EP2092453A2 - Sécurité d'un dispositif électronique personnel - Google Patents

Sécurité d'un dispositif électronique personnel

Info

Publication number
EP2092453A2
EP2092453A2 EP07824043A EP07824043A EP2092453A2 EP 2092453 A2 EP2092453 A2 EP 2092453A2 EP 07824043 A EP07824043 A EP 07824043A EP 07824043 A EP07824043 A EP 07824043A EP 2092453 A2 EP2092453 A2 EP 2092453A2
Authority
EP
European Patent Office
Prior art keywords
electronic device
personal electronic
message
secure
microprocessor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP07824043A
Other languages
German (de)
English (en)
Inventor
Neil Millar Stewart
Steven Mark Harkins
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Helixion Ltd
Original Assignee
Helixion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Helixion Ltd filed Critical Helixion Ltd
Publication of EP2092453A2 publication Critical patent/EP2092453A2/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • the present invention relates to the field of personal electronic device security.
  • Personal electronic devices which are generally carried on the person of a user (such as personal digital assistants (PDAs), mobile telephones, music players etc.) are in common use at the present time.
  • PDAs personal digital assistants
  • Many such personal electronic devices comprise wireless communications interfaces. Examples include mobile telephones and personal digital assistants (PDAs) which comprise mobile telephone interfaces, such as GSM, GPRS, W-CDMA or UMTA interfaces.
  • PDAs personal digital assistants
  • Personal electronic devices which comprise mobile telephone interfaces typically comprise an authentication token, such as a subscriber identification module (SIM) card, which stores data used to authenticate a subscriber with a mobile telephone network operator.
  • SIM subscriber identification module
  • the authentication procedure used to create a connection between a personal electronic device and a network operator includes security measures to enable the secure creation of a bearer service.
  • these security measures do not in themselves provide for the secure processing and communication of data by an application executed on the personal electronic device. Even if data is securely transmitted to a personal electronic device, it remains vulnerable unless it can be ensured that only authorised personnel can view and/or work with that data.
  • SIM cards may be password protected and will not carry out specific functionality (e.g. make telephone calls or allow the display of stored messages) until a personal identification number (PIN) has been input.
  • PIN personal identification number
  • Some embodiments of the invention aim to provide improved authentication technology which is required before a security-related function of a personal electronic device can be carried out.
  • Some embodiments aim to allow service providers other than mobile network operators (MNOs) to control aspects of the functionality of personal electronic devices.
  • MNOs mobile network operators
  • Some embodiments of the present invention aim to provide improved security measures to protect electronic messages received by a personal electronic device or, in some embodiments, created by a personal electronic device.
  • Some embodiments of the present invention aim to facilitate the creation of a secure context between a software application executed on a personal electronic device and a remote server.
  • a personal electronic device comprising:
  • a first microprocessor which controls the personal electronic device
  • secure memory which stores (i) first secure data which is required for a security-related function of the personal electronic device to be carried out, and (ii) second secure data which is required for an authentication procedure;
  • second microprocessor which is in communication with the first microprocessor and the secure memory and which controls access to the data stored in the secure memory;
  • the personal electronic device is not operable to carry out the security-related function which requires the first secure data until an authentication procedure which requires the second secure data has been successfully completed.
  • the second microprocessor controls access to the data stored in the secure memory, which comprises the first and second secure data, the second microprocessor controls whether the personal electronic device is operable to carry out the security-related function.
  • the second microprocessor and the secure memory is part of a removable memory device which is in removable electronic communication with the first microprocessor through an interface of the personal electronic device.
  • a security-related function of the personal electronic device requires (i) the removable memory device to be present and (ii) an authentication procedure, which requires the second secure data, to have been completed.
  • the secure memory preferably comprises an integrated section of memory, which is integrated with the second microprocessor.
  • the integrated section of memory may be integrated within the second microprocessor.
  • the first secure data and/or the second secure data are preferably stored in the integrated section of memory.
  • the secure memory may comprise a section of memory which is readable on demand by the first microprocessor, but in which the data is encrypted, wherein decryption of the data requires data stored in the integrated section of memory.
  • Data stored in the section of memory which is readable on demand may be decrypted by the second microprocessor using a decryption key stored in the integrated section of memory or generated in the integrated section of memory using the first secure data.
  • Data stored in the section of memory which is readable on demand may be decrypted by the first microprocessor using a decryption key which is generated by the second microprocessor using data stored in the integrated section of memory.
  • the encrypted data will have been encrypted by the second microprocessor or by the first microprocessor under the control of the second microprocessor.
  • the removable memory device may comprise a removable non-volatile solid-state memory device, comprising a section of memory which is readable on demand, the second microprocessor and the integrated section of memory, whereupon the secure memory comprises the integrated section of memory and optionally a portion of the section of memory which is readable on demand, but in which the data is encrypted, wherein decryption of the data requires data stored in the integrated section of memory.
  • the portion of the section of memory which is readable on demand which functions as secure memory may not be fixed, but may vary in use.
  • the second microprocessor and the secure memory may be integrated into a single semiconductor device to provide security. Because the second microprocessor controls access to data stored in the secure memory, the first microprocessor cannot obtain the data stored in the secure memory except under the control of the second microprocessor, for example because the second microprocessor has output the data to the first microprocessor or because the data has been decrypted under the control of the second microprocessor. Decryption under the control of the second microprocessor may be carried out by the second microprocessor with reference to the first secure data.
  • decryption under the control of the second microprocessor may be carried out by the first microprocessor using data, (such as a decryption key derived from the first secure data), received from the second microprocessor with reference to the first secure data.
  • data such as a decryption key derived from the first secure data
  • the removable memory device is preferably a non-volatile solid state memory device comprising the second microprocessor and the secure memory.
  • the removable non-volatile solid state memory device will be adapted to resist access to the secure memory (except under the control of the second microprocessor).
  • the removable non-volatile solid state memory device will be a tamper- resistant silicon device.
  • the removable non-volatile solid state memory device comprises a section of memory which can be read on demand and preferably the removable memory device interfaces with a memory card interface (e.g. a memory card slot) of the personal electronic device. Part of the section of memory which can be read on demand may be used as secure memory.
  • the removable non-volatile solid state memory device is preferably a secure media card.
  • the secure media card may be a card according to the ISO/IEC O
  • SD Secure Digital
  • microSD microSD memory cards according to standards published by the SD Association (www.sdcard.org) or a SecureMMC cards according to standards published by the MultiMediaCard Association (www.mmca.org).
  • SD is a trade mark of Toshiba Corporation
  • miniSD is a trademark of SD association
  • microSD is a trade mark of SanDisk Corporation
  • SecureMMC is a trade mark of the MultiMediaCard Association
  • secure media card includes cards according to each of these formats.
  • the personal electronic device comprises a secure media card connected to a memory card interface (e.g. a memory card slot) of the personal electronic device, wherein the second microprocessor and the secure memory are part of the secure media card.
  • the secure memory preferably comprises an integrated section of memory which is integrated with the second microprocessor.
  • Secure media cards generally comprise memory which is readable on demand, part of which may be used as part of the secure memory.
  • the removable non-volatile solid-state memory device preferably does not comprise moving parts.
  • the removable non-volatile solid-state memory device preferably does not comprise a battery.
  • the second microprocessor and secure memory are typically integrated into a single microcontroller.
  • the non-volatile solid state memory device may be integrated with the first microprocessor.
  • the first microprocessor, the second microprocessor and the secure memory may all be integrated into a single semiconductor device.
  • the authentication procedure may comprise providing an identifier to a remote server, wherein the identifier is, or is derived from, the second secure data.
  • the personal electronic device preferably comprises a wireless communications interface and the identifier may be provided to a remote server through the wireless communications interface.
  • the authentication procedure may comprise exchanging information with a remote server, preferably using the wireless communications interface.
  • the second secure data may be used for authentication of the personal electronic device, a user of the personal electronic device, or a component of the personal electronic device (such as the removable memory device) with a remote server.
  • the second secure data may be used to determine the response to a challenge from the remote server.
  • the second secure data may comprise a key used to encrypt or decrypt data sent to or received from the remote server during the authentication procedure.
  • the personal electronic device may comprise an input module for receiving an identifier
  • the second secure data may comprise identity verification data
  • the authentication procedure may be an identity verification procedure which verifies an identity using the received identifier and the identity verification data.
  • the input module may comprise program code executed by the first microprocessor.
  • the input module may comprise an input device for inputting an identifier received from a user of the personal electronic device.
  • the identifier input by a user may comprise a password and/or personal identification number (PIN).
  • the input device may comprise a keyboard and/or touch screen.
  • the input device may comprise a biometric data reader, such as an iris reader or fingerprint reader, and the input identifier may comprise biometric data.
  • the input identifier will be transmitted to the second microprocessor by the first microprocessor and compared with the identity verification data.
  • the step of activation may require a user to input a one-time identifier, such as a one- time password or code which is verified with reference to one-off identity verification data (typically stored in the secure memory) and which only causes the first microprocessor to be operable to cause an electronic message to be decrypted and output using the output means on only one occasion.
  • the personal electronic device may enable a user to input an identifier which is stored as identity verification data, or which can be used to calculate and store identity verification data, responsive to the input by a user of a one-time identifier.
  • a one-time identifier might be sent to a user, e.g. by mail, to enable them to authenticate themselves, set their own password or input their own biometric details.
  • the authentication procedure may be carried out by the second microprocessor.
  • the authentication procedure may comprise the step of comparing the received identifier and the identity verification data, although one skilled in the art will recognise that authentication with reference to identification data may be carried out in different ways, for example, the identity verification data may be a hash derived from the anticipated received identifier.
