METHOD AND SYSTEM FOR THE TRANSMISSION OF INFORMATION
FIELD OF THE INVENTION
The present invention relates to transmission and encryption of information. In the method and sys- tern of the invention, the information to be transmitted is encrypted using an encryption key stored in a mobile station. The information is encrypted using the mobile station.
BACKGROUND OF THE INVENTION
Encryption can be used to protect data transmitted in telecommunication networks. In prior art, numerous different data encryption methods are known. These include e.g. symmetric and asymmetric encryption algorithms, such as the DES (Data Encryption Standard) and RSA (Rivest, Shamir, Adleman) algorithms. The operation of these is known to the skilled person.
The personal and public keys used in asymmetric encryption are often included in the application which uses them. Thus, for instance, before electronic mail is sent, the message to be transmitted is encrypted using the receiver's public key. The receiver again decrypts the encrypted message using his own personal key, which can only be used by giving a pass- word that is only known to the receiver himself.
Encryption keys can also be used in digital signatures, in verification of the integrity of a transmission, in certification of a transmission or in authentication of the user of a terminal device. To make a digital signature, the user electronically
'signs' a text to be sent, using his personal signing key. To ensure that the information transmitted will not change during the transfer or that nobody else will be able to send the information in the user's name, the user can certify the transmission using his personal key.
STATE OF THE ART
In the methods known at present, the problem is management and storage of the keys. The personal and the public encryption keys are stored in the ter- minal or workstation in which they are used, which means that the encryption tends to become dependent on the terminal. In addition, activation and deactivation of the keys, their delivery and other actions pertaining to their management are at present difficult to implement. Besides, the keys are often used in conjunction with a given application or service.
The object of the present invention is to eliminate the drawbacks referred to above or at least to significantly alleviate them. A specific object of the invention is to disclose a new type of method and system for the encryption of information in such manner that the information to be encrypted is defined outside the mobile station. The information is transferred into the mo- bile station and encrypted by means of the mobile station.
As for the features characteristic of the present invention, reference is made to the claims.
BRIEF DESCRIPTION OF THE INVENTION
In the method of the invention for the encryption of information in a telecommunication system, the telecommunication system comprises a terminal and a mobile station connected to the terminal. The mobile station comprises a subscriber identity module or a corresponding module. In some embodiments, the mobile station may also be replaced with a security module having the required properties to allow it to be connected to the terminal. Furthermore, the terminal used in an embodiment of the invention is a computer, a
portable computer, a mobile station or a corresponding digital terminal device.
In a first step comprised in the method, the data to be encrypted is defined by means of the termi- nal. Next, the data to be encrypted is transferred into a mobile station, in which it is encrypted using an encryption key. The encryption key and the decryption key have been stored in the subscriber identity module or in a corresponding module connected to the mobile station. Finally, the encrypted data is transferred to the terminal .
The method can also be used to decrypt the encrypted data. The encrypted data is transferred from the terminal into the mobile station and decrypted in the mobile station using a decryption key. The encryption key and the decryption key are stored in the subscriber identity module or an equivalent module connected to the mobile station.
In a preferred embodiment of the invention, asymmetric encryption is used, which means that the encryption key is the receiver's public key and the decryption key is the receiver's personal key. Alternatively, it is also possible to use symmetric encryption, in which case the encryption key and the decryp- tion key are the receiver's secret key.
In another embodiment of the invention, asymmetric encryption can be used, and the user's personal secret and public keys can be used for implementing a digital signature, for verification of the integrity of the transmission, authentication of the user of the terminal and/or protection of files. Instead of asymmetric encryption, it is also possible to use symmetric encryption and the user's secret key.
Further, in an embodiment of the invention, the terminal is connected to the mobile station via a fixed connection, an infrared link and/or a radio link. A radio link may be based e.g. on Bluetooth
technology or it may be a corresponding wireless local network connection. A more detailed description of Bluetooth technology will be found e.g. on WWW page www.bluetooth.com . The method of the invention may also comprise a telecommunication server. A telecommunication server can be used to transmit and receive information and to encrypt and decrypt information. The terminal is connected to the telecommunication server via a TCP/IP connection, a mobile connection and/or a corresponding communication link.
In another embodiment of the invention, the module connected to the mobile station is a security module comprising means for encrypting electronic data transfer of the security module, decrypting encrypted data and implementing a digital signature and means for connecting the security module to a mobile station or terminal to allow electronic data transfer.
The invention makes it possible to implement encryption in a manner independent of the terminal as the encryption keys are placed on the subscriber identity module of the mobile station. Other advantages achieved are e.g. the possibility of updating the encryption keys and, if necessary, defining access rights regarding the encryption keys via an over-the- air (OTA) interface.
BRIEF DESCRIPTION OF THE DRAWINGS
In the following, the invention will be de- scribed in detail by the aid of a few examples of its embodiments, wherein
Fig. 1 presents a system according to the invention, and
Fig. 2 presents a block diagram representing the operation of an embodiment of the invention.
DETAILED DESCRIPTION OF THE INVENTION
A system as presented in Fig. 1 comprises a terminal 1 and a mobile station 2 comprising a subscriber identity module (SIM) or an equivalent module connected to the mobile station 2. The terminal 1 is connected to the mobile station 2.
The terminal 1 comprises means 5 for its connection to the mobile station 2. The terminal 1 also comprises means (CPU) for data processing, and means (APP1) for transferring data to the mobile station 2. The subscriber identity module (SIM) or corresponding module connected to the mobile station 2 comprises means (RAM) for storing an encryption key and a decryption key and means (RSA1) for the encryption of data and/or decryption of encrypted data. Encryption and decryption are implemented using the encryption key and/or decryption key stored in the subscriber identity module (SIM) .
In an embodiment as illustrated in Fig. 1, the user defines via his terminal 1 the data to be encrypted and transfers the data to the mobile station 2. The data is transferred to the mobile station 2 using data transfer software (APP1) comprised in the terminal 1. Next, the user encrypts the data using his mobile station 2. The encryption of the data may be implemented using either asymmetric encryption, preferably the RSA algorithm or a corresponding algorithm, in which the encryption key is the receiver's public key and the decryption key is the receiver's personal key. Alternatively, it is also possible to use symmetric encryption, preferably the DES algorithm or a corresponding algorithm in which the encryption key and the decryption key are the receiver's secret key. The applications (RSA1) needed for encryption are located in the subscriber identity module (SIM) of the mobile station 2 or in a corresponding module connected to the mobile station 2.
After the data has been encrypted, it is transferred to the terminal 1, from where it can be sent e.g. by electronic mail to the receiver. The encrypted data may also be sent by means of the mobile station 2. This may be done using e.g. the short message service (SMS) or a corresponding service of the mobile communication system.
The mobile station 2 may also be used to decrypt encrypted information. In this case, the user transfers the encrypted data into the mobile station 2 using data transfer software (APP1) and decrypts the data using the mobile station 2. The decryption is implemented using either a symmetric or an asymmetric decryption algorithm, depending on which method has been used for the encryption.
Using the method of the invention, it is also possible to implement digital signature of data to be transferred, verify the integrity of a transmission, verify the sender of data transmitted, authenticate the user of the terminal 1 and/or protect files. These functions are implemented using either asymmetric encryption, in which case the encryption key is the receiver's public key, or symmetric encryption, in which case the sender's secret key is used. In a preferred embodiment, a telecommunication server 3 is included in the method and system of the invention as shown in Fig. 1. In the telecommunication server 3, data can be processed, transmitted, received and encrypted as well as decrypted. The means (RSA2) needed for encryption and decryption and the software (APP2) enabling data transfer between the terminal 1 and the telecommunication server 3 are located in the telecommunication server 3. The telecommunication server 3 also comprises means 7 for con- necting it to the terminal 1. The terminal 1 comprises means 6 for connecting it to the telecommunication server 3.
For the encryption of information, symmetric or asymmetric encryption is used in the telecommunication server 3 as described above. The decryption of information in the telecommunication server 3 is also implemented using a symmetric or asymmetric decryption algorithm. By means of the telecommunication server 3, it is also possible to digitally sign information, verify the integrity of a transmission, verify the sender of information transferred, authenticate the user of the terminal 1 and/or protect files. These functions are accomplished using symmetric or asymmetric encryption as described above.
In a preferred embodiment, a wireless local network is used between the terminal 1 and the mobile station 2. A system of this type is the Bluetooth system, in which a short-range 2.4 GHz radio link is utilized.
When the user approaches the terminal 1, the system detects the mobile station 2, carried by the user in his pocket or on his belt, and establishes a connection between the terminal 1 and the mobile station 2. Next, the user transfers the data from the terminal 1 to the mobile station 2. The data transfer is accomplished using data transfer software (APP1) of the terminal. After this, the user encrypts the data or decrypts the encrypted data as described above.
Having encrypted the data, the user can send it to the receiver. The data to be transferred may consist of e.g. payment or order data. The receiver is e.g. a telecommunication server 3 in a bank or store, provided with software constituting the payment transfer system of the bank or store. The connection used between the terminal 1 and the telecommunication server 3 may be e.g. a TCP/IP connection, a modem con- nection, a mobile connection or a corresponding communication link.
The telecommunication server 3 comprises means (RSA2) for the encryption of information. The encryption of information is implemented either as symmetric or as asymmetric encryption as described above. The telecommunication server 3 transfers the encrypted information to the terminal 1. For the data transfer, the data transfer software (APP2) of the telecommunication server 3 and/or the data transfer software (APP1) of the terminal is used. After this, the user transfers the encrypted data to the mobile station 2 and decrypts it. For the decryption, either a symmetric or an asymmetric decryption algorithm is used, depending on which method has been used for the encryption of the information. The encrypted informa- tion may also be sent directly from the telecommunication server 3 to the mobile station 2. This is accomplished using e.g. a short message or equivalent. After the encrypted message has been transferred from the telecommunication server 3 to the mobile station 2, the user decrypts the information as above.
In addition to being encrypted, the information can also be signed digitally, and the integrity of the transmission and the sender of the data transferred can be verified. The user can also be authenti- cated, or the user's files can be protected in different ways as described above. The user can also receive encrypted information and decrypt it as described above .
In another preferred embodiment, a data transfer cable is used between the terminal 1 and the mobile station 2. In this case, the terminal 1 is connected to the mobile station 2 e.g. via an RS232 data transfer link. The terminal 1 in which provided with a suitable interface 5 for the connection of an RS232 cable and data transfer software (APP1) for the use of the RS232 protocol. If necessary, the mobile station 2
is provided with an adapter to adapt the voltage levels to the levels used by the mobile station 2.
In another preferred embodiment, an infrared link is used between the terminal 1 and the mobile station 2. In this case, the terminal 1 is provided with a suitable interface 5 for the setup of an infrared connection and data transfer software (APP1) for the use of the data transfer protocol. If the mobile station 2 has not been equipped for an infrared con- nection, then the required equipment for such a connection is connected to it.
In an embodiment of the invention, the encryption keys and the decryption keys can be updated on the subscriber identity module (SIM) of the mobile station 2, and the associated access rights can be changed via an over-the-air interface, preferably via a mobile communication network.
In an embodiment of the invention, the terminal 1 is a computer, a portable computer, a mobile station or a corresponding digital terminal device.
In an embodiment of the invention, the encryption key and the decryption key are stored on a module 4 corresponding to a subscriber identity module (SIM) , connected to the mobile station 2. Such a mod- ule could be e.g. a security module as described in patent application FI981902. The security module 4 comprises means (RSA3) for the encryption of electronic data transfer, for the decryption of encrypted information and for implementing an electronic signa- ture, as well as means (8) for connecting the security module 4 to a mobile station 2 for electronic data transfer.
In Fig. 2, in step 21, a connection is established between the terminal 1 and the mobile station 2. In step 22, a connection is established from the terminal 1 to the telecommunication server 3 of a bank. In step 23, the user fetches bill data from the
telecommunication server 3 into his terminal 1 by using data communications software (APP1) . In step 24, the user defines the amount to be paid and other information as required, using his terminal 1. In step 25, the bill is transferred from the terminal 1 to the mobile station 2. In step 26, the bill is encrypted using the public key of the bank. In step 27, the user sends the encrypted bill by means of his mobile station 2 to the telecommunication server of the bank. In step 28, the link between the telecommunication server 3 and the terminal 1 is disconnected.
The invention is not restricted to the examples of its embodiments described above; instead, many variations are possible within the scope of the inven- tive idea defined in the claims.