WO2000044128A1 - Simplified addressing for private communications - Google Patents

Simplified addressing for private communications Download PDF

Info

Publication number
WO2000044128A1
WO2000044128A1 PCT/SG2000/000001 SG0000001W WO0044128A1 WO 2000044128 A1 WO2000044128 A1 WO 2000044128A1 SG 0000001 W SG0000001 W SG 0000001W WO 0044128 A1 WO0044128 A1 WO 0044128A1
Authority
WO
WIPO (PCT)
Prior art keywords
addressee
package
key
escrow
module
Prior art date
Application number
PCT/SG2000/000001
Other languages
French (fr)
Inventor
Eng-Whatt Toh
Peng-Toh Sim
Original Assignee
Private Express Technologies Pte. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/332,358 external-priority patent/US7171000B1/en
Application filed by Private Express Technologies Pte. Ltd. filed Critical Private Express Technologies Pte. Ltd.
Priority to AU38536/00A priority Critical patent/AU3853600A/en
Priority to JP2000595457A priority patent/JP2002535922A/en
Priority to EP00917584A priority patent/EP1149483A1/en
Priority to CA002360095A priority patent/CA2360095A1/en
Publication of WO2000044128A1 publication Critical patent/WO2000044128A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption

Definitions

  • the present invention relates generally to cryptographic communications
  • both the sender and receiver of a message use the same secret key.
  • the sender uses the secret key to encrypt the message
  • any person in possession of the key can create forged messages or
  • a first user may publish his public
  • the present invention solves the foregoing problems by providing a system and method for securely transmitting an information package (10) to an addressee via a network (108).
  • a network 108
  • d i rectory (112) of public keys is checked to determine whether the addressee of the package (10) has a public key. If the addressee does not have a public key ir
  • the directory (112), the package (10) is encrypted with an escrow encryption key
  • a notification such as
  • an e-mail message is sent to the addressee of the package (10) in escrow.
  • the addressee acknowledges the notification, the addressee is issued new public
  • the addressee's new public key is added to the directory (112) such that future packages (10) to the addressee may be encrypted using the addressee's public key. Finally, the package (10) is transmitted to the addressee.
  • (108) includes a directory interface (110) adapted to check a directory (112) to
  • addressee's public key before a package (10) is sent is sent. Indeed, the addressee is not required to have a public key before the package (10) is sent. If the addressee does not currently have a public key, the addressee will be issued new public
  • Figure 1 is a functional block diagram of a secure communications system for transmitting information packages according to an embodiment of the present invention
  • FIG. 2 is a physical block diagram showing additional implementation
  • Figure 3 is a flow diagram of a secure communication system according to
  • Figure 4 is a flow diagram of a first embodiment of a transmission module and a decryption module according to an embodiment of the present invention.
  • Figure 5 is a flow diagram of a second embodiment of a transmission
  • the principal components of the system 100 include a sending system 102,
  • the sending system 102 is
  • an "open" computer network 108 such as the Internet.
  • all transmissions over the network 108 are by a secure protocol, such as the Secure Multipurpose Internet Mail Extension (S/MIME) and/or the Secure Sockets Layer (SSL).
  • S/MIME Secure Multipurpose Internet Mail Extension
  • SSL Secure Sockets Layer
  • the sending system 102 is used by a sender to securely transmit a , n information package 10 to at least one intended "recipient", who is
  • sending system 102 includes a directory interface 110 for communicating via the
  • the directory 112 is a
  • the directory 112 may be queried using the addressee's e-mail address.
  • the public key directory 112 is implemented using an existing online directory infrastructure provided, for example, by VeriSign, Inc. of Mountain View, California. In alternative embodiments, however, the directory is implemented using a conventional database system, such as one
  • LDAP Lightweight Directory Access Protocol
  • the sending system 102 also includes an encryption module 114 for
  • the encryption module 114 is coupled to receive an escrow encryption key from an escrow key manager 116, as described
  • the encryption module 114 uses a public key
  • each encrypted data is transmitted using such as the Data Encryption Standard (DES), such as the Data Encryption Standard (DES), is used.
  • DES Data Encryption Standard
  • each encrypted data is transmitted using the Data Encryption Standard (DES).
  • DES Data Encryption Standard
  • symmetric key cryptography are preferably used to provide a high level of data security.
  • the escrow key manager 116 generates keys and/or provides stored keys
  • the escrow key manager 116 is a process running
  • the encryption module 114 communicates with the escrow key manager 116 via the network
  • the escrow key manager 112 is a functional unit contained
  • the encryption module 114 is coupled via the network 108 to an escrow
  • storage area 118 is a database for storing encrypted information packages and is
  • an information package 10 is sent using a conventional protocol, such as the
  • Hypertext Transfer Protocol (HTTP) to be stored within the escrow storage area
  • the escrow storage area 118 is contained within the escrow storage area 118
  • the server system 104 additionally includes a notification module 120 for
  • the notification is an e-mail message
  • notification module 120 is an e-mail server, such as the Microsoft Exchange®
  • the server system 104 also includes a transmission module 122, the
  • the decryption module 126 in the receiving system 106.
  • the decryption module 126 in the receiving system 106.
  • transmission module 122 is a standard Web server, such as the Windows NT ®
  • module 126 may be implemented using a standard Web browser, such as the
  • the transmission and decryption modules 122, 126 is by HTTP using SSL.
  • the transmission module 122 is coupled to
  • the notification module 120 is coupled via the network 108 to a key
  • the key registration module 124 in the receiving system 106 The key registration
  • module 124 is configured to issue new public and private keys to an addressee who does not currently have such keys, and is additionally configured to
  • the key registration module 124 is resident in the
  • the notification module 120 is configured to send the key registration module 124 to the receiving system 106 as an
  • notification includes a hyperlink, such as a Uniform Resource Locator (URL),
  • URL Uniform Resource Locator
  • reg i stration module 124 using a conventional Web browser, such as the Netscape
  • the receiving system 106 also includes a decryption module 126 for decrypting information packages 10. Like the encryption module 114, the decryption module 126 preferably uses a public key