  • the input module may be operable to receive a identifier from a device which is connected to the personal electronic device, for example, a unique identifier of a microprocessor or memory storage device which is integrated into the personal electronic device. However, the input module is preferably operable to receive an identifier from a device which is removably connected to the personal electronic device.
  • the input module may be operable to receive an identifier from an authentication token, such as a SIM card.
  • the identifier may be an Integrated Circuit Card Identifier (ICCID), international mobile subscriber identity (IMSI) or Mobile Station International ISDN Number (MSISDN) which is typically stored in a SIM card removably connected to the personal electronic device.
  • ICCID Integrated Circuit Card Identifier
  • IMSI international mobile subscriber identity
  • MSISDN Mobile Station International ISDN Number
  • device control program code is loaded from the removable memory device into memory which is integral to the personal electronic device and executed by the first microprocessor, and the device control program code manages communication between the first microprocessor and each of the removable memory device and the SIM card.
  • the security-related function which requires the first secure data may be the creation of a secure context between a software application executed on the personal electronic device (typically on the first microprocessor) and a remote server. That is to say, the first secure data may be used in the operation of a service for securely communicating data from the software application to the remote server and/or vice versa.
  • the second microprocessor can regulate the creation of a secure context between a software application executed on the personal electronic device and a remote server.
  • the first secure data may comprise a key used for encrypting data which has been processed by the software application or selected by the software application for transmission to the remote server.
  • the first secure data may comprise a key used for decrypting data received from the remote server and intended for secure relay to the software application.
  • the first secure data may comprise shared secret data shared with the remote server for securely relaying data from the personal electronic device to the remote server and/or from the remote server to the personal electronic device.
  • the first secure data may comprise authentication data used to authenticate with the remote server in order to create a secure context.
  • the first secure data may be used by the second microprocessor to carry out one or more of the abovementioned functions.
  • the first secure data may be used by the second microprocessor to prepare data for transmission to the first microprocessor, which carries out one or more of the abovementioned functions.
  • the security-related function which requires the first secure data may be the activation of a secure token (such as a SIM card) which has an authentication role in the creation of a wireless communications link (such as a mobile telephone network connection) using the first secure data.
  • a secure token such as a SIM card
  • a wireless communications link such as a mobile telephone network connection
  • the security-related function may comprise the provision to a secure token of an identifier which is required before the secure token will fulfil its authentication role in the creation of a wireless communications link.
  • the secure token is a mobile telephone SIM card
  • the identifier may be the SIM PIN required before the SIM can be used to connect to a mobile telephone network and/or before some data stored on the SIM can be accessed.
  • the SIM card may be instructed to require a PIN provided by the personal electronic device.
  • the identifier may be the personal unblocking key (PUK) of a SIM.
  • the first secure data may comprise the identifier (such as the PIN and/or PUK) of a SIM card.
  • the security-related function may include the step of changing the identifier required by the secure token and storing the new identifier (or data which can be used to generate the new identifier) as the first secure data.
  • the security- related function may comprise the step of changing the PIN required by a SIM card, and preferably also the step of storing the revised PIN as revised first secure data.
  • the revised PIN will preferably be generated by the second microprocessor. As the revised PIN is generated by the second microprocessor and stored as first secure data, the user should not know the PIN and not be able to activate the SIM card without first having carried out the authentication procedure.
  • the personal electronic device may be operable to change or reset the identifier required by the secure token (e.g. the PIN of the SIM).
  • the secure memory is part of a removable memory device which is in removable electronic communication with the first microprocessor through an interface of the personal electronic device
  • the personal electronic device may be operable to cause a SIM card to require a PIN before it can be used to further communicate using a wireless communications link which requires the SIM card for authentication.
  • the first microprocessor typically when executing program code which was loaded from the removable memory device
  • detecting that the removable memory device has been removed and then resetting a part of the electronic device comprising the SIM card, for example resetting a mobile telecommunication transceiver, such as a GSM module.
  • a mobile telecommunication transceiver such as a GSM module.
  • this can be achieved on a Windows Mobile 5.0 device via a standard TAPI call as shown in the following line of code:
  • hres NneSetEquipmentState( hLine, LINEEQU IPMENTSTATE_NOTXRX) ;
  • the personal electronic device may be adapted to block further authentication attempts and/or delete stored data (such as encrypted electronic messages) responsive to a user making more than a predetermined numbered of authentication attempts or responsive to a lock-down message received from a remote server, or the passage of a pre-determined period of time without user activity.
  • stored data such as encrypted electronic messages
  • the blocking of further authentication attempts and/or deletion of stored data takes place under the control of the second microprocessor.
  • the security-related function of the personal electronic device may be execution of program code by the first microprocessor, which program code comprises a software application which handles confidential data and which is initially stored in an encrypted form on a removable memory device, wherein the first secure data comprises a decryption key or other data required for the decryption of the stored program code.
  • Decryption of the stored program code may be carried out by the second microprocessor with reference to the first secure data, or by the first microprocessor using data received from the second microprocessor with reference to the first secure data.
  • the personal electronic device may further comprise:
  • a message receiving module for receiving encrypted electronic messages
  • a message communication module for communicating a decrypted electronic message which was received in encrypted form by the message receiving module
  • an output control module which is operable, following the completion of the authentication procedure, to cause at least part of an encrypted electronic message which has been received by the message receiving module, to be decrypted and communicated by the message communication module;
  • output control module is not operable to cause an encrypted electronic message to be decrypted and communicated using the message communication module prior to completion of the authentication procedure, but is operable to cause an encrypted electronic message to be decrypted and communicated using the message communication module once the authentication procedure has been completed;
  • the first secure data is required for the decryption of a received electronic message and the security-related function comprises the decryption of a received electronic message.
  • the message receiving module may comprise a wireless communications receiver (which will typically be part of a wireless communications transceiver).
  • the message communication module may comprise an output device, such as a display, for displaying an electronic message which has been decrypted.
  • the output device may comprise audio output means, such as a loudspeaker, for providing audio output of an electronic message which has been decrypted.
  • the message communication module may comprise a functional part of a software application which is executed on the first microprocessor in use and which outputs the decrypted electronic message to another software application which is executed on the first microprocessor.
  • an electronic message may be securely communicated from a remote device (e.g. a server) which encrypted the electronic message to a software application executed on the first microprocessor.
  • the decrypted electronic message may be output by relaying a pointer or handle to the decrypted electronic message to the other software application.
  • the message communication module may communicate the decrypted electronic message in an encrypted format.
  • the electronic message may have been encrypted using more than one layer of encryption and only one layer of encryption may have been decrypted.
  • the decrypted electronic message may have been reencrypted using a different encryption algorithm or key to that used to encrypt the received encrypted electronic message before it was transmitted to and received by the personal electronic device.
  • the message communication module comprises program code which is loaded from the removable memory device into memory which is integral to the personal electronic device in use and executed by the first microprocessor.
  • the output control module typically comprises a functional part of a software application executed on the first microprocessor or the second microprocessor which causes the second microprocessor to decrypt an electronic message.
  • the output control module and the message communication module may be part of the same software application.
  • the whole encrypted electronic message may be decrypted and output, however only part of the encrypted electronic message may be decrypted and output.
  • the encrypted electronic message may be received in combination with non-encrypted data.
  • the first secure data comprises a decryption key or secret data.
  • the step of decrypting an encrypted electronic message (or at least part thereof) may be carried out by the second microprocessor.
  • the decryption of an encrypted electronic message (or at least part thereof) may be carried out other than by the second microprocessor (e.g. by the first microprocessor) by a procedure which nevertheless requires the first secure data.
  • the encrypted electronic message (or at least a part thereof) may be decrypted by the first microprocessor using a key derived from the first secure data by the second microprocessor.
  • the decryption key or secret data is sufficient to enable decryption of the electronic message (or at least part thereof).
  • the decryption key or secret data enables the electronic message (or at least part thereof) to be decrypted without communication with a remote device, such as a server which encrypted the electronic message.
  • the first secure data is required for decryption of the received electronic messages (or at least parts thereof) and access to the secure memory is controlled by the second microprocessor
  • electronic messages can be relayed in encrypted form from a remote server which encrypted the electronic messages to the personal electronic device such that decryption is under the control of the second microprocessor (whether or not the actual decryption is carried out by the second microprocessor).
  • This provides an important security benefit where the electronic message is transmitted through unsecure communication means, or communication means owned by an untrusted party, or where the personal electronic device comprises software applications which are executable by the first microprocessor and are not trusted.
  • a secure context can thereby be created between the server which encrypts the electronic messages and the second microprocessor which controls decryption with reference to the first secure data.
  • the received encrypted electronic messages are preferably stored such that they can only be decrypted under the control of the second microprocessor, with reference to the first secure data.
  • a decryption key may be part of a key pair, wherein the other key in the key pair was previously transmitted from the second microprocessor to a server which used the other key in the key pair to encrypt the electronic message which is received as an encrypted electronic message.
  • Keys in a key pair may be asymmetric keys or symmetric keys, and so they may be the same as each other.
