Communications system and method

ABSTRACT

A method for adding a communication device in a secure communication system comprising the steps of: A. a user accesses a database in a secure way as provided in that database and according to the authorization given to the user there, wherein the connection is achieved with a user&#39;s communication device which is used at present with the database, having already being recognized in the database as a legitimate user; B. the user is recognized in the database and is given access to facilities in that database, wherein one of the available facilities performs the service of changing the communication device or adding additional devices to the listed device(s); C. the user asks for the service of changing the communication device, to add a new device to the list of legitimate users in the database; D. the database responds by sending temporary identification means for that user for the purpose of adding a new device; E. the user connects to the database using the new communication device and presents the alphanumeric string received earlier in the process, and the database recognizes the user accordingly; F. the characteristics of the new communication devices are next presented and recorded in the database; G. the database can now relate that specific user with the new communication device, after the database has recorded the characteristics of the new communication device as belonging to the known, authorized user, H. during subsequent access of the database with the new communication device, the database will recognize the device and will grant access to the database.

TECHNICAL FIELD

[0001] The present invention relates to communication systems using public encryption, and more particularly to methods for changing the communication device or adding new devices.

BACKGROUND OF THE INVENTION

[0002] A user in a secure database may find it difficult to change the communication device used for accessing the database. Thus, for example, the database may know that the user uses a specific wireline system to access the database.

[0003] Now, the same user may desire to use a cellular telephone to access the same database.

[0004] This task may be difficult to accomplish.

[0005] The wireline system may include a computer with encryption keys stored therein. In a public encryption system, the secret private key is used to encrypt and decrypt messages.

[0006] It may be difficult or impossible to remove the private key from the computer to store it in another device, since the private key is well protected in the computer. Usually the private key is made inaccessible from outside the computer, to prevent an unauthorized person from gaining access to that key.

[0007] Initially, the private key may be generated in the computer. From that moment on, the key is well guarded inside that computer, to achieve the level of security as desired. There is no point in encrypting messages, if the ncryption key is compromised, thence the need to protect the key and not to allow its transfer to another device.

[0008] This very advantage happens to work against the us r; when the legitimate user himself desires to transfer the privat key to another computer.

[0009] To use a cellular phone, the user needs the private key that is kept inside the computer, since the database expects the same known keys to be used by the user.

[0010] Therefore, the user may find it difficult or impossible to change from a wireline telephone to a cellular telephone.

[0011] The same problem occurs if the user desires to access the secure database from another wireline system: Again, the encryption keys have to be transferred from the first computer to a second computer. For example, a user may desire to access a database both from office and from home. At present, this is a difficult or impossible task.

[0012] Thus, although a user may be authorized to access a secure database, that user may find it very difficult to access the same database using another communication device.

[0013] Now a user may buy a cellular phone or another wireless device with a digital certificate built in, or with a private key with-encryption means built in. The secure database, however, does not recognize the new device as belonging to the authorized user in the system. Therefore, the authorized user will be denied access when connecting to the database with the new device.

[0014] Moreover, a user may buy a prepaid, disposable telephone or device. The user may desire to access a secure database with that telephone. He/she may find it difficult or impossible, for the reasons detailed above.

[0015] Presently available wireless communication devices include encryption means. Internet devices may include SSL means for secure communications. These systems allow secure communications. A user who has access to a secure database, however, may find it difficult to use these devices to access the database, as the database does not recognize the new secure device.

[0016] A user may decide to enter a password or to use a private key manually.

[0017] This, however, may be a difficult, tedious and error-prone process. It may require typing manually a long string, for each connecti n to the database. A private key or certificate stored in the communication device may be a much better solution. This cannot be achieved, however, if the private key cannot be transferred from the old communication device to the new device.

[0018] A user may personally visit the database's facilities to solve the problem, however this may waste his time. The database may be located at a remote location, thus making a physical solution difficult.

[0019] Another problem in prior art is the reception of secure, encrypted E-mail messages. The computer of the receiving party may include decryption means and a secret private key. The same user may desire to also receive secure E-mail at another facility or with another computer. Again, the problem arises as of how to transfer the secret, private key from the first computer to the second.

[0020] At present, a communication device serves as identification means for their owner. That is, a secure database recognizes a specific device and accepts this as user identification. The user is known to the database by the communication device that he/she owns.

[0021] Each device may have a different identity, with a different certificate or secret encryption key built in, so a secure database may not recognize a different device.

[0022] A problem in this approach is that users tend to change their communication devices. These devices become obsolete in a short time, and new communication devices are made to replace them. This fact refers, for example, to cellular telephones and personal computers. The problem is that a user may be precluded to replace his/her telephone or computer, if that device holds a secret key that is recognized by a database, and if that key cannot be transferred to another device. Each device has a different identity, so a secure database may not recognize a different device.

[0023] It is not realistic to force customers to continue holding and using obsolete devices for the sake of secure access to a database.

[0024] A possible solution is the use of smart card, a miniature card r other insertable identification means. A user inserts a smart card into a connector, to indicate a specific identity that is recognized by a database. Each user has a different identification device. A possible problem in that approach is that it requires a special-purpose hardware including, for example, a smart card connector and its interface. There are many communication devices that do not have such capabilities.

[0025] It is an objective of the present invention to overcome the abovedetailed problems as well as other problems in communication systems.

SUMMARY OF THE INVENTION

[0026] According to the present invention, there is provided a method for transferring connection privileges from one communication device to another device, or to a plurality of such devices.

[0027] Basically, access privileges were assigned to the user personally. These privileges are contained in a communication device as means to identify the user who has been granted access rights. The problem is how to transfer the user's identity from one device to another.

[0028] The transfer procedure has to be secure, to ensure that the other communication device belongs to the same user. Otherwise, the secure communication may be compromised altogether, as an intruder receives access rights to a secure database.

[0029] According to the novel approach, it is assumed that there is a secure link between a user and a database. The user is recognized by the database and is given access thereto. The communications between user and database are kept at a suitable level of security. Therefore, the user can access the database and exchange secure messages with the database at will.

[0030] According to the novel method, a user accesses a database in a secure way as provided in that database and according to the authorization given to the user there.

[0031] The user is recognized there and is given access to facilities in that database. A novel facility in the database performs the service of changing the communication device or adding additional devices to the listed device(s). The user asks for that service, and is given an alphanumeric string for user identification.

[0032] Either a short string or a long string may be used, according to the level of security to be achieved in the system. The string may contain, for example, 5, 10 or 100 characters.

[0033] The user then connects to the database using the new communication device. The user presents the alphanumeric string received earlier in the process, and the database recognizes the user accordingly.

[0034] The characteristics of the new communication devices are next presented and recorded in the database. For example, a digital certificate may be presented. The certificate may include a user's identification and a public key.

[0035] A challenge method is performed on the public key, wherein the database sends a string encrypted with the claimed public key of that user in that device. If the user successfully decrypts the string (proof that he holds the corresponding private key) then the public key is accepted in the database.

[0036] The database can now relate that specific user with the new communication device. That is, the database records the characteristics of the new communication device as belonging to the known, authorized user.

[0037] During subsequent access of the database with the new communication device, the database will recognize the device and will grant access to the database.

[0038] The procedure may be repeated for a plurality of communication devices, so that the user may now access, in a secure way, the same database with any one of a plurality of communication devices of his/her choosing.

[0039] The user may be given a specific time period during which he/she has to conn ct with the new device, to enhance security.

[0040] The method does not require the transfer r disclosure of a private key, therefore it will not compromise the secret, private key used in the encryption of messages.

[0041] Another application of the invention is in re-directing secure E-mail messages.

[0042] A user may desire to receive encrypted E-mail either at the office or at home. The above method may be used to re-direct encrypted messages, while at each facility there is a different decryption key. Using the above method, the second computer may also be recognized in the system and may receive secure E-mail encrypted to its keys.

[0043] Another benefit of the above method is that the inclusion of a second computer or communication device is performed at the security level of that database. That is, all the transactions required to assign rights to the second computer are performed using certificates or encryption as dictated by the security level in that system, so no breach of security is likely to occur during the abovedetailed procedure.