  • a symmetric key algorithm such as the Data Encryption Standard (DES) may be used.
  • DES Data Encryption Standard
  • the decryption module 126 is coupled to receive an
  • the escrow decryption module 126 is coupled to receive the addressee's private key from the key registration module 124. Using either the escrow decryption key or the
  • the decryption module 126 decrypts the information package 10 and provides the decrypted package 10 to the addressee.
  • the systems 102, 104, and 106 described above, as well as the public key directory 112 and escrow key manager 116, are each implemented us i ng convenrional personal computers or workstations, such as IBM® PC-
  • Figure 2 is a physical
  • a central processing unit (CPU) 202 executes
  • a storage device 204 coupled to the CPU 202, provides long-term storage of data and software programs, and may be
  • network interface 206 coupled to the CPU 202, connects the sending system 102
  • a display device 208 coupled to the CPU 202, displays text
  • An input device 210 coupled to
  • the CPU 202 such as a mouse or keyboard, facilities user control of the sending system 102.
  • An addressable memory 212 coupled to the CPU 202, stores software
  • the memory 212 stores a number of standard memory devices, such as random access memory (RAM) and read-only memory (ROM) devices.
  • RAM random access memory
  • ROM read-only memory
  • the memory 212 stores a number of
  • the sending system 102 initially receives 302 from the sender the
  • addressee's e-mail address Although the addressee's e-mail address is used in one embodiment, those skilled in the art will recognize that the sender may
  • a package 10 may have a plurality of addressees.
  • the sending system 102 searches 304
  • a determination 306 is then made whether the addressee's key was found in the directory 112. If the key was found, the package 10 is encrypted 308 by the
  • the server system 104 notifies 312 the addressee about the package
  • the notification module 120 which uses an e-mail notification system.
  • the notification module 120 uses an e-mail notification system.
  • the receiving system 106 may include a notification
  • the notification module 120 Upon receipt of a UDP notification, the
  • notification client generates a visual or audible desktop notification to the
  • addressee such as a blinking icon, a chime, a pop-up dialog box, or the like.
  • notification could include a voice notification via a voice
  • synthesis module a pager notification via a conventional pager, or a facsimile notification via a standard facsimile.
  • the addressee After the addressee receives 314 and acknowledges the notification, such as by a return e-mail message, the person claiming to be the addressee is
  • authenticated 316 to determine whether that person is, in fact, the addressee.
  • Those skilled in the art will recognize that there are many ways to authenticate an addressee. For example, passwords or the like could be used.
  • the addressee is a secure way for authenticating an addressee.
  • the transmission module 122 obtains the addressee's public key from the public
  • authentication steps may be performed automatically by a Web server and Web
  • the transmission module After the addressee is properly authenticated, the transmission module
  • the receiving system 106 receives 320 the package from the server 104.
  • HTTP and SSL are used, although other standard protocols could also be used without
  • decryption module 126 decrypts 322 the package 10 using the addressee's private key, and provides the decrypted package 10 to the addressee.
  • the present invention solves this problem by holding the addressee's package 10 in escrow, as described in greater detail below.
  • step 306 if the addressee's public key was not found in the
  • the escrow key manager 116 issues 324, for the package 10, an
  • escrow decryption key is used for decrypting the package 10.
  • the addressee's private key should never be sent to the addressee.
  • the addressee's private key is generated locally at the receiving computer 106, and only the addressee's public
  • the escrow encryption/ decryption keys are
  • the keys are symmetric keys.
  • the keys are symmetric keys.
  • the encryption module 114 within the sending
  • system 102 retrieves 326 the escrow encryption key, encrypts the package 10
  • the package 10 is then stored 328 in the escrow storage area
  • the server system 104 holds the package in escrow
  • the addressee is then notified 330 of the package 10 being stored in escrow and the need to register for public and
  • the notification is an e-mail message.
  • the notification message includes a copy of the key registration
  • ⁇ module 124 as an e-mail attachment.
  • the notification message
  • a hyperlink such as a URL, to permit the addressee to download the
  • key registration module 124 from the server system 104 or another location. After the addressee has received 332 and acknowledged the notification and has either extracted or downloaded the key registration module 124, the
  • addressee uses the key registration module 124 to register 334 for new public and
  • the new public and private keys are
  • the registration process is similar to the procedure
  • the addressee is authenticated 336 to determine whether the person
  • authentication may involve encrypting a standard
  • server system 104 sends 338 the package 10 of the authenticated addressee to the
  • the decryption module 126 in the receiving system 106.
  • this process may be done in a number of ways.
  • the transmission module 122 retrieves 342 the package 10 being stored
  • the decryption module 126 retrieves 346 the escrow decryption key
  • the decryption module 126 then decrypts 348 the package 10.
  • the transmission module 122 retrieves 350 the
  • the transmission module 120 retrieves 352 the escrow decryption key from the
  • the transmission module 120 re-encrypts 354 the package

Abstract

A system for securely transmitting an information package (10) to an addressee via a network (108) includes a directory interface (110) adapted to check a directory (112) to determine whether the addressee has a public key; an escrow key manager (116), coupled to the directory interface (110), adapted to provide an escrow encryption key for encrypting the package (10); an encryption module (114), coupled to the escrow key manager (116), adapted to encrypt the package (10) with the escrow encryption key; a computer-readable medium (118), coupled to the encryption module (114), adapted to store the package (10) in escrow for the addressee; a notification module (120), coupled to the computer-readable medium (118), adapted to send a notification to the addressee via the network (108); a key registration module (124), coupled to the notification module (120), adapted to issue, in response to the addressee acknowledging the notification, new public and private keys to the addressee; and a transmission module (122), coupled to the key registration module (124) and to the computer-readable medium (118), adapted to transmit the package (10) to the addressee via the network (108).