  • the first secure data may comprise a shared secret, which corresponds with data stored securely in server means, wherein the second microprocessor and the server means uses the shared secret to securely transmit an encrypted electronic message from the server means to the personal electronic device via a communications link.
  • the secure memory may store a secret key which can be used to decrypt a received encrypted electronic message which has been encrypted (for example, by server means) using a public key which is complementary to the secret key.
  • Public key cryptosystems such as the RSA algorithm, are well-known to those skilled in the art.
  • the electronic messages (or at least parts thereof) will be decrypted by the second microprocessor and the electronic message (or at least a part thereof) will be relayed from the second microprocessor to the first microprocessor for the first microprocessor to cause the electronic message to be output using the output means in a format which is unencrypted (for example, plain text) or encrypted using a different encryption method and/or key (stored in memory which is directly accessible to the first microprocessor) to that used to encrypt the electronic message when it was received.
  • unencrypted for example, plain text
  • a different encryption method and/or key stored in memory which is directly accessible to the first microprocessor
  • the encrypted electronic messages may be decrypted by the first microprocessor by a procedure which requires the first secure data, for example by a decryption procedure using a one-off decryption key provided by the second microprocessor using a key or data stored in the secure memory as first secure data.
  • the electronic messages may comprise information to be communicated to the user of the personal electronic device.
  • the said information is preferably information of a type which is generally communicated to a user through an output device.
  • the electronic messages may comprise data to be communicated to a software application which is executed on the personal electronic device (this is especially relevant where the message communication module outputs the decrypted electronic message to a software application).
  • the electronic messages may comprise electronic documents, such as word-processor documents, spreadsheet documents, graphics software documents, or other application records which are used by software applications.
  • the electronic messages may communicate data to an application which is executed on the personal electronic device, the functionality of which is restricted until the authentication procedure which requires the second secure data has been successfully completed.
  • the electronic messages may comprise visual information which is suitable for display on a display.
  • the electronic messages may comprise audio information which is suitable for output through a loudspeaker.
  • the electronic messages may be one or more of email messages, short message service (SMS) messages, multimedia message service (MMS) messages, instant message service (IMS) messages, video messaging etc. and electronic messages which do not comprise a visual element and which typically comprise an audio element, e.g. an audio message, or sound file, such as an mp3 file.
  • the electronic messages may be addressed to the user of the portable electronic device, as distinct from being addressed solely to the portable electronic device per se.
  • the personal electronic device is adapted to receive, decrypt and display electronic messages in both a first format that was initially addressed to a recipient by specifying an email address and a second format that was initially addressed to a recipient by specifying a telephone number.
  • the electronic messages may communicate financial information to a personal banking software application (e.g. a bank account statement), or a gambling software application (e.g. a receipt or confirmation of a bet).
  • Electronic messages may communicate healthcare data to a healthcare software application (e.g. a patient data record, or details of a prescription).
  • Electronic messages may communicate receipts, electronic certificates denoting money, tickets and the like.
  • Electronic messages may comprise electronic passport data, or identity card data.
  • the electronic messages may comprise documents which communicate business information, such as business-related word processor or spreadsheet documents.
  • the message receiving module typically comprises a wireless communications transceiver, such as a Wi-Fi or Bluetooth transceiver or a cellular telecommunications network transceiver, such as a GSM, GPRS or WCDMA transceiver.
  • the message receiving module will typically be operable to communicate bidirectionally.
  • the personal electronic device may comprise mobile telephone functionality in which case the message receiving module typically comprises an RF receiver, such as a mobile telephone and/or cellular telecommunications network transceiver, for example, a GSM, GPRS or WCDMA transceiver.
  • the message receiving module is operable to receive encrypted electronic messages formatted according to internet protocol (IP), e.g. as IP messages.
  • IP internet protocol
  • electronic messages which were originally addressed to a user of the personal electronic device in formats other than internet protocol are received formatted according to internet protocol.
  • electronic messages in a plurality of different formats, or which were originally addressed to a user of the personal electronic device are received formatted according to internet protocol
  • received encrypted messages may be stored on the personal electronic device.
  • the personal electronic device preferably comprises user interface means (such as a user interface) which enable a user to determine whether a received encrypted message is stored on the personal electronic device.
  • the user interface means may comprise an input device and a display.
  • the received encrypted messages are preferably stored on the secure memory device.
  • stored electronic messages will be stored in encrypted form. They may be stored in the form in which they were received, thereby ensuring that their decryption remains under the control of the second microprocessor in embodiments where decryption requires a key or secret data stored in the secure memory. However, they may have been decrypted and reencrypted. If this is the case, they are preferably reencrypted by the second microprocessor using a key which is selected so that the encrypted electronic messages which have been reencrypted require a key stored in the secure memory in order to be decrypted. Thus, the decryption of stored encrypted electronic message preferably remains under the control of the second microprocessor.
  • the encrypted (or reencrypted) electronic messages are stored (whether in encrypted or unencrypted format) in the secure memory.
  • the second microprocessor is only operable to allow a said encrypted electronic message to be transmitted to the first microprocessor in a format which is unencrypted or decryptable using a key which is not stored in the secure memory after authentication.
  • the received encrypted messages may be stored in an encrypted format in data storage which is accessible to the first microprocessor other than under the control of the second microprocessor, such as a solid-state memory or disc drive which is in communication with the first microprocessor.
  • the received encrypted messages may be stored in an encrypted format in a non-secure memory of the removable memory device, from where they can be retrieved by the first microprocessor.
  • the personal electronic device will only be operable to cause the stored received encrypted messages to be decrypted and displayed following activation. If this is the case, they are preferably reencrypted by the second microprocessor using a key which is selected so that the encrypted electronic messages which have been reencrypted require a key stored in the secure memory in order to be decrypted. Thus, their decryption remains under the control of the second microprocessor.
  • received encrypted messages may be stored securely.
  • the second microprocessor and secure memory are part of a removable memory device and where the encrypted messages are stored in the secure memory or non-secure memory which is part of the removable memory device, this enables electronic messages to be securely received, displayed and ported from one personal electronic device to another by transferring the removable memory device to another personal electronic device.
  • the first and second secure data is of course transferred with the removable memory device.
  • some or all of the software which is executed by the first microprocessor in order to control activation and the subsequent decryption and output of electronic messages is preferably stored on the removable memory device, providing a portable unit for securely receiving, outputting and transferring electronic messages.
  • the personal electronic device may also be operable to input electronic messages for transmission to server means which transmits the electronic message to an addressee.
  • the person electronic device may comprise an input device for inputting a message (which may be the same as the input device for receiving an identifier, where present).
  • the electronic message may comprise addressee details and the remote server may be operable to transmit the electronic messages to the addressee.
  • the input electronic messages are preferably encrypted using or with reference to a key or secret data stored in the secure memory.
  • the personal electronic device is operable to output the input electronic messages using an output device, but only after authentication.
  • Encrypted input electronic messages may be stored with received encrypted electronic messages, providing a unified secure data storage facility.
  • the personal electronic device may comprise a file encrypting module which is operable to receive data from a software application executed by the first microprocessor and to encrypt the received data to create an encrypted electronic message, wherein the resulting encrypted electronic message is decryptable under the control of the second microprocessor, with reference to the first secure data.
  • the message communication module will alternatively, or also, be operable to communicate a decrypted electronic messages which was received and encrypted by the message encrypting module.
  • locally created data may be encrypted such that decryption and subsequent communication of the resulting encrypted electronic message using the message communication module requires the first secure data and is under the control of the second microprocessor.
  • locally created data such as word processor, spreadsheet, graphics and/or other documents to be encrypted under the control of the second microprocessor. They may be saved and/or decrypted as described herein in relation to the encrypted electronic messages received by the message receiving module.
  • the encrypted electronic messages created using the message encrypting module will subsequently be processed as described in relation to the encrypted electronic messages received by the message receiving module (where present).
  • the encrypted electronic messages created using the message encrypting module will subsequently be decrypted and output to the software application which created an encrypted document.
  • the personal electronic device may comprise a file system filter module (such as one or more file system filter drivers) comprising the said message encrypting module, which is operable to intercept requests by a software application to save files comprising messages (e.g. documents) and to encrypt the said files to 1 o
  • a file system filter module such as one or more file system filter drivers
  • the said message encrypting module which is operable to intercept requests by a software application to save files comprising messages (e.g. documents) and to encrypt the said files to 1 o
  • an encrypted electronic message (e.g. an encrypted message comprising a document) which is decryptable under the control of the second microprocessor, with reference to the first secure data.
  • the file system filter module is also operable to decrypt an encrypted electronic message which has been created and stored by the file system filter module, under the control of the second microprocessor, with reference to the first secure data.
  • the file system filter module is preferably operable to store said encrypted electronic messages (e.g. encrypted messages comprising documents) on the removable memory device.
  • the personal electronic device may comprise an electronic message handling software application which is executed by the first microprocessor in use.
  • the electronic message handling software application preferably functions as the output control module and is operable, after authentication, to cause an encrypted electronic message to be decrypted and output using the message communication module.
  • the electronic message handling software application causes the personal electronic device to present a user interface to a user to enable a user to select an encrypted electronic message for decryption and output.
  • the electronic message handling software application may comprise the file system filter module, where present.
  • the electronic message handling software application may not be executed until authentication has taken place.
  • the electronic message handling software application is loaded from the removable memory device into memory which is integral to the personal electronic device and executed by the first microprocessor.
  • the electronic message handling software application may initially be encrypted, at least in part, and may only be decrypted once the authentication has been completed. Decryption of the electronic message handling software application may be carried out by the second microprocessor with reference to a key or secret data stored in the secure memory.
  • the electronic message handling software application may be executable before it has been activated, but not operable to output the received encrypted electronic messages until authentication has been completed.
  • the electronic message handling software application may comprise program code which, when executed, causes the first microprocessor to request that the second microprocessor decrypts a received electronic message.
  • the second microprocessor may not be operable to decrypt a received electronic message until the second microprocessor has completed the authentication procedure, thereby preventing the personal electronic device from displaying a received electronic message until after the completion of the authentication procedure.
  • the electronic message handling software application may be executed responsive to receipt of an encrypted message, although it will not be operable to cause the received encrypted message to be output until after authentication.
  • the personal electronic device may present a suitable or specific secure or non-secure user interface to perform all necessary message related (e.g. view, store, reply, forward etc.) or message content related activities (view, save, transfer etc.).
  • the personal electronic device (typically responsive to execution of the electronic message handling software application) preferably presents a user interface to a user which, typically amongst other features, enables them to select an action from options including the options of saving and/or sending the received encrypted message in an unencrypted form.
  • the electronic message handling software application may pass the decrypted message to a message handler of a non-trusted electronic message handling software application, such as a conventional email handling software application.
  • the personal electronic device may receive and store permission data which determines whether a user can cause a said security-related function to occur and/or can carry out the authentication procedure.
  • Permission data may be stored in the secure memory.
  • Permission data may relate to a specific user.
  • Permission data may relate to all personal electronic devices to which it is sent which have specific properties.
  • Permission data may be received in a received encrypted message and determine the functionality which is available to a user in connection with that specific received encrypted message.
  • the electronic message handling software application may allow a user to save and/or send the received encrypted message in an unencrypted form dependent on permission data.
  • permission data may determine the options provided to a user by the personal electronic device (responsive to execution of the electronic message handling software application) following activation.
  • Permission data may determine whether a user can communicate using a specific communications interface (e.g. a mobile telecommunications interface), or impose limitations on the use which they can make of specific communications interface. Permission data may determine the types of electronic message which a user can cause to be decrypted and viewed, or messaging handling options available to a user. Permission data may determine the maximum size of encrypted messages which a user can send and/or receive.
  • a specific communications interface e.g. a mobile telecommunications interface
  • Whether a user can cause a security-related function to occur may depend on one or more properties of the personal electronic device, such as its operating system, hardware capabilities, software capabilities and/or the date and time.
  • Permission data may determine whether a user can complete the authentication procedure, for example, it may specify that a particular user can only complete the authentication procedure at certain times.
  • the personal electronic device (typically responsive to execution of the electronic message handling software application) may be operable to cause a received encrypted message to be stored, in encrypted form, in a data store which is shared with other software applications.
  • a received encrypted message might be stored in a file structure which specifies the contents of an email box of an email handling software application.
  • it cannot be output other than under the control of the electronic message handling software application, following activation.
  • the personal electronic device may also be operable to encrypt an electronic message and transmit it, for example to an addressee.
  • the personal electronic device may require authentication to be completed before the message is encrypted and/or transmitted.
  • the message will be encrypted by the second microprocessor with reference to a key stored in the secure memory.
  • the electronic message handling software application may also control the encryption and transmission of an electronic message in order to send it on to an addressee.
  • the message receiving module may also be operable to receive non-encrypted electronic messages.
  • the electronic message handling software application may also enable received non-encrypted electronic messages to be displayed.
  • the electronic message handling software application may enable received non- encrypted electronic message to be displayed only after authentication.
  • the electronic message handling software application may be stored in memory which is directly accessible by the first microprocessor.
  • the electronic message handling software application may be stored in non-secure memory which is part of the removable memory device.
  • the electronic message handling software application may be stored in encrypted form.
  • the electronic message handling software application may be stored in the secure memory.
  • the personal electronic device may comprise middleware software (and typically also operating system software) which functions as the input module.
  • the middleware software is preferably executed on the first microprocessor in use and causes the first microprocessor to receive an identifier and to transmit the identifier to the second microprocessor so that the second microprocessor can carry out the authentication procedure which requires the second secure data.
  • the middleware software may be stored, at least initially, on the removable memory device (typically in the memory which is readable on demand) and the personal electronic device may be operable to automatically load up and execute the middleware software from the removable memory device responsive to the personal electronic device being switched on and/or responsive to detection that a removable device has been brought into removable electronic communication with the first microprocessor.
  • the middleware software may also be operable to cause the electronic message handling software to be executed responsive to authentication.
  • the middleware software may present an application programming interface to the electronic message handling software, wherein the application programming interface includes means to instruct the middleware software to cause an electronic message to be encrypted and/or decrypted by the second microprocessor.
  • the application programming interface may comprise means to identify a key which is stored in the secure memory and which is to be used by the second microprocessor to encrypt and/or decrypt an electronic message.
  • the electronic message handling software application comprises program code which, when executed on the first microprocessor, causes the personal electronic device to provide a user interface including the display of text or icons (perhaps in the form of an inbox) denoting a plurality of received electronic messages, including more than one format of message, and which allows the user to select a received electronic message for decryption and output using the output means.
  • the display of text or icons denoting a plurality of received electronic messages may only be viewable following activation.
  • the user interface enables a user to select electronic messages for decryption and output which are in a plurality of formats, wherein at least one format of electronic message is a format in which the address of the electronic message is denoted by an email address and at least one format of electronic message is a format in which the address of the electronic message is denoted by a telephone number.
  • the invention extends in a second aspect to a system comprising server means and a plurality of personal electronic devices according to the first aspect of the present invention.
  • the server means (such as a server or cluster of servers) are in communication with a first communications network for receiving electronic messages and a second communications network for communication between the server means and the plurality of personal electronic devices.
  • the server means may be in communication with and receive electronic messages from a plurality of first communications networks, which electronic messages are encrypted and transmitted to the personal electronic device.
  • the first and second communications networks may be the same network, but typically the first and second communications networks will be different networks.
  • the second communications network typically consists of or comprises a mobile communications network such as a cellular telecommunications network (for example, a GSM, GPRS or WCDMA network) or other communications network or link (for example, an ethemet and/or virtual private network, or a broadband Wi-Fi, Bluetooth, WiMax or IrDA link).
  • a cellular telecommunications network for example, a GSM, GPRS or WCDMA network
  • other communications network or link for example, an ethemet and/or virtual private network, or a broadband Wi-Fi, Bluetooth, WiMax or IrDA link.
  • the second communications network supports the transmission of data by internet protocol and the secure server transmits the encrypted electronic messages to the personal electronic device by internet protocol, for example as IP messages.
  • the secure server preferably converts the electronic messages received by the secure server into a single format for transmission by internet protocol to the personal electronic device.
  • the first communications network may comprise or consist of an internet protocol network.
  • the first communications network may comprise a public telephone network.
  • the server means may receive electronic messages in a plurality of formats.
  • the server means may receive electronic messages in two or more formats.
  • the formats may be selected from the group comprising: email messages, SMS messages, MMS messages, IMS messages and video messages.
  • the electronic messages preferably communicate information to a user of the portable electronic device.
  • the electronic messages may comprise visual information which is suitable for display on a display.
  • the electronic messages may comprise audio information which is suitable for output through a loudspeaker.
  • the server means may be operable to receive electronic messages in two or more formats in which at least one format of electronic message is a format in which the address of the electronic message is denoted by an email address and at least one format of electronic message is a format in which the address of the electronic message is denoted by a telephone number.
  • the server means preferably comprises an address resolving module (for example, a software module which, when executed, refers to a look-up table, database or collection of rules) for resolving one or more addressees specified in received electronic messages to identifiers of a personal electronic device and/or a removable memory device associated with the or each addressee, and the server means may be operable to transmit the received electronic message to the personal electronic device identified by the address receiving module, or the personal electronic device comprising the removable memory device identified by the address receiving module.
  • an address resolving module for example, a software module which, when executed, refers to a look-up table, database or collection of rules
  • the electronic message will typically be encrypted using a key or shared secret specifically for enabling the electronic message to be decrypted by a particular personal electronic device which has a complementary key or the same shared secret stored in its secure memory.
  • Electronic messages in two or more formats may be encrypted and transmitted to personal electronic devices in the same format.
  • Electronic messages in two or more formats may be treated in the same way by the system until they are decrypted by a personal electronic device.
  • the server means and the secure memory of a personal electronic device may share a secret and the server means may use the shared secret to encrypt an electronic message for transmission to the personal electronic device.
  • the secure memory of a personal electronic device may store a private key and the server means may use the public key which is complementary to the stored private key to encrypt an electronic message for transmission to the personal electronic device.
  • the second microprocessor of a personal electronic device may generate a first key and transmit that key securely (for example, in an encrypted format) to the server means, while retaining a second key which is complementary to the first key within the secure memory of the personal electronic device (preferably within the integrated section of memory) and the server means may use that first key to encrypt an electronic message for transmission to the personal electronic device.
  • the first and second keys could be established by negotiation between the server means and the second microprocessor, for example using the Diffie-Hellman key exchange protocol. Where a symmetric key algorithm, such as DES or Triple-DES, is used for encrypting and decrypting the electronic message, the first key and second key will preferably be the same. Where an asymmetric key algorithm, such as the RSA algorithm, is used for encrypting and decrypting the electronic message, the first key and second key will preferably be different to each other.
  • the electronic message may be encrypted using the first key or a key derived from the first key.
  • the electronic message may be decrypted using the second key or a key derived from the second key.
  • the server means may encrypt part of the electronic message, or all of the electronic message.
  • the server means may use a first key to encrypt a single electronic message or a plurality of electronic messages addressed to a particular user.
  • the first microprocessor may periodically generate and transmit a new first key to the server means.
  • the server means may be operable to determine whether an electronic message received using the first communications network should be transmitted securely to a personal electronic device and, if this is the case, to cause the electronic message to be encrypted and then transmitted to a personal electronic device using the second communications network. If this is not the case, the electronic message will typically be transmitted to a personal electronic device without encryption.
  • the server means may comprise a secure server to which electronic messages which are to be encrypted are routed and which is operable to carry out the process of encrypting an electronic message.
  • the server means will typically determine whether an electronic message received using the first communications network should be transmitted securely to a personal electronic device by analysing the received electronic message to determine whether it contains a security marker.
  • the server means may be operable to determine a security level or classification associated with an electronic message, for example from a security marker included in a received electronic message or permission data associated with an addressee of the electronic message, and to include one or more security markers within the encrypted electronic message which is sent to the personal electronic device, which permission information can be interpreted by the electronic message software application (discussed below) and which affects the actions which a user of the personal electronic device can carry out in relation to the electronic message.
  • security markers may determine one or more of whether a user can delete an encrypted electronic message, whether they can store it other than in the secure memory and, if so, whether they can store it in an unencrypted format.
  • a memory device for removable communication with a memory interface of a personal electronic device, the memory device comprising secure memory which stores (i) first secure data which is required for a security- related function of a personal electronic device to be carried out, and (ii) second secure data which is required for an authentication procedure, wherein the memory device further comprises a microprocessor ("the second microprocessor") which controls access to the data stored in the secure memory, wherein the memory device further comprises program code which is readable on demand by a personal electronic device to which the memory device is interfaced and which, when the memory device is interfaced with a personal electronic device having a personal electronic device microprocessor (“the first microprocessor”) causes the personal electronic device to function as the personal electronic device of the first aspect of the invention.
  • the memory device further comprises a microprocessor ("the second microprocessor") which controls access to the data stored in the secure memory
  • the memory device further comprises program code which is readable on demand by a personal electronic device to which the memory device is interfaced and which, when the memory device is interfaced with
  • the program code, or part thereof, may be stored in the secure memory.
  • the program code, or part thereof, is preferably stored in a section of memory from which at least a part of the computer program may be uploaded by the microprocessor of a personal electronic device with which the removable device is interfaced, on demand.
  • the program code may comprise an electronic message handling software application according to the first aspect of the invention.
  • the program code may comprise an electronic message handling software application according to the first aspect of the invention in encrypted form.
  • the program code may comprise a user identification software application according to the first aspect of the invention.
  • the program code may comprise middleware software according to the first aspect of the invention.
  • the removable memory device comprises an interface for enabling the second microprocessor to electronically communicate with the first microprocessor of a personal electronic device with which it is brought into communication.
  • the secure section of memory of the removable memory device stores a decryption key or secret data which is required to decrypt an encrypted electronic message received by the personal electronic device.
  • the removable memory device may further comprise one or more encrypted electronic messages received by a message receiving module of a personal electronic device with which the removable memory device is or was in electronic communication.
  • removable memory device correspond to the features described in relation to the removable memory device of the first aspect of the invention.
  • a method of regulating a security-related function of a personal electronic device which comprises a first microprocessor which controls the personal electronic device, secure memory which stores (i) first secure data which is required for a security-related function of the personal electronic device to be carried out, and (ii) second secure data which is required for an authentication procedure; and a second microprocessor which is in communication with the first microprocessor and the secure memory and which controls access to the data stored in the secure memory; the method comprising carrying out a security-related function of the personal electronic device which requires the first secure data only after the completion of an authentication procedure which requires the second secure data.
  • Figure 1 is a schematic diagram of key components of a system for receiving, viewing and storing electronic messages, such as emails, SMS messages, MMS messages, IMS messages and video messages, on a personal electronic device;
  • Figure 2 is a flow chart of the procedure carried out by the server means responsive to the receipt 100 of an electronic message by the messaging server;
  • Figure 3 is a flow chart of procedures carried out by the personal electronic device responsive to receipt 120 of an electronic message through the second communications network from the secure server/messaging server;
  • Figure 4 is a diagram of a secure messaging system for secure communication between mobile devices and a trusted server
  • Figure 5 is a diagram of a secure messaging system for secure end to end communication between mobile device.
  • Figure 6 is a schematic diagram of a personal electronic device according to a second example;
  • Figure 7 is a schematic diagram of procedures carried out by a personal electronic device according to a second example, to allow normal access to a SIM card.
  • Figure 8 is a message sequence chart of procedures carried out by a personal electronic device according to the second example, in response to insertion of an incorrect PIN or in response to the removal of an SMC card.
  • Example 1 Secure Message Handling using an SMC card
  • Figure 1 is a schematic diagram of key components of a system for receiving, outputting and storing electronic messages, such as emails, SMS messages, MMS messages, IMS messages and video messages, on a personal electronic device.
  • electronic messages such as emails, SMS messages, MMS messages, IMS messages and video messages
  • the security-related function is the decryption and output of received encrypted electronic messages to a user.
  • the decryption requires first secure data. Decryption and output will not occur until the user of a personal electronic device has input an identifier which has been verified with reference to identity verification data (which constitutes the second secure data).
  • Server means comprise a messaging server 2 and a secure server 4 which stores one or more encryption keys 6 or secret data.
  • Messaging server 2 is connected to the first communication network 8, such as the internet or a private ethemet, for receiving email messages from remote servers.
  • the first communication network 8 such as the internet or a private ethemet
  • Other formats of. messages may be received through the same communications network, or the messaging server may be connected to additional communications networks, such as wired or wireless telecommunications networks, for receiving other formats of electronic messages.
  • server means may be implemented on a single computer or a cluster of computers.
  • the server means comprises a server which combines the functions of the messaging server and the secure server.
  • the system comprises at least one personal electronic device 10 which is in communication with the server means via a second communication network 12, such as a cellular mobile telecommunications network.
  • the server means communicates with the or each personal electronic device in internet protocol (IP) over the cellular mobile telecommunications network.
  • IP internet protocol
  • the personal electronic device includes a microprocessor 14 (functioning as the first microprocessor) which is in communication with a memory 16 (and optionally additional types of storage) and one or more output devices in the form of a display 18 and/or a loudspeaker 19.
  • the output devices and the software executed on the first microprocessor which drives the output devices constitute an output module.
  • the microprocessor of the personal electronic device is also in electronic communication with a secure media card (SMC) 20 (functioning as a removable memory device) which is located in a removable memory card slot of the personal electronic device.
  • the SMC includes a microprocessor 22 (functioning as the second microprocessor) and integrated secure memory 24. Access to the data stored in the integrated secure memory is controlled by the second microprocessor 22.
  • the SMC also includes a section of memory which is readable on demand by the first microprocessor 26. Some of this section of memory which is readable on demand may be used as secure memory under the control of the second microprocessor by storing data in the section of memory which is readable on demand in an encrypted format wherein the decryption key or other data required to decrypt the data is stored in the integrated secure memory.
  • the integrated secure memory stores an encryption key which is complementary to the encryption key stored by the server means, or shared secret data which is shared with the server means, so that the server means can encrypt an electronic message such that the encryption key or shared secret data stored in the secure memory is required for the electronic message to be decrypted.
  • the secure media card is typically a card according to the ISO/IEC 7816 specification, or a Secure Digital (SD), miniSD or microSD memory cards according to standards published by the SD Association (www.sdcard.org) or a SecureMMC card according to standards published by the MultiMediaCard Association (www.mmca.org).
  • SD Secure Digital
  • miniSD miniSD
  • microSD microSD memory cards
  • MultiMediaCard Association www.mmca.org
  • the personal electronic device may include one or more additional removable memory devices, such as a SIM card for use in authentication when a cellular mobile telecommunications network functions as the second communications network.
