SECURE MESSAGE MODEL
The present invention relates to secure transmission of messages over a network. More particularly, the present invention relates to a system and method for securely transmitting and receiving messages such as electronic mail (e-mail) over a network such as the Internet. Secure transmission of email has so far failed to emerge for day to day usage. The most common method for securing e-mail is to use public key infrastructure ("PKI"). The problem with PKI is that it requires the recipient and the sender to have digital certificates installed and that each person in the communication has access to the other's public key. This has proven to be difficult to achieve in practice as digital certificates are not commonly found on users machines and digital certificates that are available are difficult to use with many interoperability issues. Finding out the recipient's certificate requires a directory which requires proprietary software to access on the whole. There are almost no examples of widespread PKI email usage due to these issues. The other method of secure mail is to hold the mail in a "web mail" type system where the user is notified and then retrieves the mail from a particular place via a web browser. This is inconvenient as most people have their own email systems and addresses and would prefer to have all their communications in one place. It also requires a lot of infrastructure to maintain these systems. Accordingly, one object of the present invention is to provide an improved model which offers secure transmission of messages such as email between a sender and an intended recipient. To achieve the object, the present invention provides a method of sending a message between a first system and a second system over a network, the method including the step of causing the first system to consult with a storage system and
causing the message to be encrypted with a cryptographic key provided by the storage system prior to sending the message to the second system. The storage system is preferably located in a remote location to the first system and the second system and is capable of interacting with the both the first system and second system. Furthermore, the storage system stores a plurality of encryption and decryption keys and data relating to an originator of the message and a recipient of the message. The present invention further provides a method of decrypting a message sent using the preferred method and comprising the steps of: a) receiving the encrypted message at the second user system; b) causing the send user system to formulate the storage system in order to determine a decryption key assigned to the encrypted message; and c) decrypting the encrypted message. An advantage of the present invention is that it enables the originator of a message to send to the recipient the message in a form where only the recipient can read the message. In a preferred embodiment, the message is an email and the originator may be able to see that the mail has been read and received. Hence, neither the originator nor the recipient will require a digital certificate to successfully carry out secure email communication. In order that the present invention be more readily understood, an embodiment thereof will be described by way of example only with reference to the accompanying drawings in which: Fig 1 shows a schematic diagram of a preferred embodiment of the present invention; and
Fig 2 shows the email process according to a preferred embodiment of the present invention. The preferred embodiment of the present invention relates to email communication where the message being sent between a sender and receiver is an email. However, it will be appreciated that the present invention is not limited to such an embodiment, and the present invention may be embodied in many other systems which relate to the exchange of messages. Referring to Fig 1, there is shown a typical system which encompasses the present invention. A sender terminal 1 may be a computer terminal, PDA or any other type of similar equipment capable of connecting to a network such as the Internet. In this embodiment, the terminal 1 is a computer terminal of a user. The terminal 1 contains an email program capable of displaying emails. For the present invention to operate, there are a number of possible modifications which may be carried out at the sender terminal. For example, the email program utilised by the sender may be modified such that either an application or "plug in" is installed in the program. Alternatively, the email itself may be modified and contain an application such as, for example, a Java applet or Active X control. Another possibility is that the email may contain additional scripting code. Any of these modifications are possible for the correct implementation of the preferred embodiment of the present invention to be observed. Advantageously, the modifications are relatively simple to achieve and major changes to the computer system at the sender end or receiver end do not have to be made. The preferred embodiment as shown in the Fig 1 may be utilised to perform the secure transmission of the email in a number of ways. One way is that the originator 1 of the email sends an email via a secure link to a storage system 3 (hereinafter referred to as a "key exchange") which
encrypts the email message (as described later) and forwards the encrypted email to the recipient using standard mail protocols. Another way is for the originator of the email to request a cryptographic encryption key for the email message from the key exchange 3 and have the modified email application (not shown) on the originators terminal 1 encrypt the email message and have it sent over a network using standard email protocols. The basic principle is the same for both methods but the description will be described hereinafter on the basis of the second of these two methods. It will be appreciated that the preferred embodiment is capable of being used with either of these two methods. The key exchange 3 stores a plurality of encryption and corresponding decryption keys. In addition, the key exchange 3 stores user account details and is capable of carrying out encryption if required. The encryption key used to encrypt an email message is not the same for every message. Instead, the key exchange 3 provides a key to the sender which differs for every message. In addition, the key can be of any type to be used in any type of encryption. For example, the encryption type may be symmetric or asymmetric (such as PKI). When an encryption key is provided to a sender the key exchange identifies the decryption key corresponding to the encryption key provided for that particular message, stores a unique identifier for that message and the email address of the recipient. In this preferred embodiment, the email application on the sender's terminal 1 interacts with an SMTP server 4. The SMTP server 4 may belong to an Internet Service Provider (ISP) that the email sender is subscribed to, may be on the local machine of the sender or in a company. The SMTP server 4 sends the email to the recipient's mail server 5 which may be an ISP POP3 server or local mail server. It will be appreciated that any standard email protocol may be used. Moreover, the
