at the message server 400 and is redirected by the
redirection program
45 to the mobile device 100. As this redirection takes place the message 15 is
re-enveloped, as
indicated at 80, and a possibly proprietary compression and encryption
algorithm can then be
applied to the original message 15. In this way, messages being read on the
mobile device 100
are no less secure than if they were read on a desktop workstation such as 35
within the firewall.
All messages exchanged between the redirection program 45 and the mobile
device 100
preferably use this message repackaging technique. Another goal of this outer
envelope is to
maintain the addressing information of the original message except the
sender's and the
receiver's address. This allows reply messages to reach the appropriate
destination, and also
allows the "from" field to reflect the mobile user's desktop address. Using
the user's e-mail
address from the mobile device 100 allows the received message to appear as
though the
message originated from the user's desktop system 35 rather than the mobile
device 100.



CA 02475561 2009-10-23

With reference back to the port 50 and cradle 65 connectivity to the mobile
device 100,
this connection path offers many advantages for enabling one-time data
exchange of large items.
For those skilled in the art of personal digital assistants (PDAs) and
synchronization, the most
common data exchanged over this link is Personal Information Management (PIM)
data 55.
When exchanged for the first time this data tends to be large in quantity,
bulky in nature and
requires a large bandwidth to get loaded onto the mobile device 100 where it
can be used on the
road. This serial link may also be used for other purposes, including setting
up a private security
key 210 such as an S/MIME or PGP specific private key, the Certificate (Cert)
of the user and
their Certificate Revocation Lists (CRLs) 60. The private key is preferably
exchanged so that the
desktop 35 and mobile device 100 share one personality and one method for
accessing all mail.
The Cert and CRLs are normally exchanged over such a link because they
represent a large
amount of the data that is required by the device for S/MIME, PGP and other
public key security
methods.

As depicted in FIG. 3, mobile communications device 100 includes a suitable RF
antenna
102 for wireless communication to/from wireless network 105, 110. Conventional
RF,
demodulation/ modulation and decoding/coding circuits 104 are provided. As
those in the art
will appreciate, such circuits may involve possibly many digital signal
processors (DSPs),
microprocessors, filters, analog and digital circuits and the like. However,
since such circuitry is
well known in the art, it is not further described herein.

The mobile communications device 100 will also typically include a main
control CPU
106 that operates under the control of a stored program in program memory 108,
and which has
access to data memory 120. CPU 106 also communicates with a conventional
keyboard 112 and
display 114 (for example, a liquid crystal display or LCD) and audio
transducer or speaker 116.
11


CA 02475561 2009-10-23

A portion of the data memory 310 is available for storing data required for
decrypting encrypted
messages, such as, for example, private keys, digital certificates, and the
like. Suitable computer
program executable code is stored in portions of the program memory 108 to
constitute stored
program logic for receiving and using new or added private keys and/or digital
certificates or the
like as described below (for example, via a wired serial I/O port or the
wireless RF antenna 102).

As depicted in FIG. 1, a secure wired synchronization connection 26 (for
example,
between serial I/O ports of the user's base unit 24 and the wireless device
100) is typically
provided for normal data synchronization purposes (for example, to synchronize
databases in the
two devices with respect to such things as calendars, to-do lists, task lists,
address books, etc.).
Part of prior data synchronization processes has included a program logic such
as Cert Sync for
maintaining synchronization between cryptographic message certificates. If a
secure over the air
(OTA) synchronization connection 28 is available, it may also be used by Cert
Sync to maintain
synchronization of cryptographic message certificates.

As previously described, there is a communications link (for example, depicted
in dotted
lines at 30 in FIG. 1) typically found between the device user's base unit 24
and a system
message server 40. Accordingly, there is an existing communication path that
may be utilized
for passing synchronization data from the user's base unit 24 via channel 30,
the server 40,
Internet 20, wireless gateway 85 and wireless infrastructure 90 via the OTA
synchronization
connection 28.

As depicted in FIG. 4, the user's base unit 24 may be used to update the
mobile wireless
communications device 100 with information including, for example, private key
information
and digital certificate information. The user's base station 24 is typically a
desktop PC, and may
be of conventional hardware and operating system design. It will typically
include desktop

12


CA 02475561 2004-07-22

manager program logic 304 (in the form of, for example, executable computer
program logic) for
managing, among other things, a normal data synchronization connection to
device 100. As
previously mentioned, in the environment of mobile wireless communications
systems, such a
desktop manager may typically include logic for synchronizing cryptographic
message
certificates. Such logic is denoted here as Cart Sync. Optionally, an OTA
synchronization
connection may also be available via an OTA link 28 and OTA sync backup 314.

