Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography
Reexamination Certificate
2000-02-23
2003-05-06
Darrow, Justin T. (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular node for directing data and applying cryptography
C713S153000, C713S161000, C713S162000, C713S188000, C380S281000, C709S225000
Reexamination Certificate
active
06560705
ABSTRACT:
BACKGROUND
1. Field of the Invention
The present invention relates to encryption and mechanisms for screening data. More specifically, the present invention relates to a method and an apparatus for performing content screening on data that is protected by end-to-end encryption.
2. Related Art
The advent of computer networks has led to an explosion in the development of applications, such as electronic mail, that facilitate rapid dissemination of information between computer systems across computer networks.
One problem with sending information across computer networks is that it is hard to ensure that sensitive information is kept confidential. This is because a message containing sensitive information can potentially traverse many different computer networks and many different computer systems before it arrives at its ultimate destination. An adversary can potentially intercept a message at any of these intermediate points along the way.
One way to remedy this problem is to “encrypt” sensitive data using an encryption key so that only someone who possesses a corresponding decryption key can decrypt the data. (Note that for commonly used symmetric encryption mechanisms the encryption key and the decryption key are the same key.) For example, a person sending sensitive data across a computer network can encrypt the sensitive data using the encryption key before it is sent across a computer network. At the other end, the recipient of the data can use the corresponding decryption key to decrypt the data.
Another problem with transferring data across a computer network is that it is hard to ensure that data which is received from the computer network is harmless. For example, the data may contain a computer virus, which can harm a computer system, or the data may contain information that violates a company policy.
In order to remedy this problem, communications entering a protected group of computer systems can be channeled through a “firewall.” This allows the firewall to perform “content screening” in order to filter out harmful or unwanted communications from entering the protected group of computer systems.
Unfortunately, the use of a firewall can interfere with encryption. The most secure method of encryption is “end-to-end.” End-to-end encryption typically entails setting up an encrypted “tunnel” between processes on different computer systems in order to allow the processes to communicate with each other. All communications passing through the tunnel are encrypted using a session key, which is negotiated between the processes during initialization of the tunnel.
In order to perform content screening, existing systems terminate an encrypted tunnel at the firewall. This allows the firewall to perform the content screening, but it does not provide end-to-end encryption for the communication.
Another solution is to perform the content screening after a message reaches a client computer system within the firewall. For example, virus scanners typically operate on a client computer system. Performing content screening on a client computer system makes it possible to provide end-to-end encryption. However, there are a number of drawbacks in doing so. (1) Content screeners (such as virus scanners) often require updating more frequently than a client system is likely to be updated. (2) Content screeners must often be explicitly activated by a user of the client computer system in order to screen the data. (3) Also, client computer systems within the firewall may not be completely trusted to enforce a content screening policy.
Hence, what is needed is a method and an apparatus for providing content screening in a system that provides end-to-end encryption without performing the content screening at a destination computer system.
SUMMARY
One embodiment of the present invention provides a system that performs content screening on a message that is protected by end-to-end encryption. The system operates by receiving an encrypted message and an encrypted message key at a content screener from a firewall, the firewall having previously received the encrypted message and the encrypted message key from a source outside the firewall. The content screener decrypts the encrypted message key to restore the message key, and decrypts the encrypted message with the message key to restore the message. Next, the content screener screens the message to determine whether the message satisfies a screening criterion. If so, the system forwards the message to a destination within the firewall in a secure manner.
In one embodiment of the present invention, the system decrypts the encrypted message key by sending the encrypted message key to the destination. Upon receiving the encrypted message key, the destination decrypts the encrypted message key and returns the message key to the content screener in a secure manner.
In one embodiment of the present invention, the system screens the message by, screening the message for a virus, screening the message in order to detect a policy violation within the message, or screening the message to detect keywords of interest in the message.
In one embodiment of the present invention, the system forwards the message to the destination by: forwarding the message to the destination in the clear under protection of the firewall; encrypting the message with a destination public key belonging to the destination prior to forwarding the message; encrypting the message with a secret key known to the destination prior to forwarding the message; or forwarding the encrypted message to the destination so that the destination can decrypt the encrypted message with the message key.
REFERENCES:
patent: 4458109 (1984-07-01), Mueller-Schloer
patent: 4578530 (1986-03-01), Zeidler
patent: 5668877 (1997-09-01), Aziz
patent: 5812671 (1998-09-01), Ross, Jr.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5850449 (1998-12-01), McManis
patent: 5960086 (1999-09-01), Atalla
patent: 6226618 (2001-05-01), Downs et al.
patent: 6026167 (2002-02-01), Aziz
patent: 6408336 (2002-06-01), Schneider et al.
patent: WO 99/05814 (1999-02-01), None
patent: WO 00/00879 (2000-01-01), None
Publication entitled, “Sun's SKIP Firewall Traversal for Mobil IP” by G. Montenegro and V. Gupta of Sun Microsystems, Inc., Jun. 1998, XP-002171034, pp. 1-20.
Elley Yassir K.
Hanna Stephen R.
Perlman Radia J.
Darrow Justin T.
Sun Microsystems Inc.
LandOfFree
Content screening with end-to-end encryption prior to... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Content screening with end-to-end encryption prior to..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Content screening with end-to-end encryption prior to... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3090990