Description

SIMPLIFIED ADDRESSING FOR PRIVATE COMMUNICATIONS
BACKGROUND OF THE INVENTION
TECHNICAL FIELD
The present invention relates generally to cryptographic communications,
and more particularly, to a system and method for simplifying the addressing of
public key-encrypted communications.
DESCRIPTION OF BACKGROUND ART
In symmetric key cryptography, both the sender and receiver of a message use the same secret key. The sender uses the secret key to encrypt the message
and the receiver uses the same secret key to decrypt the message. However, a
difficulty arises when the sender and receiver attempt to agree on the secret key
without anyone else finding out. For example, if the sender and receiver are in
separate physical locations, they must trust a courier, a telephone system, or
some other transmission medium to prevent the disclosure of the secret key.
Anyone who overhears or intercepts the key in transit can later read, modify,
and forge all messages encrypted or authenticated with that key. Thus,
symmetric key encryption systems present a difficult problem of key
management. Public key cryptography was developed as a solution to the key
management problem. In public key cryptography, two keys are used — a public
key and a private key. The public key is published, while the private key is kept
secret. Although the public and private keys are mathematically related, neither
can be feasibly derived from the other.
To send a private message using public key cryptography, a message is
encrypted using the recipient's public key, which is freely available, and
decrypted using recipient's private key, which only the recipient knows. Thus,
the need for the sender and recipient to share secret information is eliminated. A
sender only needs to know the recipient's public key, and no private keys are
ever transmitted or shared.
Public key cryptography has another advantage over symmetric key
cryptography in the ability to create digital signatures. One of the significant problems in cryptography is determining whether an encrypted message was
forged or modified during transmission. As noted above, if a symmetric key is
lost or stolen, any person in possession of the key can create forged messages or
modify legitimate messages.
Using public key cryptography, however, a sender can digitally "sign" a
message using the sender's private key. Thereafter, the recipient uses the
sender's public key to verify that the message was actually sent by the sender
and was not modified during transmission. Thus, a recipient can be confident that a message was actually sent by a particular sender and was not modified during transmission.
Despite its many advantages, public key cryptography presents three
basic difficulties. First, in order to send private messages, the sender must know
beforehand the public key of the recipient. Conventional public key systems
typically rely on a sender's locally-maintained address book of public keys.
Thus, if the recipient's public key is not in the sender's address book, the sender
must somehow contact the recipient by telephone or e-mail, for example, to
request the recipient's public key. Such systems are cumbersome and
inconvenient, and prevent widespread adoption and use of public key cryptography.
More fundamentally, another problem with public key cryptography is
that a recipient must first have a public key in order to receive an encrypted message. Because the technology is relatively new, only a few users have
currently obtained public keys. This fact, alone, represents a significant barrier
to adoption because a sender cannot encrypt a message to the recipient until the
recipient has completed the process of obtaining a public key.
Yet another problem with public key cryptography is the relatively ease
for "spoofing" a public key. In other words, a first user may publish his public
key in the name of a second user and thereby receive private communications
intended for the second user. Various solutions, such as digital certificates and certificate authorities (CA's), have been proposed to address this problem, but are not relevant to present application.
Accordingly, what is needed is a system and method for securely
transmitting an information package using public key cryptography in which the
sender is not required to know the recipient's public key before the package is
sent. Indeed, what is needed is a system and method for securely transmitting
an information package using public key cryptography in which the recipient is not required to have a public key before the package is sent.
DISCLOSURE OF INVENTION
The present invention solves the foregoing problems by providing a system and method for securely transmitting an information package (10) to an addressee via a network (108). In accordance with the present invention, a
directory (112) of public keys is checked to determine whether the addressee of the package (10) has a public key. If the addressee does not have a public key ir
the directory (112), the package (10) is encrypted with an escrow encryption key
Thereafter, the package (10) is stored in escrow for the addressee pending
notification of, and acknowledgment by, the addressee. A notification, such as
an e-mail message, is sent to the addressee of the package (10) in escrow. When
the addressee acknowledges the notification, the addressee is issued new public
and private keys. Thereafter, the addressee's new public key is added to the directory (112) such that future packages (10) to the addressee may be encrypted using the addressee's public key. Finally, the package (10) is transmitted to the addressee.
Additionally, in accordance with the present invention, a system (100) for
securely transmitting an information package (10) to an addressee via a network
(108) includes a directory interface (110) adapted to check a directory (112) to
determine whether the addressee has a public key; an escrow key manager (116),
coupled to the directory interface (110), adapted to provide an escrow encryption
key for encrypting the package (10); an encryption module (114), coupled to the escrow key manager (116), adapted to encrypt the package (10) with the escrow encryption key; a computer-readable medium (118), coupled to the encryption module (114), adapted to store the package (10) in escrow for the addressee; a notification module (120), coupled to the computer-readable medium (118), adapted to send a notification to the addressee via the network (108); a key registration module (124), coupled to the notification module (120), adapted to issue, in response to the addressee acknowledging the notification, new public
and private keys to the addressee; and a transmission module (122), coupled to
the key registration module (124) and the computer-readable medium (118),
adapted to transmit the package (10) to the addressee via the network (108).
Using the present invention, a sender is not required to know the
addressee's public key before a package (10) is sent. Indeed, the addressee is not required to have a public key before the package (10) is sent. If the addressee does not currently have a public key, the addressee will be issued new public
and private keys, and the public key will be stored for future reference such that
subsequent private communications may be encrypted using the addressee's
public key. Thus, the present invention removes significant barriers to adoption
of public key cryptography, while increasing the security of private
communications.
BRIEF DESCRIPTION OF THE DRAWINGS These and other more detailed and specific objects and features of the present invention are more fully disclosed in the following specification, reference being had to the accompanying drawings, in which
Figure 1 is a functional block diagram of a secure communications system for transmitting information packages according to an embodiment of the present invention;
Figure 2 is a physical block diagram showing additional implementation
details of a sending system according to an embodiment of the present invention;
Figure 3 is a flow diagram of a secure communication system according to
an embodiment of the present invention;
Figure 4 is a flow diagram of a first embodiment of a transmission module and a decryption module according to an embodiment of the present invention; and
Figure 5 is a flow diagram of a second embodiment of a transmission
module and a decryption module according to an embodiment of the present
invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
A preferred embodiment of the invention is now described with reference to the Figures, where like reference numbers indicate identical or functionally
similar elements. Also in the Figures, the left most digit of each reference number corresponds to the Figure in which the reference number is first used.
Referring now to Figure 1, there is shown a functional block diagram of a secure
communications system 100 for transmitting information packages 10 according
to an embodiment of the present invention.
The principal components of the system 100 include a sending system 102,
a server system 104, and a receiving system 106. The sending system 102 is
coupled to the server system 104, and the server system 104 is coupled to the
receiving system 106, via an "open" computer network 108, such as the Internet.
Preferably, all transmissions over the network 108 are by a secure protocol, such as the Secure Multipurpose Internet Mail Extension (S/MIME) and/or the Secure Sockets Layer (SSL).
The sending system 102 is used by a sender to securely transmit a , n information package 10 to at least one intended "recipient", who is
interchangeably referred to herein as an "addressee". In one embodiment, the
sending system 102 includes a directory interface 110 for communicating via the
network 108 with an external public key directory 112. The directory 112 is a
database of the public keys of registered addressees and may be selectively
queried to determine the public key of each addressee of the information
package 10. Preferably, the directory 112 may be queried using the addressee's e-mail address.
In one embodiment, the public key directory 112 is implemented using an existing online directory infrastructure provided, for example, by VeriSign, Inc. of Mountain View, California. In alternative embodiments, however, the directory is implemented using a conventional database system, such as one
available from SyBase, Inc., of Emeryville, California, although other databases
could be used without departing from the spirit of the invention. Preferably, the
directory 112 is accessed by the directory interface 110 using the Lightweight Directory Access Protocol (LDAP).
The sending system 102 also includes an encryption module 114 for
encrypting information packages 10. The encryption module 114 is coupled to receive an escrow encryption key from an escrow key manager 116, as described
in greater detail below. Preferably, the encryption module 114 uses a public key
cryptosystem, available, for example, from RSA Data Security, Inc., of San Mateo,
California. In alternative embodiments, however, a symmetric key algorithm,
such as the Data Encryption Standard (DES), is used. Preferably, each encrypted
package 10 conforms to the S/MIME standard, which is well known to those
skilled in the art. In addition, key lengths of at least 128 bits (in the case of
symmetric key cryptography) are preferably used to provide a high level of data security.
The escrow key manager 116 generates keys and/or provides stored keys
for use in encrypting and decrypting information packages 10 to be stored in
escrow. In one embodiment, the escrow key manager 116 is a process running
on an separate escrow key management server (not shown), and the encryption module 114 communicates with the escrow key manager 116 via the network
108. Alternatively, the escrow key manager 112 is a functional unit contained
within one or more of the sending system 102, the server system 104, or the
receiving system 106.
The encryption module 114 is coupled via the network 108 to an escrow
storage area 118 within the server system 104. In one embodiment, the escrow
storage area 118 is a database for storing encrypted information packages and is
managed, for example, by a SyBase database system. Once encrypted, an information package 10 is sent using a conventional protocol, such as the
Hypertext Transfer Protocol (HTTP), to be stored within the escrow storage area
118 pending notification and authentication of the addressee. In alternative
embodiments, however, the escrow storage area 118 is contained within the
sending system 102, and packages 10 are stored locally until an addressee is
notified and properly authenticated.
The server system 104 additionally includes a notification module 120 for
sending a notification of the package 10 to an addressee at the receiving system
106. In one embodiment, the notification is an e-mail message, and the
notification module 120 is an e-mail server, such as the Microsoft Exchange®
Server 5.5, available from Microsoft Corporation of Redmond, Washington, although those skilled in the art will recognize that other notification systems
and methods could be used within the scope of the present invention.
The server system 104 also includes a transmission module 122, the
purpose of which is to transmit the package 10 from the escrow storage area 118
to a decryption module 126 in the receiving system 106. In one embodiment, the
transmission module 122 is a standard Web server, such as the Windows NT®
Server 4.0, available from Microsoft Corporation. Additionally, the decryption
module 126 may be implemented using a standard Web browser, such as the
Microsoft Internet Explorer®, with decryption logic being contained within a
plug-in or Java applet. Those skilled in the art, however, will recognize that various other transmission systems and methods could be used without
departing from the spirit of the invention. Preferably, communication between
the transmission and decryption modules 122, 126 is by HTTP using SSL.
Additionally, in one embodiment, the transmission module 122 is coupled to
receive an addressee's public key from the directory 112 in order to authenticate the addressee, as described in greater detail below.
The notification module 120 is coupled via the network 108 to a key
registration module 124 in the receiving system 106. The key registration
module 124 is configured to issue new public and private keys to an addressee who does not currently have such keys, and is additionally configured to
automatically add the addressee's new public key to the public key directory 112.
In one embodiment, the key registration module 124 is resident in the
receiving system 106 before an information package 10 is sent by the sender. In
an alternative embodiment, however, the notification module 120 is configured to send the key registration module 124 to the receiving system 106 as an
attachment to an e-mail notification. In yet another embodiment, the e-mail
notification includes a hyperlink, such as a Uniform Resource Locator (URL),
which allows an addressee at a receiving system 106 to download the key
registration module 124 using a conventional Web browser, such as the Netscape
Communicator®, available from Netscape Communications Corporation of Mountain View, California. As noted above, the receiving system 106 also includes a decryption module 126 for decrypting information packages 10. Like the encryption module 114, the decryption module 126 preferably uses a public key
cryptosystem, available, for example, from RSA Data Security, Inc. However, in
alternative embodiments, a symmetric key algorithm, such as the Data Encryption Standard (DES), may be used.
In one embodiment, the decryption module 126 is coupled to receive an
escrow decryption key from the escrow key manager 116. Alternatively, the . decryption module 126 is coupled to receive the addressee's private key from the key registration module 124. Using either the escrow decryption key or the
private key, the decryption module 126 decrypts the information package 10 and provides the decrypted package 10 to the addressee.
Preferably, the systems 102, 104, and 106 described above, as well as the public key directory 112 and escrow key manager 116, are each implemented using convenrional personal computers or workstations, such as IBM® PC-
compatible personal computers or workstations available from Sun
Microsystems of Mountain View, California. For example, Figure 2 is a physical
block diagram showing additional implementation details of the sending system
102, and is similar in all relevant respects to other systems described above.
As illustrated in Figure 2, a central processing unit (CPU) 202 executes
software instructions and interacts with other system components to perform the methods of the present invention. A storage device 204, coupled to the CPU 202, provides long-term storage of data and software programs, and may be
implemented as a hard disk drive or other suitable mass storage device. A
network interface 206, coupled to the CPU 202, connects the sending system 102
to the network 108. A display device 208, coupled to the CPU 202, displays text
and graphics under the control of the CPU 202. An input device 210, coupled to
the CPU 202, such as a mouse or keyboard, facilities user control of the sending system 102.
An addressable memory 212, coupled to the CPU 202, stores software
instructions to be executed by the CPU 202, and is implemented using a combination
of standard memory devices, such as random access memory (RAM) and read-only memory (ROM) devices. In one embodiment, the memory 212 stores a number of
software objects or modules, including the directory interface 110 and encryption
module 114 described above. Throughout this discussion, the foregoing modules are
described as separate functional units, but those skilled in the art will recognize that
the various modules may be combined and integrated into a single software
application or device.
Referring now to Figure 3, there is shown a flow diagram of the system
100 according to an embodiment of the present invention. Referring also to
Figure 1, the sending system 102 initially receives 302 from the sender the
addressee's e-mail address. Although the addressee's e-mail address is used in one embodiment, those skilled in the art will recognize that the sender may
specify an addressee by name, which is associated, in the sending system 102,
with an e-mail address or other unique identifier of the addressee. Although the
addressee is referred to hereafter in the singular, those skilled in the art will
recognize that a package 10 may have a plurality of addressees.
After the e-mail address is received, the sending system 102 searches 304
the public key directory 112 using the addressee's e-mail address to locate the
public key of the addressee. As noted earlier, this is accomplished by means of a
directory interface 110 in the sending system 102, which accesses the directory
112 using a standard protocol such as LDAP.
A determination 306 is then made whether the addressee's key was found in the directory 112. If the key was found, the package 10 is encrypted 308 by the
encryption module 114 using the addressee's public key and is sent to the server system 104, where it is stored 310 as a "regular" package. The term "regular" is
used to distinguish the package 10 from one being stored in "escrow" for an
addressee who does not yet have a public key. In one embodiment, a separate
storage area (not shown) in the server system 104 is provided for regular
packages.
Next, the server system 104 notifies 312 the addressee about the package
10 being stored for the addressee. As noted earlier, this is done, in one
embodiment, by the notification module 120, which uses an e-mail notification system. However, those skilled in the art will recognize that other notification systems and methods could be used without departing from the spirit of the
invention. For example, the receiving system 106 may include a notification
client (not shown) which receives user datagram protocol (UDP) notifications
from the notification module 120. Upon receipt of a UDP notification, the
notification client generates a visual or audible desktop notification to the
addressee, such as a blinking icon, a chime, a pop-up dialog box, or the like.
Other forms of notification could include a voice notification via a voice
synthesis module, a pager notification via a conventional pager, or a facsimile notification via a standard facsimile.
After the addressee receives 314 and acknowledges the notification, such as by a return e-mail message, the person claiming to be the addressee is
authenticated 316 to determine whether that person is, in fact, the addressee. Those skilled in the art will recognize that there are many ways to authenticate an addressee. For example, passwords or the like could be used.
Public key cryptography, however, provides a convenient and highly
secure way for authenticating an addressee. In one embodiment, the addressee
encrypts a standard message using the addressee's private key and sends the
encrypted message to the transmission module 122 in the server system 104.
The transmission module 122 obtains the addressee's public key from the public
key directory 112, and attempts to decrypt the message using the addressee's public key. If the message is successfully decrypted, the addressee is known to hold the private key corresponding to the public key in the directory 112 and is
therefore authentic. Those skilled in the art will recognize that the above
authentication steps may be performed automatically by a Web server and Web
browser (or by custom software programs), with little active intervention required by the addressee.
After the addressee is properly authenticated, the transmission module
122 sends 318 the package 10 via the network 108 to the receiving system 106,
and the receiving system 106 receives 320 the package from the server 104.
Those skilled in the art will recognize that either "push" or "pull" mechanisms
could be used within the scope of the present invention. Preferably, HTTP and SSL are used, although other standard protocols could also be used without
departing from the spirit of the invention. When the package 10 is received, the
decryption module 126 decrypts 322 the package 10 using the addressee's private key, and provides the decrypted package 10 to the addressee.