E-mail messages generated using the S/MIME and PGP techniques may include
encrypted information, a digital signature on the message contents, or both.
In encrypted
S/MIME message operations, a one-time session key is generated and used to
encrypt the body
of the message, typically with a symmetric cipher, such as, for example,
Triple DES. The
session key is then encrypted using the receiver's public key, typically with
a public key
encryption algorithm like RSA. If the message is addressed to more than one
receiver, the same
session key is encrypted using the public key of each receiver. The encrypted
message body, as
well as all encrypted session keys, is sent to every receiver. Each receiver
must then locate its
own session key, possibly based on a generated Recipient Info summary of the
receivers that
may be attached to the message, and decrypt the session key using its private
key. Once the
session key is decrypted, it is then used to decrypt the message body. The
S/MI ME Recipient
Info attachment can also specify the particular encryption scheme that must be
used to decrypt
the message. This information is normally placed in the header of the S/MIME
message. Those
skilled in the art will appreciate that these operations relate to an
illustrative example of S/MIME
messaging and its associated encoding operations, namely encryption. It will
also be understood
that the instant disclosure is in no way limited thereto.

13


CA 02475561 2004-07-22

FIG. 5 illustrates an exemplary embodiment of the present disclosure wherein
intelligent
error messaging is provided. If a user receives a message at his or her
handheld device 500, the
device first determines if the message is encrypted in step 502. If the
message is not encrypted,
the message is displayed to the user in step 516. On the other hand, if the
message is determined
to be encrypted, the program logic then determines if the appropriate private
key is present on
the user's device 504. If the private key is present on the user's device, the
message is decrypted
506 and then displayed on the user's device 516, If, however, there is a
problem, such as, for
example, a determination in step 504 that the appropriate private key or
certificate is not
available, intelligent error messaging according to an exemplary embodiment of
the disclosure is
provided.

When an exemplary error, such as that illustrated above occurs, the program
logic of the
user's device provided with intelligent error messaging provides detailed
information for
correcting or overcoming the error 510. According to the intelligent error
messaging, the
program logic determines, among other things, exactly what the problem is with
the message,
and displays an appropriate descriptive indication of what error has been
detected 510a. In this
illustrative example, a message such as "This S/MJ E message is encrypted but
cannot be
decrypted because the required private key is not present on your handheld"
may be displayed.
This message describes in understandable terms the problem being encountered
in displaying a
received message. Thus, the user is not left wondering or guessing as to the
cause of the error.

After displaying the detailed descriptive error message identifying the
problem being,
encountered 510a, a descriptive message detailing how the problem maybe solved
is displayed
510b. It will be understood that this message may be automatically displayed
or displayed in
response to a user input. In any event, according to this exemplary
illustration, a message telling

14


CA 02475561 2004-07-22

the user exactly how to solve the problem is displayed, for example, how to
get a private key on
to the user device. For example, a message along the lines of "You may update
your handheld's
key store using the certificate synchronization software in the desktop
manager." Now, the user
has been informed of exactly what problem has occurred, and what steps to take
to solve the
problem. However, it still remains that the user must now be informed as to.
what data must be
loaded onto the user's device when implementing, for example, the desktop
manager,

To that and, an advantageous feature of the instant exemplary embodiment is
the display
51 Oc of a further message informing the user exactly which certificates need
to be loaded with
the message to provide the user's device with the appropriate data for
decrypting the message,
including which certificates include the necessary information, For example, a
message such as
"The missing certificate corresponds to one of the following serial number,
issuer pairs: serial
number X, issuer X; serial number Y, issuer Y, etc."

After all of the intelligent error messaging information 5108, 510b, 510c is
provided to
the user, the user may farther be prompted to follow the instructions provided
512, and load the
appropriate data onto the user's device 514. Upon completing the error
correction steps, the
message may then be decrypted 506 for display to the user 516.

