WO2000008793A2 - Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom - Google Patents
Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom Download PDFInfo
- Publication number
- WO2000008793A2 WO2000008793A2 PCT/US1999/017647 US9917647W WO0008793A2 WO 2000008793 A2 WO2000008793 A2 WO 2000008793A2 US 9917647 W US9917647 W US 9917647W WO 0008793 A2 WO0008793 A2 WO 0008793A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- policy
- packaged
- object product
- capabilities
- capability
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
Definitions
- the present invention relates generally to object-oriented communication techniques and constructs. More particularly, the present invention relates to a packaged-object product. The present invention also relates to a method and apparatus for packaging a data payload with executable code to form the packaged-object product.
- the executable code defines at least one policy, and a set of capabilities is associated with each policy. The policy responds to events which are associated with the capabilities.
- the packaged-object product created according to an embodiment of the present invention forms an encapsulated object having active, self- enforcing policies.
- a receiving station such as a computer
- requests are made of the capability at the receiving station.
- the encapsulated object responds to the requests in a manner such that the policy, or policies, defined by the executable code are enforced.
- the data payload forms a digital data file, such as an e-mail document or facsimile document.
- the executable code packaged together defines at least one policy with which a capability is associated.
- the policy embodied by the executable code defines who. when, or how a capability can be performed upon the data file.
- An exemplary policy embodied by the executable code comprises a restriction to access to the data file, and arr exemplary capability includes a read capability to permit reading of the data file if compliance with the policy is achieved.
- a communication system includes a sending station and a receiving station interconnected by way of a communication channel
- the information which is to be transmitted between the sending and receiving stations is typically in the form of. or is represented by. binary bits
- the binary bits are transmitted upon the communication channel to be received b ⁇ the receiving station
- binary bits forming the information might first be converted into a form to permit their transmission upon the communication channel And.
- facsimile machines also permit the communication of information between a sending-facsimile machine and a receiving-facsimile machine, typically connected together by way of a PSTN (public-switched telephonic network).
- PSTN public-switched telephonic network
- a document which is to be transmitted is converted into digital form and a binary representation of the document is transmitted by the sending-facsimile machine to a receiving-facsimile machine.
- Digitized information can analogously be communicated between a sending and a receiving station of other types of communication systems.
- Security issues relating to data communicated between a sending and a receiving station is sometimes of concern.
- Security of the communications is sometimes of concern, not only during transmission of information upon a communication channel but also subsequent to its reception at a receiving station.
- Encryption techniques are sometimes utilized to encrypt information prior to its transmission upon a communication channel to a receiving station. Encryption of the information reduces the possibility that a recipient, other than an intended recipient, shall be able to recover the informational content of the information.
- the received information is de-encrypted, and thereafter, the informational content of the information is recovered. Once the information has been de-encrypted, the sender of the information no longer controls access to the information.
- the sender loses use-control over the information. If, however, the sender were able to maintain use-control over the information, the sender would be able to limit access to. and use of. the information.
- the present invention accordingly, advantageously provides apparatus, and an associated method, for packaging a data payload together with executable code to form a packaged-object product.
- the executable code defines a policy with which compliance must be achieved to permit a capability, such as a read or copy operation, to be performed upon the data payload.
- the present invention further advantageously provides a packaged- object product formed of a data payload and executable code which defines a policy and with which a capability is associated.
- the policy responds to events which are associated with the capability.
- the packaged-object product forms an encapsulated object having active, self-enforcing policies.
- requests are made of the capability associated with the executable code forming a policy and which is included as a portion of the encapsulated object.
- the encapsulated object responds to the requests made of the encapsulated object at the receiving station.
- the responses are made in a manner such that the policy defined by the executable code is enforced.
- the executable code forming the policy defines who. when or how a capability can be performed. And. the capability associated with the policy defines an act which can be carried out upon the object.
- One or more policies are defined by the executable code and each policy has associated therewith one or more capabilities. That is to say, a set of capabilities is associated with each policy.
- An act carried out upon an object is dependent upon the requests made upon the encapsulated object by the receiving station. Thereby, separate acts might be performed upon the encapsulated object dependent upon the requests made of it by the receiving station.
- policies Through use of appropriate policies, access to the object can be made to be limited. Security problems associated with an object subsequent to its de-encryption are obviated due to the self-enforcing nature of the policies of the encapsulated object.
- the executable code defining the policy of the encapsulated object is formed of objects-oriented codes, such as JAVA TM code.
- An encapsulated object of an embodiment of the present invention is able to implement the specified policies which have associated therewith dynamics capabilities.
- the packaged-object product includes a digital data file, such as an e-mail document, facsimile document, text file, picture file, or digitized audio file.
- a digital data file such as an e-mail document, facsimile document, text file, picture file, or digitized audio file.
- the policy embodied by the executable code with which the data file is packaged defines who, when, or how a capability, such as a read capability, is performed upon the data file.
- the policy packager packages data within at least one policy to form a packaged-object product.
- At least one policy is stored at a storage location of a storage element.
- Each policy has a set of capabilities associated therewith. Each capability of the set of capabilities is effectuable responsive to compliance with the policy to which the set of capabilities is associated.
- An adder is coupled to receive the data and to the storage element. The adder selectively accesses the storage location at which the policy is stored. The selected policy is retrieved and added to the data to package the data therewith. _The data, once packaged with the selected policy, forms the packaged-object product.
- a packaged-object product and an apparatus and method for producing such product, is provided.
- the packaged- object product includes a data payload.
- At least one policy is packaged together with the data payload.
- the at least one policy defines selected criteria and has associated therewith a set of capabilities. Each capability of the set of capabilities defines an event capable of being performed upon the data payload when compliance with the selected criteria defined by the policy is achieved.
- Figure 1 illustrates a functional block diagram of a policy packager of an embodiment of the present invention.
- Figure 2 illustrates a representation of an encapsulated object of an embodiment of the present invention formed during operation of the policy packager shown in Figure 1 .
- Figure 3 illustrates a representation of a portion of the encapsulation layer of the encapsulated object shown in Figure 2.
- Figure 4 illustrates a functional block diagram of a communication system in which an encapsulated object, such as the encapsulated object shown in Figure 2. is generated and transmitted between a sending and a recei v ing station.
- an encapsulated object such as the encapsulated object shown in Figure 2.
- Figure 5 illustrates a method flow diagram listing the method acts of the method of operation of an embodiment of the present invention.
- a policy packager shown generally at 10. is operable to package an object 12 forming a digital payload together with one or more policies to form an encapsulated object 14.
- the policy packager is formed of a digital processor, such as a personal computer or other computing device.
- the objects 12 may also be generated at the digital processing device.
- the object 12 is here represented as an input to the policy packager 10 as. in the exemplary implementation, the object 12 is separately created and then applied to the policy packager 10.
- the policy packager 10 is here shown to be coupled to a user interface.
- the user interface 16 forms a computer key board permitting a user to enter input commands to effectuate operation of the policy packager, as appropriate.
- a controller 18 is operable to control packaging operations of the packager 10 and is here shown to be coupled to receive commands generated by way of actuation of the user interface 16.
- the policy packager 10 is further shown to include a storage element 22 having a plurality of storage locations 24.
- the storage elements 22 is formed alternately of computer main memory or storage elements of a computer-peripheral, storage device. Data stored in the storage locations of the storage elements 22 form executable code defining policies.
- Each policy has associated therewith a set of one or more capabilities.
- Each policy defines who. when or how a capability can be performed. And. each capability defines an action.
- the policy packager further includes an adder 26 coupled to receive the object 12 and also to data stored in storage locations 24 of the storage element 22. Operation of the adder 26 is here shown to be controlled by the controller 1 8 which is also operable to control which of the data stored in the selected ones of the_storage locations is provided to the adder 26.
