EP0958673A4 - - Google Patents
Info
- Publication number
- EP0958673A4 EP0958673A4 EP97944079A EP97944079A EP0958673A4 EP 0958673 A4 EP0958673 A4 EP 0958673A4 EP 97944079 A EP97944079 A EP 97944079A EP 97944079 A EP97944079 A EP 97944079A EP 0958673 A4 EP0958673 A4 EP 0958673A4
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- message
- key
- center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/23—Reliability checks, e.g. acknowledgments or fault reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Definitions
- This invention concerns methods for transferring electronic mail.
- the invention relates in particular to such methods which include means for transferring registered and secure messages.
- a major drawback of prior art E-mail is that it operates "open loop" , that is the sender has no means for checking whether the recipient actually received the message.
- proof of delivery Even more important is proof of delivery for legal or formal mail. In these and a multitude of similar applications, proof of delivery may be mandatory.
- PO Post Office
- the PO accepts the message from sender and delivers it to recipient only after receiving the signed approval from recipient.
- One problem with this approach is the huge amount of traffic in the PO, corresponding to the vast number of E-mail users. It is difficult to implement and maintain a PO capable of handling all this traffic.
- Still another problem is the reliability of the PO itself. As a large number of messages pass through the PO, the PO becomes the weak link in all the E-mail communications. Unlike regular mail, E-mail may be opened or copied without leaving traces. It is difficult to ensure that the PO itself was not compromised.
- the parties exchange message and receipt which are encrypted with the public signature of a third party, the PO. Then the parties exchange the same, but en clair. If one party fails to perform, then the other may go to the PO which then acts to complete the transaction.
- the PO purportedly receives the required information to extract both message and receipt, and may complete the transaction by sending the missing document (message and/or receipt) to the other party. It is claimed that the PO can ensure that cheating is always detected.
- a great disadvantage in Micali is that the recipient knows the identity of the sender, since the sender "Alice” indicates her identity and requires that "Bob” send the answer directly to her. This is a definite departure from the "registered mail” model, where the recipient first has to sign a receipt, and only then gains knowledge of the sender's identity.
- One reason for that accepted procedure is that the knowledge of the sender's identity is in itself valuable information. By presenting it to recipient, the recipient gains an advantage without giving anything in return.
- Another reason for the present method of registered mail is to prevent recipient to selectively accept/reject messages, according to the sender's identity.
- a sender may be interested to deliver a message to a reluctant recipient, for example a warning from the IRS or a warrant from a court of law. If the recipient is given the information who is the sender, then they may refuse to accept the message, so that a large part of the reg ; stered mail will never be delivered.
- Micali Another disadvantage in Micali is that the recipient signs a message that he/she cannot read. This may leave open the possibility for attack, like by impersonation.
- Micali Still another disadvantage in Micali is that multiple copies of a message are sent back and forth, each with a different encryption. The same message is sent three times back and forth between the users.
- the system should allow the recipient to prove or sign that approval for the sender, and only then the message should be delivered to recipient.
- Another problem is to ensure that the actual intended message reached the recipient. This problem is yet to be solved with registered mail, since at present there is only proof that an envelope was delivered to the recipient. There is no proof regarding the contents of that envelope. The same need exists with respect to E-mail, that is to ensure or to prove that the intended actual message was delivered to its recipient.
- Still another problem with E-mail is to achieve secure communications.
- various encryption devices and methods are used to encipher messages. All these devices assume that the parties involved had exchanged encryption keys prior to the encrypted communication session, such that both parties use the same key or complementary keys, as the need be.
- E-mail has different characteristics: While the previous invention detailed a real-time exchange between two parties, this is impossible with E-mail, where each party has the equivalent of a mailbox, that is an address in a computer system into which other parties can write messages. The recipient is not responding in real time or may, sometimes, decide not to respond at all. He/she may read the message from their mailbox at a later time, or may decide not to read it at all (for example when they are overflowed with messages, or when they decide to ignore old mail).
- This object is achieved by an electronic mail method as disclosed in claim 1
- the object is basically accomplished by providing an electronic mail method which includes means for achieving closed loop" communications, that .s communications in which the sender receives proof that the E-mail message was indeed delivered to recipient
- the electronic mail system and method includes means for providing proof regarding the contents of the message received by l ecipient That is, sender get proof from recipient that the complete and unaltered message was received by recipient; the recipient can read the message only after giving this proof.
- the electronic mail system and method includes means for achieving secure communications, that is the message being encrypted for preventing anyone en route from reading the message.
- the electronic mail system and method includes a hierarchical key dissemination center array means using certificates to provide the encryption keys to parties desiring to perform secure E-mail communications therebetween.
- the hierarchical key dissemination center array means may be used within the Internet environment.
- the hierarchical array includes a plurality of key dissemination centers and post offices (PO) A user may select any post office for a specific transaction, thus eliminating a possible overload on any specific PO.
- PO post offices
- the electronic mail system and method includes means for performing the whole key exchange and communication session automatically, with minimal user intervention, both at the sender and the recipient ends.
- the secure registered transmission may be performed between users which had no a priori arrangements for such transmissions, and over an open network like Internet or several interrelated networks.
- the sender may choose a Legal Registered Mail (LRM) system, which makes use of a post office, but without placing too heavy a load on the post office.
