EP1133854A1 - Methode et systeme de securisation d'objets numerises - Google Patents

Methode et systeme de securisation d'objets numerises

Info

Publication number
EP1133854A1
EP1133854A1 EP99958570A EP99958570A EP1133854A1 EP 1133854 A1 EP1133854 A1 EP 1133854A1 EP 99958570 A EP99958570 A EP 99958570A EP 99958570 A EP99958570 A EP 99958570A EP 1133854 A1 EP1133854 A1 EP 1133854A1
Authority
EP
European Patent Office
Prior art keywords
server
user
mail
data object
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99958570A
Other languages
German (de)
English (en)
Inventor
Christian Gehrmann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Publication of EP1133854A1 publication Critical patent/EP1133854A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication

Definitions

  • the present invention relates generally to the telecommunications field and, in particular, to a method and system for securing data objects such as electronic mail (e-mail).
  • e-mail electronic mail
  • IP Internet Protocol
  • Low level information protection can be beneficial because the services can be provided without requiring any changes to the applications involved.
  • low level protection protocols e.g., IPSEC protocol
  • IPSEC protocol require substantial modifications to the operating systems involved.
  • information that is protected only during transport requires additional protection when the information is ultimately stored at the clients' locations and servers.
  • the S/MIME Standard should be able to provide adequate protection for e-mail messages while they are stored at a user's terminal and/or mail server.
  • the S/MIME protection approach should make it possible to provide e-mail services that are totally open at the Internet and extremely easy to access. As such, it is expected that this model of open but protected information will be one of the more important security models in the future.
  • the standard Netscape ® and Microsoft ® e-mail tools support the S/MIME protocol.
  • the S/MIME Standard should provide a way to encrypt MIME information in a way that is flexible and secure.
  • the S/MIME standard will be a combination of public key encryption and symmetric encryption.
  • the symmetric key encryption will be used to encrypt the actual information content in the MIME messages, and the public keys will be used to encrypt the symmetric key used for encryption of the MIME content, or for digitally signing the MIME message.
  • S/MBVIE approach will use digital certificates to check the validity of the public keys used.
  • Secure e-mail approaches such as S/MIME, are based on a point-to-point communication model.
  • an arbitrary user in a network communicates with another user in the network, and the communication between the two users is secure.
  • a point-to-point security model does not fit well in a conventional co ⁇ orate network architecture.
  • a co ⁇ orate network e.g., LAN
  • LAN is an IP-based private network, and its only access to the Internet is through a firewall. Consequently, it is intentionally made difficult to access information in the co ⁇ orate network from the other side of the firewall.
  • a method and system are provided for securing private e-mail that can be conveyed to and from a user via an open network such as the Internet.
  • the e-mail messages are encrypted with a secure digital envelope type protocol which can be based on the use of digital certificates.
  • An example of such a digital envelope encryption protocol is the S/MIME protocol.
  • a domain-to-user security relationship is used instead of a user-to-user or domain-to-domain security relationship.
  • a mobile radiotelephone user of a co ⁇ orate network can have certain incoming e-mail forwarded to an external mail server (e.g., in the Internet).
  • the mail to be forwarded is first encrypted into a secure digital envelope format (e.g.,S/MIME format) with the user's secret key. Consequently, the protected e-mail from the co ⁇ orate network can be forwarded to the user via the external mail server (e.g., in the Internet) without compromising security.
  • a secure digital envelope format e.g.,S/MIME format
  • An important technical advantage of the present invention is that a mobile user can receive and view secure e-mail via an open network such as the Internet.
  • Another important technical advantage of the present invention is that a co ⁇ orate network user's e-mail can be secured with a maximum of two digital certificates required to obtain such protection.
  • Still another important technical advantage of the present invention is that the security of a user's e-mail is independent of the mail server used.
  • FIGURE 1 is a diagram that illustrates a secure e-mail system and method that can be implemented in accordance with a preferred embodiment of the present invention.
  • FIGURE 2 is a flow diagram of a method that can be used for encryption and decryption of e-mail using the S/MEVIE standard in accordance with the preferred embodiment of the present invention.
  • FIGURES 1 -2 of the drawings like numerals being used for like and corresponding parts of the various drawings.
  • the e-mail messages are encrypted with a secure digital envelope type protocol which can be based on the use of digital certificates.
  • a secure digital envelope type protocol is the S/MIME protocol.
  • S/MIME protocol a domain-to-user security relationship is used instead of a user-to-user or domain-to-domain security relationship.
  • a mobile radiotelephone user of a co ⁇ orate network can have certain incoming e-mail forwarded to an external mail server (e.g., in the Internet).
  • the mail to be forwarded is first encrypted into a secure digital envelope format (e.g., S/MIME format) with the user's secret key. Consequently, the protected e-mail from the co ⁇ orate network can be forwarded to the user via the external mail server (e.g., in the Internet) without compromising security.
  • a secure digital envelope format e.g., S/MIME format
  • the present invention is described herein primarily with respect to the protection of e-mail, the present invention can also apply to the protection of any data object, such as, for example, data programs, JAVA programs, or mobile code.
  • FIGURE 1 is a diagram that illustrates a secure e-mail system and method that can be implemented in accordance with a preferred embodiment of the present invention.
  • an exemplary system 10 includes an open or public-access network (e.g., the Internet) and a private network (e.g., a co ⁇ orate intranet or LAN).
  • the two networks are typically separated by a firewall 12, which functions primarily to protect and maintain the confidentiality of the information stored in the private network.
  • the open network includes a mail server 16 (external to the private network).
  • a user e.g., user of the private network
  • the user is preferably a mobile radiotelephone user who can gain access to the mail server 16 over a conventional wireless connection 18.
  • the user's PC (or PDA) 14 can include a speech/data connection to a mobile radiotelephone, such as, for example, a cellular phone.
  • the user's PC (or PDA) 14 can utilize a conventional e-mail application such as Netscape ® mail or Microsoft Outlook Express ® to forward or receive e-mail to or from the mail server 16 via the connection 18.
  • a wireless connection 18 is shown, the scope of the present invention is not intended to be so limited, and can include the use of, for example, a wireline connection, fiber optic connection, etc. However, the use of a wireless connection 18 via a mobile phone is more convenient for a user who is periodically on the move (e.g., in an automobile, train, aircraft, etc.).
  • the user's PC (or PDA) 14 is also connected to the co ⁇ orate network (generally denoted as 22) via a wireless (or any other appropriate) connection 20.
  • the user' s PC (or PDA) 14 can transfer data via a cellular phone over the wireless connection 20 to a dial-up modem at the co ⁇ orate network 22.
  • the user's PC 14 can be connected to the co ⁇ orate network's
  • WWW World-Wide Web
  • the primary pu ⁇ ose for this secure connection 32 in the context of FIGURE 1 is to enable the user to formulate and convey an e-mail forwarding policy to the co ⁇ orate network 22.
  • the co ⁇ orate network 22 includes a mail server 24 (e.g., on a co ⁇ orate LAN).
  • the Web interface 26 can be a conventional
  • the co ⁇ orate network 22 also includes a decryption unit 28 for decrypting an incoming e-mail message that has been encrypted using a packet or digital envelope cryptographic protocol (e.g., S/MIME).
  • the decryption unit 28 preferably includes a software application that can decrypt a secure digital envelope-formatted (e.g., S/MIME-protected) e-mail message conveyed via the connection 20 from the user's PC 14.
  • An encryption unit 30 preferably includes a software application that functions to encrypt an outgoing e-mail message with a secure digital envelope format (e.g., from a MIME format to S/MIME format).
  • the encrypted e-mail messages are coupled from the co ⁇ orate network 22 to the external mail server 16 via a conventional data connection 34.
  • the co ⁇ orate network 22 can be connected to an Internet mail server (16) via a Public Switched Telephone Network (PSTN) Tl line (34).
  • PSTN Public Switched Telephone Network
  • a mobile phone user employs the PC (or PDA) 14 to send a message including e-mail forwarding policy instructions to the Web interface 26.
  • the e-mail forwarding policy message is transported via a secure connection 32 (e.g., using TLS, IPSEC or any other appropriate secure transport protocol) to the Web interface 26.
  • This mail forwarding policy predetermines which e-mail messages are to be transported from the co ⁇ orate network 22, and to what address (e.g., to the external mail server 16).
  • the user's e-mail forwarding policy can include instructions to forward all incoming e-mail messages from the co ⁇ orate LAN to the external mail server, or just to forward certain e-mail messages only (e.g., just those arriving from a specific set of addresses, or having a certain priority).
  • the user's e-mail forwarding policy actually selected can be a matter of personal (or co ⁇ orate) choice.
  • a secure digital envelope format is a message, or information string, packed into a certain format to provide confidentiality, and/or integrity, and/or non-repudiation.
  • a combination of symmetric and asymmetric cryptographic functions can be used. Unlike most secure data transport protocols, a digital envelope can be used for off-line decryption and integrity-checking. Once transformed into a secure cryptographic envelope format, a secure message can be decrypted and checked at any time by anyone who possesses a correct secret key. As mentioned earlier, the S/MIME standard is an example of a secure digital envelope format.
  • the S/MIME standard can provide confidentiality and/or integrity and non-repudiation protection for MIME messages. Encrypting a MIME message with a secret symmetric key provides confidentiality for the message, while using a digital signature provides integrity and non-repudiation for the message.
  • a message can just be encrypted, just signed, or both encrypted and signed. The following description illustrates an exemplary method that can be used with the S/MIME standard to provide confidentiality, integrity and non-repudiation protection for a MIME message to be sent from one user to another.
  • a user, A wants to send a MIME message, M, to an arbitrary user, B, using the S/MEVIE standard.
  • S ' e'(K_public,S).
  • user A e.g., A's terminal
  • K_publicB public encryption key
  • user B For example, such a key can be contained in a digital certificate signed by a trusted third party.
  • K_s a public encryption key
  • user A generates a random value for a key, K_s.
  • user A holds the public key pair, K_publicA,K_secretA, to be used for signing messages.
  • user A e.g., A's terminal
  • step 207 user B (e.g., B's terminal) receives the message, (K',S,C), together with a certificate which contains the public key, K_publicA.
  • user B checks the signature of the certificate with the key, K_publicA.
  • step 209 if user B determines that the signature is correct, user B accepts the key, K_publicA, as the public signing key of user A. Otherwise, if the signature is incorrect, then user B considers the message (K',S,C) as invalid and can disregard the communication.
  • user B accepts the message (K'S,C) as a valid message from A. Otherwise, user B considers the message as invalid.
  • the e-mail to be forwarded (in accordance with the user's predetermined mail forwarding policy) from the co ⁇ orate network (LAN) 22 to the external network's (Internet) mail server 16 is first encrypted.
  • the e-mail messages stored in the co ⁇ orate network's mail server 24 are maintained in the MEVIE format.
  • the encryption unit 30 can encrypt each e-mail message to be forwarded to the external mail server into an S/MEVIE format.
  • the encryption unit 30 can encrypt the e-mail to be forwarded into the S/MEVIE format using symmetric keys shared between the network mail server 24 and the user's PDA 14.
  • a digital certificate can be used to assure the integrity and non-repudiation of the message.
  • the S/MEVIE encrypted e-mail messages are transmitted from the network 22 to the external mail server 16 via the conventional connection 34.
  • the encrypted e- mail is then maintained in the user's mailbox at the external mail server, until the user requests the mail for delivery to the PC (or PDA) 14.
  • a conventional mail tool e.g., Netscape mail or Microsoft's Outlook Express
  • the user's PC (or PDA) 14 can retrieve the encrypted mail from the external mail server 16 via the connection 18.
  • the user's PC 14 can check the signature of the certificate and decrypt the mail from the S/MEVIE format to the MIME format. If a PDA (14) is used, it decrypts the received mail.
  • the mobile user can also transmit encrypted e-mail messages from the PC (or PDA) 14 to the network 22.
  • the user's PC (or PDA) 14 encrypts the e-mail to be forwarded to the network 22 from the MEVIE format to an S/MEVIE format, mail server 22.
  • the encrypted e-mail message (and a digital certificate associated with the mail server 22) is transmitted from the PC 14 to the decryption unit 28 via connection 20.
  • the decryption unit 28 checks the digital certificate and then decrypts the received e-mail message from the S/MEVIE format to the MEVIE format.
  • the present invention requires the use of only two digital certificates for authentication: the user's certificate for encrypted mail forwarded to the external mail server; and the co ⁇ orate mail server's certificate for encrypted mail forwarded to the co ⁇ orate network's mail server.
  • a conventional Certificate
  • Management System can be used in the co ⁇ orate network's mail server 24 to handle both the issuance of digital certificates and the publication of the revocation of such certificates, if so required.
  • one or more e-mail mailing lists can be implemented and secured.
  • mailing lists currently are useful for large groups of people having some common interests in communicating by e-mail.
  • a person can send certain subscription e-mail containing the e-mail messages intended for communication to a mailing list e-mail server.
  • the subscription e-mail can contain the e-mail address where the subscriber desires to receive e-mail from the mailing list. All mail received by the mailing list server is forwarded to all mail addresses of subscribers to the list.
  • anyone who wishes to subscribe to an e-mail list may do so. As such, the only identity related to a subscriber is that subscriber's e-mail address.
  • e-mail address could be an anonymous address.
  • a mailing list administrator it is currently not possible for a mailing list administrator to prevent malicious use of the list by certain subscribers.
  • all e-mail messages currently being sent to and from mailing list servers are sent in clear text.
  • the secure e-mail gateway provided by the present invention can be used to prevent such problems.
  • the MEVIE to S/MEVIE (or S/MEVIE to MEVIE) e-mail gateway (e.g., units
  • the gateway 22 can be used as a mailing list server.
  • S/MEVIE Secure Digital
  • the identity of the subscriber can be determined before allowing the subscriber to enter the mailing list in the server.
  • the confidentiality and integrity of the mail received by the gateway 22 can be ensured.
  • the gateway 22 can encrypt the e-mail by using the receiver's certificate. Consequently, all messages sent to and from the mailing list (server) will be protected.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

la présente invention concerne une méthode et un système permettant de sécuriser principalement un courrier électronique privé qui peut être expédié par un utilisateur ou lui être destiné via un réseau ouvert tel que l'Internet. Essentiellement, les messages électroniques sont cryptés avec un protocole de type enveloppe numérique sécurisée qui peut se fonder sur l'utilisation de certificats numériques. Le protocole S/MIME est un exemple de ce protocole cryptographique à enveloppe numérique. Il utilise une relation de sécurisation de domaine à utilisateur au lieu d'une relation de sécurisation d'utilisateur à utilisateur ou de domaine à domaine. L'utilisateur du radiotéléphone mobile d'un réseau d'entreprise (22) peut par exemple transmettre certains messages électroniques entrants à un serveur de courrier électronique extérieur (16) (par exemple sur l'Internet). Le courrier à expédier est d'abord crypté dans un format d'enveloppe numérique sécurisée (par exemple dans le format S/MIME) avec la clé secrète de l'utilisateur. Le courrier électronique protégé en provenance du réseau d'entreprise (22) peut donc être transmis à l'utilisateur via le serveur de courrier extérieur (16) (par exemple sur l'Internet) sans compromettre la sécurisation.
EP99958570A 1998-11-24 1999-11-08 Methode et systeme de securisation d'objets numerises Withdrawn EP1133854A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US19882298A 1998-11-24 1998-11-24
US198822 1998-11-24
PCT/SE1999/002021 WO2000031931A1 (fr) 1998-11-24 1999-11-08 Methode et systeme de securisation d'objets numerises

Publications (1)

Publication Number Publication Date
EP1133854A1 true EP1133854A1 (fr) 2001-09-19

Family

ID=22735007

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99958570A Withdrawn EP1133854A1 (fr) 1998-11-24 1999-11-08 Methode et systeme de securisation d'objets numerises

Country Status (4)

Country Link
EP (1) EP1133854A1 (fr)
CN (1) CN1328735A (fr)
AU (1) AU1590900A (fr)
WO (1) WO2000031931A1 (fr)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020049818A1 (en) * 1998-05-29 2002-04-25 Gilhuly Barry J. System and method for pushing encrypted information between a host system and a mobile data communication device
US6219694B1 (en) 1998-05-29 2001-04-17 Research In Motion Limited System and method for pushing information from a host system to a mobile data communication device having a shared electronic address
US6463463B1 (en) 1998-05-29 2002-10-08 Research In Motion Limited System and method for pushing calendar event messages from a host system to a mobile data communication device
EP1344353B1 (fr) 2000-12-22 2014-11-19 BlackBerry Limited Systeme de routeur sans fil et procede
GB2372413A (en) * 2001-02-20 2002-08-21 Hewlett Packard Co Digital credential exchange
US7295836B2 (en) 2001-03-09 2007-11-13 Research In Motion Limited Advanced voice and data operations in a mobile data communication device
US8406389B2 (en) 2001-03-09 2013-03-26 Research In Motion Limited Advanced voice and data operations in a mobile data communication device
CA2386491A1 (fr) * 2001-05-16 2002-11-16 Kasten Chase Applied Research Limited Systeme de transmission protegee de donnees electroniques
IL159340A0 (en) 2001-06-12 2004-06-01 Research In Motion Ltd System and method for processing encoded messages for exchange with a mobile data communication device
KR20040015272A (ko) 2001-06-12 2004-02-18 리서치 인 모션 리미티드 인증서 관리 및 전송 시스템 및 방법
IL159341A0 (en) 2001-06-12 2004-06-01 Research In Motion Ltd System and method for compressing secure e-mail for exchange with a mobile data communication device
KR20020094782A (ko) * 2001-06-13 2002-12-18 엘지전자 주식회사 이동통신 단말기를 이용한 복수의 이-메일 계정 관리 방법
BRPI0211093B1 (pt) 2001-07-10 2016-09-06 Blackberry Ltd sistema e método para efetuar o cache de chave de mensagem segura em um dispositivo de comunicação móvel
US8019081B2 (en) 2001-08-06 2011-09-13 Research In Motion Limited System and method for processing encoded messages
EP1633094B1 (fr) * 2001-10-25 2007-03-28 Research In Motion Limited Système et méthode en plusieurs phases pour le traitement de messages codés
ATE313194T1 (de) * 2001-10-25 2005-12-15 Research In Motion Ltd Mehrstufiges system und verfahren zur verarbeitung der kodierten nachrichten
US7865720B2 (en) * 2002-03-20 2011-01-04 Research In Motion Limited System and method for supporting multiple certificate status providers on a mobile communication device
US7272716B2 (en) 2002-08-30 2007-09-18 Sap Aktiengesellschaft Enterprise secure messaging architecture
US7836131B2 (en) 2002-10-25 2010-11-16 Sierra Wireless, Inc. Redirection of notifications to a wireless user device
US7251823B2 (en) 2002-12-17 2007-07-31 Sierra Wireless, Inc. Enterprise access configuration
EP1478143B1 (fr) * 2003-08-07 2005-10-05 Onaras AG Procédé et dispositif de transmission sécurisée de courrier électronique
CN1323508C (zh) * 2003-12-17 2007-06-27 上海市高级人民法院 一种基于数字证书的单点登录方法
US9094429B2 (en) 2004-08-10 2015-07-28 Blackberry Limited Server verification of secure electronic messages
JP2006319702A (ja) * 2005-05-13 2006-11-24 Murata Mach Ltd 電子メールサーバ装置
US7953971B2 (en) 2005-10-27 2011-05-31 Research In Motion Limited Synchronizing certificates between a device and server
US8355701B2 (en) 2005-11-30 2013-01-15 Research In Motion Limited Display of secure messages on a mobile communication device
US8135645B2 (en) 2005-12-06 2012-03-13 Microsoft Corporation Key distribution for secure messaging
CN101072093B (zh) * 2006-05-12 2010-11-24 中兴通讯股份有限公司 短信内容保护系统及方法
US7814161B2 (en) 2006-06-23 2010-10-12 Research In Motion Limited System and method for handling electronic mail mismatches
US20100250947A1 (en) * 2006-10-18 2010-09-30 Kamfu Wong System and method of preventing spam by using pay-charge-contribution and authentication means
US8179872B2 (en) 2007-05-09 2012-05-15 Research In Motion Limited Wireless router system and method
US7949355B2 (en) 2007-09-04 2011-05-24 Research In Motion Limited System and method for processing attachments to messages sent to a mobile device
CN103428077B (zh) * 2013-08-22 2016-08-17 北京明朝万达科技股份有限公司 一种安全收发邮件的方法和系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997000471A2 (fr) * 1993-12-15 1997-01-03 Check Point Software Technologies Ltd. Systeme pour la securisation et la modification selective du flux de paquets dans un reseau informatique
US5864683A (en) * 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5862220A (en) * 1996-06-03 1999-01-19 Webtv Networks, Inc. Method and apparatus for using network address information to improve the performance of network transactions
US6104716A (en) * 1997-03-28 2000-08-15 International Business Machines Corporation Method and apparatus for lightweight secure communication tunneling over the internet

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0031931A1 *

Also Published As

Publication number Publication date
CN1328735A (zh) 2001-12-26
AU1590900A (en) 2000-06-13
WO2000031931A1 (fr) 2000-06-02

Similar Documents

Publication Publication Date Title
WO2000031931A1 (fr) Methode et systeme de securisation d'objets numerises
US10313135B2 (en) Secure instant messaging system
EP1410601B1 (fr) Systeme et procede de mise en memoire cash de cles de messages proteges
ES2315379T3 (es) Sistema y metodo para el tratamiento de mensajes codificados.
US7325127B2 (en) Security server system
US6988199B2 (en) Secure and reliable document delivery
US7277549B2 (en) System for implementing business processes using key server events
US7376835B2 (en) Implementing nonrepudiation and audit using authentication assertions and key servers
US7196807B2 (en) Encrypted e-mail message retrieval system
US6084969A (en) Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network
EP1536601B1 (fr) Procédé et système de cryptage des courriers électroniques
US20030115448A1 (en) Methods and apparatus for securely communicating a message
US20060020799A1 (en) Secure messaging
CA2518025A1 (fr) Systeme de messagerie par courriel securise
JP2003503901A (ja) インターネット環境の移動通信システムにおける使用者情報セキュリティ装置及びその方法
Gabber et al. On secure and pseudonymous client-relationships with multiple servers
JPH07170280A (ja) ローカルエリアネットワーク
EP1437024B1 (fr) Procede et dispositif pour reseau de telecommunications
JP3803522B2 (ja) 電子メールサーバシステム
US20070079114A1 (en) Method and system for the communication of a message as well as a suitable key generator for this
CA2649100C (fr) Systemes et methodes de traitement assiste par serveur d'accuse de reception signe
JP2001094600A (ja) メッセージ転送ノード及びネットワーク
JP2002149569A (ja) 暗号通信システム、暗号通信方法およびコンピュータプログラム

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20010530

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

RIN1 Information on inventor provided before grant (corrected)

Inventor name: GEHRMANN, CHRISTIAN

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)

RBV Designated contracting states (corrected)

Designated state(s): DE FR GB

17Q First examination report despatched

Effective date: 20060922

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20070203