WO2002043316A2 - Method and system for encrypting shared documents for transmission and storage using triple des key to encrypt/decrypt shared documents and ecc public/privat key pair to transmit triple des key - Google Patents
Method and system for encrypting shared documents for transmission and storage using triple des key to encrypt/decrypt shared documents and ecc public/privat key pair to transmit triple des key Download PDFInfo
- Publication number
- WO2002043316A2 WO2002043316A2 PCT/US2001/044258 US0144258W WO0243316A2 WO 2002043316 A2 WO2002043316 A2 WO 2002043316A2 US 0144258 W US0144258 W US 0144258W WO 0243316 A2 WO0243316 A2 WO 0243316A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- text document
- triple des
- symmetric key
- server system
- encryption server
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Definitions
- the present invention relates to a method and system for encrypting shared documents for transit and storage.
- pre-installed client software is an additional disadvantage of the various methods and systems of encrypting shared documents known to those skilled in the art.
- the requirement for pre-installed client software such as is found with Kerberos and PKI-based Lotus Notes®, results in only being able to access encryption capabilities using computers on which the client software was pre-installed. Relying on pre-installed client software limits both the mobility and flexibility in the use of encryption.
- the present invention provides a method and system for encrypting documents for transit and storage where the interactive end user has no direct responsibility, and takes no action, for creating, protecting, using or deleting an encryption key.
- the present invention provides for the encryption of a clear text document located on a client system and the transmittal of the cipher text version of the clear text document from the client system to the encryption server system.
- an ECC public/private key pair is generated for the encryption server system.
- a Java® encryption applet and an encryption server system EEC public key are requested from the encryption server system.
- the Java® encryption applet and the encryption server system EEC public key are transmitted to the client system over a secure channel.
- the Java® encryption applet is installed and run on the client system to generate a Triple DES symmetric key.
- a clear text document is encrypted with the Triple DES symmetric key, thereby creating a cipher text document.
- the Triple DES symmetric key is encrypted with the encryption server EEC public key, thereby creating an encrypted Triple DES symmetric key.
- the encrypted Triple DES symmetric key and the cipher text document are transmitted from the chent system to the encryption server system.
- the cipher text document and the encrypted Triple DES symmetric key are stored in a storage medium.
- the present invention provides for the retrieval of a cipher text document stored on the encryption server system, the transmittal of the cipher text document from the encryption server system to the client system, and the decryption of the cipher text document under the control of the chent system.
- the cipher text document is requested from the encryption server system.
- the encrypted Triple DES symmetric key used to encrypt the cipher text document is retrieved and the encrypted Triple DES symmetric key is decrypted using the encryption server system EEC private key, thereby creating a decrypted Triple DES symmetric key.
- the Triple DES symmetric key is inserted into a Java® decryption applet, and the Java® decryption applet is sent to the client system over a secure channel.
- the cipher text document is sent to the client system.
- the Java® decryption applet is installed, and the cipher text document is decrypted using the Java® decryption applet, thereby creating a clear text document.
- the present invention provides for the retrieval of a clear text document stored on the encryption server system, the transmittal of the cipher text version of the clear text document from the encryption server system to the client system, and the decryption of the cipher version of the clear text document under the control of the client system.
- the clear text document is requested from the encryption server system.
- a Triple DES symmetric key is generated under the control of the encryption server system and the clear text document is encrypted with the Triple DES symmetric key, thereby creating a cipher text document.
- the Triple DES symmetric key is inserted into a Java® decryption applet, and the Java® decryption applet is transmitted to the client system over a secure channel.
- the cipher text document is sent to the client system.
- the Java® decryption applet is installed on the client system and the cipher text document is decrypted using the Java® decryption applet, thereby creating a clear text document.
- FIG. 1 illustrates the overall system for document encryption, transit, and storage.
- FIG. 2 is a block diagram illustrating the transmittal of a cipher text document to the encryption server system.
- FIG. 3 illustrates the overall system for the transmittal of a cipher text document stored in a storage medium to a client system.
- FIG. 4 is a block diagram illustrating the transmittal of a cipher text document stored in a storage medium to a client system.
- FIG. 5 illustrates the overall system for the transmittal of a clear text document stored in a storage medium to a chent system.
- FIG. 6 is a block diagram illustrating the transmittal of a clear text document stored in a storage medium to a chent system.
- FIG. 7 illustrates a correlation table in which an entry is made to support the retrieval of an encrypted Triple DES symmetric key, a cipher text document, a clear text document, or any combination of the foregoing.
- FIG. 8 is a block diagram illustrating the use of a correlation table to support the future decryption of a cipher text document.
- FIG. 9 is a block diagram illustrating the decryption of a cipher text document, initially stored in a storage medium as a cipher text document, and subsequently stored in a storage medium as both cipher text document and as a clear text document version of the cipher text document.
- FIG. 10 is a block diagram illustrating the decryption of a cipher text document upon receipt by the encryption server system.
- the present invention provides a method and system for encrypting documents wherein the interactive end user has no direct responsibihty and takes no action for creating, protecting, using or deleting an encryption key.
- the encryption server system is responsible for all key management operations, including key creation, protection, distribution, and deletion.
- a client system may request to transmit a document from the client system to the encryption server system.
- a client system may request that the encryption server system transmit a document to the client system.
- FIG. 1 illustrates the overall system for document encryption, transit, and storage.
- the system is comprised of an encryption server system 100 connected to at least one client system 200.
- Encryption server system 100 and at least one client system are connected to at least one client system 200.
- 200 may be connected via an Internet connection using a public switched phone network, e.g., those provided by a local or regional telephone company or by dedicated data lines.
- a public switched phone network e.g., those provided by a local or regional telephone company or by dedicated data lines.
- Connection may also be provided by cellular, Personal Communications Systems (PCS), microwave, satelhte networks or other wireless networks. Connection may also be provided through the process of writing the communication to a medium, such as a floppy disk or write-able CD-ROM, and physically carrying it to the endpoint.
- PCS Personal Communications Systems
- microwave microwave
- satelhte networks or other wireless networks.
- Connection may also be provided through the process of writing the communication to a medium, such as a floppy disk or write-able CD-ROM, and physically carrying it to the endpoint.
- Encryption server system 100 is a computer.
- Client system 200 is a computer or any other device that can execute a computer program, including a personal digital assistant (PDA) or a cellular telephone.
- Encryption server system 100, or client system 200, or both encryption server system 100 and client system 200 act under the control of a human user, or on behalf of a human user, or under the control of a computer program.
- a document refers to electronic files that are shared in an office environment; more specifically, a document refers to electronic files in the following categories: word processing electronic files, e.g., Microsoft® Word electronic files; spread sheet electronic files, e.g., Microsoft® Excel electronic files; graphic presentation electronic files, e.g., Microsoft® PowerPoint electronic files; and, project planning electronic files.
- a document does not refer to software programs or CAD/CAM electronic files.
- FIG. 2 is a block diagram illustrating the transmittal of a cipher text document to the encryption server system 100.
- An encryption server system EEC public/private key pair is generated, at step 110.
- client system 200 issues a request to the encryption server system 100 for a Java® encryption applet, at step 300.
- Java® is a programming language developed by Sun Microsystems of Mountain View, California.
- Client system 200 accesses encryption server system 100 using HyperText Transfer Protocol (HTTP).
- HTTP HyperText Transfer Protocol
- the encryption server system 100 responds by transmitting a Java® encryption applet to chent system 200 over a secure channel, at step 400.
- the encryption server system's EEC public key is transmitted to client system 200 over a secure channel, at step 410.
- cipher text refers to a document that has been encrypted
- clear text refers to a document that has not been encrypted or has been decrypted
- a secure channel means a communications channel having authenticated end points and provides that the content of the communications channel cannot be viewed or modified while being transmitted.
- a secure channel such as an encryption server system-authenticated Secure Sockets Layer (SSL) connection, ensures the confidentiality and integrity of a Java® encryption applet as it is being transmitted and provides chent system 200 assurance that the Java® encryption applet did in fact come from encryption server system 100.
- Authentication is performed by the use of passwords or digital signatures. The choice of the authentication method used is based on a variety of factors, including, but not limited to, ease of use, sensitivity of the document, cost, and hardware support. It will be readily understood by one of skill in the art that authentication may be performed using other appropriate authentication methods. Referring to FIGS.
- chent system 200 installs the Java® encryption applet, at step 500.
- installed refers to the actions that are necessary in order for a Java® encryption applet or a Java® decryption applet to execute.
- the execution of the Java® encryption applet by chent system 200 is comprised of generating a Triple DES symmetric key, at step 510, encrypting the clear text document with the Triple DES symmetric key, at step 520, and encrypting the Triple DES symmetric key with the encryption server system's EEC public key, at step 530.
- the performance of steps 510, 520, and 530 creates a relationship between the encrypted Triple DES symmetric key and the cipher text document.
- the symmetric key generated at step 510 is a 168-bit Triple
- the execution of the Java® encryption applet by the client may further include the step of deleting the encryption server system EEC public key from any storage medium under the control of client system 200.
- client system 200 then transmits the cipher text document to encryption server system 100, at step 600.
- Client system 200 then transmits the encrypted Triple DES symmetric key to encryption server system 100, at step 700.
- the transmission of the cipher text document, at step 600, and the transmission of the encrypted Triple DES symmetric key, at step 700, may occur separately or together.
- the performance of steps 600 and 700 transmits the relationship created between the encrypted Triple DES symmetric key and the cipher text document to encryption server system 100.
- FTP File Transport Protocol
- HTTPS Secure HyperText Transfer Protocol
- the cipher text document is stored in a storage medium, at step 810.
- the cipher text document may be stored, at step 810, in a storage medium as a cipher text document.
- the cipher text document may be decrypted and stored in a storage medium as a clear text document.
- the cipher text document may be stored in a storage medium as both a cipher text document and a clear text document.
- the encrypted Triple DES symmetric key is stored in a storage medium, at step 820.
- storage medium refers to both non- volatile, persistent storage, and primary memory.
- Examples of non- volatile, persistent storage include, but are not limited to, hard disk magnetic storage unit, optical storage unit, CD-ROM or flash memory.
- the storage medium is located on encryption server system 100.
- FIG. 3 illustrates the overall system for the transmittal of a cipher text document stored in a storage medium to client system 200.
- FIG. 4 is a block diagram illustrating the transmittal of a cipher text document stored in a storage medium to client system 200.
- client system 200 requests a cipher text document from the encryption server system 100.
- encryption server system 100 performs a series of actions.
- encryption server system 100 retrieves and decrypts the Triple DES symmetric key used to encrypt the cipher text document.
- encryption server system 100 inserts the Triple DES symmetric key used to encrypt the clear text document into the Java® decryption applet at step 1110.
- encryption server system 100 transmits the Java® decryption applet, having the inserted Triple DES symmetric key used to encrypt the clear text version of the cipher text document, to client system 200, using a secure channel.
- encryption server system 100 transmits the cipher text document to client system 200.
- Client system 200 installs the Java® decryption applet, at step 1310.
- the Java® decryption applet decrypts the cipher text document with the Triple DES symmetric key used to encrypt the clear text version of the cipher text document.
- FIG. 5 illustrates the overall system for the transmittal of clear text document stored in a storage medium to client system 200.
- FIG. 6 is a block diagram illustrating the transmittal of clear text document stored in a storage medium to client system 200.
- client system 200 requests the clear text document from the encryption server system 100.
- encryption server system 100 performs a series of actions.
- encryption server system 100 generates a Triple DES symmetric key, at step 1600, and encrypts the clear text document with the Triple DES symmetric key, at step 1700.
- Encryption server system 100 inserts the Triple DES symmetric key used to encrypt the clear text document into the Java® decryption applet at step 1110.
- the encryption server system 100 transmits the Java® decryption applet, having the inserted Triple DES symmetric key used to encrypt the clear text version of the cipher text, to client system 200, using a secure channel.
- encryption server system 100 transmits the cipher text document to chent system 200.
- Client system 200 installs the Java® decryption applet, at step 1310.
- the Java® decryption applet decrypts the cipher text document with the Triple DES symmetric key used to encrypt the clear text version of the cipher text document.
- FIG. 7 illustrates a correlation table in which an entry is made to support the retrieval of an encrypted Triple DES symmetric key, a cipher text document, a clear text document, or any combination of the foregoing.
- an entry is a tuple.
- Each entry or tuple in the correlation table corresponds to one document.
- the correlation table shown in FIG. 7 is comprised of at least one tuple having at least three fields. Any of the at least three fields may contain a null value.
- a first, second, and third field correspond to a first, second, and third item, respectively.
- the correlation table maintains a relationship between three fields each having a corresponding item.
- a first field corresponds to the encrypted Triple DES symmetric key used to encrypt the cipher text document.
- a second field corresponds to the cipher text document.
- a third field corresponds to the clear text version of the cipher text document.
- Making a first and second entry in the same tuple of the correlation table stores the relationship created between the encrypted Triple DES symmetric key and the cipher text document by the performance of steps 530, and 520.
- the item entered in a field may be a pointer.
- a pointer is a location reference to another item.
- the item entered in the first field may be a pointer referencing the location of an encrypted Triple DES symmetric key. It is advantageous to use a pointer when the item is larger than the pointer.
- FIG. 8 is a block diagram illustrating the use of the correlation table to support the future retrieval of an item.
- encryption server system 100 creates a correlation table entry.
- encryption server system 100 enters the encrypted Triple DES symmetric key in the first field of the correlation table.
- encryption server system 100 enters the cipher text document in the second field of the correlation table.
- the correlation table entry, at step 1011 may be made before any item is received by encryption server system 100; when at least one item is received by encryption server system 100; when at least one item is stored in a storage medium; or, when at least one item is received by encryption server system 100 and at least one item is stored in a storage medium.
- Collapsing multiple operations into a single operation may optimize the use of the correlation table.
- Creating the correlation table entry, step 1011, storing the cipher text document in a storage medium, step 810, and entering the cipher text document in the second field of the correlation table, step 1013 may occur as one operation.
- Creating the correlation table entry, step 1011, storing the encrypted Triple DES symmetric key in a storage medium, step 820, and, entering the encrypted Triple DES symmetric key in the first field of the correlation table, step 1012 may occur as one operation.
- FIG. 9 is a block diagram illustrating the decryption of a cipher text document, initially stored in a storage medium, and subsequently stored in a storage medium as both cipher text document and a clear text document version of the cipher text document.
- a document is initially stored in a storage medium as a cipher text document, at step 810.
- encryption server system 100 retrieves the encrypted Triple DES symmetric key used to encrypt the cipher text document from a first field of the correlation table, at step 1800.
- Encryption server system 100 decrypts the encrypted Triple DES symmetric key with the encryption server system EEC private key, at step 1900.
- encryption server system 100 decrypts the cipher text document using the decrypted Triple DES symmetric key.
- the clear text version of the cipher text document is stored on a storage medium, at step 2100.
- encryption server system 100 enters the clear text document in the third field of the correlation table.
- encryption server system 100 enters a pointer to the clear text document in the third field of the correlation table.
- encryption server system 100 may perform another operation on the clear text document.
- FIG. 10 is a block diagram illustrating the decryption of a cipher text document upon receipt by encryption server system 100.
- the cipher text document is stored in a storage medium
- the encrypted Triple DES symmetric key is stored in a storage medium.
- encryption server system 100 decrypts the encrypted Triple DES symmetric key with the encryption server system EEC private key, at step 2300.
- encryption server system 100 decrypts the cipher text document using the decrypted Triple DES symmetric key.
- the clear text version of the cipher text document is stored in a storage medium, at step 2500.
- the encryption server system 100 may enter the clear text document in the third field of the correlation table. Alternatively, encryption server system 100 may enter a pointer to the clear text document in the third field of the correlation table. Alternatively, the clear text document may not be initially stored, allowing encryption server system 100 to perform another operation on the clear text document.
- the present invention may be deployed in an Application Service Provider (ASP) environment.
- ASP Application Service Provider
- Deploying the present invention in an ASP environment provides the advantage of having all or some of the operations of encryption server system 100 managed by a third party.
- the Java® encryption applet and the Java® decryption applet may be installed on a browser, such as, Internet Explorer® or Netscape Navigator®.
- the source code for the Java® encryption applet and the Java® decryption applet can be readily configured by one skilled in the art using well-known programming techniques and hardware components.