FIG. 6A and 6B are illustrative depictions showing exemplary error messaging
in
accordance with the exemplary embodiments discussed above. As shown in FIG.
6A, an
indication of what type of error has occurred is displayed on the mobile
device. For example, the
display indicates that the S/MIME message cannot be decrypted because the
required private key
is not present on the mobile device. FIG. 6H illustrates titrther error
messaging in accordance
with exemplary embodiments of the invention. For example, as shown in FIG. 6B,
the display of



CA 02475561 2004-07-22

the mobile device indicates how the user may obtain the missing information,
and what that
information may be.

It will be understood that the above intelligent error messaging described
with respect to
decryption of encrypted e-mail messages is intended to be illustrative only.
It will be apparent to
those skilled in the art that this type of Intelligent error messaging has
wide ranging application
in unlimited and innumerable applications, especially those encountered in the
computer and
electronics fields. Thus, the exemplary embodiment described above may be
equally applicable
to use in computer programs. Internet browsing, data processing and the like,
whore errors that
are correctable by a user may occur frequently.

16

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date 2010-10-19
(22) Filed 2004-07-22
Examination Requested 2004-07-22
(41) Open to Public Inspection 2006-01-22
(45) Issued 2010-10-19

Abandonment History

There is no abandonment history.

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Request for Examination $800.00 2004-07-22
Application Fee $400.00 2004-07-22
Registration of a document - section 124 $100.00 2005-05-13
Maintenance Fee - Application - New Act 2 2006-07-24 $100.00 2006-06-27
Maintenance Fee - Application - New Act 3 2007-07-23 $100.00 2007-06-22
Maintenance Fee - Application - New Act 4 2008-07-22 $100.00 2008-06-25
Maintenance Fee - Application - New Act 5 2009-07-22 $200.00 2009-07-21
Maintenance Fee - Application - New Act 6 2010-07-22 $200.00 2010-06-30
Final Fee $300.00 2010-07-27
Maintenance Fee - Patent - New Act 7 2011-07-22 $200.00 2011-06-08
Maintenance Fee - Patent - New Act 8 2012-07-23 $200.00 2012-06-14
Maintenance Fee - Patent - New Act 9 2013-07-22 $200.00 2013-06-12
Maintenance Fee - Patent - New Act 10 2014-07-22 $250.00 2014-07-21
Maintenance Fee - Patent - New Act 11 2015-07-22 $250.00 2015-07-20
Maintenance Fee - Patent - New Act 12 2016-07-22 $250.00 2016-07-18
Maintenance Fee - Patent - New Act 13 2017-07-24 $250.00 2017-07-18
Maintenance Fee - Patent - New Act 14 2018-07-23 $250.00 2018-07-16
Maintenance Fee - Patent - New Act 15 2019-07-22 $450.00 2019-07-12
Maintenance Fee - Patent - New Act 16 2020-07-22 $450.00 2020-07-17
Maintenance Fee - Patent - New Act 17 2021-07-22 $459.00 2021-07-16
Maintenance Fee - Patent - New Act 18 2022-07-22 $458.08 2022-07-15
Maintenance Fee - Patent - New Act 19 2023-07-24 $473.65 2023-07-14
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
RESEARCH IN MOTION LIMITED
Past Owners on Record
ADAMS, NEIL P.
BROWN, MICHAEL K.
BROWN, MICHAEL S.
KIRKUP, MICHAEL G.
LITTLE, HERBERT
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Abstract 2004-07-22 1 24
Description 2004-07-22 16 745
Claims 2004-07-22 6 177
Drawings 2004-07-22 6 140
Representative Drawing 2005-12-30 1 11
Cover Page 2006-01-09 2 49
Drawings 2009-10-23 6 136
Description 2009-10-23 16 740
Claims 2009-10-23 4 112
Abstract 2010-08-12 1 24
Representative Drawing 2010-09-27 1 14
Cover Page 2010-09-27 2 50
Correspondence 2004-09-03 1 27
Assignment 2004-07-22 3 105
Assignment 2005-05-13 5 185
Correspondence 2008-10-06 3 109
Correspondence 2008-10-21 1 13
Correspondence 2008-10-21 2 28
Prosecution-Amendment 2009-04-23 7 375
Prosecution-Amendment 2009-10-23 13 436
Correspondence 2010-07-27 1 41
Correspondence 2015-03-19 6 401
Correspondence 2015-04-15 6 1,339
Correspondence 2015-04-15 4 897