  • additional removable memory devices such as a SIM card for use in authentication when a cellular mobile telecommunications network functions as the second communications network.
  • FIG. 2 is a flow chart of the procedure carried out by the server means responsive to the receipt 100 of an electronic message by the messaging server.
  • Each received message has at least one addressee to whom the message is ultimately addressed.
  • the addressee could be identified by an email address.
  • the addressee could be identified by a telephone number.
  • the server means determines to which personal electronic device the electronic message should be sent 102 from the addressee details of the electronic message.
  • the server means comprises a data store (such as a look up table or database) which can be used to relate address details (such as a telephone number or email address) to an address (such as an internet protocol address or telephone number) to which the electronic message should be sent.
  • the address to which the electronic message should be sent may be an address (such as an internet protocol address or telephone number) of a personal electronic device. However, it may be an address (such as an internet protocol address) of an application which is executed on the personal electronic device or an address (such as an internet protocol address) of an SMC associated with a personal electronic device.
  • the messaging server determines whether the received electronic message is to be transmitted securely 104. This may be achieved by looking for tags within the received email message. If the electronic message is not to be transmitted securely, it is then transmitted 106 to the personal electronic device(s) of the addressee(s) of the electronic message without further encryption. If the electronic message is to be transmitted securely, it is relayed 108 to the secure server which encrypts 110 the electronic message using the stored key and then transmits 112 the resulting encrypted message to the personal electronic device including a security marker to indicate that it is a secure message.
  • the electronic message could be encrypted and relayed to the personal electronic device by other means.
  • a secure session could be established between the secure server and the personal electronic device, or a specific software application executed on the personal electronic device, or the second microprocessor of the personal electronic device.
  • a shared secret stored in both the secure server and the integrated secure memory of the SMC associated with a personal electronic device, can be used in a protocol for encrypting and transmitting the electronic message.
  • the electronic message is sent in an encrypted format such that a key, or shared secret, stored in the integrated secure memory of the SMC of the user to which the electronic message is addressed, is required in order for the electronic message to be decrypted.
  • a secure context is established between the secure server and the integrated secure memory of the SMC of the device of the addressee.
  • the encrypted electronic message which is sent to the personal electronic device may include further security markers which determine the functionality which will be available to a recipient of the encrypted security message, for example whether they can view, save, delete or print the electronic message.
  • the security markers may depend on one or more rules or profiles allocated to an addresses, or group or class of addressees.
  • electronic messages in different formats such as email messages, SMS messages, MMS messages, IMS messages and video messages, are preferably all sent across the second communications network as IP messages. Where the messages are encrypted, this allows the secure transmission of different types of message in a unified fashion.
  • Figure 3 is a flow chart of procedures carried out by the personal electronic device responsive to receipt 120 of an electronic message through the second communications network from the secure server/messaging server.
  • Middleware software originally loaded from the SMC and installed on the personal electronic device and executed by the microprocessor of the personal electronic device determines whether the received electronic message is a secure message (i.e. an electronic message which has been encrypted by the secure server) from the security markers included in the received electronic message. If the received message is not a secure message, it is passed 124 to the electronic message handler of open message handling software installed on the personal electronic device, for example, a conventional email application or SMS message handling application which enables a user to select and then view or play 126 unencrypted messages.
  • the conventional email application (which will typically be preinstalled on the personal electronic device by the manufacturer or an OEM distributor) will then typically provide conventional messaging handling features, such as a user interface allowing a user to select, view, edit, compose and send electronic messages.
  • the received electronic message is determined to be a secure message, it will require to be decrypted by a procedure requiring a key or secret data stored in the secure memory before it can be displayed, played or otherwise output to a user.
  • a secure message handling application (functioning as the electronic message handling software application) is then loaded from the built-in memory of the personal electronic device or from the section of memory of the SMC which is readable on demand, and executed.
  • the secure message handling application presents a user interface requesting that the user inputs identification data 126, such as a PIN which can be input using a keyboard or touch screen, or biometrical information, such as a fingerprint, which can be input using a fingerprint reader.
  • identification data 126 such as a PIN which can be input using a keyboard or touch screen
  • biometrical information such as a fingerprint
  • the portion of the secure message handling application which controls input of identification data and input devices constitutes at least part of an input module.
  • the input identification data is sent by the personal electronic device microprocessor to the microprocessor of the SMC where it is compared with identity verification data (which constitutes second secure data) stored in the integrated secure memory. If, following comparison of the input identification data with the identity verification data, the microprocessor determines 134 that the user has identified themselves, the microprocessor allows decryption 136 and display 138 of the received electronic message, or at least part thereof.
  • Decryption requires data (first secure data) which is stored in the integrated secure memory in the form of a key or shared secret data which is shared with the secure server This means that decryption is under the control of the microprocessor of the SMC.
  • the microprocessor of the SMC decrypts the received electronic message and transmits the corresponding plain text / decrypted data to the microprocessor of the personal electronic device which displays the electronic ⁇
  • the microprocessor of the personal electronic device decrypts the received electronic message using a decryption key provided by the microprocessor of the SMC by a procedure requiring the first secure data.
  • the user is then provided with the option 140 of replying to/forwarding or storing the electronic message securely.
  • the electronic message is stored in encrypted form on the SMC, for example, in the section of memory on the SMC which is readable on demand.
  • the electronic message may be stored in the encrypted form in which it was received or may be reencrypted. In either case, a key or secret data stored in the secure memory will be required to decrypt the electronic message.
  • a new electronic message is created 142, using input devices such as a keyboard, camera etc., encrypted 144 and transmitted 146 to the secure server for onward transmission to an addressee.
  • the electronic message will be encrypted using secret data which is shared with the secure server or an encryption key which is complementary to a decryption key stored on the secure server.
  • the created message is stored 148 on the personal electronic device, it will be stored along with the received electronic messages, in encrypted form, such that a key or secret data stored in the integrated secure memory is required for it to be decrypted.
  • the user may be presented with the option of storing the received electronic message in a non-encrypted open form. If they wish to do this, the personal electronic device determines 150 whether they have permission to do this. This will be determined by the permission data included in the received electronic message by the secure server. If they have permission to do this, the message will be transferred 152 in a non-encrypted open form to the open message handling software.
  • the middleware software, the secure message handling application, and stored encrypted electronic messages are stored in section of memory which is readable on demand of the SMC. If the SMC is removed, the secure message handling application terminates. The user may insert the SMC into another personal electronic device. They will then need to identify themselves before the encrypted messages can be decrypted and viewed. Thus, they can securely carry around the encrypted messages on the SMC and transfer them to another personal electronic device.
  • At least the middleware software is typically configured to be automatically loaded onto the personal electronic device from the section of memory which is readable on demand when the SMC is inserted into a personal electronic device. The middleware software then loads up any missing device drivers from the section of memory which is readable on demand.
  • the middleware software controls entry by a user of an identifier, and the relay of that identifier to the second microprocessor where it is compared against the stored identity verification data. Once the user has identified themselves, the middleware software causes the secure message handling software to be executed by the personal electronic device microprocessor.
  • the secure message handling software application is stored in encrypted form in the section of memory of the SMC which is readable on demand and is decrypted by the SMC microprocessor using a key stored in the integrated secure memory, following authentication.
  • the middleware software provides an API which can be used by the secure message handling software to instruct the microprocessor of the SMC to encrypt or decrypt an electronic message using a specific key which is stored in the integrated secure memory.
  • the middleware software typically includes functionality to authenticate with the secure server and can issue a request to the secure server to initiate a secure transaction of data with the secure server, or react to a challenge from the secure server.
  • the secure message handling software needs to communicate securely with the secure server (e.g. to receive an encrypted electronic message or to send an encrypted electronic message), it does so through the middleware software.
  • the data stored in the integrated secure memory (such as one or more keys or secret data shared with the secure server) is sufficient to enable decryption of the received electronic messages, so there is no need for the personal electronic device to communicate with the secure server, or to be in communication with the secure server, in order to allow the decryption and viewing of received electronic messages.
  • Figures 4 and 5 illustrate two alternative approaches for secure communication between users 200 of a personal electronic device and a trusted server 218 in a message system, such as a corporate email and/or messaging system, which is considered to be secure.
  • the user creates 202 a message using a messaging application 204, such as Microsoft Outlook (Outlook and Microsoft are trade marks of Microsoft Corporation).
  • Microsoft Outlook Outlook and Microsoft are trade marks of Microsoft Corporation.
  • middleware 208 intercepts the message and requires the user to authenticate (e.g, by entering a PIN) if they have not already done so.
  • the message is then digitally signed and encrypted under the control of the second microprocessor, on the SMC card, following a request 210 for a session key to be generated and transmitted 212 to the middleware, along with an encryption key for securing and locally storing the message.
  • the message is then transmitted 214 to a secure mail receiving application 216 on the trusted server 218 after a secure link is formed between the middleware and the secure mail receiving application using the session key.
  • the address of the mail server to which the messaging program would otherwise have sent the message is appended to the message so that the encrypted message can be routed via that server, if appropriate.
  • the middleware is also operable to output 220 the encrypted message back to the messaging program for storage.
  • the encrypted message can be stored by the messaging program in its usual file structure, but cannot be read except under the control of the second microprocessor, with reference to the encryption key which was previously generated.
  • the middleware can be conveniently implemented as part of an SMTP server application.
  • the trusted server determines whether to transmit the message to a user securely, with reference to permission data, in the form of one or more policies. If the trusted server determines that the message should be sent without encryption, for example if it is addressed to a recipient who is not part of a group of users who communicate securely, it relays it to the mail server at the address which is appended to the message. If the message should be sent securely, it is relayed securely to a second trusted server 221.
  • the messaging program In order to receive an electronic message, the messaging program periodically checks for emails with the second trusted server, for example using a pull email transfer protocol, such as POP3.
  • the messaging program is also operable to downloaded non-secure emails periodically from a non-secure server.
  • requests to receive secure emails through the secure messaging system are intercepted by the middleware program which creates a secure session with a secure mail sending application 222 on the second trusted server.
  • emails may be delivered automatically to the personal electronic device by a push email forwarding protocol, from the second trusted server. Encrypted messages are received from the second trusted server 224 and transferred to the middleware of the personal electronic device.
  • the middleware requires a user to authenticate themselves if they have not already done so, under the control of the SMC, decrypts the received encrypted message, re-encrypts it using a storage key obtained 226 from the SMC card, and transmits the resulting encrypted message to the messaging program which stores it in its filing system.
  • a user In order for a user to view the encrypted message, it must first be decrypted by the middleware using a key obtained from the SMC card.
  • the middleware may also function to restrict security-related action which can be carried out by a particular user or on a particular personal electronic device, according to permission data (such as a policy). For example, the middleware may block the receipt of non-secure messages.
  • end-to-end security is provided for sending electronic messages, such as email, text messages and instant messages, between personal electronic devices, perhaps over non-secure communications networks.
  • a client key management module 228 is operable to store public keys belonging to third parties and to obtain any public keys which are not already stored from an external key management server 230 where required.
  • a user interacts with a messaging application.
  • the messaging application requests a symmetric key from the SMC.
  • the message is ready for sending, it is encrypted by a middleware application using the received symmetric key.
  • the symmetric key is encrypted using the public keys of both the recipient and the sender and sent with the resulting encrypted message via a non-secure email server 232.
  • the electronic message is encrypted as before so that decryption is under the control of the second microprocessor and returned to the messaging application in encrypted form for storage with other messages.
  • the electronic message is also digitally signed using the private key of the sender (which forms a key pair with their published public key) for the purpose of non-repudiation.
  • a messaging application of the personal electronic device which receives the electronic message requires a user to authenticate before enabling decryption and viewing of the received electronic message.
  • a plug-in to the messaging application functioning as a message decryption module, looks up the public key of the sender (again obtaining a copy from a key management server where required), decrypts the O /
  • the received encrypted key using the recipient's private key (which forms a key pair with their published public key), which is stored in their SMC card secure memory, retrieves the symmetric key and decrypts the electronic message to enable it to be viewed by the user.
  • the signature of the received electronic message is checked to verify the identity of the party that transmitted the electronic message.
  • the electronic message may be re-encrypted under the control of the SMC card and stored by the messaging application.
  • the examples described above relate to discrete messages, individual sections of streaming data (e.g. packets) can be encrypted, transmitted and decrypted in the same way as electronic messages.
  • the system can be used to provide secure voice communications by encrypting parts of voice data (e.g. packets of Voice over IP data) at a first personal electronic device for periodic transmission to a second electronic device, decryption and reconstitution to provide a continuous voice output.
  • Many personal electronic devices include mobile telephone functionality and include a mobile telephone SIM card which performs an authentication role when the mobile telephone transceiver connects to a mobile telephone network, such as a GSM network.
  • a mobile telephone SIM card which performs an authentication role when the mobile telephone transceiver connects to a mobile telephone network, such as a GSM network.
  • a user Normally, a user must enter the SIM PIN to in order to gain access to the network and/or access the SIM internal file structure. If an incorrect value is entered for three consecutive attempts the PIN is blocked and access to the SIM denied, thereby disabling voice and data connections using the mobile telephone network.
  • a SIM with a blocked PIN can be recovered using the Pin Unblock Key (PUK) which can be obtained from the relevant network operator. This allows the PIN to be changed to a new value.
  • PKI Pin Unblock Key
  • PIN entry offers comparatively weak security as the PUK can be obtained from the network operator with little or no control, thus allowing a malicious user to unblock the SIM PIN at will. Furthermore, with knowledge of the PIN, a user can disable the requirement of entering the PIN each time, reducing security.
  • the security-related function provides improved control of the SIM and the SIM PIN mechanism, through the use of a SIM control software agent and an OO
  • the SIM control agent will take control of the PIN (i.e. amend the PIN to a value which is kept confidential from the user.)
  • the new PIN is stored in the integrated section of memory of the SMC.
  • FIG. 4 illustrates a personal electronic device 200 having a mobile telephone transceiver 202 (such as a GSM interface) which requires a SIM card 204, a secure media card 206 (functioning as a removable memory device) interfaced with a memory interface of the personal electronic device, and a microprocessor 214 of the personal electronic device (functioning as the first microprocessor).
  • the SMC comprises a microprocessor 208 which regulates access to secure memory including an integrated section of memory 210.
  • the SMC comprises memory which is readable on demand 212 by the microprocessor of the personal electronic device through a memory card interface.
  • Access to the SIM is controlled by using the SMC to generate and issue the PIN to the SIM each time the SMC is inserted and/or the handset is reset.
  • the SMC is configured with the original SIM Integrated Circuit Card Identifier (lccld) PIN and PUK, which are stored in the integrated section of memory of the SMC (as first secure data).
  • the memory which is readable on demand comprises software which is uploaded to the personal electronic device and executed by the personal electronic device microprocessor in use and which includes middleware software comprising a SIM control agent.
  • the authentication step may be the input of a PIN or biometric identifier from a user which is compared with identity verification data (functioning as the second secure data) stored in the integrated section of memory of the SMC.
  • identity verification data functioning as the second secure data
  • the SIM control agent then verifies that the SIM present in the device is the specific device that is to be controlled by comparing the lccld stored in the integrated section of memory of the SMC with that of the SIM. If the lccld matches, the SIM control agent ensures that:
  • the SIM PIN verification is enabled and b) the PIN stored in the integrated section of memory of the SMC can be verified with the SIM. If both a) and b) are satisfied, the SIM control agent then commands the SMC to generate a new PIN. The SIM control agent then changes the value of the PIN for the SIM and the new value is stored in the integrated section of memory of the SMC.
  • the SIM PIN mechanism is deemed to have been tampered with.
  • the SIM control agent logs that an access violation has occurred and a message is sent to an appropriate remote server.
  • the SMC uses the PUK of the SIM to regain control of the SIM PIN by changing the SIM PIN and ensuring that the SIM is set to require a PIN.
  • the SIM control agent Upon removal of the SMC, the SIM control agent resets the SIM so that it does not function to allow a telecommunications link to be created until the current PIN has been supplied.
  • the SIM card can be reset by the SIM control agent causing the mobile telephone transceiver to be reset. For example this can be achieved on a Windows Mobile 5.0 device via a standard TAPI call as shown in the following line of code:
  • hres lineSetEquipmentState( hLine, LINEEQUIPMENTSTATE_NOTXRX) ;
  • the PIN is generated by the microprocessor of the SMC and remains stored in the integrated section of memory, the PIN number remains secret and unavailable to the user.
  • the SMC is required in order to access the SIM or for a telecommunication link to be created which requires the SIM for authentication.
  • the middleware software loaded from the SMC onto the personal electronic device and executed by the personal electronic device microprocessor comprises or consists of a file system filter (functioning as the file system filter module).
  • File system filters are driver modules which intercept and modify communications between software applications and a filing system.
  • the file system filter is operable to intercept attempts to save or modify documents such as a word processor documents, spreadsheets, graphics files, or other application records, from applications executed by the personal electronic device microprocessor, and to cause these documents to be encrypted such that first secure data is required for their subsequent decryption.
  • the documents are considered to be electronic messages and the resulting encrypted electronic messages are typically stored on the SMC, along with any encrypted electronic messages received from the server means. They can therefore be ported from one personal electronic device to another by transferring the SMC.
  • the file system filter may enable applications to open the stored encrypted files by causing the encrypted document files to be decrypted, under the control of the SMC microprocessor, with reference to the first secure data, and output to applications executed on the personal electronic device which can work with those documents.
  • locally created and edited content may be stored securely with activation required before securely stored documents can be opened. If the SMC is removed from the personal electronic device, the stored messages are removed from the personal electronic device with the SMC. If the SMC is interfaced with another personal electronic device, activation is required before the encrypted messages can be opened using the new personal electronic device.
  • policies may be provided which determine the functionality available to a particular user, or by any user in relation to a particular message, or by any user of a personal electronic device with specific properties. Policies can be distributed to individual personal electronic devices, where they are typically stored in the secure memory, or as part of encrypted electronic messages. Functionality which may be determined by policies includes whether a user may decrypt and read an electronic message, whether they may save an electronic message in decrypted form, whether they can use a specific communications interface of the personal electronic device (e.g. a GSM, GPRS or Wi-Fi interface), the maximum size of message that they may send, where they may send messages to, the types of messages they can send, and whether they can make specific types of communication (e.g. international telephone calls).
  • a specific communications interface of the personal electronic device e.g. a GSM, GPRS or Wi-Fi interface
  • the maximum size of message that they may send where they may send messages to, the types of messages they can send, and whether they can make specific types of communication (e.g. international telephone calls
  • policies may also determine the circumstances under which authentication can occur. For example, policies may determine when users in general, or one or more specific users, can authenticate.
  • Policies may determine functionality which is available on personal electronics devices with specific properties, such as specific operating systems, specific installed software applications and/or specific hardware features. Policies may take the form of data specifying access rules.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

Dispositif électronique personnel comprenant : un premier microprocesseur qui contrôle le dispositif électronique personnel ; une mémoire sécurisée qui stocke (i) des premières données sécurisées qui sont nécessaires pour une fonction liée à la sécurité du dispositif électronique personnel qui doit être exécutée, et (ii) des secondes données sécurisées qui sont nécessaires pour une procédure d'authentification ; un second microprocesseur qui communique avec le premier microprocesseur et la mémoire sécurisée et qui contrôle l'accès aux données stockées dans la mémoire sécurisée ; le dispositif électronique personnel n'étant pas capable d'effectuer la fonction liée à la sécurité qui nécessite les premières données sécurisées tant qu'une procédure d'authentification qui nécessite les secondes données sécurisées n'a pas été effectuée avec succès.
EP07824043A 2006-10-05 2007-10-05 Sécurité d'un dispositif électronique personnel Withdrawn EP2092453A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0619696.8A GB0619696D0 (en) 2006-10-05 2006-10-05 Personal electronic device security
PCT/GB2007/003789 WO2008040996A2 (fr) 2006-10-05 2007-10-05 SÉCURITÉ d'un dispositif Électronique personnel

Publications (1)

Publication Number Publication Date
EP2092453A2 true EP2092453A2 (fr) 2009-08-26

Family

ID=37454036

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07824043A Withdrawn EP2092453A2 (fr) 2006-10-05 2007-10-05 Sécurité d'un dispositif électronique personnel

Country Status (3)

Country Link
EP (1) EP2092453A2 (fr)
GB (1) GB0619696D0 (fr)
WO (1) WO2008040996A2 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2437198B1 (fr) 2010-10-01 2020-12-30 HID Global GmbH Procédé de réinitialisation de code PIN sécurisé
WO2016018028A1 (fr) 2014-07-31 2016-02-04 Samsung Electronics Co., Ltd. Dispositif et procédé de mise en place ou de suppression de la sécurité sur un contenu

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2340344A (en) * 1998-07-29 2000-02-16 Nokia Mobile Phones Ltd Bilateral Data Transfer Verification for Programming a Cellular Phone
WO2006034399A2 (fr) * 2004-09-21 2006-03-30 Snapin Software Inc. Execution securisee de logiciels par exemple pour telephone cellulaire ou dispositif mobile

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2008040996A2 *

Also Published As

Publication number Publication date
WO2008040996A3 (fr) 2008-05-22
WO2008040996A2 (fr) 2008-04-10
GB0619696D0 (en) 2006-11-15

Similar Documents

Publication Publication Date Title
US10595201B2 (en) Secure short message service (SMS) communications
US9807065B2 (en) Wireless device and computer readable medium for storing a message in a wireless device
US8112794B2 (en) Management of multiple connections to a security token access device
US6842628B1 (en) Method and system for event notification for wireless PDA devices
US20120210134A1 (en) Method of securing communication
US20150358354A1 (en) Method and system for policy based authentication
EP2195963B1 (fr) Mesures de securite destinees a empecher un decryptage non autorise
KR101387600B1 (ko) 전자 파일 전달 방법
US20170279807A1 (en) Safe method to share data and control the access to these in the cloud
EP1881663B1 (fr) Gestion de connexions multiples à un dispositif d'accès sécurisé à jeton
WO2012131659A1 (fr) Système et procédé permettant une transmission sécurisée des sms
CN114175580B (zh) 增强的安全加密和解密系统
WO2008040996A2 (fr) SÉCURITÉ d'un dispositif Électronique personnel
US20230353518A1 (en) File Transfer System
EP1532505A2 (fr) Garantie de l'application d'une politique avant l'autorisation d'utilisation d'une cle privee
JP4140617B2 (ja) 認証用記録媒体を用いた認証システムおよび認証用記録媒体の作成方法
JP2019057234A (ja) 配信制御装置、端末、配信制御方法、およびプログラム

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20090505

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20121025

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20130305