[0044] Thus, the second computer or device has the same security level as the first device. There is no compromise in security or protection measures during the changeover to another computer.

[0045] The user may either use his/her true name or a pseudonym.

[0046] A simple, concise digital certificate may be used.

[0047] The certificate may contain Just a public key and a pseudonym, so the actual identity of the user needs not be disclosed. This is an anonymous certificate, with an anonymous identity. Such a certificate better preserves the privacy of the user.

[0048] Even with such a minimal amount of disclosure in the certificate, the user may enjoy access to secure databases and unique privileges. Although the user's identity is not disclosed, only that specific user can answer a public key challenge, since only that user can prove that he/she knows the private key corresponding to the public key in the certificate.

[0049] Th above method allows for collation f access rights to various databases for a specific user. That is, a user may have access rights to a plurality of databases. In each database, a different communication device may be used, each with a different set of public/private encryption keys. Using the disclosed method, the user may transfer his/her rights in the databases, from the various communication devices to just one preferred device. That device may then be used to access any of the secure databases which that user has access to.

[0050] Further objects, advantages and other features of the present invention will become obvious to those skilled in the art upon reading the disclosure set forth hereinafter.

BRIEF DESCRIPTION OF THE DRAWINGS

[0051]FIG. 1 illustrates a secure communication system.

[0052]FIG. 2 details a method for adding a communication device in a secure communication system.

[0053]FIG. 3 details a method for adding a communication device in a secure E-mail system.

DETAILED DESCRIPTION OF THE INVENTION

[0054] A preferred embodiment of the present invention will now be described by way of example and with reference to the accompanying drawings.

[0055] Referring to FIG. 1, an embodiment of a secure communication system, a user's communication device 1, is used at present with a secure database 2.

[0056] There is a communication link 3 that connects device 1 with database 2. The link 3 may include a telephone wired net, a wireless link, the Internet or other means of digital communications.

[0057] The device 1 may include encryption means 12 with a private, secret encryption key 122 and/or a digital certificate 13.

[0058] The user may desire to also use a second communication device 4 with the database 2. The device 4 may include its encryption means 42 with a private, secret encryption key 422 and/or a digital certificate 43.

[0059] The problem is how to connect the device 4 to the database 2. Device 4 may use a different communication channel 5.

[0060] Thus, for example, the existing communication link 3 may use wireline telephone lines, whereas the communication channel 5 may be wireless. In another embodiment of the invention, the same communication means may be used for links 3 and 5.

[0061] The methods detailed below may be implemented in the above system to add the communication device 4 to the system, that is to allow the user access to the database 2 in a secure way.

[0062]FIG. 2 details a method for adding a communication device in a secure communication system.

[0063] The novel approach assumes that there is a secure link between a user and a database. This implies that the user is recognized by the database and is given access to the database. Moreover, the communications between user and database are kept at a level of security that is suitable for that application.

[0064] Therefore, the user can access the database and exchange secure messages with the database at will.

[0065] A new communication device 4 is added to a secure database 2 by:

[0066] Stage 61—a user accesses the database 2 in a secure way as provided in that database and according to the authorization given to the user there. The connection is achieved with the user's communication device 1, which is used at present with the secure database 2, having already being recognized in the database 2 as a legitimate user.

[0067] Stage 62—the user is recognized there and is given access to facilities in that database 2. A novel facility in the database performs the service of changing the communication device or adding additional devices to the listed device(s).

[0068] Stage 63—the user asks for the service of changing the communication device, to add device 4 to the list of legitimate users in database 2.

[0069] Stage 64—the database responds by sending temporary identification means for that user for the purpose of adding a new device. For example, the temporary identification may be implemented with an alphanumeric string for user identification.

[0070] Either a short string or a long string may be used, according to the level of security to be achieved in the system. The string may contain, for example 5, 10 or 100 characters.

[0071] In another embodiment, the alphanumeric string may be provided by the user. As the communication link is secure, any of the parties involved may provide that string. Alternately a numeric string may be used, or an alphabetic only string may be used, as deemed necessary and suitable to that specific system.

[0072] Stage 65—the user connects to the database using the new communication device. The user presents the alphanumeric string received earlier in the process, and the database recognizes the user accordingly.

[0073] Stage 66—th characteristics of the new communication devices are next presented and recorded in th database. For example, a digital certificate may be presented. The certificate may include a user's identification and a public key.

[0074] Stage 67—(Optional) a challenge method is performed on the public key, wherein the database sends a string encrypted with the claimed public key of that user in that device. If the user successfully decrypts the string (proof that he holds the corresponding private key) then the public key is accepted in the database.

[0075] Stage 68—the database can now relate that specific user with the new communication device. That is, the database records the characteristics of the new communication device as belonging to the known, authorized user.

[0076] Stage 69—During subsequent access of the database with the new communication device, the database will recognize the device and will grant access to the database.

[0077] End of method.

[0078] For enhanced security, in stage 64 the user may be given a specific time period during which he/she has to connect with the new device (perform stage 65), otherwise the access option (the alphanumeric string sent to the user) becomes void.

[0079] An important benefit of the above method is that it does not require the transfer or disclosure of a private key, therefore it will not compromise the secret, private key used in the encryption of messages.

[0080]FIG. 3 details a method for adding a communication device in a cure E-mail system.

[0081] A new communication device is added to a secure database by:

[0082] Stage 71—a user accesses a database in a secure way as provided in that database and according to the authorization given to the user there.

[0083] Stage 72—the user is recognized there and is given access to facilities in that database. A novel facility in the database performs the service of changing the communication device to be used to receive E-mail or adding additional devices to the listed device(s).

[0084] Stage 73—the user asks for the service of changing the communication device.

[0085] Stage 74—the database responds by sending temporary identification means for that user for the purpose of adding a new device. For example, the temporary identification may be implemented with an alphanumeric string for user identification.

[0086] Either a short string or a long string may be used, according to the level of security to be achieved in the system. The string may contain, for example 5, 10 or 100 characters.

[0087] In another embodiment, the alphanumeric string may be provided by the user. As the communication link is secure, any of the parties involved may provide that string. Alternately a numeric string may be used, or an alphabetic only string may be used, as deemed necessary and suitable to that specific system.

[0088] Stage 75—the user accesses the database using the new communication device, for example another computer that is to receive secure E-mail. The user presents the alphanumeric string received earlier in the process, and the database recognizes the user accordingly.

[0089] Stage 76—the public key of the new computer is next presented and recorded in the database. For example, a digital certificate may be presented. The certificate may include a user's identification and the public key.

[0090] Stage 77—(Optional) a challenge method is performed on the public key, wherein the database sends a string encrypted with the claimed public key of that user in that device. If the user successfully decrypts the string (proof that he holds the corresponding private key) then the public key is accepted in the database.

[0091] Stage 78—the database can now relate that specific user with the new communication device. That is, the database records the characteristics of the new communication device as belonging to the known, authorized user.

[0092] Stage 79—During subsequent access of the database with the new communication device, the database will recognize the device and will grant access to the database. E-mail addressed to that user will be encrypted with the new public key provided in stage 76 above.

[0093] End of method.

[0094] Various other embodiments of the cover for a telephone may be implemented.

[0095] For example, the new invention may be used with various communication devices: wired or wireless. Wireless may include cellular, satellite or other means.

[0096] The user may connect to a database, a controlled access Internet site or other controlled entry facility.

[0097] It will be recognized that the foregoing is but one example of an apparatus and method within the scope of the present invention and that various modifications will occur to those skilled in the art upon reading the disclosure set forth hereinbefore. 

What is claimed is:
 1. A method for adding a communication device in a secure communication system comprising the steps of: A. a user accesses a database in a secure way as provided in that database and according to the authorization given to the user there, wherein the connection is achieved with a user's communication device which is used at present with the database, having already being recognized in the database as a legitimate user; B. the user is recognized in the database and is given access to facilities in that database, wherein one of the available facilities performs the service of changing the communication device or adding additional devices to the listed device(s); C. the user asks for the service of changing the communication device, to add a new device to the list of legitimate users in the database; D. the database responds by sending temporary identification means for that user for the purpose of adding a new device; E. the user connects to the database using the new communication device and presents the alphanumeric string received earlier in the process, and the database recognizes the user accordingly; F. the characteristics of the new communication devices are next presented and recorded in the database; G. the database can now relate that specific user with the new communication device, after the database has recorded the characteristics of the new communication device as belonging to the known, authorized user; H. during subsequent access of the database with the new communication device, the database will recognize the device and will grant access to the database.
 2. The method for adding a communication device according to claim 1, wherein the temporary id ntification is implemented with an alphanumeric string for user id ntification.
 3. The method for adding a communicati n device according to claim 1, wherein the temporary identification is implemented with a numeric string f r user identification.
 4. The method for adding a communication device according to claim 1, wherein the temporary identification is implemented with an alphabetic only string for user identification.
 5. The method for adding a communication device according to claim 1, wherein a short string of about 5 to 10 characters is used.
 6. The method for adding a communication device according to claim 1, wherein a long string of about 100 characters is used.
 7. The method for adding a communication device according to claim 1, wherein in step F a digital certificate is presented.
 8. The method for adding a communication device according to claim 7, wherein the certificate may include a user's identification and a public key.
 9. The method for adding a communication device according to claim 1, wherein after step F a challenge method is performed on the public key, wherein the database sends a string encrypted with the claimed public key of that user in that device, and the user has to successfully decrypt it.
 10. The method for adding a communication device according to claim 1, wherein in step D the user may be given a specific time period during which he/she has to connect with the new device (perform step E), otherwise the access option (the alphanumeric string sent to the user) becomes void.
 11. A method for adding a communication device in a secure communication system comprising the steps of: A. a user accesses a database in a secure way as provided in that database and according to the authorization given to the user there, wherein the connection is achieved with a user's communication device which is used at present with the database, having already being recognized in the database as a legitimate user; B. the user is recognized in the database and is given access to facilities in that database, wherein one of the available facilities performs the service of changing the communication device to be used to receive E-mail or adding additional devices to the listed device(s); C. the user asks for the service of changing the communication device, to add a new device to the list of legitimate users in the database; D. the database responds by sending temporary identification means for that user for the purpose of adding a new device; E. the user connects to the database using the new communication device and presents the alphanumeric string received earlier in the process, and the database recognizes the user accordingly; F. the characteristics of the new communication devices are next presented and recorded in the database, including the public key of the new computer; G. the database can now relate that specific user with the new communication device, after the database has recorded the characteristics of the new communication device as belonging to the known, authorized user; H. during subsequent access of the database with the new communication device, the database will recognize the device and will grant access to the database, wherein E-mail addressed to that user will be encrypted with the new public key provided in step F.
 12. The method for adding a communication device according to claim 11, wherein the temporary identification is implemented with an alphanumeric string for user identification.
 13. The method f r adding a communication device according to claim 11, wherein the temporary identification is implemented with a numeric string for user identification.
 14. The method for adding a communication device according to claim
 11. wherein the temporary identification is implemented with an alphabetic only string for user identification.
 15. The method for adding a communication device according to claim 11, wherein a short string of about 5 to 10 characters is used.
 16. The method for adding a communication device according to claim 11, wherein a long string of about 100 characters is used.
 17. The method for adding a communication device according to claim 11, wherein in step F a digital certificate is presented.
 18. The method for adding a communication device according to claim 17, wherein the certificate may include a user's identification and a public key.
 19. The method for adding a communication device according to claim 11, wherein after step F a challenge method is performed on the public key, wherein the database sends a string encrypted with the claimed public key of that user in that device, and the user has to successfully decrypt it.
 20. The method for adding a communication device according to claim 11, wherein in step D the user may be given a specific time period during which he/she has to connect with the new device (perform step E), otherwise the access option (the alphanumeric string sent to the user) becomes void. 