- LRM Legal Registered Mail
- a less stringent delivery method may be chosen by sender, that is a Business Registered Mail (BRM), where the automatic transaction takes place between the parties without a post office or intermediary.
- BRM Business Registered Mail
- the post office may be interrogated and verified by the users, and/or the post office may be accessed anonymously to prevent a directed attack, towards a specific user.
- Fig. 1 details the structure of the registered E-mail delivery system.
- Fig. 2 details the structure of a message prepared by the sender, during a first stage of a secure communication session.
- Fig. 3 details the structure of the message after processing by a mail server, during a second stage of the communication session.
- Fig. 4 details the structure of a message after processing by recipient, during a third stage of the communication session.
- Fig. 5 details the structure of a hierarchical array including key dissemination centers, users and post offices.
- FIG. 1 illustrates an example of a registered E-mail delivery system
- the encryption key used for encryption may be retrieved from a key dissemination center which is part of a hierarchical array of centers, users and post offices The array is detailed below with reference to Fig 5
- BRM business registered message system
- the encryption key used for encryption may be automatically retrieved from a key dissemination center which is part of a hierarchical array of centers, users and post offices, as detailed below with reference to Fig 5
- the encryption key used for encryption may be automatically retrieved from a key dissemination center which is part of a hierarchical array of centers, users and post offices, see Fig. 5 .
- user 1 has an electronic mailbox 12, which user 1 may access through communication link 11 .
- mailbox 12 may be a memory segment in a computer (not shown) of an Internet services provider (not shown).
- Link 11 may be implemented with any combination of a wide variety of communication means as known in the art, like telephone lines, wireless, local area network LAN and/or Internet links.
- user 2 has an electronic mailbox 22, which user 2 may access through communication link 21 .
- a mail server 3 is required.
- Mail server 3 may include a computer (not shown) or a plurality of computers, accessible through digital communication channels using any combination of a wide variety of communication means as detailed above.
- Each of the users 1 and 2 can send E-mail messages to mail server 3 through communication links 13 and 23, respectively.
- Communication links 13 and 23 are established with server 3 whenever a user desires to send ⁇ , message to server 3.
- server 3 can send E-mail messages to each one of the users 1 and 2, through communication links 31 and 32, respectively.
- server 3 actually accesses the electronic mailbox service provider for that user and sends a message to that mailbox.
- FIG. 1 illustrates the structure of the system for registered E-mail transmission, wherein the communication links 13, 31 , 23 and 32 exist only temporarily, being established at different times to convey the messages as required, to be detailed below.
- a secure message may be transmitted as well.
- a secure electronic mail method for sending a first message from a first user 1 to a second user 2 comprises the following steps: a. the first user 1 prepares the first message to be sent, indicates the identification of the second user 2 to whom the first message is to be sent, and activates an E-mail transmission program in their computer; b. the E-mail transmission program at the first user 1 automatically connects to the Internet, connects there to one of the key distribution centers (for example center 63, see Fig. 5) and asks for the public key of the second user.
- the key dissemination array detailed in Fig. 5 is available to users on the Internet, so that each user can connect in real time to one of the centers 63, 62, 64 for example, and ask for the public key for another user; c.
- the center 63 sends a certificate to the first user 1 , wherein the certificate includes the public key for the second user 2 together with identifying information for the second user 2, all encrypted with the private key of the center 63.
- the certificate is akin to a statement like "The public key for the user 2 is abed, and I center 63 hereby sign with my private key to attest to the truth of this statement" .
- the E-mail program at the first user 1 decrypts the certificate to retrieve a public key for the second user 2;
- the E-mail program at the first user 1 uses the public key for the second user 2 to encrypt the first message to be sent, to create a second message; f.
- the E-mail program at the first user 1 sends the second message to the E-mail address 22 of the second user 2.
- the centers are preferably connected in a network which is hierarchical with respect to endorsement of the public key of each center, so that the public key of any center is endorsed in a certificate signed by the private key of a center higher in the hierarchy, up to one center at the highest level
- the public key of center 63 is endorsed in a certificate issued by center 62, and the public key of center 62 is endorsed by a certificate from center 61 .
- the public key for any center is traceable to a higher authority, to achieve a reliable key system.
- the system is also flexible, however, since any key can be changed without any detrimental effect on the system
- the E-mail transmission program for any user desiring to send an E-mail message can choose either one of the centers to ask for the certificate of a second user or addressee
- the centers are connected in a network capable of automatic exchange of certificates between the centers so as to locate a certificate for any desired second user which may be stored in any one of the centers, and for transferring the certificate to another center to be delivered to the first user.
- user 1 desiring to send a message to user 2 may connect to center 63.
- User 1 may choose center 1 for one of many reasons, like the center is close geographically to the user or known to them.
- center 63 When an inquiry regarding user 2 is placed with center 63, the inquiry is passed between centers 63, 62, 61 , 64, 65.
- the information on user 2 is found at center 65, and a corresponding certificate is transferred on the same path in the reverse direction, back to center 63 and thence to user 1 .
- user 1 can inquire in real time about the public key for a desired addressee, and use that key for the subsequent E-mail transmission.
- Each center may be programmed to respond to any inquiry without requiring that the inquirer identify themselves. This prevents an attack by someone at the center, directed towards a specific user. This also allows to check the center by placing inquiries where the correct answer is known, to detect possible malfunctions at the center. Thus, the center need not be trusted, but can be verified by users.
- a secure method for sending a first message from a first user 1 (see Fig. 1 ) to a second user 2 as a business registered electronic mail (BRM) comprises the following steps:
- the first user 1 prepares the first message to be sent, indicates the identification of the second user 2 to whom the first message is to be sent, and activates an E-mail transmission program in their computer; b. the BRM E-mail transmission program at the first user 1 automatically connects to the Internet, connects there to one of the key distribution centers like center 63 or 62 or 64 (see Fig. 5) and asks for the public key of the second user 2; c. the center 63 (if that center was selected for the transaction) sends a certificate to the first user 1 , wherein the certificate includes the public key for the second user 2 together with identifying information for the second user 2, all encrypted with the private key of the center 63; d.
- the E-mail program at the first user 1 decrypts the certificate to retrieve a public key for the second user 2, e. the E-mail program at the first user 1 creates a second message which includes a message section including the first message to be sent which is encrypted with the public key for the second user 2, a hash or CRC of the message section, and a sender identification section with information to identify the first user 1 ; f. the E-mail program at the first user 1 sends the second message to the E-mail address 22 of the second user 2; g. when the second user 2 connects to Internet to retrieve messages in their E-mail 22, a BRM E-mail transmission program at the second user automatically presents information relating to the received second message; h.
- the second user 2 is given a choice, either to accept or not the message. If the second user 2 decides not to accept the second message, then END; otherwise the E-mail program at the second user automatically decrypts the second message with the private key of the second user 2, presents the decrypted message to the second user 2, prepares a third message including a receipt for the second message signed with the private key of the second user 2, and sends the third message to the E-mail address 12 of the first user 1
- the receipt includes the identification of the message and the received hash or CRC, so the second user 2 signs to approve receipt of a specific message, and that the message was received in full.
- the public key of user 2 may be used directly to encrypt the message, or indirectly
- the message itself is encrypted with a symmetrical key and algorithm, and the corresponding decryption key is separately encrypted with the public key of user 2.
- the same key may be used both for encryption and decryption, for example using XOR logic with a random string derived from the key, or the DES algorithm.
- the sender identification section in the second message may include a certificate with the public key of the first user 1 , signed by a key distribution center like center 63
- User 1 may store their certificate from center 63, and present the certificate to any second party for establishing their identity The other party may choose to accept that certificate, or ask in real time for an updated certificate for user 1 , fiom one of the key distribution centers like centers 62, 63
- the sender identification section in the second message may include a name or pseudonym which identifies the first user 1
- the second message further includes a general information section comprising a CRC or hash and/or other information, all encrypted with the private key of the first user, and wherein the E-mail program in the second user automatically connects to a key distribution center to retrieve the public key of the first user, which key is used to decrypt the general information section; if the CRC or hash and/or the other information therein corresponds to that computed by the E-mail of the second user, then will the second u ser send the third message to the first user
- Method 2 where there are a plurality of key distribution centers like centers 61 , 62, 63 (see Fig 5) and the E-mail transmission program can choose either one of the centers to ask for the certificate of the second user 2, and wherein the centers are connected in a network which is hierarchical with respect to endorsement of the public key of each center, so that the public key of any center is endorsed in certificate signed by the private key of a center higher in the hierarchy, up to one center at the highest level
- center 62 attests for the public key of center 62
- center 61 attests for center 62 etc
- the BRM method in the present disclosure allows for an integrated approach, using concurrently an on-line, real-time connection (to the key distribution center) an J a non-real time connection (with the E-mail addressee).
- the public key is retrieved automatically using the distributed key center? array Method 3
- a secure method for sending a first message from a first user to a second user as a legal registered electronic mail (LRM), comprises the following steps'
- the first user 1 (see Fig 1 ) prepares the first message to be sent, indicates the identification of the second user 2 to whom the first message is to be sent and an intermediary or post office (PO) for the transmission (like post office 71 or 72, see Fig. 5).
- PO intermediary or post office
- the first user then activates an E-mail transmission program in their computer;
- the LRM E-mail tiansmission program at the first user 1 automatically prepares a second message including the first message which is encrypted for example with a symmetrical key and algorithm , together with a general information section including a serial number or message identification and information relating to the public key of the second user 2, together with a CRC or hash and optional time/date information.
- the LRM E-mail t'ansmission program at the first user 1 automatically prepares a third message including the decryption key for the first message, encrypted with the public key of the second user 2, together with a general information section including a serial number or message identification, together with the CRC or hash and optional time/date information; d.
- the LRM E-mail transmission program at the first user 1 automatically prepares a fourth message including a notice that an E-mail message was sent to the second user, the CRC or hash of the message, the identification of the intermediary 71 and the serial number or message identification, e.
- the LRM E-mail tiansmission program at the first user 1 sends the third message to the chosen intermediaiy or PO 71 , the fourth message to the second user 2 and the second message either to the intermediary 71 or the second user 2; f. when the second user 2 connects to Internet to retrieve messages in their E-mail 22, a LRM E-mail transmission program at the second user automatically presents information relating to the received message, g. the second user 2 is given a choice, either to accept or not the message.