- Client system 200 functions may be accomplished by other means, including, but not limited to integrated circuits and programmable memory devices, e.g., EEPROM.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2002225750A AU2002225750A1 (en) | 2000-11-27 | 2001-11-26 | Method and system for encrypting shared documents for transmission and storage using triple des key to encrypt/decrypt shared documents and ecc public/privat key pair to transmit triple des key |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US25301800P | 2000-11-27 | 2000-11-27 | |
US60/253,018 | 2000-11-27 | ||
US09/735,876 | 2000-12-13 | ||
US09/735,876 US20020071562A1 (en) | 2000-12-13 | 2000-12-13 | Method and system for encrypting shared documents for transit and storage |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002043316A2 true WO2002043316A2 (en) | 2002-05-30 |
WO2002043316A3 WO2002043316A3 (en) | 2002-12-27 |
Family
ID=26942872
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/044258 WO2002043316A2 (en) | 2000-11-27 | 2001-11-26 | Method and system for encrypting shared documents for transmission and storage using triple des key to encrypt/decrypt shared documents and ecc public/privat key pair to transmit triple des key |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2002225750A1 (en) |
WO (1) | WO2002043316A2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012120313A1 (en) | 2011-03-10 | 2012-09-13 | Amethyst Cryptographic Services Limited | A cryptographic system and method |
CN101416467B (en) * | 2006-02-02 | 2015-08-26 | 趋势科技有限公司 | KEM-DEM encrypted electronic data communication system |
CN115208632A (en) * | 2022-06-16 | 2022-10-18 | 国网浙江省电力有限公司营销服务中心 | Front-end and back-end data encryption transmission method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0869652A2 (en) * | 1997-04-01 | 1998-10-07 | Tumbleweed Software Corporation | Document delivery system |
WO2000042748A1 (en) * | 1999-01-14 | 2000-07-20 | Tumbleweed Communications Corp. | Web-based delivery of secure e-mail messages |
-
2001
- 2001-11-26 AU AU2002225750A patent/AU2002225750A1/en not_active Abandoned
- 2001-11-26 WO PCT/US2001/044258 patent/WO2002043316A2/en not_active Application Discontinuation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0869652A2 (en) * | 1997-04-01 | 1998-10-07 | Tumbleweed Software Corporation | Document delivery system |
WO2000042748A1 (en) * | 1999-01-14 | 2000-07-20 | Tumbleweed Communications Corp. | Web-based delivery of secure e-mail messages |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101416467B (en) * | 2006-02-02 | 2015-08-26 | 趋势科技有限公司 | KEM-DEM encrypted electronic data communication system |
WO2012120313A1 (en) | 2011-03-10 | 2012-09-13 | Amethyst Cryptographic Services Limited | A cryptographic system and method |
CN115208632A (en) * | 2022-06-16 | 2022-10-18 | 国网浙江省电力有限公司营销服务中心 | Front-end and back-end data encryption transmission method and system |
CN115208632B (en) * | 2022-06-16 | 2023-11-07 | 国网浙江省电力有限公司营销服务中心 | Front-end and back-end data encryption transmission method and system |
Also Published As
Publication number | Publication date |
---|---|
WO2002043316A3 (en) | 2002-12-27 |
AU2002225750A1 (en) | 2002-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6834112B1 (en) | Secure distribution of private keys to multiple clients | |
US6651166B1 (en) | Sender driven certification enrollment system | |
US6381695B2 (en) | Encryption system with time-dependent decryption | |
JP3193610B2 (en) | Communications system | |
JP3657396B2 (en) | Key management system, key management apparatus, information encryption apparatus, information decryption apparatus, and storage medium storing program | |
US6061448A (en) | Method and system for dynamic server document encryption | |
US20020064283A1 (en) | Method and system for object encryption using transparent key management | |
US6292895B1 (en) | Public key cryptosystem with roaming user capability | |
US6367010B1 (en) | Method for generating secure symmetric encryption and decryption | |
TW474080B (en) | Secure management of electronic documents in a networked environment | |
KR101130415B1 (en) | A method and system for recovering password protected private data via a communication network without exposing the private data | |
CA2394451C (en) | System, method and computer product for delivery and receipt of s/mime-encrypted data | |
US6941454B1 (en) | System and method of sending and receiving secure data with a shared key | |
US8271788B2 (en) | Software registration system | |
WO2007058907A2 (en) | Systems and methods for trusted information exchange | |
JP2009044763A (en) | Identity-based encryption system | |
EP1501238B1 (en) | Method and system for key distribution comprising a step of authentication and a step of key distribution using a KEK (key encryption key) | |
US20020071562A1 (en) | Method and system for encrypting shared documents for transit and storage | |
US8930703B2 (en) | Methods, systems and computer program products for controlling the disclosure time of information | |
EP1125393B1 (en) | Method of sending and receiving secure data with a shared key | |
US20030051160A1 (en) | Anti-piracy firmware update | |
US20020184490A1 (en) | Anti-piracy network storage device | |
WO2002043316A2 (en) | Method and system for encrypting shared documents for transmission and storage using triple des key to encrypt/decrypt shared documents and ecc public/privat key pair to transmit triple des key | |
JP2005217808A (en) | Information processing unit, and method for sealing electronic document | |
JP4167137B2 (en) | Signature generation method and data exchange system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO R.69(1) EPC (EPO FORM 1250A DATED 18.08.03) |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase in: |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |