WO2001030016A2 - A method for non-repudiation using a trusted third party - Google Patents
A method for non-repudiation using a trusted third party Download PDFInfo
- Publication number
- WO2001030016A2 WO2001030016A2 PCT/US2000/027069 US0027069W WO0130016A2 WO 2001030016 A2 WO2001030016 A2 WO 2001030016A2 US 0027069 W US0027069 W US 0027069W WO 0130016 A2 WO0130016 A2 WO 0130016A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- party
- sub
- session key
- trusted
- message
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 50
- 230000005540 biological transmission Effects 0.000 claims description 8
- 230000002085 persistent effect Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 10
- 230000007246 mechanism Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 230000007257 malfunction Effects 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000007774 longterm Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 1
- 240000002853 Nelumbo nucifera Species 0.000 description 1
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000013497 data interchange Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
Definitions
- the present invention relates to protocols for ensuring security during electronic
- Entities initially utilized in inter-business trading by entities in certain industries. Entities
- VAN value added network
- VAN service providers typically provide data communication services and assist
- This preparation typically included negotiating technical and administrative protocols and executing legal
- Internet users may utilize
- EDI transaction is secured, security requirements, such as confidentiality, integrity,
- each user typically has a password that is kept secret and when the user needs access to protected information, the user enters the secret password into the system.
- Encryption in essence, scrambles bits of a message in such a way that only the
- the encrypted message will be unable to extract information from encrypted message.
- the encryption algorithms enable a sender to encrypt a
- hash functions may be used to generate a
- a digital signature mechanism that includes a pair of keys, may be used to
- recipient uses the other key in the pair of keys, for example the sender's public key, to
- message may also contain a date/time stamp, i.e., the date and time that the message was
- a transacting party may subsequently deny
- the non-repudiation requirement is a communication attribute that prohibits one
- one transacting party may not trust the other party or both parties
- transacting parties is dynamic because it is generally easy for one party to cheat without
- the sender includes a desired product and the sender's digital signature
- the recipient may use the digital signature as evidence of non-
- the recipient retrieves the desired product from the first message
- the sender may use the reply message as evidence of non-repudiation of
- the sender has no way of determining if
- the first message was successfully delivered to the recipient or destroyed during a system
- Some methods employ a trusted third party in each transaction, i.e., each message in the transaction must pass through the trusted third party.
- the trusted third party i.e., each message in the transaction must pass through the trusted third party.
- the sender includes in the first message a product that is encrypted with a
- session key and transmits the first message to the recipient.
- the recipient requests the
- the sender transmits the
- session key that is encrypted with the recipient's public key to the trusted third party.
- the trusted third party thereafter transmits the session key to the recipient.
- a session key to the recipient.
- recipient may decrypt the session key with the recipient's private key and then decrypt
- the corrupt recipient may later
- a corrupt trusted third party may decrypt the session key with it's
- the sender may encrypt the session key with the recipient's and trusted third party's public keys and thereby require the
- the sender sends to the recipient in the encrypted first message, a product that is
- the first message also includes the sender's digital
- the encrypted first message is used as
- the session key is used as evidence of non-repudiation of receipt. Thereafter, the sender
- the sender stores the third message in a public key repository on the sender's
- the recipient is thereafter required to go to the sender's web site to retrieve the
- the sender maintains the key repository. By monitoring activity on the
- This invention works well in a situation where the sender is trustworthy and
- the recipient does not have to worry about repudiation by the sender.
- unscrupulous sender may publish the key after the required time and manipulate the time
- the present invention relates to a protocol for prohibiting non-repudiation by
- a sender uses a secret
- the first and second sub-session keys must be combined into the
- the sender includes the first sub-session key that is encrypted with
- the recipient uses the first message as
- the recipient transmits, to the sender, a second message requesting the transaction.
- the sender may use the second message as evidence of non-
- the sender includes the second sub-session key which is encrypted with the trusted third party's public key in a third message that is forwarded to
- the trusted third party decrypts the third message to retrieve the
- the trusted third party includes the re-encrypted second sub-
- the sender encrypts a
- the recipient may use the encrypted first message with the first sub-session key.