message, if not an email, may travel using any messaging protocol as the message is encrypted and is not in a readable form when being transferred over a network. It should be noted that the recipients mail system 2 is configured in a similar manner to the sender terminal 1 such that the email program utilised by the receiver is modified by installing an application or plug-in which is capable of consulting with the key exchange 3. This consultation may take place automatically or may require the recipient to prompt such a consultation. Alternatively, rather than using a modified application or plug-in, the email message itself may be scripted in such a way that it includes a header which causes a consultation with the key exchange to occur. Upon receipt, an email application on the recipient's mail system 2 will ask the recipient for their user identification and password for their key exchange account and the unique message identifier (which is not encrypted) and their email address. It is possible for some of these requirements to be generated automatically. The email application will then provide these details to the key exchange 3 over a secured link such as server side SSL (Secure Socket Layer). The details are provided by making a call to the key exchange 3 using a suitable protocol which may be LDAP (Lightweight Directory Access Protocol), https (hypertext transmission protocol, secure) or SOAP (Simple Object Access Protocol). Once a connection is established, the details are checked at the key exchange and if correct, a decryption key for that message is returned to the email message recipient. It is important to note that the encryption key is preferably only used for a particular message. However, it may be possible for the encrypted key to be reused for another message which uses the key exchange but as the encryption key is generated at the key exchange from a considerably large number of keys, there would be very little benefit for a potential hacker in keeping or intercepting the
keys. In addition, it is preferable to vary the encryption type so that even in the unlikely event of the key being intercepted, the hacker would be faced with a potentially difficult task of establishing the type of encryption. Figure 1 also shows a possible modification which may be incorporated into the system. The key exchange 3 can track the fact that the recipient 2 has correctly requested the decryption key for that message and if necessary email the originator to inform them that the message has been successfully received by the recipient. One possible method of communicating this would be to send the email from the key exchange 3 to the sender 1 via an ISP POP 3 server or local mail server 6. Furthermore, it is possible for the recipient of the email, when requesting the decryption key from the key exchange, to also request authentication of the sender's details. The preferred embodiment will now be described with reference to Fig 2 which shows the email process for achieving secure messaging when utilising the present invention. The sender composes a message (100) and the sender's email application generates a unique ID for that message (101). The sender enters his key exchange user ID and password into the application (102) and the application request a key by sending the user ID and password, the sender's email address, the unique ID for the message, and the recipient's email address to the key exchange (103). It will be appreciated that other credentials instead of or in addition to the user ID or password may be used to identify the sender. For example, a smart card or certificate may be utilised. The key exchange authenticates the sender's request (104) and if successful supplies a key for encrypting the message to the sender's email application (105).
The sender's email application encrypts the message using the key (106) and discards the key from the sender's system. Preferably, both the unencrypted message and the encrypted version of the email message are arranged in the sent folder of the email application. The key exchange stores the decryption key corresponding to the encryption key provided to the sender, the unique message ID, the recipient's email address and the sender's email address securely in its system (107). The encrypted email message is then sent to the receiver using a standard email protocol (108). When the recipient collects the mail from their mail box, the recipient's modified email application locates the receiver's key exchange user ID and password (109). This is achieved by either prompting the recipient to enter this information or to locate the information from a stored location on the recipient's system. This information along with the sender's email address, the unique message code, and the recipient's email address are sent to the key exchange as a request for the decryption key (110). The key exchange authenticates the request (111) and if successful provides back the decryption key to the recipient's email application (112). The email message is then decrypted (113). A modification may be made to the above process such that the sender of the email may request an indication that the recipient has successfully received and decrypted the sent email message. If so, the key exchange will notify the sender that successful transmission of the email has occurred. It will be appreciated that the above process can also be carried out where the email message contains attachments. As already mentioned, the present invention is not limited to email communication but may be applied to other types of communication.