WO2002009346A1 - Composant de cryptage e-mail ubiquiste - Google Patents
Composant de cryptage e-mail ubiquiste Download PDFInfo
- Publication number
- WO2002009346A1 WO2002009346A1 PCT/US2001/022457 US0122457W WO0209346A1 WO 2002009346 A1 WO2002009346 A1 WO 2002009346A1 US 0122457 W US0122457 W US 0122457W WO 0209346 A1 WO0209346 A1 WO 0209346A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encryption
- message
- recipient
- mail message
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
Definitions
- the present invention relates to a method for transmitting e-mail messages over a computer network, and more particularly, to a system and method for transmitting encrypted e-mail messages using a currently used e-mail system and e-mail account and an encryption application.
- Computer networking allows network computer users to share information, software applications and hardware devices and internetworking enables a set of physical networks to be connected into a single network such as the Internet.
- Today, computers connected to the Internet have almost instant access to information stored in relatively distant regions.
- computers connected to networks other than the Internet also have access to information stored on those networks.
- the World Wide Web (Web) a hypermedia system used on the Internet, enables hypertext linking, whereby documents automatically reference or link other documents located on connected computer networks around the world.
- users connected to the Internet have almost instant access to information stored in relatively distant regions.
- E-mail Like Web browsing and other network applications, electronic mail (e-mail) uses a client-server paradigm. Originally, e-mail systems were built to allow a person to communicate with other people, whereby an individual created an e-mail message and an e-mail software transmitted a copy of the e-mail message to each specified recipient. Today, e-mail systems include automated features for performing more complex interactions, such as automatically responding to requests for information in an e-mail message. Each user of the e-mail system is assigned an electronic mailbox and an e-mail address. Thereafter, a creator of the e-mail message uses the e-mail address of each recipient to specify the recipient(s) of the e-mail message. E-mail messages include a header and a body.
- the header contains information about the message and the body contains the text of the message.
- the e-mail software transfers a copy of the message to each recipient.
- the e-mail system contains a mail transfer program that handles the details of sending a copy of the e-mail message to each recipient's remote computer.
- the mail transfer program is a client that contacts a server, i.e., the remote machine. The client sends the message to the server, which places a copy of the e-mail message in the recipient's mailbox.
- SMTP Simple Mail Transfer Protocol
- Some e-mail systems transmit e-mail messages to a mail gateway, which is a computer dedicated to forwarding e-mail messages to specified recipients. While the e-mail message is being transmitted to the recipient's computer, the e-mail message may be intercepted by an unauthorized third party. The unauthorized third party may either change the e-mail message or read an otherwise private communication.
- Some e-mail systems include encryption features for enabling the creator to encrypt the e-mail message. However, most e-mail systems require the user to configure encryption keys, such as public/private keys, to encrypt and decrypt the e-mail message. Moreover, even if some web-based e-mail systems implement one type of encryption solution, these systems may not work with other web-based e-mail systems that implement another type of encryption solution.
- the object of the present invention to provide a system and method for enabling a user to encrypt e-mail messages without having to install new infrastructure or switch between e-mail systems.
- the inventive system is an add-on application for any windows application, and the system allows the user to use an existing e-mail account to send encrypted e-mail messages.
- the system thus enables the user to transmit secure e-mail messages without requiring the user to change e-mail systems or e-mail accounts.
- the inventive system therefore allows creators and recipients to encrypt and decrypt messages without having to configure encryption keys.
- the system normalizes encryption across diverse e-mail systems.
- an encryption key such as a password
- the system For each message and attachment the user wants to encrypt, the system generates two random keys and encrypts each message and attachment with a corresponding randomly generated key via encryption techniques, such as Triple-DES. Thereafter, the user is prompted for the password, which is turned to a "hash" and used to encrypt the randomly generated keys via encryption techniques.
- the encrypted message and attachments are then combined with the encrypted keys as a single encrypted e-mail message package.
- a recipient Upon receiving the encrypted e-mail message package, a recipient initiates the system and enters the password, which was turned into the "hash", to decrypt each random encrypted key and the system uses each decrypted key (pair) to decrypt the corresponding e-mail message or attachment.