- the sender may use the request message as evidence of non-
- the sender thereafter encrypts the second sub-session key with the trusted third party's public key and includes the encrypted second sub-session key in the
- the trusted third party decrypts the third message in order to obtain the second sub-
- the trusted third party re-encrypts the second sub-session with the
- recipient's public key includes the re-encrypted second sub-session key in a fourth
- the trusted third party publishes the fourth message in a key repository on
- the recipient is required to go to the trusted third party's web site to retrieve the
- the trusted third party maintains the key repository.
- the trusted third party can prove to the appropriate
- the present invention provides a method for ensuring non-repudiation by transacting parties involved in an executed electronic
- the method comprising the steps of: generating, by a sending party, a session
- session key in order to retrieve encrypted product from the first cryptographic message.
- the invention alternatively provides a system for ensuring non-repudiation by
- transacting parties involved in an executed electronic transaction the transacting parties
- the system comprises: means for generating, by a sending party, a session key and dividing the session key into a
- plurality of sub-session keys comprising a first sub-session key and a second sub-session
- the first cryptographic message including a product that is encrypted with the
- Fig. 1 illustrates a computer network in which the inventive non-repudiation
- Fig. 2 illustrates the TCP/IP Layering Model Protocol used during
- Fig. 3 illustrates a secret sharing technology which enables a sender to divide a
- Fig. 4 illustrates an alternate embodiment for dividing two session keys into two
- Fig. 5 illustrates a preferred embodiment ofthe inventive non-repudiation
- Fig. 6 illustrates the steps implemented according to the preferred embodiment of
- Fig. 7 illustrates a security architecture in which the inventive non-repudiation
- Fig. 1 is an example of a local area network (LAN) 100 that is configured to
- LAN 100 comprises a server 102, four computer
- peripherals such as printers and other devices 112, that may be
- Computer systems 104-110 may serve as clients for
- server 102 and/or as clients and/or servers for each other and/or for other components
- LAN 100 connected to LAN 100.
- Components on LAN 100 are preferably connected together by
- cable media for example copper or fiber-optic cable and the network typology may be a
- wireless media such as optical and radio frequency
- Data may be transferred between components on LAN 100 in packets, i.e., blocks
- Routers 120, 122 create an
- Routers are hardware devices that are connected to the Internet, other LANs or Wide Area Networks (WAN). Routers are hardware devices that are connected to the Internet.
- the processor may include a conventional processor, memory, and separate I/O interface for each
- components on the expanded network may share
- TCP/IP Layering Model comprises an application layer or
- Layer 5 (Layer 5) 202, a transport layer or (Layer 4) 204, an Internet layer or (Layer 3) 206, a
- Layer 2 network interface layer or (Layer 2) 208, and a physical layer or (Layer 1) 210.
- Application layer protocols 202 specify how each software application connected to the
- Transport layer protocols 204 specify how to ensure reliable
- Internet layer protocols 206 specify the format of
- Network interface layer
- protocols 208 specify how to organize data into frames and how a computer transmits
- a browser application such as Microsoft Explorer TM or Netscape Internet
- Browser TM connects users on computer systems 104-110 to the World Wide Web (Web)
- the browser application displays the document for the user.
- the browser application interacts with a Web server application, the
- HTTP HyperText Transport Protocol
- HTTP defines the exact format for request sent from the browser application to the server
- transacting party enters the URL of another transacting party and the browser application
- one transacting party may transmit a transaction to the
- a buyer on the Internet wishing to purchase a software application, may enter
- the browser displays a corresponding
- the seller may transmit the software application through the seller's
- a third party may intercept the
- the transacting parties may later deny that the transaction actually occurred.
- the buyer may subsequently deny receiving the already
- the present invention utilizes a secret sharing technology to prevent non-
- Fig. 3 illustrates a secret sharing technology that enables a sender to divide a
- the sender generates an
- K2 (K + r*ID TTP ) mod 2 64
- ID R is the recipient's
- FIG. 4 illustrates an alternate embodiment for dividing two session keys into two
- the sender As illustrated in Fig. 4, the sender generates two original session keys (K and K') and
- Kl (K + K'*ID R ) mod 2 64
- K2 (K + K'*ID TTP ) mod 2 64
- K and K' can be recreated by the recipient when he/she obtains Kl from
- Fig. 5 illustrates a preferred embodiment of a non-repudiation protocol 500
- the trusted third party addresses only non-repudiation issues, thereby minimizing the cost
- sender 502 includes a
- Message 508 also includes sender's 502 digital signature and first sub-
- session key 302/402 that is encrypted with recipient's 504 public key.
