WO2007094772A1 - Messaging and document management system and method - Google Patents
Messaging and document management system and method Download PDFInfo
- Publication number
- WO2007094772A1 WO2007094772A1 PCT/US2006/005052 US2006005052W WO2007094772A1 WO 2007094772 A1 WO2007094772 A1 WO 2007094772A1 US 2006005052 W US2006005052 W US 2006005052W WO 2007094772 A1 WO2007094772 A1 WO 2007094772A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sender
- recipient
- software
- eletter
- epostal
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/226—Delivery according to priorities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Definitions
- the present invention relates in general to communications systems and methods. More specifically, it relates to a system and method that enables the public to send and receive electronic mail and messages over the Internet with greater assurances of delivery, security, privacy, priority and manageability than conventional email.
- the Internet has produced a revolutionary change in the sharing of information.
- the growth in electronic, or "e” mail, over the Internet has been spectacularly robust, with similarly strong future expansion forecasted.
- Email use is exploding because of the proliferation of computing devices of various types, and because of the greater availability of, and access to, telecommunications bandwidth.
- An estimated 31 billion email messages were sent daily during 2002, and that number, increasing by more than 20% per year, is expected to exceed 60 billion per day in 2006.
- wanted email is, by itself, causing an ever-increasing overload problem.
- wanted emails i.e., those recipients deem of value, whether solicited or unsolicited in nature.
- that volume of wanted email is expected to reach 36 billion per day in 2006.
- Direct mail marketing has been an accepted and effective way of advertising and promoting goods and services for many years, both to consumers and to businesses. Its electronic counterpart has the potential ⁇ as yet unrealized — to grow and develop similar levels of acceptability and commercial effectiveness.
- Email not only has a larger base than the Worldwide Web, but email also has the capability to give audiences personalized, media-rich, interactive communication where, and when, they are most receptive ⁇ a capability which will elicit a much greater response than banner advertising. But, email marketing cannot reach its full potential unless there is a better way to manage the growing email volume and clutter. At present, the email highways have so much "noise" that it distracts recipients from giving sufficient attention to legitimate online email advertising. Today, it is difficult for a recipient to understand the importance, value and priority of a particular email until it is opened and reviewed. And, this opening and reviewing process is time consuming, and exposes the recipient to technical risks (such as viruses and worms) as well as content risk (such as offensive words and pictures). A constraint on email marketing now is the concern that the communicated messages will be confused with, or associated with, valueless nuisance email.
- the email security process that now exists is inadequate and impedes expanded usage of the Internet for many potential commercial purposes.
- Many email applications have encryption procedures, but their procedures are too complex for many email users, or not reasonably and/or generally available in needed situations. As such, email security represents another problem looking for an effective solution.
- HPAA U.S. Federal Health Insurance Portability and Accountability Act
- HPAA has declared that emails (and faxes) which are not secured by encryption are unacceptable for communicating personal health care information (such as diagnosis codes, test results and certificates of medical necessity) among doctors, other health care providers, and insurance organizations.
- personal health care information such as diagnosis codes, test results and certificates of medical necessity
- HIPAA Health Insurance Portability and Accountability Act
- ISP Internet Services Provider
- Brightmail a filter sold under the trade designation "Brightmail" within its email system.
- the filtering rules and software are controlled by the ISP, and the existence of this filter was even unknown to at least some of its customers when the filter was initially activated.
- Some, but not all, unsolicited email is blocked.
- unsolicited-and-wanted email is blocked, and some unsolicited- and-unwanted email still comes through.
- Even worse, some wanted (and solicited and expected emails) are also blocked, and a recipient does not know at the time that they have been blocked.
- a customer To see if and what emails are being blocked, a customer must leave his email application, go to the ISP's website, enter a particular area of that website, log in with user identification (LD.) and password, and scroll through days and lines of emails. To unblock specific senders, a customer must email the sender's email address to the ISP, which is the only entity that can correct the filtering rules.
- LD. user identification
- password password
- scroll through days and lines of emails To unblock specific senders, a customer must email the sender's email address to the ISP, which is the only entity that can correct the filtering rules.