The foregoing discussion was in the context of the addressee's public key
being found in the directory 112. However, a more difficult situation arises
when the addressee's public key is not in the directory 112. Indeed, when the
addressee does not yet have a public key, conventional public key systems are
wholly unable to send encrypted messages to the addressee. This represents a
serious shortcoming of prior systems. The present invention solves this problem by holding the addressee's package 10 in escrow, as described in greater detail below.
Returning to step 306, if the addressee's public key was not found in the
directory 112, the escrow key manager 116 issues 324, for the package 10, an
escrow encryption key and an escrow decryption key. The escrow encryption
key is used for encrypting the package 10 prior to being stored in escrow, and the
escrow decryption key is used for decrypting the package 10.
The escrow encryption/ decryption keys should not be confused with the
new public and private keys issued to the addressee, as described in step 336. If
the escrow encryption/ decryption keys were to be issued to the addressee, they
would need to be transmitted to the addressee via the network 108, resulting in
the same drawbacks as symmetric key cryptography. In public key
cryptosystems, the addressee's private key should never be sent to the addressee. Thus, in accordance with the present invention, the addressee's private key is generated locally at the receiving computer 106, and only the addressee's public
key is sent via the network 108 to the directory 112.
In one embodiment, the escrow encryption/ decryption keys are
asymmetric keys generated according to the RSA algorithm for key generation.
Alternatively, the keys are symmetric keys. In yet another embodiment, the
keys are stored, not generated, by the escrow key manager 116, and are either
hard-coded into the escrow key manager 116 or are added and periodically updated by an external agent or process. In still another embodiment, the public
escrow key is published in the directory 112, and the server system 104 keeps the
private escrow key in a hardware device that protects it from tampering,
providing the highest level of security against tampering with the escrow keys.
After the keys are issued, the encryption module 114 within the sending
system 102 retrieves 326 the escrow encryption key, encrypts the package 10
using the escrow encryption key, and sends the encrypted package 10 to the
server system 104. The package 10 is then stored 328 in the escrow storage area
118. As described hereafter, the server system 104 holds the package in escrow
for the addressee until the addressee has properly registered and received new
public and private keys.
As in the case of a regular package, the addressee is then notified 330 of the package 10 being stored in escrow and the need to register for public and
private keys. In one embodiment, the notification is an e-mail message.
Preferably, the notification message includes a copy of the key registration
module 124 as an e-mail attachment. Preferably, the notification message
including the key registration module 124 is digitally signed in order to verify
the source of the message. In alternative embodiments, however, the notification
includes a hyperlink, such as a URL, to permit the addressee to download the
key registration module 124 from the server system 104 or another location. After the addressee has received 332 and acknowledged the notification and has either extracted or downloaded the key registration module 124, the
addressee uses the key registration module 124 to register 334 for new public and
private keys. As noted above, these keys are not the same as those issued by the
escrow key manager 116. Preferably, the new public and private keys are
generated according to the RSA algoritlim for key generation, and are issued
locally at the receiving system 106.
In one embodiment, the registration process is similar to the procedure
used by VeriSign, Inc. and other certificate authorities to issue certificates, and
involves prompting the addressee for various personal data, including, for
example, the addressee's name, address, telephone number, e-mail address, and the like. Those skilled in the art will recognize that various procedural
safeguards may be used to increase the reliability of the data obtained from the addressee.
After the addressee has registered, the addressee's new public key is
.automatically transmitted via the network 108 and stored 335 in the public key
directory 112. This is advantageous because a subsequent package 10 being sent
to the same addressee will be encrypted using the addressee's public key,
providing a higher degree of security since no escrow keys are involved.
Next, the addressee is authenticated 336 to determine whether the person
claiming to be the addressee is, in fact, the addressee. As described previously with respect to step 316, authentication may involve encrypting a standard
message at the receiving computer 106 using the addressee's private key, and
decrypting the message at the server computer 102 using the addressee's public
key as obtained from the directory 112.
After the addressee is authenticated, the transmission module 122 in the
server system 104 sends 338 the package 10 of the authenticated addressee to the
decryption module 126 in the receiving system 106. The decryption module 126
then decrypts 340 the package 10 and provides the decrypted package 10 to the
addressee. As described below, this process may be done in a number of ways.
Referring now to Figure 4, there is shown a first embodiment of the
interaction between the transmission and decryption modules 122, 126.
Initially, the transmission module 122 retrieves 342 the package 10 being stored
in escrow for the authenticated addressee and sends the package 10 via the
network 108 to the decryption module 122, which receives 344 the package 10. Thereafter, the decryption module 126 retrieves 346 the escrow decryption key
for the package 10 from the escrow key manager 116. Using the escrow
decryption key, the decryption module 126 then decrypts 348 the package 10.
Referring now to Figure 5, there is shown a second and more secure
embodiment of the interaction between the transmission and decryption
modules 122, 126. Initially, the transmission module 122 retrieves 350 the
package 10 being stored in escrow for the authenticated user. Thereafter, the transmission module 120 retrieves 352 the escrow decryption key from the
escrow key manager 116, and decrypts the package 10 using the escroλv
decryption key. Next, the transmission module 120 re-encrypts 354 the package
10 using the addressee's new public key, which may be obtained from the
directory 112 or the key registration module 124. After the package 10 is re-
encrypted, it is sent via the network 108 to the decryption module 126, which
receives 356 the package 10 and decrypts 358 the package 10 using the
addressee's private key.
The above description is included to illustrate the operation of the preferred
embodinients and is not meant to limit the scope of the invention. The scope of the
invention is to be limited only by the following claims. From the above discussion, many variations will be apparent to one skilled in the art that would yet be
encompassed by the spirit and scope of the present invention.
What is claimed is:

Claims

Claims
1. A computer-implemented method for securely transmitting an
information package to an addressee via a network, the method comprising the steps of:
determining whether the addressee has a public key;
in response to the addressee not having a public key:
encrypting the package with an escrow encryption key;
storing the package in escrow for the addressee;
notifying the addressee of the package in escrow; and
in response to receiving an acknowledgment from the addressee:
issuing new public and private keys to the addressee; and
transmitting the package to the addressee via the network.
2. The method of claim 1, wherein the step of determining whether
'the addressee has a public key comprises the sub-step of:
checking a public key directory for a public key of the addressee.
3. The method of claim 1, further comprising the step of:
storing the addressee's new public key in a public key directory.
4. The method of claim 1, wherein the encrypting step comprises the
sub-steps of:
providing an escrow encryption key and an escrow decryption key,
wherein the escrow encryption and decryption keys comprise one
of symmetric keys and asymmetric keys; and
encrypting the package with the escrow encryption key.
5. The method of claim 1, wherein the notifying step comprises the
sub-step of:
sending a notification to the addressee via the network.
6. The method of claim 5, wherein the notification comprises one of
an e-mail notification, a desktop notification, a voice notification, a pager
notification, and a facsimile notification.
7. The method of claim 1, further comprising the step of:
decrypting the package with an escrow decryption key corresponding to
the escrow encryption key.
8. The method of claim 1, wherein the escrow encryption key is
different from the new public and private keys issued to the addressee.
9. The method of claim 1, wherein the acknowledgment from the
addressee includes an indication of the addressee's name and e-mail address.
10. The method of claim 1, further comprising the step of:
in response to an addressee having a public key:
encrypting the package with the addressee's public key;
storing the package;
notifying the addressee of the package;
authenticating a user as the addressee; and
transmitting the package to the authenticated addressee.
11. The method of claim 1, wherein the step of transmitting the package comprises the sub-steps of:
authenticating a user as the addressee; and transmitting the package to the authenticated user via the network.
12. A computer-implemented method for securely transmitting an
information package to an addressee via a network, the method comprising the steps of:
determining whether the addressee has a public key;
in response to the addressee not having a public key:
encrypting the package with an escrow encryption key; storing the package in escrow for the addressee;
notifying the addressee of the package in escrow; and
in response to receiving an acknowledgment from the addressee:
issuing new public and private keys to the addressee;
decrypting the package with an escrow decryption key;
re-encrypting the package using the addressee's new public
key; and
transmitting the package to the addressee via the network.
13. The method of claim 12, wherein the step of determining whether
the addressee has a public key comprises:
checking a public key directory for a public key of the addressee.
14. The method of claim 12, further comprising:
storing the addressee's new public key in a public key directory.
15. The method of claim 12, wherein the step of transmitting the
package comprises the sub-steps of:
authenticating a user as the addressee; and
transmitting the package to the authenticated user via the network.
16. The method of claim 12, further comprising the step of:
decrypting the package using the addressee's new private key.
1 . A system for securely transmitting an information package to an
addressee via a network, the system comprising:
a directory interface adapted to check a directory to determine whether
the addressee has a public key;
an escrow key manager, coupled to the directory interface, adapted to
provide an escrow encryption key for encrypting the package;
an encryption module, coupled to the escrow key manager, adapted to
encrypt the package with the escrow encryption key;
a computer-readable medium, coupled to the encryption module, adapted
to store the package in escrow for the addressee;
a notification module, coupled to the computer-readable medium,
adapted to send a notification to the addressee via the network;
a key registration module, coupled to the notification module, adapted to
issue, in response to the addressee acknowledging the notification,
new public and private keys to the addressee; and
a transmission module, coupled to the key registration module and to the
computer-readable medium, adapted to transmit the package to the
addressee via the network.
18. The system of claim 17, further comprising: a directory, coupled to the directory interface, adapted to store a public
key of at least one addressee.
19. The method of claim 18, wherein the key registration module is
further adapted to store the addressee's new public key in the directory.
20. The system of claim 17, wherein the notification module is adapted
to send one of an e-mail notification, a desktop notification, a voice notification, a
pager notification, and a facsimile notification.
21. The system of claim 17, wherein the escrow key manager is
adapted to provide an escrow decryption key, the system further comprising:
a decryption module, coupled to the transmission module, adapted to decrypt the package using the escrow decryption key.
22. The method of claim 21, wherein the escrow encryption key and the escrow decryption key comprise one of symmetric keys and asymmetric keys.
23. The system of claim 17, wherein the directory interface and the
encryption module are each adapted to operate within a sending system;
wherein the computer-readable medium, the notification module, and the
transmission module are each adapted to operate within a server system; and wherein the key registration module and the decryption module are each
adapted to operate within a receiving system.
24. The system of claim 23, wherein the key registration module is
received by the receiving system as an attachment to a notification.
25. The system of claim 23, wherein the key registration module is
received by the receiving system by following a hyperlink in a notification.
26. The system of claim 23, wherein the transmission module within
the server system is adapted to transmit the package in escrow to the decryption
module witlvin the receiving system; and wherein the decryption module within
the receiving system is adapted to receive the package from the transmission module, receive an escrow decryption key from the escrow key manager, and
decrypt the package with the escrow decryption key.
27. The system of claim 23, wherein the transmission module within
the server system is adapted to receive an escrow decryption key from the
escrow key manger, decrypt the package in escrow using the escrow decryption
key, receive the addressee's public key from a directory, re-encrypt the package
using the addressee's public key, and transmit the package to the decryption
module witliin the receiving system; and wherein the decryption module within
the receiving system is adapted to receive the package from the transmission module, retrieve the addressee's private key from the key registration module, and decrypt the package using the addressee's private key.
28. In a computer-readable medium, a computer program product for
securely transmitting an information package to an addressee via a network, the
computer-readable medium comprising program code adapted to perform the steps of:
determining whether the addressee has a public key;
in response to the addressee not having a public key:
encrypting the package with an escrow encryption key;
storing the package in escrow for the addressee;
notifying the addressee of the package in escrow; and
in response to receiving an acknowledgment from the addressee:
issuing new public and private keys to the addressee; and
transmitting the package to the addressee via the network.
PCT/SG2000/000001 1999-01-12 2000-01-11 Simplified addressing for private communications WO2000044128A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
AU38536/00A AU3853600A (en) 1999-01-12 2000-01-11 Simplified addressing for private communications
JP2000595457A JP2002535922A (en) 1999-01-12 2000-01-11 Simplified procedure for private communication
EP00917584A EP1149483A1 (en) 1999-01-12 2000-01-11 Simplified addressing for private communications
CA002360095A CA2360095A1 (en) 1999-01-12 2000-01-11 Simplified addressing for private communications

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US11562699P 1999-01-12 1999-01-12
US60/115,626 1999-01-12
US09/332,358 US7171000B1 (en) 1999-06-10 1999-06-10 Simplified addressing for private communications
US09/332,358 1999-06-10

Publications (1)

Publication Number Publication Date
WO2000044128A1 true WO2000044128A1 (en) 2000-07-27

Family

ID=26813404

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2000/000001 WO2000044128A1 (en) 1999-01-12 2000-01-11 Simplified addressing for private communications

Country Status (5)

Country Link
EP (1) EP1149483A1 (en)
JP (1) JP2002535922A (en)
AU (1) AU3853600A (en)
CA (1) CA2360095A1 (en)
WO (1) WO2000044128A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6725264B1 (en) * 2000-02-17 2004-04-20 Cisco Technology, Inc. Apparatus and method for redirection of network management messages in a cluster of network devices

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4717509B2 (en) * 2005-05-17 2011-07-06 キヤノン株式会社 Document management apparatus and control method therefor, computer program, and storage medium
US11750572B2 (en) 2020-08-12 2023-09-05 Capital One Services, Llc System, method, and computer-accessible medium for hiding messages sent to third parties
US11664988B2 (en) * 2020-11-30 2023-05-30 EMC IP Holding Company LLC Method and system for encrypting and decrypting secrets using escrow agents

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5751813A (en) * 1996-04-29 1998-05-12 Motorola, Inc. Use of an encryption server for encrypting messages
EP0869652A2 (en) * 1997-04-01 1998-10-07 Tumbleweed Software Corporation Document delivery system
WO1999000958A1 (en) * 1997-06-26 1999-01-07 British Telecommunications Plc Data communications

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5751813A (en) * 1996-04-29 1998-05-12 Motorola, Inc. Use of an encryption server for encrypting messages
EP0869652A2 (en) * 1997-04-01 1998-10-07 Tumbleweed Software Corporation Document delivery system
WO1999000958A1 (en) * 1997-06-26 1999-01-07 British Telecommunications Plc Data communications

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6725264B1 (en) * 2000-02-17 2004-04-20 Cisco Technology, Inc. Apparatus and method for redirection of network management messages in a cluster of network devices
USRE41750E1 (en) * 2000-02-17 2010-09-21 Cisco Technology, Inc. Apparatus and method for redirection of network management messages in a cluster of network devices

Also Published As

Publication number Publication date
JP2002535922A (en) 2002-10-22
AU3853600A (en) 2000-08-07
CA2360095A1 (en) 2000-07-27
EP1149483A1 (en) 2001-10-31

Similar Documents

Publication Publication Date Title
US20020101998A1 (en) Fast escrow delivery
US6988199B2 (en) Secure and reliable document delivery
US7251728B2 (en) Secure and reliable document delivery using routing lists
US9667418B2 (en) Electronic data communication system with encryption for electronic messages
US6061448A (en) Method and system for dynamic server document encryption
US9673984B2 (en) Session key cache to maintain session keys
US6834112B1 (en) Secure distribution of private keys to multiple clients
US6424718B1 (en) Data communications system using public key cryptography in a web environment
US8649522B2 (en) Electronic data communication system
US8370444B2 (en) Generating PKI email accounts on a web-based email system
US6941454B1 (en) System and method of sending and receiving secure data with a shared key
US7171000B1 (en) Simplified addressing for private communications
US20020023213A1 (en) Encryption system that dynamically locates keys
US20040019780A1 (en) System, method and computer product for delivery and receipt of S/MIME encrypted data
CA2554847C (en) System and method for secure electronic data delivery
EP1197030A1 (en) Method for generating secure symmetric encryption and decryption
JP2004048679A (en) Session key security protocol
US8271788B2 (en) Software registration system
US20060095770A1 (en) Method of establishing a secure e-mail transmission link
US20070022292A1 (en) Receiving encrypted emails via a web-based email system
WO2000044128A1 (en) Simplified addressing for private communications
JP2000099421A (en) Method for confirming reception of electronic information
US20050138367A1 (en) System and method for storing user credentials on a server copyright notice
CA2350321C (en) System, method and computer product for deploying pki (public key infrastructure) in wireless devices connected to the internet
WO2002033891A2 (en) Secure and reliable document delivery using routing lists

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2360095

Country of ref document: CA

Ref country code: CA

Ref document number: 2360095

Kind code of ref document: A

Format of ref document f/p: F

ENP Entry into the national phase

Ref country code: JP

Ref document number: 2000 595457

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 2000917584

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2000917584

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWW Wipo information: withdrawn in national office

Ref document number: 2000917584

Country of ref document: EP