- Recipient 504 may
- recipient 504 must acknowledge receipt of message 508 to sender 502. If
- recipient 504 is no longer interested in encrypted message 508 after receiving it, recipient
- recipient 504 did not receive encrypted message 508 due to a system error and recipient 504 does not request second sub-session key 304/404, sender 502 is then alerted by the
- sender 502 may
- Recipient 504 may use encrypted message 508 as evidence of non-repudiation of
- Recipient 504 may request second sub-session key 304/404 from sender 502 in
- message 510 includes recipient's 504 digital signature and sender 502 may
- sender 502 encrypts second sub-session key 304/404 with a trusted third party's
- trusted third party 506 Upon receipt of message 512, trusted third party 506 decrypts it with trusted third
- third party 506 includes the re-encrypted second sub-session key 304/404 in message 514
- recipient 504 can decrypt message 514 with recipient's private key. Recipient 504 and
- sender 502 need to actively retrieve message 514 from the trusted third party's site by
- Recipient 504 uses a persistent protocol such as HTTP or File Transfer Protocol (FTP).
- HTTP HyperText Transfer Protocol
- FTP File Transfer Protocol
- first and second sub-session keys 302/402 and 304/404 then combines first and second sub-session keys 302/402 and 304/404 to retrieve the
- trusted third party 506 is responsible for taking care of the key
- trusted third party 506 can determine when recipient 504
- trusted third party 506 can prove to the appropriate authority
- sender 502 can
- Trusted third party can then verify whether there is
- trusted third party 506 is
- Fig 6 illustrates the steps implemented in a preferred embodiment ofthe inventive
- Step 610 of protocol 500 sender 502 sends encrypted message 508 with
- recipient 504 may use encrypted message 508 as evidence of non-
- Step 630 recipient 504 requests second sub-session key 304/404
- sender 502 may
- Step 640 upon request, use message 510 as evidence of non-repudiation of receipt.
- sender 502 transmits a third message 512 with the encrypted
- party 506 publishes the fourth message 514 in the public key repository 518 on trusted
- Step 660 recipient is responsible for retrieving fourth
- Fig. 7 illustrates a security architecture 700 in which the inventive protocol may
- security hardware 702 At the base layer of security architecture 700 is a security hardware 702 that
- cryptography system 706 are built on security hardware 702 for providing additional
- Cryptographic algorithms 708 are built on cryptographic systems 704 and 706.
- the inventive non-repudiation protocol 710 and cryptographic protocols 712 are built on
- HTTP 718 For a firewall and proxy server, is built on algorithms and protocol 714a-714d. HTTP 718
- certificate authority 724, and certificate authority 724 are built upon security
- Novell NetwareTM Directory Service The next layer includes public key infrastructure
- PKI PKI 724
- PKI 724 combines digital certificates, public key cryptography, secret key
- the final layer includes non-EDI applications 728 and EDI
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002386502A CA2386502A1 (en) | 1999-10-01 | 2000-10-02 | A method for non-repudiation using a trusted third party |
AU77451/00A AU7745100A (en) | 1999-10-01 | 2000-10-02 | A method for prohibiting transacting parties from subsequently repudiating an executed transaction with trusted third party |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US41100499A | 1999-10-01 | 1999-10-01 | |
US09/411,004 | 1999-10-01 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001030016A2 true WO2001030016A2 (en) | 2001-04-26 |
WO2001030016A3 WO2001030016A3 (en) | 2001-12-13 |
Family
ID=23627160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/027069 WO2001030016A2 (en) | 1999-10-01 | 2000-10-02 | A method for non-repudiation using a trusted third party |
Country Status (4)
Country | Link |
---|---|
AU (1) | AU7745100A (en) |
CA (1) | CA2386502A1 (en) |
TW (1) | TW545021B (en) |
WO (1) | WO2001030016A2 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001069843A2 (en) * | 2000-03-10 | 2001-09-20 | Absolutefuture, Inc. | Method and system for coordinating secure transmission of information |
WO2003107584A1 (en) * | 2002-01-02 | 2003-12-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Non-repudiation of service agreements |
EP1495408A1 (en) * | 2002-04-11 | 2005-01-12 | Andrew Dominic Tune | An information storage system |
WO2007068668A3 (en) * | 2005-12-16 | 2007-10-11 | Ibm | Cooperative non-repudiated message exchange in a network environment |
US8726009B1 (en) * | 2010-01-26 | 2014-05-13 | David P. Cook | Secure messaging using a trusted third party |
KR101393159B1 (en) | 2013-04-10 | 2014-05-30 | 숭실대학교산학협력단 | Method and apparatus for controlling access based on key in social network service |
CN104463451A (en) * | 2014-11-28 | 2015-03-25 | 中国建设银行股份有限公司 | Sales slip managing system and method |
US9654294B2 (en) | 2015-02-26 | 2017-05-16 | Red Hat, Inc. | Non-repudiable atomic commit |
US9886573B2 (en) | 2015-08-06 | 2018-02-06 | Red Hat, Inc. | Non-repudiation of broadcast messaging |
US10228967B2 (en) | 2016-06-01 | 2019-03-12 | Red Hat, Inc. | Non-repudiable transaction protocol |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008259077A (en) * | 2007-04-06 | 2008-10-23 | N-Crypt Lab Inc | Transmission and reception system, transmitting device, receiving device, method performed by them, and program |
-
2000
- 2000-10-02 CA CA002386502A patent/CA2386502A1/en not_active Abandoned
- 2000-10-02 AU AU77451/00A patent/AU7745100A/en not_active Abandoned
- 2000-10-02 WO PCT/US2000/027069 patent/WO2001030016A2/en active Application Filing
- 2000-11-27 TW TW89120395A patent/TW545021B/en active
Non-Patent Citations (2)
Title |
---|
HERDA S: "Non-repudiation: Constituting evidence and proof in digital cooperation" COMPUTER STANDARDS AND INTERFACES,CH,ELSEVIER SEQUOIA. LAUSANNE, vol. 17, no. 1, 1995, pages 69-79, XP004046750 ISSN: 0920-5489 * |
ZHOU J ET AL: "A FAIR NON-REPUDIATION PROTOCOL" PROCEEDINGS OF THE IEEE SYMPOSIUM ON SECURITY AND PRIVACY,US,LOS ALAMITOS, IEEE COMP. SOC. PRESS, vol. SYMP. 17, 6 May 1996 (1996-05-06), pages 55-61, XP000634833 ISBN: 0-7803-3527-9 * |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001069843A3 (en) * | 2000-03-10 | 2003-11-06 | Absolutefuture Inc | Method and system for coordinating secure transmission of information |
WO2001069843A2 (en) * | 2000-03-10 | 2001-09-20 | Absolutefuture, Inc. | Method and system for coordinating secure transmission of information |
WO2003107584A1 (en) * | 2002-01-02 | 2003-12-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Non-repudiation of service agreements |
EP1495408A4 (en) * | 2002-04-11 | 2010-04-07 | Splitlock Holdings Pty Ltd | An information storage system |
EP2560101A3 (en) * | 2002-04-11 | 2013-08-14 | Splitlock Holdings Pty Ltd | Information storage system |
EP1495408A1 (en) * | 2002-04-11 | 2005-01-12 | Andrew Dominic Tune | An information storage system |
US8090953B2 (en) | 2002-04-11 | 2012-01-03 | Splitlock Holdings Pty Ltd. | Information storage system |
GB2403880B (en) * | 2002-06-12 | 2005-11-09 | Ericsson Telefon Ab L M | Non-repudiation of service agreements |
GB2403880A (en) * | 2002-06-12 | 2005-01-12 | Ericsson Telefon Ab L M | Non-repudiation of service agreements |
WO2007068668A3 (en) * | 2005-12-16 | 2007-10-11 | Ibm | Cooperative non-repudiated message exchange in a network environment |
US7568106B2 (en) | 2005-12-16 | 2009-07-28 | International Business Machines Corporation | Cooperative non-repudiated message exchange in a network environment |
US8726009B1 (en) * | 2010-01-26 | 2014-05-13 | David P. Cook | Secure messaging using a trusted third party |
KR101393159B1 (en) | 2013-04-10 | 2014-05-30 | 숭실대학교산학협력단 | Method and apparatus for controlling access based on key in social network service |
CN104463451B (en) * | 2014-11-28 | 2018-05-18 | 中国建设银行股份有限公司 | A kind of sales slip management system and correlation technique |
CN104463451A (en) * | 2014-11-28 | 2015-03-25 | 中国建设银行股份有限公司 | Sales slip managing system and method |
US9654294B2 (en) | 2015-02-26 | 2017-05-16 | Red Hat, Inc. | Non-repudiable atomic commit |
US9886573B2 (en) | 2015-08-06 | 2018-02-06 | Red Hat, Inc. | Non-repudiation of broadcast messaging |
US10181025B2 (en) | 2015-08-06 | 2019-01-15 | Red Hat, Inc. | Non-repudiation of broadcast messaging |
US10783236B2 (en) | 2015-08-06 | 2020-09-22 | Red Hat, Inc. | Non-repudiation of broadcast messaging |
US10228967B2 (en) | 2016-06-01 | 2019-03-12 | Red Hat, Inc. | Non-repudiable transaction protocol |
US11150938B2 (en) | 2016-06-01 | 2021-10-19 | Red Hat, Inc. | Non-repudiable transaction protocol |
Also Published As
Publication number | Publication date |
---|---|
CA2386502A1 (en) | 2001-04-26 |
AU7745100A (en) | 2001-04-30 |
TW545021B (en) | 2003-08-01 |
WO2001030016A3 (en) | 2001-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11477037B2 (en) | Providing forward secrecy in a terminating SSL/TLS connection proxy using ephemeral Diffie-Hellman key exchange | |
US6988199B2 (en) | Secure and reliable document delivery | |
US8370444B2 (en) | Generating PKI email accounts on a web-based email system | |
US7305548B2 (en) | Using atomic messaging to increase the security of transferring data across a network | |
US6061448A (en) | Method and system for dynamic server document encryption | |
US8145898B2 (en) | Encryption/decryption pay per use web service | |
US8145707B2 (en) | Sending digitally signed emails via a web-based email system | |
JP2005517348A (en) | A secure electronic messaging system that requires a key search to derive a decryption key | |
US20100195824A1 (en) | Method and Apparatus for Dynamic Generation of Symmetric Encryption Keys and Exchange of Dynamic Symmetric Key Infrastructure | |
US20050182937A1 (en) | Method and system for sending secure messages over an unsecured network | |
WO2001020836A2 (en) | Ephemeral decryptability | |
US8352742B2 (en) | Receiving encrypted emails via a web-based email system | |
US20070288746A1 (en) | Method of providing key containers | |
EP1423958A2 (en) | Method and device for transmitting an electronic message | |
EP1493243B1 (en) | Secure file transfer | |
US20060095770A1 (en) | Method of establishing a secure e-mail transmission link | |
Gritzalis et al. | A digital seal solution for deploying trust on commercial transactions | |
US7171000B1 (en) | Simplified addressing for private communications | |
WO2001030016A2 (en) | A method for non-repudiation using a trusted third party | |
WO2001025883A2 (en) | A method for preventing repudiation of an executed transaction without a trusted third party | |
WO2002021793A2 (en) | System and method for encrypted message interchange | |
WO2003081840A1 (en) | Method and system relating to a non-repudiation message exchange | |
Spinellis et al. | Deploying a Secure Cyberbazaar by adding Trust on Commercial Transactions | |
is HTTP | VI How secure is the Encryption | |
Oberholster | An audit model for the analysis and evaluation of encryption with reference to RSA |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2386502 Country of ref document: CA |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase in: |
Ref country code: JP |