- U.S. Postal Service U.S.P.S. itself. But, the U.S.P.S. process requires a sender to leave his own email application, go to the U.S.P.S. website, and compose a letter there. The U.S.P.S. then prints the document out, puts it in an envelope, applies postage and physically delivers it. In 2003, a one-page letter produced in this fashion cost the sender 50 cents. While some may find this service attractive, it suffers in that the sender cannot use the convenience of his own mail box (i.e., his own email application) to mail the document. Second, this system is still mostly a physical, nonelectronic process with all the limitations inherent in physical mail delivery. Third, the recipient cannot make use of his electronic mailbox (that is, his email application) to receive the document.
- the invention manages an internet-based communication system that unlocks the commercial value of email for large and small businesses and individuals.
- Another object of the invention is to empowers all senders of email using the system to differentiate and prioritize, safeguard and secure, special-deliver and track, and sort and manage the email more effectively.
- Fig. 1 is a block diagram of an ePost Office and ePostal Internet communication system constructed and operated according to the current invention
- Figs. 2A and 2B are an operational block diagram for Sender ePostal operations including Sender ePostal software according to the current invention used in the system shown in Fig. 1;
- Figs 3A-3C are an operational block diagram for ePostal server software according to the present invention operating as an ePost Office communicating over the Internet between the Sender and Recipient as shown in Fig. 1 ;
- Figs. 4A-1, 4A-2, and 4B are operational block diagrams for Recipient ePostal operations with and without, respectively, Recipient ePostal software according to the present invention used in the system shown in Fig. 1 ;
- Fig. 5 is a view corresponding to Fig. 1 of alternative embodiments of this invention where Sender and Recipient do not have the ePostal software shown in Figs. 2A, 2B, 4A- 1, and 4A-2 on the computer they are presently using, but have ePostal accounts, and can send and receive eLetters through the ePostal system at the ePost Office window, or ePostal website;
- Fig. 6 is an operational block diagram of the Sender ePostal operational interactions at the ePost Office "window," or ePostal website, according to the present invention for use in the embodiment shown in Fig. 5;
- Fig. 7 is an operational block diagram of the Recipient ePostal operational interactions at the ePost Office "window," or ePostal website, according to the present invention for use in the embodiment shown in Fig. 5;
- Fig. 8 is a view corresponding to Figs. 1 and 9 of another embodiment of the invention where, within a network, elements of ePostal operations according to the invention are shared between both the Sender/Recipient level and the network server level;
- Fig. 9 is a view corresponding to Fig. 1 of another embodiment of the invention using various modes of connection to the Internet;
- Fig. 10 is a view corresponding to Fig. 1 of another embodiment of the invention showing an option of physical delivery to the Recipient
- Fig. 11 is a view corresponding to Fig. 1 showing alternative embodiments of the invention for sending ePostal email and related ePostal data from the Sender to the ePost Office;
- Fig. 12 is a view corresponding to Fig. 1 showing alternative embodiments of the invention for sending ePostal email and related ePostal data from the ePost Office to the Recipient;
- Fig. 13 is a view corresponding to Fig. 1 showing alternative embodiments of the invention for sending ePostal email and related ePostal data from the Sender directly to the Recipient;
- Figs. 14A and 14B are an operational block diagram of an exemplary embodiment of steps for the user download, installation and activation of the ePostal software;
- Fig. 15 is a view of an exemplary embodiment for the direct communications between the ePostal Client (Sender and Recipient) software and the ePost Office;
- Figs. 16A and 16B are an operational block diagram of an exemplary embodiment of direct communications between the Client software and the ePost Office;
- Fig. 17 is a table showing an exemplary embodiment of the message data structures according to the present invention for direct communications between the ePostal Client software and the ePost Office;
- Figs. 18A and 18B are an operational flow diagram of an exemplary embodiment of the Sender sequence of steps for processing an eLetter and sending it to the ePost Office;
- Fig. 19 is a table showing an exemplary embodiment of building a custom header of an eLetter according to the present invention for transmission from the Sender to the ePost Office;
- Figs. 2OA and 2OB are an operational flow diagram of an exemplary embodiment of the ePost Office sequence of steps for processing an eLetter and sending it to the Recipient;
- Fig. 21 is a table showing an exemplary embodiment of building the custom headers of an eLetter according to the present invention for transmission from the Sender to the ePost Office;
- Figs. 22A and 22B are an operational flow diagram of an exemplary embodiment of the Recipient sequence of steps for the final processing of an eLetter.