- the second user 2 decides not to accept the second message, then END; otherwise tne E-mail program at the second user 2 automatically encrypts the fourth message with the private key of the second user 2 to create a fifth message, and sends the fifth message to the intermediary or PO 71 , so that the fifth message is a receipt signed by the second user 2, with the receipt including the message identification and the CRC or hash relating to the contents of the message. h.
- the intermediary 71 decrypts the fifth message with a public key of the second user 2, and compares with the message identification in the third message, if the two correspond, then the intermediary sends the third message with the decryption key therein to the second user 2, and the fifth message with the receipt from the second user is made available to the first u ⁇ er 1 ; if the second message with the encrypted message itself was sent to the intermediary 71 , then the intermediary 71 sends the second message to the second user 2.
- An advantage of the above Method 3 over Micali and others is that there are a plurality of intermediaries or post offices (PO) like 71 , 72, 74.
- PO post offices
- Any user with a computer and suitable software may act as a post office, provided they connect in the hierarchical array and can use and present a public key endorsed by a key distribution center.
- the endorsement is usually in the form of a certificate.
- Users worldwide can each select any PO for any given transaction.
- the PO has no motivation to cheat the user who selected that PO, and may later select other PO if not satisfied.
- the PO need not be trusted, but can be interrogated and tested by any user, for example by sending E-mail to themselves at a different E-mail address or pseudonym.
- the E-mail transmission program can choose either one of the intermediaries to act as PO for a given transmission.
- the intermediaries or POs may be connected in a network which is hierarchical with respect to endorsement of the public key of each center and intermediary, so that the public key of any intermediary is endorsed by a certificate issued by a key distribution center like center 63, 62, 65 etc
- each center is endorsed in a certificate signed by the private key of a centei higher in the hierarchy, up to one center at the highest level
- the LRM E-mail transmission program at the first user 1 may automatically extract the public key for the intermediary 71 and/or the second user 2 by connecting to a key distribution center like center 62 on Internet and asking for a certificate for the intermediary 71 and/or second user 2
- the public key thus obtained and contained in a certificate or certificates from center 62 is/are most updated and reliable
- the LRM E-mail transmission program at the second user 2 automatically challenges the intermediary 71 for its key by receiving a message encrypted with the private key of the intei mediary 71 and decrypting with the public key thereof This is used to ensure that the receipt is sent to the real intermediary 71 , not to an impostor.
- step (g) is sent to the intermediary or PO 71 only if the keys of the intermediary 71 correspond
- the first variant demands less overload on the intermediaries like 71 , 72 since the intermediaries only handle the keys which comprise short messages.
- the bulk of the communications is in the messages, and these are transferred directly to user 2
- the second variant may be attractive where there is a requirement to keep a log of
- the system and method of LRM disclosed in the present invention may support the legal requirements of the law
- An intermediary like 71 , 72 will keep a log of all message, to allow subsequent verification and to preserve the security of the system Figs. 2, 3 and 4 detail the structure of messages in the various parts of the system as detailed above for a legal registered mail (LRM) system and during the several stages of the communication session to be detailed next.
- LRM legal registered mail
- the communication session includes the following stages
- the message section 41 including the message to be send, encrypted with a symmetrical key and algorithm (this is a method using the same key both for encryption and decryption, for example using XOR logic with a random sts ing derived from the key, or the DES algorithm).
- User 1 generates a new randomial symmetrical key for each message to be transmitted.
- the message 41 can be read only by someone possessing the required symmetrical key.
- the decryption key section 42 comprising the symmetrical key which is to be used to decrypt the message in section 41 , which key itself is encrypted using a public key algorithm with the public key of user 2.
- the decryption key section 42 comprising the symmetrical key which is to be used to decrypt the message in section 41 , which key itself is encrypted using a public key algorithm with the public key of user 2.
- the CRC section 43 which is used for sender authentication purposes. It includes a cyclic redundancy code or CRC which is derived from the message being sent in section 41 , and encrypted with the private key of user 1 . This is the de facto signature of user 1 , since anyone can compute the CRC, and compare it with its encrypted version as received, after being decrypted with the public key of user 1 . If the two values are identical, this is proof that user 1 prepared and sent the message. Either a CRC or a hash may be used, without departing from the spirit and scope of the present invention.
- sender identification section 44 including the name, address and/or other information identifying user 1 . May be sent en plain.
- recipient identification section 45 including the name, address and/or other information identifying user 2. May be sent en plain.
- the encrypted sections 41 , 42, 43 form the first layer of encryption 51 , see Fig. 2 .
- only section 42 is encrypted. This saves part of the computational effort, and prevents section 41 from being encrypted twice.
- user 1 sends the encrypted message as detailed in (a) above to mail server 3 through link 13 (see Fig. 1 ).
- mail server 3 processes the message to create a new message derived from the received message and which includes, see Fig. 3 :
- Server 3 generates a new randomial symmetrical key for each message to be transmitted. In another embodiment of the invention, it is possible to encrypt the whole message, not only parts of it.
- the decryption key in section 42 can be read by usei 2 only if given the second key generated in server 3
- sender identification section 44 encrypted with the same second symmetrical key and algorithm, with a second key generated in server 3
- user 2 is prevented from gain access to the sender, that is user 1 , identification until being given the second symmetrical key
- a message idenffication number or alphanumeric string 46 which unambiguously identifies each message sent by server 3 That number is used by server 3 to identify each registered message being processed in the system.
- the encrypted sections 42, 44 form the second layer of encryption 52, see Fig. 3 .
- mail server 3 sends the encrypted message as detailed in (c) above to user 2 through link 32 (see Fig 1 ) Actually, the message is sent to the mailbox 22 belonging to user 2
- User 2 is given the choice of either to accept or not to accept the registered mail.
- Server 3 may send "second notice" remainders, according to a routine to be established, then the message will be considered as undelivered. Notice may be send to the first user that the message could not be delivered.
- This encryption by user 2 serves as the signature of user 2 to the effect that he/she agrees to accept the registered E-mail message Since only user 2 can use their private key, this serves as authentication of user 2's confirmation of the registered mail delivery Moreover, since user 2 signs (by using their private key) for the whole document, this is proof that the whole document was received OK. This is a much stronger proof than that of ordinary registered mail, where there is only proof that a package was delivered, but there is no proof regarding the actual message that was received by the other party.
- the encrypted message with the private key of user 2 forms the third layer of encryption 53, see Fig. 4 .
- mail server 3 decrypts the message prepared as detailed in f(2) above, using the public key of user 2. The decrypted message is compared with the message sent to user 2, as illustrated in Fig. 3 .
- Mail server 3 sends the second symmetrical key to user 2, see Fig. 3 . This enables user 2 to open the registered mail message. Mail server 3 also sends to user 1 a message including the encrypted message from user 2, see Fig. 4, concurrently with the transmission of the second symmetrical key to user 2.
- the message to user 1 is sent through link 31 (see Fig. 1 ). Actually, the message is sent to the mailbox 12 belonging to user 1 .
- step (d) above is performed again.
- the decryption key section 42 is opened using the second symmetrical key received from server 3, see step h(1 ). This reveals the original section 42 which was prepared by user 1 .
- the sender identification section 44 is also opened using the second symmetrical key received from server 3. This reveals the sender, that is user 1 , identification, including the name, address and/or other information identifying user 1 . 3) the message section 41 is decrypted using the decryption key which was opened in step ⁇ (1 ) above Thus the E-mail message finally reaches its destination
- a second CRC is computed for decrypted message in step ⁇ (3), and the two CRC s are compared If they are identical, this may be used sender authentication purposes This proves that user 1 indeed is the sender of the message.
- the message fron server 3, including the encrypted message from user 2, see Fig 4, is opened using the public key of user 2, to reveal the message sent to usei 2 by server 3, see Fig 3
- step (b) the message thus opened is compared with the original message sent by user 1 , see step (b) above If the two messages are identical, then user 1 has proof that user 2 received the message as sent, since user 2 signed it with his/her private key This is also proof that the contents of the message was delivered, not only the "package” or "envelope" which contains the message k. User 1 may send notice to server 3 according to the results of the comparison made in step j(2) above
- server 3 can check the various messages to detect the source of the error and/or try again to complete successfully the registered E-mail delivery
- the abovedetailed registered secure E-mail transmission may be performed automatically, with minimal users' intervention, as follows
- user 1 prepares the message to be send and initiates the registered secure E-mail transmission, for example by activating an icon or pushing a button on screen, which icon or button has assigned the function "send registered secure E-mail" therewith This is the first manual action performed in the transmission process
- the computer at user 1 's location automatically performs the steps (a) and (b) above c2.
- the computer at server 3 location automatically performs the steps (c) and (d) above.
- user 2 finds there is a registered encrypted message waiting in his/her mailbox 22. If user 2 decides to accept that message, then he/she indicates that agreement, for example by activating an icon or pushing a button on screen, which icon or button has assigned the function "accept registered secure E-mail" therewith. This action has the effect of user 2 signing for the registered mail acceptance.
- the computer at user 2's location automatically performs the step (i) above, to bring and present the complete received message to user 2.
- the computer at user 1 's location automatically performs the steps (j) and (k) above, to indicate to user 1 that the message was received successfully and that proof is in the records of user 1's computer, or that the message was not delivered and adequate actions are being taken.
- Fig. 5 details the structure of a hierarchical key dissemination (K. D. ) center array means.
- K.D. centers are used to create and exchange certificates including a secure key between the parties, such that each user gains access to an updated key, with the knowledge that that is truly the key belonging to the user as desired.
- Center 63 is connected in a hierarchical array with other centers, depicted here as 61 , 62, 64, 65
- the hierarchical structure is for net structure definition only; the actual operation is that of a flat distributed network, in which each of the centers 61 , 62, 63, 64, 65 can directly reach each other of said centers.
- Each user in the system has an unique identification number or name or address, akin to the telephone number or Internet address. Part of that identification number indicates the center that user belongs to.
- center 63 can determine from the number for usei 2 that user 2 belongs to center 65.
- each of the centers 61 , 62, 63, 64, 65 has a table indicating which center should be accessed for each user number possible.
- center 63 automatically accesses that center, extracts the key for user 2 and delivers it to user 1 .
- the computer at user 1 's facility automatically connects the secure encryption key distribution center 65, and sends an inquiry message asking for the public key for the addressee, user 2 in this example, the message being encrypted with the public key for center 63.
- Center 63 decrypts the message, verifying the identity of user 1 in the process; the answer is sent to user 1 , encrypted with the public key for that user.
- the center 63 maintains a list of public keys for its various users like 1 , 73 in this example
- User 1 can now access user 2, to send the E-mail message as detailed above.
- Center 63 accesses center 65 to get the key for user 2, using a similar encryption procedure, to ensure the secrecy and integrity of the process
- center 65 creates a "certificate" , that is a message including the public key for user 2, together with identification information for user 2, all encrypted with the private key of center 63
- a "certificate" that is a message including the public key for user 2, together with identification information for user 2, all encrypted with the private key of center 63
- anyone, for example user 1 or 2 can ask for a certificate on any other user or for himself; the certificate can be opened by anyone using the known public key for center 65, thus ensuring the authenticity of the key.
- center 65 can be verified using centers higher in the hierarchy like centers 64 and 61
- a system and method for transferring electronic mail including registered and secure messages The method is automatic, with minimal users' intervention. It can be performed between users which did not know each other before, over an open network like Internet.
- server 3 may encrypt the whole message, see Fig. 2, and not only the sections as detailed.
- User 1 may encrypt the whole message with the public key for server 3, for additional protection and/or to prevent anyone from tampering with the message.
- User 2 may encrypt messages to server 3 as well.
- This system has the additional advantage that it helps fight the nuisance of "junk mail” , that is the mailbox being filled with unsolicited and unwanted messages.
- the user can select to consider first the registered E-mail messages, which may be believed to be of more use. If there is a fee to be paid to send registered mail, that may discourage "junk mail” senders from using this method.
- the message is sent directly to user 2, encrypted.
- the key required to decrypt it is sent through the PO.
- user 2 still has to acknowledge receipt of the message to receive the decryption key therefor.
- the PO is not required to store and handle the whole message, but only the keys.
- Another advantage of this method is that the PO has no access to the messages themselves, so that the PO cannot compromise the message.
- the communication session includes the following stages:
- the message to be send encrypted with a symmetrical key and algorithm (this is a method using the same key both for encryption and decryption, for example using XOR logic with a random string derived from the key, or the DES algorithm) .
- User 1 generates a new randomial symmetrical key for each message to be transmitted.
- This number may be sent en clair or may be encrypted with the public key of user 2.
- the CRC may include the serial number in (2) above.
- the indication of the intermediary or post office where the decryption key is available (optional) the indication of the intermediary or post office where the decryption key is available.
- the users use a common or local or otherwise obvious post office, and no such indication may be necessary.
- the decryption key comprising the symmetrical key which is to be used to decrypt the message being sent to user 2, which key itself is encrypted using a public key algorithm with the public key of the post office.
- the decryption key may be first encrypted with the public key of user 2, then encrypted with the public key of the PO in a second stage or layer of encryption.
- This number may be sent en clair or may be encrypted with the public key of the intermediary or post office.
- the CRC may include the serial number in a(2) above. This allows the post office to ensure the receipt of the correct message by user 2, prior to releasing the decryption key.
- CRC and hash are used interchangeably. In the actual implementation, each of the two may be used, according to relevant consideration like the computational effort required, response time, safety required etc. 4) (optional) the indication of the identity of user 2, who is expected to claim the 'mail" , that is the key to decrypt it This is not mandatory, since there is a measure of safety already - only user 2 can read the serial number of the message (if it was encrypted with their public key) , so only user 2 will know to ask for the "package" with that number
- the decryption key itself is encrypted with the public key of user 2, so an impostor will not be able to decrypt the package and extract the decryption key therein
- User 2 is given the choice of either to accept or not to accept the registered mail 1 ) If user 2 declines to accept the message, then he/she cannot gain access to its contents thus for all practical purposes the message is not delivered
- the post office PO may send "second notice" remainders, according to a routine to be established, then the message will be considered as undelivered.
- the PO may notify the first user that the message could not be delivered
- the message includes a CRC of the whole message as well, in case the method in usa requires confirmation of receipt of the correct message by user 2
- This encryption by user 2 serves as the signature of user 2 to the effect that he/she agrees to accept the registered E-mail message Since only user 2 can use their private key, this serves as authentication of user 2's confirmation of the registered mail delivery Moreover, since user 2 signs (by using their private key) for the CRC of the whole document, this is proof that the whole document was received OK.
- the post office decrypts the message prepared as detailed in f(2) above, using the public key of user 2
- the decrypted message is compared with the message sen! to user 2
- the post office may then send the decryption key (the second message, prepared in step (c) above by user 1 ) to user 2
- the receipt from user 2 is sent back to user 1 .
- the post office may compare the CRC received from user 2 (computed in step f(2) above ) with the CRC computed by user 1 (computed in step c(3) above). Only if the two CRCs correspond, will the deciyption key be sent to user 2. Otherwise, the post office may notify both users that an error occurred during transmission, so recovery measures may be taken, for example by cancellation of the message and retransmit
- the decryption key is opened using the private key of user 2
- the message from the post office, including the encrypted message from user 2 is opened using the public key of user 2, to reveal the message sent to user 2 by the post office
- the decryption key is also encrypted with the public key of user 2 thus the decryption key cannot be read at the post office
- Another advantage of sending the message directly to the second user is that the workload on tne PO is greatly reduced There is no need for the PO to handle large amounts of traffic corresponding to the messages themselves
- the keys messages l esult in a vastly reduced traffic is solved in the present invention
- each user can verify the post office, for example by anonymously sending a package and then demanding it, using a different pair of keys for example If the post office is not working proper, then this may be detected by users
- a less stringent delivery method may be chosen by sender, that is a Business Registered Mail (BRM) Following is a description of this method, Method &
- the communication session includes the following stages
- a time and date information may be used in lieu of the serial number, or in addition thereto
- the message may be encrypted with the public key of user 2
- the message is encrypted with a symmetric key, and a second section s added to the message where the second section includes the decryption key, encrypted with the public key of usei 2
- the hash or CRC may be encrypted with the private key of user 1 , so as to serve as their signature on the complete document
- the CRC is computed, to verify correct receipt of the message d.
- a response message is composed It may include the serial number and/or date and time of the message as sent, the time and date it was received, and a flag to indicate that the reception was OK or not, based on the comparison of tne CRC in the message with the computed CRC
- the whole message may be encrypted with the public key of user 1 , to prevent the information relating to the message from being read by others
- the message is further signed or encrypted with the private key of user 2, so that user 1 has proof that the message was received correctly by user 2
- the presentation is performed at the user s computer
- the user has a choice to select the communication method, as detailed in Method 8 below Method 9
- the user's computer presents a menu to the user whenever the user desires to transmit an E-mail message
- the menu includes the various method of transmission
- the user may choose to send the message en clair or using the
- BRM method or the LRM method may depend on the nature/sensitivity of the message itself, and/or the nature of the relationship with the recipient The user chooses from the menu accordingly
- the E-mail program in the computer activates a corresponding routine, to implement either one of the communication methods as detailed above, for example the BRM or LRM method
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL11943096A IL119430A0 (en) | 1996-10-15 | 1996-10-15 | Electronic mail system and method |
IL11943096 | 1996-10-15 | ||
PCT/IL1997/000329 WO1998017042A2 (en) | 1996-10-15 | 1997-10-13 | Electronic mail method |
Publications (2)
Publication Number | Publication Date |
---|---|
EP0958673A2 EP0958673A2 (en) | 1999-11-24 |
EP0958673A4 true EP0958673A4 (en) | 1999-12-22 |
Family
ID=11069378
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP97944079A Withdrawn EP0958673A2 (en) | 1996-10-15 | 1997-10-13 | Electronic mail method |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP0958673A2 (en) |
AU (1) | AU4570497A (en) |
IL (1) | IL119430A0 (en) |
WO (1) | WO1998017042A2 (en) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7222087B1 (en) * | 1997-09-12 | 2007-05-22 | Amazon.Com, Inc. | Method and system for placing a purchase order via a communications network |
AU4854899A (en) * | 1998-07-02 | 2000-01-24 | Mail.Com, Inc. | Secure web-based mail and authentication system |
WO2000031944A1 (en) * | 1998-11-25 | 2000-06-02 | Orad Software Limited | A secure electronic mail gateway |
WO2001010090A1 (en) * | 1999-07-28 | 2001-02-08 | Tomkow Terrance A | System and method for verifying delivery and integrity of electronic messages |
US7886008B2 (en) | 1999-07-28 | 2011-02-08 | Rpost International Limited | System and method for verifying delivery and integrity of electronic messages |
US7240199B2 (en) | 2000-12-06 | 2007-07-03 | Rpost International Limited | System and method for verifying delivery and integrity of electronic messages |
US7966372B1 (en) * | 1999-07-28 | 2011-06-21 | Rpost International Limited | System and method for verifying delivery and integrity of electronic messages |
NZ518393A (en) * | 1999-09-30 | 2005-02-25 | Us Postal Service | Systems and method for authenticating an electronic message |
IL134066A (en) | 2000-01-16 | 2004-07-25 | Eluv Holdings Ltd | Key encrypted e-mail system |
FR2814016B1 (en) * | 2000-09-13 | 2003-02-28 | Francois Joseph Vasseur | METHOD FOR GENERATING PROOF OF SENDING AND RECEIVING BY A NETWORK OF DATA TRANSMISSION OF AN ELECTRONIC WRITTEN AND ITS CONTENT |