- the non-encrypted header text may be used to enter non-sensitive information.
- the Encryption software component determines that the recipient is in the "read" window, prompts the recipient for the password used to encrypt the random key, creates the secure window on the recipient computer and decrypts the random keys with the password from the recipient.
- a message with the e-mail address, time-stamp and other information is transmitted to a system server for future notification of the receipt to the sender.
- the present invention provides an encryption system that interfaces and integrates with an e-mail system, thereby enabling a user to use the e-mail system and a current e-mail account to send encrypted e-mail messages, the system comprises: an encryption software component for encrypting the e-mail message in a message text area after initiation by a sender and for decrypting the encrypted e-mail message after initiation by a recipient; a secure window for displaying decrypted e-mail messages, the secure window having fields for entering information; a script component for controlling interaction between windows in the e-mail system and the secure window after determining which window is currently opened in the e-mail system; and means for creating the secure window after the encryption software component is initiated, generating random keys for encrypting the e-mail message, obtaining an encryption key from the secure window and passing the encryption key to the encryption software component for use in encrypting the random keys,
- An alternate embodiment of the present invention provides a method for interfacing and integrating an encryption system with an e-mail system, thereby enabling a user to use the e-mail system and a current e-mail account to send encrypted e-mail messages, the method comprising the steps of: initiating an encryption software component to encrypt the e-mail message; generating random keys for encrypting the e- mail message; creating a secure window after the encryption software component is initiated; obtaining an encryption key from the secure window and passing the encryption key to the encryption software component for use in encrypting random keys; creating a package with a encrypted e-mail message and encrypted random keys; transmitting the package and non-encrypted information to a recipient through an e- mail system infrastructure; and enabling the recipient to initiate the encryption software component to decrypt the package and display a decrypted e-mail message in the secure window.
- An alternate embodiment of the present invention provides an encryption system that interfaces and integrates with an e-mail system, thereby enabling a user to use the e-mail system and a current e-mail account to send encrypted e-mail messages, the system comprises: an encryption software component for encrypting the e-mail message in a message text area after initiation and for decrypting an encrypted e-mail message after initiation by a recipient; a secure window for displaying decrypted e-mail messages, the secure window having fields for entering an encryption key and for selecting attachment files; a script component for controlling interaction between the e- mail system's windows and the secure window after reading information associated with the e-mail system to determine which window is currently opened in the e-mail system; means for creating the secure window after the encryption software component is initiated and if the user is in a first window, generating random keys for encrypting the e-mail message and selected attachment files, obtaining an encryption key from the secure window and passing the encryption key to the encryption software component for use in
- Fig. 1 illustrates a computer network in which the inventive e-mail-processing system may be incorporated
- Fig. 2 illustrates the TCP/IP Layering Model Protocol used during communications between components on the computer network
- Fig. 3 illustrates a preferred embodiment of the inventive system that enables a user to encrypt e-mail messages using a current e-mail system
- Fig. 4 illustrates initiation of an Encryption software component
- Fig. 5 illustrates that the user of the inventive system is allowed to enter non- encrypted header text in the e-mail message
- Fig. 6 illustrates the connection between the current e-mail system and the inventive system
- Fig. 7 illustrates a secure window of the inventive system that may be used to select files for encryption
- Fig. 8 illustrates the message text area in the e-mail system with the encrypted e-mail message, the non-encrypted header text and the attached file;
- Fig. 9 illustrates the displayed decrypted e-mail message and the decrypted attached file
- Figs. 10 illustrates the steps implemented in a preferred embodiment of the inventive system of Fig. 3.
- the present invention described below extends the functionality of the inventive e-mail encryption system and method for encrypting and decrypting e-mail messages without changing a currently used e-mail system and/or account.
- Fig. 1 is an example of a local area network (LAN) 100 that is connected to the Internet and in which the inventive system and method may be utilized.
- LAN 100 comprises a server 102, four computer systems 104-110, and peripherals, such as printers and other devices 112, that may be shared by components on LAN 100.
- Computer systems 104-110 may serve as clients for server 102 and/or as clients and/or servers for each other and/or for other components connected to LAN 100.
- Components on LAN 100 are preferably connected together by cable media, for example copper or fiber-optic cable, and the network topology may be a token ring topology 114.
- cable media for example copper or fiber-optic cable
- the network topology may be a token ring topology 114.
- other media for example, wireless media, such as optical and radio frequency, may also connect LAN 100 components.
- network topologies, such as Ethernet may be used.
- Routers 120, 122 create an expanded network by connecting LAN 100 to other computer networks, such as the Internet, other LANs or Wide Area Networks (WAN).
- Routers are hardware devices that may include a conventional processor, memory, and separate I/O interface for each network to which it connects.
- components on the expanded network may share information and services with each other.
- All components on the expanded network and the routers that connect them must adhere to a standard protocol.
- Computer networks connected to the Internet and to other networks typically use TCP TP Layering Model Protocol. It should be noted that other internetworking protocols may be used.
- TCP/IP Layering Model comprises an application layer (Layer 5) 202, a transport layer (Layer 4) 204, an Internet layer (Layer 3) 206, a network interface layer (Layer 2) 208, and a physical layer (Layer 1) 210.
- Application layer protocols 202 specify how each software application connected to the network uses the network.
- Transport layer protocols 204 specify how to ensure reliable transfer among complex protocols.
- Internet layer protocols 206 specify the format of packets sent across the network as well as mechanisms used to forward packets from a computer through one or more routers to a final destination.
- Network interface layer protocols 208 specify how to organize data into frames and how a computer transmits frames over the network.
- Physical layer protocols 210 correspond to the basic network hardware.
- Fig. 3 illustrates an inventive system 300 that enables a user to encrypt e-mail messages without having to install new infrastructure or switch between e-mail systems.
- System 300 may be downloaded from a predefined web site and it includes an Encryption software component 302, a secure window 304 and a script 306.
- Encryption software component 302 encrypts and decrypts e-mail messages in system 300.
- Secure window 304 is used for displaying messages to be encrypted and decrypted messages.
- Script 306 controls interaction between the e-mail system and inventive system 300. The user is thus able to use a currently available e-mail system and account to send encrypted e-mail messages.
- inventive system 300 Upon signing up with an e-mail system, the user installs inventive system 300 as an add-on application. Thereafter, system 300 is associated with the currently available e-mail system, and the user may initiate Encryption software component 302 in the e-mail system.
- the system is capable of interfacing with any window displayed within an operating system. This enables system 300 to easily integrate with any windows application and to provide encryption and decryption services to these applications without additional software installations and/or libraries. For example, the system may be integrated with chat or instant messaging applications.
- the user logs into the e- mail system, such as YahooTM e-mail, and enters an e-mail message in a message text area. Thereafter, if the user decides to encrypt the e-mail message, the user initiates Encryption software component 302.
- Encryption software component 302 is automatically initiated depending on whether the user is in a "compose" window or in a "read” window.
- Fig. 4 illustrates initiation of Encryption software component 302 via a right-click of the mouse while using Microsoft's Internet ExplorerTM browser.
- Encryption software component 302 encrypts or decrypts the e-mail message by determining which window is currently opened in the e-mail system. If a "compose" window is opened, Encryption software component 302 determines that the user is creating an e-mail message and Encryption software component 302 encrypts the e-mail message. If a "read" window is opened, Encryption software component 302 determines that the user is reading the e-mail message and Encryption software component 302 decrypts the encrypted e-mail message.
- Encryption software component 302 Upon initiation, Encryption software component 302 creates a secure window and allows the user to enter an encryption key, such as a password, in secure window 304. Upon clicking on an encryption button in secure window 304, Encryption software component 302 generates two random keys for each message and each attachment to be encrypted. In a preferred embodiment, the randomly generated keys are 128-bit keys. Thus, for example, if the user is encrypting an e-mail message that has two attachments, Encryption software component 302 generates six random 128-bit keys. Encryption software component 302 then encrypts each message and attachment with the corresponding randomly generated keys via an encryption technique, such as Triple-DES.
- an encryption technique such as Triple-DES.
- Encryption software component 302 turns the password entered by the user into a "hash” via an encryption technique, such as SHA-1. Using other encryption techniques, such as Triple-DES, Encryption software component 302 uses the hash to encrypt the randomly generated keys. The encrypted message and attachments are then combined with the encrypted keys as a single encrypted e-mail message "package.”
- Inventive system 300 may use public/private keys for encrypting the e-mail message package. As is apparent, other methods for encrypting the e-mail message also may be used by inventive system 300, and are within the scope of the present invention.
- the sender of the e-mail message is given the option of using either a standard security level or a higher security level.
- the standard security level encrypts the random keys with the password supplied by the sender.
- the higher security level requires the e-mail message to be opened only in the recipient's e-mail box by comparing the recipient's address in the e-mail message to the address of the mailbox used to open the e-mail message. If the addresses do not match, the system will not open the e-mail message, even if the recipient has the correct password to decrypt the randomly generated keys.
- the higher security level thus provides an anti-forwarding feature that may be used to prevent the recipient from forwarding the e-mail message with protected intellectual property, thereby ensuring the sender' s intellectual property rights.
- Encryption software component 302 After encrypting the e-mail message package, Encryption software component 302 stores the encrypted message in the message text area in the e-mail system.
- Fig. 5 illustrates that the user is allowed to enter non-encrypted special header text in the e- mail message.
- the non-encrypted special header text is used for transmitting non- sensitive information.
- the non-encrypted special header text may be used to let the recipient know where to obtain inventive system 300 in order to decrypt the encrypted e-mail message.
- the user may use the non-encrypted special header text to give the recipient clues about the password used to encrypt the random keys.
- Encryption software component 302 stores the encrypted message package and the non-encrypted special header text in the e-mail system's message area and the user sends the e-mail message package and the non-encrypted header text through the e-mail system.
- the encrypted e-mail message and the non-encrypted special header text travel through the e-mail system's infrastructure.
- inventive system 300 initiates Encryption software component 302, which determines that the recipient is in the
- Encryption software component 302 prompts the recipient for the password that was originally used to encrypt the random keys and Encryption software component 302 turns the password into the same hash to decrypt the randomly generated keys. Thereafter, each pair of keys is used to decrypt the e-mail message and attachment.
- Encryption software component 302 creates secure window 304 on the recipient computer and displays the decrypted e-mail message in secure window 304.
- Inventive system 300 therefore allows creators and recipients to encrypt and decrypt messages without having to configure encryption keys.
- system 300 transmits an open message to a server.
- the open message includes the e-mail address, the time stamp, the subject line of the e-mail message, and a flag indicating whether or not the sender requested a successful decryption receipt for notifying the sender when the recipient opens the e-mail message. If the sender requested the successful decryption receipt and the e-mail message was not previously opened by the recipient, the server transmits the successful decryption receipt e-mail to the sender.
- the server transmits the successful decryption receipt message to the sender every time the e-mail message is opened.
- This enables commercial senders to request reports that detail every time specific commercial messages are opened.
- System 300 also enables reporting on other system usage, such as encryption request, successful and failed password entries during decryption, the number and percentage of users requesting an update receipt, the number of times a particular message is successfully opened and decrypted (even if the successful decryption receipt was not requested), and tracking patterns of forwarded messages. As is apparent to one of ordinary skill in the art, other information may be reported by the system.
- Fig. 6 illustrates the connection between the e-mail system and inventive system 300.
- interaction between secure window 304 and the e-mail system's compose window or read window is controlled by script 306.
- script 306 As is apparent to one of ordinary skill in the art, other software applications written in other high level programming languages, such as C++, may be used to control the interaction, and are within the scope of the present invention.
- a function in the script reads the URL or other information associated with the "compose" window or "read” window to determine whether to encrypt or decrypt the e-mail message.
- Script 306 creates secure window 304 with fields for entering a password and selecting attachment files, obtains the password from the creator or recipient and passes the password to Encryption software component 302 for use in encrypting or decrypting the randomly generated keys.
- Encryption software component 302 uses standard encryption library routines, such as triple-DES, to encrypt or decrypt the e-mail message and passes the encrypted or decrypted message to script 306 for display in the message text area or secure window 304.