- Fig. 1 shows a communication system 10 according to the present invention that connects many system users (although only two are shown) who are, with respect to any given transaction, either a Sender 12 of electronic mail (“email”) and attached documents or files, or a Recipient 14 of that email and attached documents or files.
- the communication system 10 is described herein as an “ePostal Service” and the email carried on the system 10 and handled according to the present invention is also referred to herein as an "eLetter", "document”, or simply, "mail”.
- eLetter is used only when an email will be or has been processed by this invention.
- the terms “ePostal,” “ePost Office,” and “eLetter” used herein are service marks of ePostal Services, Inc.
- a given Sender 12 can send the same email to one designated Recipient 14, or multiple Recipients 14.
- a given Recipient, with access to the ePostal system can also be a Sender of eLetters.
- the illustrated Sender 12 can be a Recipient 14, and vice versa.
- the system 10 includes known telecommunication links 16 between each Sender or Senders 12 and the Internet 18 via a Sender ISP 19 and between the Internet and each Recipient or Recipients 14 via a Recipient ISP 19.
- the Sender and Recipient users may typically use computing and processing devices known as p.c.'s (personal computers), as shown in Fig. 1 as connected to Internet email and access through an ISP 19, but they can use other computing and processing devices such as servers and hand-helds as well as p.c.'s.
- These user interface devices are termed herein generally as "terminals”. It will be understood that the terminals can have varying degrees of intelligence, from what are essentially I/O devices to devices that provide substantial information processing using resident and/or downloaded software. In particular, the terminals can operate as a component of a network with a server and/or in conjunction with other linked computers and software, to provide the operating functions described below characteristic of this invention.
- the terms "Sender” and “Recipient” as used herein therefore mean the terminal and software operable on or through that terminal.
- Fig. 9 although this description in Fig. 1 refers to an ISP 19 as an intermediary between the Sender/Recipient and the Internet, the actual type of email and Internet access server connection can be any existing alternative which provides such services to the Sender/Recipient, such as the email and Internet access servers of corporate intranets or other networks such as extranets, LANs or the like. Conventional firewalls and filters are typically present in this system. Also as shown in Figs. 9 and 10, the specific type of physical telecommunications connection can also use a number of alternatives, such as telephone, cell, DSL, cable, satellite or other form of wireless communications, and even physical delivery (Fig. 10).
- the present invention uses, complements and augments the basic, known SMTP Internet email and Web messaging HTTP systems.
- Internet is intended to include both.
- the present invention features what is termed herein an ePost Office 20 (Fig. 1).
- the ePost Office 20 is a server, or set of servers, running the exemplary software 24, 24' shown in Figs. 3A-C, 4B, 6 and 7, and connected into the Internet by telecom links 16. While the ePost Office 20 will be described as a server running postal software 24, 24', it will be understood that the server can be plural servers or equivalent hardware and software.
- the terms "ePost Office", “ePO”, “postal server,” “electronic postal service,” and “postal server and software” encompass all these variations and other known equivalents.
- all of the servers or sets of servers of the ePO 20 can be located at one physical site.
- the individual sets of servers can be located at multiple sites at which each such set of servers, running the exemplary software 24, 24', is capable of performing the ePO 20 functions for certain assigned Senders 12 and Recipients 14, which assignments can be changed.
- the entire group or network of geographically separate sets of servers, running the exemplary software 24, 24' and connected with each other by the Internet and telecommunication links are coordinated for operational efficiency, availability and redundancy, scalability, improved user services, and security advantages.
- the entire group or network of separate sets of ePost Office 20 servers is the ePost Office 20 of Fig. 1.
- the ePost Office 20 communicates and coordinates with and between the Sender 12 and Recipient 14 p.c.'s, servers or the like (the Sender and Recipient
- exemplary software 22, 26 of Figs. 2A, 2B, 4A-1 and 4A-2 which is, in a preferred form, installed on the Sender 12 and Recipient 14 p.c.'s or servers, respectively.
- the ePostal component software 22, 26 installed and/or operable on the Sender and Recipient p.c.'s or servers is compatible with the operating system and the application (email and browser) software on those p.c.'s or servers.
- ePost Office 20 in Fig. 1 communicates and coordinates with and between Sender 12 and Recipient 14 in order for the communication system shown in Fig. 1 to operate.
- the alternatives involve different ways for an eLetter to be initially processed and sent by the Sender 12, and/or processed by the ePost Office 20, and/or delivered to and finally processed by the Recipient 14.
- One variable in these alternatives is whether or not the eLetter message itself (its content, as opposed to information for processing the message) passes through the ePost Office 20.
- the second variable is alternative transmission protocols (and how are they used) to send and deliver the eLetter message and the accompanying eLetter ePostal data, which are needed by the ePost Office 20 and the Recipient 14 to process the eLetter from the Sender 12 to the Recipient 14.
- eLetter ePostal data may be referred to also as “ePostal data,” “ePostal processing data,” “eLetter message data,” “eLetter data,” “message data,” “message data component,” or the like.
- Fig. 11 shows four basic alternatives a) - d) for sending an eLetter from a Sender 12 to the ePost Office 20, each with a certain set of advantages and disadvantages discussed below.
- the links between the Sender 12, Sender ISP 19, and the ePO 20 are shown in a simplified version of Fig. 1, without the telecom links 16. While the general flow of information of and about an eLetter is from Sender 12 to the ePO 20, it is understood as shown in Fig. 11 that there can be transmissions of data in both directions including to facilitate the Internet connections that transmit the eLetter information and to exchange security and message data.
- the eLetter message and all the ePostal data needed to send, process and deliver the eLetter message as an eLetter are sent together by the Sender 12 using a standard Internet mail protocol such as SMTP through the Sender ISP 19 mail server to the ePO 20 mail server.
- SMTP Internet mail protocol
- This group of possible mail protocols is referred to simply as SMTP.
- the advantages of this alternative include: all the information is in one package; there is a minimum of transmissions and therefore fewer associated uncertainties; and, since this is the most normal procedure for sending Internet mail, there is therefore less chance that some problem might arise along the transmission path to the ePO 20.
- Alternative b the eLetter message and most of the ePostal processing data is sent as in Alternative a).
- a limited amount of ePostal processing data such as identification and security numbers for the Sender 12 and eLetter would also be exchanged by the Sender 12 with the ePO 20 using some standard TCP application protocol such as HTTP via the Sender ISP 19.
- the advantages of this Alternative include the security benefits which would accrue from the eLetter message, which might contain encrypted information, being sent separately from the second communication having the ePostal processing data which contains the eLetter identification numbers and the decryption key for encrypted information.
- the disadvantages include: more than the minimal communications are required, and the user might need to be on-line when the Sender 12 processes the eLetter.
- the Sender 12 communicates with the ePO 20 via HTTP or some other such protocol, provides the ePO 20 with ePostal data including the identification number of the eLetter, and gives to or gets from the ePO a one-time-use encryption key. The key is then used to encrypt the eLetter and the other ePostal processing data that is sent to the ePO 20 via SMTP and the ISP mail server.
- ePostal data including the identification number of the eLetter
- the key is then used to encrypt the eLetter and the other ePostal processing data that is sent to the ePO 20 via SMTP and the ISP mail server.
- Alternative a) is likely used, because no communication is required with the ePO 20 prior to the processing of the eLetter by Sender 12.
- Fig. 12 shows three basic alternatives e) - g) for sending an eLetter from the ePost Office 20 to the Recipient 14, each with a certain set of advantages and disadvantages.
- Fig. 12 shows three basic alternatives e) - g) for sending an eLetter from the ePost Office 20 to the Recipient 14, each with a certain set of advantages and disadvantages.