- the adder 26 is operable to package together the objects 12 and one or more policies formed of the data stored in the storage locations 24 of the storage element.
- the adder forms the encapsulated object 14 by packaging together the objects 12 together with the data forming the policies retrieved from the storage locations 24. Selection of which of the policies is added by the adder 26 together with the object 12 is made by user actuation of the user interface 16 or can be automatically selected by way of an automated process.
- the adder 26 is operable, for example, to concatenate together an object 12 to the data forming the selected policies.
- the data payload forming the object 12 forms a facsimile document
- the policy packager 10 forms a portion of a facsimile machine.
- the data payload forming the object 1 2 comprises an e-mail document, such as that generated at a personal computer
- the policy packager 10 forms a portion of such personal computer.
- the data payload forming the object 12 can also be formed of any digital material, such as digitized text, digitized picture information, and digitized audio information.
- the policy packager 10 forms a portion of digital processing apparatus operable to receive and perform operations upon such digital data.
- FIG 2 illustrates an encapsulated object 14 of an embodiment of the present invention.
- the encapsulated object 14 forms a packaged-object product, such as that formed by the policy packager 10 shown in Figure 1 .
- the encapsulated object 14 is formed of a data payload. here the object 12.
- Exemplary objects 12 include facsimile documents, e-mail documents, text documents, digitized picture documents, digitized audio documents, and the like.
- the encapsulated object 14 also includes executable code forming one or more policies 32. While in an actual implementation, the executable code forming policies 32 are concatenated together with the objects 12. Policies 32 are here shown to be packaged about, or to encapsulate, the objects 12.
- Such encapsulation indicates that the access to the objects 1 2 is limited, and the policies 32 form a self-enforcing, content-control mechanism which limits the performance of actions upon the object unless compliance with at least one. more than one. or all of the policies 32 is achieved.
- the exemplary object 14 shown in Figure 2 includes N policies which encapsulate the object 12. N can be of anv selected number.
- a set of capabilities is associated with each policy 32.
- a policy defines who, when or how. an action can be performed upon the objects 12.
- the capability defines the action which can be performed upon the object if the policy with which the capability is associated is complied with, the capability can be performed upon the objects 12.
- Figure 3 illustrates the policies 32, and sets 34 of capabilities 36 associated with the policies 32.
- the executable code of which the policies 32 are formed comprise object-oriented code, such as JAVA TM code.
- Exemplary capabilities 36 associated with various of the policies include, for example, a read capability, a forward capability, a change (or overwrite) capability, an append capability, an annotate capability, and a delete-object capability.
- Each policy 32 forms a content-control mechanism controlling access to the objects 12 to have one or more capabilities performed thereon.
- An exemplary encapsulated object includes a text document forming the object 12 and which includes a legal notice message.
- the document forming the object 12 is encapsulated with a policy of: a presentation of the legal notice to a prospective-accessor, and legal notice acknowledgment, or a failure to do so.
- a capability associated with such policy permits limited access to the document if the prospective-accessor acknowledges retrieval of the legal notice.
- Such an encapsulated object limits access to the document unless a prospective accesser acknowledges receipt of the legal notice associated with the document.
- Figure 4 illustrates a communication system, shown generally at 52, having a transmitting station 54 and a receiving station 56, interconnected by way of a communication channel 58.
- the transmitting and receiving stations 54 and 56 form computer stations connected together by way of a computer network which forms the communication channel 58.
- the transmitting station 54 includes a policy packager 10 and, here, also an object creator 62.
- the object creator 62 creates an object 12 (shown in Figure 1 ).
- the object created by the object creator 62 is provided to the policy packager 10 which packages the object together with one or more policies as above-described to form an encapsulated object 14 (shown in Figures 1 and 2). Additional portions (not shown) of the transmitting station 54 place the object 14 in a form to permit its communication upon the networked connection 58 for transmission to the receiving station 56.
- the receiving station 56 receives the encapsulated object 14 transmitted upon the network 58.
- the encapsulated object is delivered to an area of the receiving station 56 at which requests are made of the capabilities associated with the at least one policy of the encapsulated object.
- the receiving station generates events, also referred to as method requests or messages, and the encapsulated object responds to such events.
- the object responds to the events in manners which enforce the policy or policies of the encapsulated object. When compliance is achieved with the policy or policies, performance of the one or more capabilities associated with such policy or policies is carried out at the receiving station.
- Figure 5 illustrates a method, shown generally at 72. of an embodiment of the present invention.
- the method 72 packages a data payload within at least one policy to form a packaged-object product.
- At least one policy is stored.
- the policy_ has a set of capabilities associated therewith. Each capability of a set of capabilities is effectuable responsive to compliance with the policy with which the set of capabilities is associated.
- one or more policies stored during the act of storing is selectively accessed.
- the policy accessed during the act of selectively accessing is retrieved.
- the policy retrieved during the act of retrieving is added to the data payload. Thereby, the data payload is packaged with the policy.
- the data payload, once packaged with the policy forms the packaged-object product.
- the creator and sender of the encapsulated object of an embodiment of the present invention thereby includes active, self-enforcing policies.
- effective control over the object is maintained by the creator by virtue of the policies packaged together with the object.
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP99938984A EP1104606A2 (en) | 1998-08-04 | 1999-08-04 | Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom |
AU53354/99A AU5335499A (en) | 1998-08-04 | 1999-08-04 | Apparatus and method for forming a packaged-object product and a packaged-objectproduct formed therefrom |
CA002339239A CA2339239A1 (en) | 1998-08-04 | 1999-08-04 | Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12946798A | 1998-08-04 | 1998-08-04 | |
US09/129,467 | 1998-08-04 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2000008793A2 true WO2000008793A2 (en) | 2000-02-17 |
WO2000008793A3 WO2000008793A3 (en) | 2000-05-18 |
Family
ID=22440096
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1999/017647 WO2000008793A2 (en) | 1998-08-04 | 1999-08-04 | Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom |
PCT/US1999/017786 WO2000008794A2 (en) | 1998-08-04 | 1999-08-04 | Systems and methods for securing electronic message |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1999/017786 WO2000008794A2 (en) | 1998-08-04 | 1999-08-04 | Systems and methods for securing electronic message |
Country Status (5)
Country | Link |
---|---|
EP (2) | EP1101190A2 (en) |
CN (1) | CN1342278A (en) |
AU (2) | AU5335499A (en) |
CA (1) | CA2339239A1 (en) |
WO (2) | WO2000008793A2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001076181A2 (en) * | 2000-03-31 | 2001-10-11 | Tumbleweed Communications Corp. | Policy enforcement in a secure data file delivery system |
EP1386242A1 (en) * | 2001-04-03 | 2004-02-04 | Purdue Pharma L.P. | Privileged e-mail system with routing controls |
US20080172717A1 (en) * | 2000-11-08 | 2008-07-17 | Peter Malcolm | Information Management System |
US10552603B2 (en) | 2000-05-17 | 2020-02-04 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9219755B2 (en) | 1996-11-08 | 2015-12-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US8079086B1 (en) | 1997-11-06 | 2011-12-13 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US6938065B2 (en) | 2000-12-12 | 2005-08-30 | Ericsson Inc. | System and method for controlling inclusion of email content |
US7725098B1 (en) | 2003-09-04 | 2010-05-25 | Emc Corporation | Data message processing |
US8831194B2 (en) | 2005-06-30 | 2014-09-09 | Emc Corporation | Telephonic communication redirection and compliance processing |
US8059805B2 (en) | 2005-06-30 | 2011-11-15 | Emc Corporation | Enhanced services provided using communication redirection and processing |
US8605878B2 (en) | 2005-06-30 | 2013-12-10 | Emc Corporation | Redirecting and mirroring of telephonic communications |
US20180176256A1 (en) * | 2016-12-16 | 2018-06-21 | Futurewei Technologies, Inc. | Temporal Control and Access Control of Emails |
US10924459B2 (en) * | 2016-12-16 | 2021-02-16 | Futurewei Technologies, Inc. | Location control and access control of emails |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4525780A (en) * | 1981-05-22 | 1985-06-25 | Data General Corporation | Data processing system having a memory using object-based information and a protection scheme for determining access rights to such information |
US4924513A (en) * | 1987-09-25 | 1990-05-08 | Digital Equipment Corporation | Apparatus and method for secure transmission of data over an unsecure transmission channel |
US5475845A (en) * | 1993-07-19 | 1995-12-12 | Taligent, Inc. | Wrapper system for interfacing an object-oriented application to a procedural operating system |
US5805700A (en) * | 1996-10-15 | 1998-09-08 | Intel Corporation | Policy based selective encryption of compressed video data |
US5825891A (en) * | 1996-01-16 | 1998-10-20 | Raptor Systems, Inc. | Key management for network communication |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5325310A (en) * | 1992-06-26 | 1994-06-28 | International Business Machines Corporation | Method and system for persistant electronic mail reply processing |
JPH08331175A (en) * | 1995-05-31 | 1996-12-13 | Sony Corp | Method for controlling information and device therefor |
US5893910A (en) * | 1996-01-04 | 1999-04-13 | Softguard Enterprises Inc. | Method and apparatus for establishing the legitimacy of use of a block of digitally represented information |
US5937161A (en) * | 1996-04-12 | 1999-08-10 | Usa.Net, Inc. | Electronic message forwarding system |
US5903652A (en) * | 1996-11-25 | 1999-05-11 | Microsoft Corporation | System and apparatus for monitoring secure information in a computer network |
-
1999
- 1999-08-04 EP EP99943655A patent/EP1101190A2/en not_active Withdrawn
- 1999-08-04 AU AU53354/99A patent/AU5335499A/en not_active Abandoned
- 1999-08-04 AU AU56708/99A patent/AU5670899A/en not_active Abandoned
- 1999-08-04 EP EP99938984A patent/EP1104606A2/en not_active Withdrawn
- 1999-08-04 WO PCT/US1999/017647 patent/WO2000008793A2/en not_active Application Discontinuation
- 1999-08-04 WO PCT/US1999/017786 patent/WO2000008794A2/en not_active Application Discontinuation
- 1999-08-04 CN CN99809311A patent/CN1342278A/en active Pending
- 1999-08-04 CA CA002339239A patent/CA2339239A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4525780A (en) * | 1981-05-22 | 1985-06-25 | Data General Corporation | Data processing system having a memory using object-based information and a protection scheme for determining access rights to such information |
US4924513A (en) * | 1987-09-25 | 1990-05-08 | Digital Equipment Corporation | Apparatus and method for secure transmission of data over an unsecure transmission channel |
US5475845A (en) * | 1993-07-19 | 1995-12-12 | Taligent, Inc. | Wrapper system for interfacing an object-oriented application to a procedural operating system |
US5825891A (en) * | 1996-01-16 | 1998-10-20 | Raptor Systems, Inc. | Key management for network communication |
US5805700A (en) * | 1996-10-15 | 1998-09-08 | Intel Corporation | Policy based selective encryption of compressed video data |
Non-Patent Citations (4)
Title |
---|
BOYD C.: 'Modern data encryption' ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL October 1993, pages 271 - 278, XP002925136 * |
FENNA ERIK: 'Data encryption protocols for electronic mail' IEEE 1984, pages 123 - 125, XP002925134 * |
FORCE GORDON: 'Portable data encryption approaches' pages 413 - 419, XP002925133 * |
SMID M.E. ET AL: 'The data encryption standard: past and future' PROCEEDINGS OF THE IEEE vol. 76, no. 5, May 1988, pages 550 - 559, XP002925135 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001076181A2 (en) * | 2000-03-31 | 2001-10-11 | Tumbleweed Communications Corp. | Policy enforcement in a secure data file delivery system |
WO2001076181A3 (en) * | 2000-03-31 | 2002-03-21 | Tumbleweed Comm Corp | Policy enforcement in a secure data file delivery system |
US8196183B2 (en) | 2000-03-31 | 2012-06-05 | Axway Inc. | Policy enforcement in a secure data file delivery system |
US10362063B2 (en) | 2000-03-31 | 2019-07-23 | Axway Inc. | Policy enforcement in a secure data file delivery system |
US10552603B2 (en) | 2000-05-17 | 2020-02-04 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US20080172717A1 (en) * | 2000-11-08 | 2008-07-17 | Peter Malcolm | Information Management System |
US9225553B2 (en) * | 2000-11-08 | 2015-12-29 | Ca, Inc. | Information management system |
EP1386242A1 (en) * | 2001-04-03 | 2004-02-04 | Purdue Pharma L.P. | Privileged e-mail system with routing controls |
EP1386242A4 (en) * | 2001-04-03 | 2005-02-09 | Purdue Pharma Lp | Privileged e-mail system with routing controls |
Also Published As
Publication number | Publication date |
---|---|
WO2000008794A3 (en) | 2000-05-18 |
EP1104606A2 (en) | 2001-06-06 |
CA2339239A1 (en) | 2000-02-17 |
WO2000008794A2 (en) | 2000-02-17 |
AU5670899A (en) | 2000-02-28 |
AU5335499A (en) | 2000-02-28 |
WO2000008793A3 (en) | 2000-05-18 |
EP1101190A2 (en) | 2001-05-23 |
CN1342278A (en) | 2002-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6230186B1 (en) | Private electronic message system | |
US6591367B1 (en) | Method and apparatus for preventing unauthorized copying and distributing of electronic messages transmitted over a network | |
CN1156765C (en) | Security mechanism for providing access control to local hold data | |
US9825925B2 (en) | Method and apparatus for securing sensitive data in a cloud storage system | |
US8601605B2 (en) | Methods and apparatus for secure document printing | |
EP1104606A2 (en) | Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom | |
US6665709B1 (en) | Method, apparatus, and system for secure data transport | |
US7900211B2 (en) | Method and apparatus for data transfer across a network | |
US20050105719A1 (en) | Personal information control and processing | |
EP1662356A2 (en) | Information leakage prevention method and apparatus and program for the same | |
US20020178353A1 (en) | Secure messaging using self-decrypting documents | |
EP0880088A2 (en) | Data copyright management system and apparatus | |
EP1359758A1 (en) | Efficient encryption of image data | |
US20030044009A1 (en) | System and method for secure communications with network printers | |
WO2001026277A1 (en) | Method and apparatus for packaging and transmitting data | |
CN1522516A (en) | Secure header information for multi-content e-mail | |
JP2002501334A (en) | System for sending subscription information and content to mobile devices | |
WO1999017504A1 (en) | Messaging application having a plurality of interfacing capabilities | |
WO1997039552A1 (en) | An apparatus and method for re-encrypting data | |
US11216577B1 (en) | Systems, methods, and computer-readable media for utilizing anonymous sharding techniques to protect distributed data | |
US20040088539A1 (en) | System and method for securing digital messages | |
US20030081788A1 (en) | Secure printing to a web-based imaging print service | |
CN104601548A (en) | Generation method and device of encrypted file and computing equipment | |
US20050216754A1 (en) | Method of encrypting digital items delivery through a communication network | |
JP3537959B2 (en) | Information decryption device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 99809311.4 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2339239 Country of ref document: CA Ref document number: 2339239 Country of ref document: CA Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999938984 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1999938984 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1999938984 Country of ref document: EP |