- the system also checks itself to ensure that the cryptographic library and the user interface have not been tampered with and if necessary, the system will automatically download an update to fix internal problems.
- System 300 may include an encrypted local file for storing account information, such as usernames and passwords and it may include marketing space for advertisement.
- System 300 also allows for definition fields governing communication between windows applications and Encryption software component 302 and it allows for the user interface to be updated remotely.
- system 300 constantly checks for an update flag and automatically updates the user interface when it receives the update flag.
- the user can click on a button in system 300 to initiate an update or a system administrator can transmit the update flag to system 300 for it to execute a remote software update.
- Encryption software component 302 when Encryption software component 302 determines that the user is in the "compose" window, it initiates secure window 304 with fields for enabling the user to encrypt attached files.
- Fig. 7 illustrates secure window 304 that may be used to select files for encryption. After selecting the files and entering the password for encrypting randomly generated keys and by extension the e-mail message and attached files, the user clicks on the encryption button. The e-mail message and the attached files are encrypted with the randomly generated keys.
- Fig. 8 illustrates the message text area in the e-mail system with the encrypted e-mail message, the non-encrypted header text and the attached file. The user may then transmit the e-mail to the recipient through the e-mail system.
- Fig. 9 illustrates the displayed decrypted e-mail message and the decrypted attached file.
- the attached file in Fig. 9 is an HTML file and Encryption software component 302 displays HTML files. It should be noted that the system will display both HTML and text files in component 302.
- System 300 is also capable of launching the proper executable, such as WordTM or Excel TM, when the user hit the view button of Fig. 9 next to the Word attachment.
- WordTM WordTM
- Excel TM any attachment can be either viewed through the properly associated software or saved locally, no matter what type of file the attachment is.
- Fig. 10 illustrates the steps implemented in inventive system 300.
- the user logs into the currently used e-mail system and enters the e-mail message in a message text area.
- Step 1020 the user decides to encrypt the e-mail message and initiates Encryption software component 302.
- Encryption software component 302 creates secure window 304, and allows the user to select files to be encrypted and attached to the e-mail message and also to enter a password in secure window 304.
- Step 1040 upon clicking on an encryption button in secure window 304, Encryption software component 302 generates two random keys for each message and attachment and uses a corresponding pair of random keys to encrypt each e-mail message and attachment.
- Encryption software component 302 uses the password to encrypt the random keys and creates one encryption package with the encrypted e-mail message and attachment.
- Step 1050 after encrypting the e-mail message,
- Encryption software component 302 stores the encrypted package in the message text area in the e-mail system.
- Encryption software component 302 stores the encrypted package and the non-encrypted header text in the e-mail system's message area, and the user or system 300 sends the e-mail message through the e-mail system.
- Step 1070 when a recipient receives the message, inventive system 300 initiates Encryption software component 302 and Encryption software component 302 determines that the recipient is in the read window.
- Encryption software component 302 prompts the recipient for the original password used to encrypt the random keys and it decrypts the random keys with the password and decrypts the e- mail message and attachment with the associated decrypted random keys.
- Encryption software component 302 creates secure window 304 on the recipient computer and displays the decrypted e-mail message in secure window 304.
- the recipient may save the decrypted message locally on the recipient's machine.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Operations Research (AREA)
- Economics (AREA)
- Marketing (AREA)
- Data Mining & Analysis (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001276951A AU2001276951A1 (en) | 2000-07-20 | 2001-07-18 | A ubiquitous e-mail encryption component |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US62100100A | 2000-07-20 | 2000-07-20 | |
US09/621,001 | 2000-07-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002009346A1 true WO2002009346A1 (fr) | 2002-01-31 |
Family
ID=24488320
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/022457 WO2002009346A1 (fr) | 2000-07-20 | 2001-07-18 | Composant de cryptage e-mail ubiquiste |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2001276951A1 (fr) |
WO (1) | WO2002009346A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7877594B1 (en) | 2006-03-16 | 2011-01-25 | Copytele, Inc. | Method and system for securing e-mail transmissions |
US8521821B2 (en) | 2009-03-17 | 2013-08-27 | Brigham Young University | Encrypted email based upon trusted overlays |
US8762976B2 (en) | 2007-03-09 | 2014-06-24 | Microsoft Corporation | Static extensibility models with dynamic languages and scripts |
US8826001B2 (en) | 2010-04-27 | 2014-09-02 | International Business Machines Corporation | Securing information within a cloud computing environment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6289105B1 (en) * | 1995-07-28 | 2001-09-11 | Kabushiki Kaisha Toshiba | Method and apparatus for encrypting and transferring electronic mails |
-
2001
- 2001-07-18 AU AU2001276951A patent/AU2001276951A1/en not_active Abandoned
- 2001-07-18 WO PCT/US2001/022457 patent/WO2002009346A1/fr active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6289105B1 (en) * | 1995-07-28 | 2001-09-11 | Kabushiki Kaisha Toshiba | Method and apparatus for encrypting and transferring electronic mails |
Non-Patent Citations (1)
Title |
---|
"Stealth E-mail encryptor/decryptor", TROPICAL SOFTWARE, XP002948662, Retrieved from the Internet <URL:http://www.tropsoft.com/stealth/themail.html> * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7877594B1 (en) | 2006-03-16 | 2011-01-25 | Copytele, Inc. | Method and system for securing e-mail transmissions |
US8219798B1 (en) | 2006-03-16 | 2012-07-10 | Copytele, Inc. | Method and system for securing E-mail transmissions |
US8762976B2 (en) | 2007-03-09 | 2014-06-24 | Microsoft Corporation | Static extensibility models with dynamic languages and scripts |
US8521821B2 (en) | 2009-03-17 | 2013-08-27 | Brigham Young University | Encrypted email based upon trusted overlays |
US8826001B2 (en) | 2010-04-27 | 2014-09-02 | International Business Machines Corporation | Securing information within a cloud computing environment |
Also Published As
Publication number | Publication date |
---|---|
AU2001276951A1 (en) | 2002-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2394451C (fr) | Systeme, methode et produit informatique pour l'envoi et la reception de donnees cryptees s/mime | |
US9667418B2 (en) | Electronic data communication system with encryption for electronic messages | |
EP0992145B1 (fr) | Procede pour exploiter un systeme de serveurs d'authentification ainsi qu'un tel systeme | |
JP3995338B2 (ja) | ネットワーク接続制御方法及びシステム | |
US7640427B2 (en) | System and method for secure electronic communication in a partially keyless environment | |
US8793491B2 (en) | Electronic data communication system | |
JP4991035B2 (ja) | 遠隔解読サービスを備えたセキュアメッセージシステム | |
EP1249981A1 (fr) | Système et procédé pour système de surveillance de sécurité | |
US20030065941A1 (en) | Message handling with format translation and key management | |
US20060020799A1 (en) | Secure messaging | |
US11652633B2 (en) | System and method for securely transmitting non-PKI encrypted messages | |
US20120331078A1 (en) | Methods and systems for encouraging secure communications | |
CN113508563A (zh) | 基于区块链的安全电子邮件系统 | |
US20070220008A1 (en) | System and method for single client remote access | |
WO2001097440A2 (fr) | Systeme de chiffrement effectuant la localisation dynamique de cles | |
EP1479188A1 (fr) | Systeme de messagerie electronique securisee necessitant une recuperation de cle pour la formation des cles de decodage | |
JPH1131127A (ja) | ドキュメントデリバリシステム | |
JPH11272594A (ja) | 電子ネットワーク上でのドキュメントデリバリ方法及び装置 | |
EP1151573A1 (fr) | Systeme et procede de messagerie securisee | |
EP1387239B1 (fr) | Messagerie sécurisée | |
US20060122936A1 (en) | System and method for secure publication of online content | |
WO2002009346A1 (fr) | Composant de cryptage e-mail ubiquiste | |
WO2005015862A1 (fr) | Procede et dispositif pour la transmission sure de messages electroniques | |
CA2293117A1 (fr) | Systeme, appareil, produit informatique et methode d'acquisition de cles de chiffrement | |
IE83974B1 (en) | A security services system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |