WO2001006805A1 - Procede et systeme permettant d'authentifier un dispositif de communication mobile - Google Patents
Procede et systeme permettant d'authentifier un dispositif de communication mobile Download PDFInfo
- Publication number
- WO2001006805A1 WO2001006805A1 PCT/SE2000/001418 SE0001418W WO0106805A1 WO 2001006805 A1 WO2001006805 A1 WO 2001006805A1 SE 0001418 W SE0001418 W SE 0001418W WO 0106805 A1 WO0106805 A1 WO 0106805A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer system
- code word
- code
- char
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/214—Monitoring or handling of messages using selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/58—Message adaptation for wireless communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates to a method and a system for authenticating a mobile communication device.
- the invention relates to a transmission system, which transmits data between a computer system and a mobile communication device, and to a method for authenticating a mobile communication device to a computer system.
- SMS short text message
- step (V) the computer system transmits information (e.g. the code word and a "you've got mail"-message) used in the authentication process, but the device has not access to data in the computer system.
- information e.g. the code word and a "you've got mail"-message
- the computer system Preferably the computer system generates a random code word.
- the computer system uses a predetermined address of the device.
- the generation of the code message, in step (III) is preferably performed by encryption of the received code word using a unique encryption key of the device. If the code message is verified, step (VI), then the address of the device is authenticated for data transmission.
- the device transmits the code message using a Hypertext Transfer Protocol (HTTP) or Simple Mail Transport Protocol (SMTP).
- HTTP Hypertext Transfer Protocol
- SMTP Simple Mail Transport Protocol
- the computer system transmits data in step (VI) to the address from where the device sent the code message, e.g. the computer system extracts the sender address of the mobile communication device and transmits the data to this address. This address can differ from the address to which the code word was transmitted.
- authenticated data transmission can be obtained.
- automated forwarding of data such as electronic mail (E-mail)
- E-mail facilitated logging in on a secure network, such as a bank and many more applications where an authenticated transmission is required or desired.
- FIG. 1 is a schematic view of a system for automatic forwarding of E-mail or other data using the Internet.
- FIG. 2 is a schematic view of a system for automatic forwarding of E-mail or other data using a packet data network.
- FIG. 3 is a schematic view of a system for automatic authentication of a device over an Internet connection.
- Fig. 4 is a flow chart illustrating the steps carried out when authenticating a mobile communication device and initiating a data transmission in the system shown in Fig. 1.
- Figs. 5a and 5b are flow charts illustrating the steps carried out when authenticating a mobile communication device and initiating a data transmission in the system shown in Fig. 2.
- Fig. 6 is a flow chart illustrating the steps carried out when authenticating a mobile communication device in the system shown in Fig. 3.
- Fig. 1 a schematic view of a system for automatic forwarding of E-mail or other data using an Internet connection is shown.
- the system comprises a computer system 101 , which in turn can comprise a number of different computers and other devices.
- the computer system 101 in Fig. 1 comprises an electronic mail (E-mail) server 103 connected to a local area network (LAN) 107 of the computer system 101.
- the server 103 is arranged to handle electronic mails (E-mails) within the computer system 101.
- the computer system 101 also comprises an authentication server 105, which also is connected to the LAN 107 and to a communication device 108 for transmitting messages outside the computer system 101.
- the entire computer system 101 is, for example, located inside a firewall 109.
- the only way for entering data from outside the firewall 109 to the computer system 101 is through the firewall 109.
- the firewall 109 is arranged to only let trough data traffic arriving in a HTTP or SMTP format.
- a mobile communication device 1 15 is located outside the firewall.
- the firewall is connected to the Internet 1 1 1 , which in turn is connected to a number of Internet service providers (ISP) 1 13.
- the Internet service providers 1 13 provides an interface via which different devices, such as the mobile communication device 1 15, can connect to the Internet.
- Fig. 4 a flow chart illustrating different steps carried out when authenticating a mobile communication device 1 15 and initiating a data transmission from the computer system 101 to the mobile communication device 1 15 in the system shown in Fig. 1.
- First some event such as the arrival of an E-mail to the E-mail server 103 of the computer system 101, which E-mail is addressed to a user of the device 1 15, triggers the set up of an authenticated transmission towards the device 115 from the computer system 101, step 401.
- the computer system 101 is arranged to automatically forward data, in this case E-mails, which is present inside the computer system and which is intended for a client which presently is located outside the computer system 101 and hence also outside the firewall 109.
- the system 101 then generates a random code word, step 403.
- the code word is generated by the authentication server 105.
- the code word generated by the authentication server 105 is then transmitted via the communication device 108, for example by means of a transmitting a short message service (SMS) message, to the device 1 15, step 405.
- SMS short message service
- the authentication server uses a predetermined address of the user, in this case an SMS number.
- the device 1 15 receives the code word from the computer system 101, step 407. In response to this reception the device automatically connects to an Internet service provider (ISP) 1 13, step 409.
- ISP Internet service provider
- IP Internet protocol
- the device also generates a code message based on the received code word, step 414.
- an E-mail server is set up inside the device, step 413.
- An E-mail is then transmitted to the authentication server 105 of the computer system, step 415.
- the E-mail from the device 115 to the authentication server 105 is transmitted via the ISP 1 13, the Internet 1 1 1, through the firewall 109, and via the LAN 107.
- the E-mail from the device 115 to the authentication server 105 comprises at least the code message.
- the code message is preferably generated by encrypting the received code word using a unique encryption key.
- the code message is generated by encrypting the code word together with a part of the encryption key.
- the E-mail from the device to the authentication server 105 is transmitted using a SMTP or HTTP protocol, since the firewall 109 is designed to only let such data traffic through.
- the firewall 109 can maintain a high level of security.
- the SMTP protocol is used, since it only requires one socket to be used for the connection.
- the authentication server receives the code message from the dev ice, step 417.
- the code word is then extracted from the received E-mail, which may require decryption if the code word is encrypted, step 419.
- the session ends, step 423.
- the computer system 101 can be arranged to continue to try to establish an authenticated connection to the device 1 15 later.
- the authentication server knows that it is the correct device.
- the authentication server knows where to transmit the data, in this example an E-mail.
- the authentication server 105 copies the data from the E-mail server and transmits the E-mail to the device 1 15 using the IP-address of the device, step 425.
- the data transmitted is preferably encrypted using the unique encryption key of the device 1 15.
- FIG. 2 another system for automatic forwarding of E-mail or other data, which uses packet data transmission is shown.
- the system as shown in Fig. 2 is similar to the system shown in Fig. 1.
- a packet data network 1 12 is used instead of using an ISP 1 13 for transmitting data between the computer system 101 and the device 1 15, a packet data network 1 12 is used.
- the Internet can be used for transmissions between the computer system 101 and the packet data network 1 12.
- Fig. 5a a flow chart illustrating the steps carried out when authenticating a mobile communication device in the system shown in Fig. 2 is shown.
- the flow chart in Fig. 5 is similar to the flow chart in Fig. 4. However, the transmission from the device 1 15 to the computer system 101 is done via the packet data network, 1 12.
- the code word can be transmitted to a predetermined address of the device using the packet data network.
- the code word can then be transmitted embedded in a data packet.
- Fig. 5b a flow chart illustrating yet another way of authenticating a mobile communication device is shown, which is similar to the method described above in conjunction with Fig. 5a.
- the difference between the flow chart in Fig. 5a and the flow chart in Fig. 5b is that the authentication server extracts the code word (step 419 in Fig. 5a), and compares it to the code word; and that the authentication server extracts the code message (step 418 in Fig. 5b), and compares it to a code message generated by itself using the same code message generating algorithm as the device.
- the device upon reception of the code word, the device generates a code message using the code word as input data in a code message generating algorithm, step 414.
- the system uses the same code message generation algorithm as the device, step 420 in order to authenticate the device.
- the device generates the code message, step 414, during the time interval between the reception of the code word, step 407, and the transmission of the E-mail, step 415.
- the authentication server generates the code message, step 420 during the time interval between the generation of the code word, step 403, and the comparison of the code messages, step 421.
- Fig. 3 a view of a system for automatic authentication of a device over an Internet connection is shown.
- the system used can be similar to the system as shown in Fig. 1 or Fig. 2.
- the system as shown in Fig. 3 also comprises a financial transaction server 104, which is connected to the LAN 107.
- Fig. 6 a flow chart illustrating the steps carried out when authenticating the device 1 15 to the computer system 101 in the system shown in Fig. 3 is shown.
- the user transmits an E-mail from the device 1 15 to the authentication server 105 requesting to be authenticated, step 400.
- the E-mail which comprises information identifying the user, such as a user ID, is transmitted via the ISP 1 13, the Internet 1 1 1, through the firewall 109, and via the LAN 107 to the authentication server 105.
- the computer system 101 receives the request, step 402.
- the authentication server 105 In response to this request the authentication server 105 generates a code word, in particular a random code word, step 403.
- the system 101 then transmits the code word via the communication device 108, for example by means of transmitting a short message service (SMS) message, to the device 1 15, step 405.
- SMS short message service
- the computer system sends the code word to a predetermined address of the device 1 15.
- the computer system 101 uses the received identification information from the user together with a stored address list to obtain the (predetermined) address.
- the random code word is transmitted on the Internet to a server or the like, which server in turn transmits an SMS to the device 1 15.
- the device 1 15 receives the code word from the computer system 101 , step 407, and generates a code message.
- the device In response to this reception the device automatically transmits a second E-mail, including the code message, to the authentication server 105 of the computer system, step 415.
- the second E-mail from the device 1 15 to the authentication server 105 is transmitted via the ISP 1 13, the Internet 1 1 1 , through the firewall 109, and via the LAN 107.
- the device 1 15 does not have to set up a new connection to the Internet when transmitting the E-mail comprising the code message, since an Internet connection already has been set up when transmitting the first E-mail in step 400.
- the device connect to the Internet a second time when it receives the code word in step 407, if this should turn out to be advantageous.
- the E-mail from the device 1 15 to the authentication server 105 comprises at least the code message.
- the generation of the code message is preferably done by using a unique encryption key.
- the code message is generated by encrypting the code word and a part of the encryption key.
- the E-mails from the device 1 15 to the authentication server 105 are transmitted using a SMTP or HTTP protocol, since the firewall 109 is designed to only let such data traffic through.
- the firewall 109 can maintain a high level of security.
- the SMTP protocol is used, since it only requires one socket to be used for the connection.
- the authentication server receives the E-mail from the device, step 417.
- the code word is then extracted from the received E-mail, e.g. by extracting and decrypting the code message, step 419.
- it is checked if the transmitted code word matches the received code word, step 421.
- the computer system 101 can be arranged to return a message to the device informing the user of the device that access is denied, so that the user can try to connect again if he/she wishes to do so.
- the device 1 15 can be any type of mobile communication device, which can receive and transmits data.
- the device can be a mobile telephone, a computer comprising a wireless modem or a combination thereof, such as a hand held computer comprising an integrated mobile telephone.
- the device 1 15 In order for the device 1 15 to operate properly it must be loaded with a suitable program, which enables the device to communicate using the method as described above.
- the functions required for enabling the device to operate according to the method can of course also be implemented in hardware. Software or hardware support for the authentication method is also provided in the computer system.
- the system as described in conjunction with Figs. 3 and 6 can also be used in other types of transactions than financial transactions.
- Appendix 1 - 12 a computer program listing illustrating a software implementation of different procedure steps is shown.
- Appendices 1 - 6 a program listing in C++ language of some procedure steps in the computer system is shown, for example "lumpio" in appendix 5-6 deals with encoding and decoding.
- Appendices 7 - 12 a listing of some procedure steps in the client or device is shown, for example: “pushnot” in appendices 7-8 initiates a connection upon receipt of an SMS using the function "DoConnect”; “client” in appendices 11-12 use the functions “lumpIO_fputs” and “lumpIO fgets” for decryption and encryption, and the function "send_f ⁇ le” to send a mail.
- This SMTP server expects to get either: [[ Step (a) is NOT needed - messages will get from the EVO server into the right place behind my back a) "real" email from the Internet which must be sent on to a PAT client (on EPOC) - in which case it should queue the email to be sent AND queue an SMS to be sent to the user which will contain the token used to authenticate them
- # include ⁇ sys/stat.h> /* For getopt() */ extern char *optarg; extern int optind; #endif
- MAX_DB_FIELDLEN 100 char user[ MAX DB FIELDLEN ], password[ MAX_DB_FIELDLEN ], evokey[ MAX DB FIELDLEN ], randnum[ MAX DB FIELDLEN ], dbtime[ MAX_DB_FIELDLEN ];
- MAX_ VERSION 100 char client_version[ MAX VERSION ]; bool authenticated false; void main( int argc, char **argv ); void parse_args( int argc, char **argv ); void become_daemon(); #ifdef UNIX void process_under_inetd(); char *get_my_login();
- /* client has no email to send to me! */ nprintf( n, "QUIT ⁇ r ⁇ n” ); break; ⁇ ⁇ nprintf( n, "200 So long and thanks for all the fish. ⁇ r ⁇ n” ); nclose( n ); logit( INFO, "end of process smtp” ); ⁇ bool process_state( int state, NET n, char *buf, char *addr )
- ⁇ dot strchr( addr, '.' ); if( ! dot ) ⁇ nprintf( n, "550 bad token/address: no ⁇ r ⁇ n” ); return false;
- Hash md5 ( SSH HASH MD5 ); md5.Add( RandomToken, 16 ); memcpy( db_hash_rnd_str, md5.Digest(), 16 );
- REPLY_OK( ret ) ) ⁇ logit( WARNING, "bad reply to MAIL FROM of %d", ret ); return false; ⁇ logit( INFO, "Send RCPT TO: ⁇ %s>", client version ); nprintf( n, "RCPT TO: ⁇ %s> ⁇ r ⁇ n", client version ); ret read_smtp_reply( n, tmp, sizeof( tmp ) ); if( !
- int des_ede_encrypt (unsigned char *input, unsigned char *output, des_key_schedule ksl , des key schedule ks2, des_key_schedule ks3, int encrypt)
- FILE *f lio->f; if( feof( f )
- ferror( f ) ) return NULL; int in fread( &tmp_in[ 0 ], sizeof( char ), LUMP_DATA_LEN, f ); if( in ⁇ 0 ) return NULL; logit( INFO, "fread %d bytes «%*.*s»", in, in, in, &tmp_in[ 0 ] );
- FILE *f lio->f; if( feof( f )
- CFloatCloseAppUi CFloatAppUi* anAppUi
- public // from CCoeControI void Draw(const TRect& aRect) const
- void HandlePointerEventL Const TPointerEvent& aPointerEvent
- EFloatWindowHeight EFloatHeight+2*EFloatMargin+EFloatTitleHeight
- ENewWindowHeight ENewHeight+2*ENewMargin+ENewTitIeHeight
- CEikCommandButton NewButton(const TDesC8& text); inline CNewWindow* GetWindowQ ⁇ return iNewWindow; ⁇ ; private: void Draw(const TRect& aRect) const; private:
- Tint ThreadFunction TAny* anArg
- StartThread CFloatAppUi* ParentAppUi,RThread *thread
- Tint CFloatAppUi :TextWidth(char *Text)
- TPtrC8* Buffer new TPtrC8((TUint8 *)Text);
- TInt width iEikonEnv->Static()->NormalFont()->TextWidthInPixels(*Buffer); delete Buffer; return(width);
- Tint width TextWidth(Text);
- TBufC8 ⁇ 512> Buffer((const unsigned char *)Text); iCoIumnView->GetListArray()->AppendL(Buffer); iColumnView->RedrawL();
- TBufC8 ⁇ 512> Buffer((const unsigned char *)Text); iColumnView->GetListArray()->AppendL(Buffer); iColumnView->SetCurrentItem(9000); iColumnView->RedrawL();
- SPACER 4 // gap between jies ⁇ #define TILES_ WIDTH (EFloatWidth-(MAIL_W+BYTES_W+2*SPACER))
- buttons and window #def ⁇ ne BUTTON_BOTTOM_MARGIN 0 // margin between buttons and window
- PatClient Pat CWSocket* Socket
- SMSUtils new ESMSUtil(&this->PhoneStat);
- SMSUtils->OpenPort() // open the infra-red and configure it
- iCoIumnView new(ELeave) CGuiViewColumnListBoxControI(this); iColumnView->ConstructL(ClientRect());
- iNewControl new(ELeave) CNewControl(this); iNewControl->ConstructL(); iNewControl->ActivateL();
- SmsTimer CPeriodic::NewL(-10); SmsTimer->Start(POLL_PHONE_RATE,POLL_PHONE_RATE,cb);
- TBufC ⁇ 2> c_drive(_L("C:4)); mbfn.Set(BitmapFile,&c_drive,NULL); iBitmap new (ELeave) CFbsBitmapO; iBitmap->Load(mbfn.FullName(),EMbmBmapsBat ; shareIfLoaded);
- ⁇ iActive aActive
- TRect BoxRect (TPoint(LeftX+2,(rect.iBr.iY-Font->HeightInPixels()- 8)),TSize(ETextBoxWidth,Font->HeightInPixels()+6)); gc.SetBrushColor(KRgb White); // set pen colour gc.SetBrushStyle(CGraphicsContext::ESolidBrush); gc.DrawRect(BoxRect); gc.DrawText(iText,TPoint(LeftX+5,rect.iBr.iY-Font->DescentInPixels()-5)); // then draw it
- iTestButton NewButton(_L("Test"));
- iNewWindow new (ELeave) CNewWindow(); iNewWindow->ConstructL(); iNewWindow->SetContainerWindowL(*this); iNewWindow->SetRectL(iNewRect); iNewWindow->SetActive(ETrue); #endif
- case 0 return iMover
- case 1 return iTestButton
- Tint aind Index(aControl);
- SMSUtiIs ParentAppUi->SMSUtils
- SMSUtils->ClosePort() // release the IR port
- Socket->Close(); delete Socket; Socket NULL;
- ParentAppUi->SmsTimer CPeriodic: :NewL(- 10); ParentAppUi->SmsTimer->Start(POLL_PHONE_RATE,POLL_PHONE_RATE,cb);
- Tint Leave FALSE
- Tint res thread->Create(_L("SmsThread"), // create new server thread ThreadFunction, // thread's main function KDefaultStackSize, KDefaultHeapSize, KDefaultHeapSize, &TempStat // passed as TAny* argument to thread function
- EVO installed security key is 001 1223344556677 memcpy(EvoKey,” ⁇ x00 ⁇ xl l ⁇ x22 ⁇ x33 ⁇ x44 ⁇ x55 ⁇ x66 ⁇ x77",8); Hash md5(SSH_HASH_MD5); md5.Add(EvoKey, sizeof(EvoKey)); md5.Add(RandomToken, 16 );
- Hash md5 (SSH_HASH_MD5); md5.Add(Random Token, 16); CopyMemory(TokenBuffer, md5.Digest(), 16 );
- InitKey (&ctx_enc,key,iv,&des_check_key); Encrypt(&ctx_enc,CipherText,TokenBuffer, 16);
- PatClient (CFloatAppUi* ParentAppUi,unsigned char *RT,unsigned char *k,unsigned char *i); void GenFCount(RFs& FS);
- PatClient :PatClient(CFloatAppUi* AppUi,unsigned char *RT,unsigned char *k,unsigned char *i)
- TInt Colon buf.Match(_L("*: ⁇ *>*")); if (Colon ⁇ 0) return(FALSE);
- Tint End buf.LocateReverse('>'); addr.Copy(buf.Mid(Colon,End-Colon- 1 )); return(TRUE);
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2001510503A JP2003504773A (ja) | 1999-07-16 | 2000-07-04 | 移動体通信装置を認証する方法とシステム |
EP00948441A EP1195071A1 (fr) | 1999-07-16 | 2000-07-04 | Procede et systeme permettant d'authentifier un dispositif de communication mobile |
AU61922/00A AU6192200A (en) | 1999-07-16 | 2000-07-04 | A method and a system for authenticating a mobile communication device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9902746-8 | 1999-07-16 | ||
SE9902746A SE514769C2 (sv) | 1999-07-16 | 1999-07-16 | Sätt och system för autentisering av en mobilkommunikationsanordning |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001006805A1 true WO2001006805A1 (fr) | 2001-01-25 |
Family
ID=20416536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SE2000/001418 WO2001006805A1 (fr) | 1999-07-16 | 2000-07-04 | Procede et systeme permettant d'authentifier un dispositif de communication mobile |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1195071A1 (fr) |
JP (1) | JP2003504773A (fr) |
CN (1) | CN1153501C (fr) |
AU (1) | AU6192200A (fr) |
SE (1) | SE514769C2 (fr) |
WO (1) | WO2001006805A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2842055A1 (fr) * | 2002-07-05 | 2004-01-09 | Nortel Networks Ltd | Procede pour controler l'acces a un systeme cellulaire de radiocommunication a travers un reseau local sans fil, et organe de controle pour la mise en oeuvre du procede |
US8943560B2 (en) | 2008-05-28 | 2015-01-27 | Microsoft Corporation | Techniques to provision and manage a digital telephone to authenticate with a network |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070093259A1 (en) * | 2005-10-26 | 2007-04-26 | Hyatt Edward C | Methods, systems, and computer program products for secured access to list server information via SMS messaging |
CN108920629B (zh) * | 2018-06-29 | 2021-10-26 | 郑州云海信息技术有限公司 | 一种文件系统的acl权限设置方法、装置、设备及介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997008906A1 (fr) * | 1995-08-30 | 1997-03-06 | Sendit Ab | Systeme et dispositif hote pour transmettre du courrier electronique |
EP0817518A2 (fr) * | 1996-07-03 | 1998-01-07 | AT&T Corp. | Méthode de l'accès contrÔlé à un réseau sécurisé |
US5796825A (en) * | 1996-01-16 | 1998-08-18 | Symantec Corporation | System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time |
GB2324682A (en) * | 1997-01-31 | 1998-10-28 | Nec Corp | Connection of a mobile wireless terminal to a host computer |
WO1999006900A2 (fr) * | 1997-07-30 | 1999-02-11 | Visto Corporation | Systeme et procede d'acces global et sur a des informations unifiees, dans un reseau informatique |
-
1999
- 1999-07-16 SE SE9902746A patent/SE514769C2/sv not_active IP Right Cessation
-
2000
- 2000-07-04 AU AU61922/00A patent/AU6192200A/en not_active Abandoned
- 2000-07-04 EP EP00948441A patent/EP1195071A1/fr not_active Withdrawn
- 2000-07-04 JP JP2001510503A patent/JP2003504773A/ja not_active Withdrawn
- 2000-07-04 WO PCT/SE2000/001418 patent/WO2001006805A1/fr not_active Application Discontinuation
- 2000-07-04 CN CNB008130310A patent/CN1153501C/zh not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997008906A1 (fr) * | 1995-08-30 | 1997-03-06 | Sendit Ab | Systeme et dispositif hote pour transmettre du courrier electronique |
US5796825A (en) * | 1996-01-16 | 1998-08-18 | Symantec Corporation | System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time |
EP0817518A2 (fr) * | 1996-07-03 | 1998-01-07 | AT&T Corp. | Méthode de l'accès contrÔlé à un réseau sécurisé |
GB2324682A (en) * | 1997-01-31 | 1998-10-28 | Nec Corp | Connection of a mobile wireless terminal to a host computer |
WO1999006900A2 (fr) * | 1997-07-30 | 1999-02-11 | Visto Corporation | Systeme et procede d'acces global et sur a des informations unifiees, dans un reseau informatique |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2842055A1 (fr) * | 2002-07-05 | 2004-01-09 | Nortel Networks Ltd | Procede pour controler l'acces a un systeme cellulaire de radiocommunication a travers un reseau local sans fil, et organe de controle pour la mise en oeuvre du procede |
WO2004006532A1 (fr) * | 2002-07-05 | 2004-01-15 | Nortel Network Limited | Procede et organe pour controler l'acces a un systeme cellulaire de radiocommunication a travers un reseaju local sans fil |
US8943560B2 (en) | 2008-05-28 | 2015-01-27 | Microsoft Corporation | Techniques to provision and manage a digital telephone to authenticate with a network |
Also Published As
Publication number | Publication date |
---|---|
EP1195071A1 (fr) | 2002-04-10 |
AU6192200A (en) | 2001-02-05 |
CN1375173A (zh) | 2002-10-16 |
SE9902746L (sv) | 2001-01-17 |
CN1153501C (zh) | 2004-06-09 |
JP2003504773A (ja) | 2003-02-04 |
SE514769C2 (sv) | 2001-04-23 |
SE9902746D0 (sv) | 1999-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8583914B2 (en) | Reducing processing load in proxies for secure communications | |
US6442686B1 (en) | System and methodology for messaging server-based management and enforcement of crypto policies | |
CA2467988C (fr) | Systeme et methode d'etablissement de connexion reseau securitaire, d'un client a un hote de reseau | |
US9917828B2 (en) | Secure message delivery using a trust broker | |
US7814208B2 (en) | System and method for projecting content beyond firewalls | |
US7870384B2 (en) | Offload processing for secure data transfer | |
US7441119B2 (en) | Offload processing for secure data transfer | |
US9172682B2 (en) | Local authentication in proxy SSL tunnels using a client-side proxy agent | |
JP4315696B2 (ja) | ホスト端末エミュレーションプログラム、中継用プログラムおよびホスト端末エミュレーション方法 | |
US7653815B2 (en) | System and method for processing encoded messages for exchange with a mobile data communication device | |
CA2394451C (fr) | Systeme, methode et produit informatique pour l'envoi et la reception de donnees cryptees s/mime | |
CN113067828B (zh) | 报文处理方法、装置、服务器、计算机设备及存储介质 | |
US20030065941A1 (en) | Message handling with format translation and key management | |
US20040133775A1 (en) | System and method for secure electronic communication in a partially keyless environment | |
US20060123092A1 (en) | Architecture for general purpose trusted personal access system and methods therefor | |
CN113508563A (zh) | 基于区块链的安全电子邮件系统 | |
CA2511335A1 (fr) | Systeme et procede pour des communications electroniques transparentes et securisees | |
EA009997B1 (ru) | Способ шифрования и передачи данных между отправителем и получателем с использованием сети | |
US20030105957A1 (en) | Kernel-based security implementation | |
CN103428077B (zh) | 一种安全收发邮件的方法和系统 | |
JP4434680B2 (ja) | 電子メール処理装置用プログラム | |
CN101656608A (zh) | 一种在即时通信工具中单点登录Web端的方法及系统 | |
US20050198165A1 (en) | Systems and methods for electronic information distribution | |
JP2002049571A (ja) | 通信制御装置及び通信制御方法 | |
WO2001006805A1 (fr) | Procede et systeme permettant d'authentifier un dispositif de communication mobile |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2000948441 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 008130310 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2000948441 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000948441 Country of ref document: EP |