IT1315566B1 (en) | 2000-12-12 | 2003-02-18 | Federico Renier | METHOD FOR CERTIFICATION OF SENDING, RECEPTION AND AUTHENTICITY OF ELECTRONIC DOCUMENTS AND NETWORK UNIT |
DE10106096A1 (en) * | 2001-02-08 | 2002-08-29 | Wendenburg Jan C | E-mail delivery advice system logs data for return is fast does not require client compatibility |
CA2339564A1 (en) * | 2001-03-05 | 2002-09-05 | David Paul Wiebe | A method and system for encrypting digital messages |
FR2837047B1 (en) * | 2002-03-11 | 2006-04-21 | Jean Bernard Condat | ELECTRONIC MESSAGE WITH NOTICE OF RECEPTION AND MONITORING (MARCH) |
AU2003208199A1 (en) * | 2002-03-18 | 2003-09-29 | Colin Martin Schmidt | Session key distribution methods using a hierarchy of key servers |
EP1519287A1 (en) * | 2003-09-24 | 2005-03-30 | Alex Racic | Method for proving the delivery of an e-mail message |
US7698558B2 (en) | 2003-11-21 | 2010-04-13 | Rpost International Limited | System for, and method of, providing the transmission, receipt and content of an e-mail message |
WO2005099352A2 (en) * | 2004-04-19 | 2005-10-27 | Aliroo Ltd. | Secure data transmission |
CA2635351C (en) | 2005-12-29 | 2014-11-25 | Regify Ag | A communication system for providing the delivery of an e-mail message |
ATE459169T1 (en) * | 2008-01-10 | 2010-03-15 | Research In Motion Ltd | SYSTEMS AND METHODS FOR SERVER-ASSISTED PROCESSING OF A SIGNED RECEIPT |
IT1392733B1 (en) * | 2009-01-27 | 2012-03-16 | Anastasio | SYSTEM AND METHOD TO MANAGE TRANSMISSION AND RECEPTION OF AN ELECTRONIC DOCUMENT WITH EQUIVALENCE OF THE LEGAL VALUE OF RECOMMENDED MAIL |
CN114095468B (en) * | 2021-11-19 | 2023-04-07 | 中国银行股份有限公司 | Message middleware system, post office system and message receiving and transmitting method |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US5509071A (en) * | 1994-04-01 | 1996-04-16 | Microelectronics And Computer Technology Corporation | Electronic proof of receipt |
US5511122A (en) * | 1994-06-03 | 1996-04-23 | The United States Of America As Represented By The Secretary Of The Navy | Intermediate network authentication |
US5416842A (en) * | 1994-06-10 | 1995-05-16 | Sun Microsystems, Inc. | Method and apparatus for key-management scheme for use with internet protocols at site firewalls |
US5553145A (en) * | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties |
-
1996
- 1996-10-15 IL IL11943096A patent/IL119430A0/en unknown
-
1997
- 1997-10-13 EP EP97944079A patent/EP0958673A2/en not_active Withdrawn
- 1997-10-13 AU AU45704/97A patent/AU4570497A/en not_active Abandoned
- 1997-10-13 WO PCT/IL1997/000329 patent/WO1998017042A2/en not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
LEVIEN R: "PROTECTING INTERNET E-MAIL FROM PRYING EYES", DATA COMMUNICATIONS, vol. 25, no. 6, 1 May 1996 (1996-05-01), pages 117/118, 120, 122, XP000587586, ISSN: 0363-6399 * |
Also Published As
Publication number | Publication date |
---|---|
EP0958673A2 (en) | 1999-11-24 |
WO1998017042A2 (en) | 1998-04-23 |
AU4570497A (en) | 1998-05-11 |
IL119430A0 (en) | 1997-01-10 |
WO1998017042A3 (en) | 1998-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1998017042A2 (en) | Electronic mail method | |
US7644268B2 (en) | Automated electronic messaging encryption system | |
US10182026B2 (en) | System for, and method of, providing the transmission, receipt and content of a reply to an electronic message | |
Zhou et al. | Observations on non-repudiation | |
US9363084B2 (en) | Methods and apparatus for controlling the transmission and receipt of email message | |
US7493661B2 (en) | Secure transmission system | |
US7650383B2 (en) | Electronic message system with federation of trusted senders | |
Zhou et al. | Evidence and non-repudiation | |
US7376835B2 (en) | Implementing nonrepudiation and audit using authentication assertions and key servers | |
US5812669A (en) | Method and system for providing secure EDI over an open network | |
US7660989B2 (en) | System for, and method of, authenticating an electronic message to a recipient | |
US7277549B2 (en) | System for implementing business processes using key server events | |
CN100413292C (en) | System and method for verifying delivery and integrity of electronic message | |
US20060048210A1 (en) | System and method for policy enforcement in structured electronic messages | |
US20030101346A1 (en) | Method for notarizing receipt of electronic communications and enabling electronic registered mail; method for verifying identity of account party | |
EP1088433A1 (en) | Method and apparatus for secure data transmission system | |
JP2005057417A (en) | Electronic document exchanging system, signature decoding service system and program | |
CA2547480C (en) | Method for verifing delivery and integrity of electronic messages | |
WO2000046952A1 (en) | Method for sending secure email via standard browser | |
JPH11261549A (en) | Content-certified electronic mail device, method and storage medium for content-certified electronic mail program | |
Yang et al. | A non-repudiation message transfer protocol for e-commerce | |
Schadow et al. | Secure HL7 Transactions using Internet Mail |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 19990823 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 19991105 |
|
AK | Designated contracting states |
Kind code of ref document: A4 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
RIC1 | Information provided on ipc code assigned before grant |
Free format text: 6H 04L 9/00 A, 6H 04K 1/00 B, 6H 04L 12/58 B, 6H 04L 29/06 B, 6H 04L 12/22 B, 6G 06F 17/60 B |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20021213 |