- the links between the ePO 20, Recipient ISP 19, and the Recipient 14 are shown in a simplified version of Fig. 1, without the telecom links. While the general flow of information of and about an eLetter is from the ePO 20 to the Recipient 14, it is understood as shown in Fig. 12 that there can be transmissions of data in both directions including to facilitate the Internet connections that transmit the eLetter information and to exchange security and message data.
- the eLetter message and all the ePostal data required to send, process and deliver the message as an eLetter to the Recipient 14 are sent together by the ePO 20 using SMTP and POP, EVIAP or other such mail protocols to the Recipient ISP 19 mail server, and then to the Recipient 14.
- the advantages of this alternative include:
- the Recipient 14 does not need to be or go on line to finish the eLetter processing, and, since this is the most normal procedure for sending Internet mail, there is less chance that some problem might arise along the transmission path from the ePO 20 to the Recipient 14.
- Alternative e recognizes that the Recipient 14's most likely and simplest, and perhaps even only, means for receiving such eLetter messages is from the Recipient ISP 19 mail server.
- Alternative f the eLetter message and some ePostal processing data such as identification and security numbers for the eLetter are sent to the Recipient 14 via the Recipient ISP 19 mail server.
- the amount of ePostal data sent with the eLetter can vary depending on the combination of Recipient 14 and Recipient ISP 19 systems functions.
- the Recipient 14 When the eLetter arrives at the Recipient 14, the Recipient 14 then communicates directly with the ePO 20 via HTTP or some other such protocol, and the ePO 20 gives to the Recipient 14 all the remaining ePostal data required to finish processing the eLetter at the Recipient 14.
- the advantages of this Alternative include the security benefits which would accrue because the eLetter message, which might contain encrypted information, is sent via HTTP separately from the second communication having the ePostal data which contains identification and security numbers for the eLetter.
- the disadvantages include: the requirement for a more complex set of communications with the ePO 20 than in Alternative e), and the Recipient 14 must be able to go online to finish processing the eLetter. If the Recipient 14 is not online or is not allowed to go online, then the Recipient 14 cannot finish processing the eLetter and must wait until the Recipient 14 is on-line.
- the ePO 20 first sends the Recipient 14 an ePO eLetter which does not have any part of Sender's eLetter message in it.
- This ePO eLetter sent by the ePO 20 has only limited identification and security numbers for the Sender 12 eLetter and informs the Recipient 14 that an eLetter is being held for the Recipient 14 at the ePO 20.
- the Recipient 14 then communicates with the ePO 20 using HTTP or some other such protocol, and the ePO 20 gives to the Recipient 14 the Sender 12 eLetter and all the ePostal data required to finish processing the Sender 12 eLetter at the Recipient 14.
- Alternative g) has the same disadvantage as Alternative f) in that the Recipient 14 might not be, or go, online to obtain from the ePO 20 the eLetter and ePostal data needed for final processing.
- Alternative g) does have however some advantage in security over Alternative f) because no part of the Sender 12 eLetter message is transmitted from the ePO 20 to the Recipient 14 until the Recipient 14 has the ePostal data required to finish processing the eLetter.
- the preferred form of the ePostal system 10 among these three alternatives is Alternative e). It is the simplest with the fewest communications, has the flexibility of not needing to go online for more information, and provides good security.
- Alternative f) or Alternative g) is preferred.
- Alternative f) or Alternative g is preferred.
- Alternative g is used when an eLetter is sent to a Recipient which does not have the Recipient software 26.
- Fig. 13 there are two basic alternatives h) and i) shown for sending an eLetter message from a Sender 12 to the Recipient 14, but not through the ePost Office 20.
- Each alternative has its advantages and disadvantages.
- the links between the Sender 12, Sender ISP 19, the Recipient ISP 19, and the Recipient 14 are shown in a simplified version of Fig. 1, without the telecom links. While the general flow of information of and about an eLetter is from the Sender 12 to the Recipient 14 (and some information to and from the ePO 20), it is understood as shown in Fig. 13 that there can be transmissions of data in both and/or all directions among the Sender 12, Recipient 14 and ePO 20 including to facilitate the Internet connections which transmit the eLetter information and to exchange security and message data.
- the eLetter message and most of the ePostal data needed to send, process and deliver the message as an eLetter are sent together by the Sender 12 using standard Internet mail protocols such as SMTP and POP/IMAP to the Recipient ISP 19 and Recipient 14, without going through the ePost Office 20.
- standard Internet mail protocols such as SMTP and POP/IMAP
- a limited amount of ePostal processing data such as identification and security numbers for the Sender 12 and the eLetter, which are essential for processing the eLetter, would also be exchanged by the Sender 12 directly with the ePO 20 using some standard TCP application protocol such as HTTP via the Sender ISP 19.
- Recipient 14 After the Recipient 14 receives the eLetter message and the ePostal data, Recipient 14 then communicates directly with the ePO 20 using some standard TCP application protocol such as HTTP via the Recipient ISP 19, in order to receive from the ePO 20 the remaining and limited amount of ePostal processing data which was not with the eLetter message. The Recipient 14 then finishes processing the eLetter.
- some standard TCP application protocol such as HTTP via the Recipient ISP 19
- the eLetter message and only a limited amount of ePostal processing data such as identification and security numbers for the eLetter are sent together by the Sender 12 using standard Internet mail protocols such as SMTP and POP/MAP to the Recipient ISP 19 and Recipient 14, without going through the ePost Office 20.
- ePostal data needed to send, process and deliver the eLetter message as an eLetter would be exchanged by the Sender 12 directly with the ePO 20 using some standard TCP application protocol such as HTTP via the Sender ISP 19.
- the Recipient 14 After the Recipient 14 receives the eLetter message and the limited ePostal data, the Recipient then communicates directly with the ePO 20 using some standard TCP application protocol such as HTTP via the Recipient ISP 19, in order to receive from the ePO 20 the ePostal processing data which was not with the eLetter message. The Recipient 14 then finishes processing the eLetter.
- some standard TCP application protocol such as HTTP via the Recipient ISP 19
- Alternatives h) and i) are similar and vary only in the amount of ePostal processing data that is sent together with the eLetter message by the Sender 12 using standard Internet mail protocols such as SMTP and POP/MAP to the Recipient ISP 19 and Recipient 14, without going through the ePost Office 20.
- the ePO 20 cannot authenticate the Sender 12, verify the certification of the individual Sender, and evaluate the integrity of the eLetter message as reliably at the Recipient 14 as it can at the ePO 20. This makes the authentication of the Sender 12, the certification of the individual Sender, and the evaluation of the integrity of the eLetter in general circumstances less reliable and therefore less secure. • The ePO 20 cannot manage return-to-Sender 12 functions as well.
- the ePO 20 could not provide Sender 12 and Recipient 14 with time stamps or tracked records of the eLetter message processing times at the ePO 20.
- the ePO 20 cannot provide Sender 12 with the most authoritative confirmation of the ePostal fee for the eLetter. • The ePO 20 cannot provide the same degree of non-repudiation for an eLetter which is selected by Sender 12 to be put into the ePostal official eLetter repository. Standards for such official repositories require a copy of the original eLetter that passes through the ePO 20 rather than being given a copy by the Sender 12 or Recipient 14.
- Office 20 as shown in Figs. 11 and 12 has many advantages over sending the eLetter message to the Recipient 14 while bypassing the ePO 20 as shown in Fig. 13.
- Sending through the ePO 20 is generally the preferred and most flexible form of the present invention.
- sending an eLetter direct to a Recipient 14 might be preferred.
- a Recipient 14 can be a client workstation residing inside a corporate network, where the Recipient ISP 19 is essentially the network mail and Internet access servers, and where ePostal network software as shown in Fig. 8 operates with the network mail, Internet access, and other corporate servers.
- This software 22, 26 is installed, e.g. in conjunction with the user opening an account with the ePostal Service, e.g. at least in part by downloading.
- Figs. 14A and 14B The download, installation and activation process and major alternatives are shown in Figs. 14A and 14B. It would be understood by one skilled in the art that the specific steps in the process depend upon the Client terminal technical environment including the operating system and email application.
- the representative process as shown in Fig. 14A begins with a set of steps included in a Download and Install phase Dl .
- the user initiates the process by deciding to download the software and describes to the ePO important software components on the user's terminal such as the operating system, email application and web browser.
- This download can be made either from the ePost Office 20 website, from an ePostal software CD or from any other ePostal medium containing the required software which is compatible with the operating system and email application of the user's terminal.
- the user's terminal downloads and saves a Client software 22, 26 setup file which the user's terminal runs.
- EULSA end user licensing and service agreement
- the EULSA could be presented later in the process, but the alternative of presenting it at this time is best in order to discontinue the download process if the user does not accept the EULSA so that there is no further software downloaded to the user's computer. If the EULSA is accepted, the Client setup file downloads and installs the rest of the software.
- the Client software 22, 26 then communicates directly with the ePO 20 using HTTP or some other such TCP application protocol checking for the online status of the ePO 20. This ends the Download and Install phase Dl of setting up the Client software 22, 26.
- a Registration phase D2 begins.
- the Client then transmits this user data to the ePO 20 using HTTP or some other such TCP protocol.
- the ePO 20 stores and processes the user data, registers this new Account for the user, and transmits the Account registration information back to the Client using the same protocol such as HTTP which the Client used to communicate with the ePO 20. This completes the Registration phase D2 of setting up the Client software 22, 26.
- a Verification phase D3 begins.
- the Client software 22, 26 then presents the user with a Credit Card (CC) screen into which the user inputs the requested CC information.
- the Client then transmits this user data to the ePost Office 20 using HTTP or some other such TCP protocol.
- the ePO 20 receives the CC data and verifies that it is a valid CC to which the user could charge the costs for using the ePostal communication system.
- the ePO 20 then transmits to the Client using the same protocol such as HTTP which the Client used to communicate with the ePO 20 that the Account has been verified along with temporary Sender 12 and Recipient 14 identification and security data.
- An alternative to the above is to provide the Client with the temporary Sender 12 and Recipient 14 identification and security information before verifying the user's CC data.
- the above is the preferred form of the ePostal system 10, so that the CC data is used as an added means of insuring that the user is a legitimate person to have an ePO 20 Account, before the Client receives the identification and security data, even though this data has a temporary status.
- the Client software 22, 26 is not considered Active by the ePost Office 20.
- the Client is fully installed on the user's terminal, but not activated to be used yet with the user's email application for sending and receiving eLetters. It is in a stand-by mode.
- the ePO 20 emails an Activation eLetter D5 to the primary email address of the user on the terminal where the Client software 22, 26 is installed, registered and verified.
- the Client monitors incoming email looking for the Activation eLetter.
- the Client identifies it, parses the data in it, and stores the new identification and security data.
- the Client transmits to the ePO 20 using HTTP or some other such TCP application protocol that it has received the Activation eLetter and the new data.
- the ePO 20 responds to the Client using the same protocol such as HTTP which the Client used to communicate with the ePO 20 that the ePO 20 has recorded that the new Account is Active.
- the user can now use the Client for accessing all ePostal system features and benefits.
- An alternative to this way of activating the Client software is to not use an
- Activation eLetter but to use direct communications D6 between the Client and the ePO 20 via HTTP or some other such TCP protocol. This can be done after or in lieu of the step where the ePO 20 transmitted to the Client that the Account had been verified along with temporary Sender 12 and Recipient 14 identification and security information.
- the ePO 20 transmitted to the Client using the same protocol such as HTTP which the Client used to communicate with the ePO 20 the non-temporary identification and security data to activate the Account.
- Use of the Activation eLetter D5 is the preferred form of the ePostal system 10 because it confirms that the primary email address provided by the user during the Registration phase D2 of software installation and setup is valid, providing further confirmation of the legitimacy of the user and therefore the Account.
- N for Normal
- the client computer's web browser creates a TCP/IP connection with a user-specified URL and uses HTTP (and HTML) as the TCP application protocol by which to communicate with the web server. This usually takes place over port 25 at the server, aided by the use of cookies, especially to identify to the web server with whom it is communicating.
- HTTP HyperText Transfer Protocol
- Encrypted transmissions using HTTPS encryption is controlled by the server and makes use of an outside third party for encryption keys and digital certificates.
- ePostal communications system 10 of Fig. I 5 While this same normal kind of process can be used for the ePostal communications system 10 of Fig. I 5 it is not preferred. Rather, the ePostal system 10 process is custom-made and is shown as Alternative "C" (for Custom) in Fig. 15. Security is improved with independence from any third party for encryption keys and digital certificates and by having a controlled, proprietary process for encryption. The system is also more flexible if identification of the Client is not dependent on the use of cookies which can be deleted, if communications are not dependent on just one TCP application protocol which might not be available, and if a particular web browser is not required. The ePostal communication system 10 is able to provide the preferred form for structuring and performing these communications because of the design of the communication system 10.
- the preferred custom form of communication for use in the present invention takes advantage of the invention design, specifically, the fact that the Sender 12 and Recipient 14 using the Client software 22, 26 can communicate with and transmit data directly to the ePost Office 20 using software 24, 24', and vice versa.
- the ePostal system 10 can communicate within itself, that is, creating a communications network between the ePostal Client software 22, 26 operating on the Sender 12 and Recipient 14 terminals and the ePost Office 20 software 24, 24' operating on the ePostal servers.
- the ePostal system 10 during these direct communications between the ePO 20 and the Client simulates HTTPS sessions, uses its own one-time session id's, establishes its own one-time session encryption/decryption keys, and is able to use multiple TCP application protocols by capitalizing on a unique message data structure described in more detail below with reference to Fig. 17, useable by these protocols.
- This system in effect creates virtual intranet-like qualities for its users, despite its use of the . . Internet and its public availability.
- direct comms which will be referred to as "direct comms,” “ePO comms,” or “comms," are important to performing the many administrative, help and support, maintenance of Account, and eLetter processing functions between the Sender 12, ePost Office 20 and Recipient 14, including: • Creating a new account, during software registration
- Figs. 16A and 16B there are five basic steps the Client and the ePO 20 use for all of these direct comms: open a communications connection Cl, establish a secure channel C2, authenticate the Client C3, transmit the messages C4, and close the session C5. Each step is comprised of various substeps. Open a communications connection Cl
- the Client has stored URL and port information for its direct comms with the ePO 20. Not all Senders 12 and Recipients 14 need to use the same IP address for the ePO 20. As mentioned earlier, typically there are multiple sets of servers operating at different physical locations, communicating with Clients and with each other. In addition, the IP addresses for the ePO 20 servers might change from time to time (e.g., for security reasons), and the Client would receive the changed information from the ePO 20 via direct comms. While any standard TCP application protocol can work, it is presently preferred that the Client first attempts connecting using standard HTTP behavior over port 80, since it is most likely to be open. If communications are established, the Client continues to use HTTP for the remainder of the direct comms session.
- the Client connects using SMTP directly to the ePO 20 over port 25 with standard and custom SMTP command tags. For example, with SMTP, when the ePO 20 accepts the connection, the Client verifies the connection and sends the ePO a standard SMTP EHLO command by which the Client identifies itself, which the ePO 20 understands and accepts, and then the Client verifies. If these SMTP communications are established, the Client continues to use SMTP for the remainder of the direct comms session. Establish a secure channel C2
- the Client begins by generating a public/private key pair for this session.
- the Client sends a request to the ePO 20, including the public key of the key pair.
- the ePostal system 10 preferably uses a character randomization and substitution to make the message more difficult to read.
- the ePO 20 catches the request and stores the public key.
- the ePO 20 generates and stores both a unique one-time-use session id and symmetric key. Then the ePO 20, using the public key from the Client's first request, encrypts the session id and symmetric key, rewrites them as hex characters, and sends them back to the Client in a response.
- references to rewriting encrypted data with hex characters will mean rewriting the encrypted data with hex characters or with some other similar encoding such as UUEncode in order to enable transmission of the encrypted data.
- the Client receives the response from the ePO 20 and stores the session id and symmetric key.
- the symmetric key generated by these steps will be used to encrypt and decrypt all data transmissions for the remainder of the communication session.
- the session id is needed to be sent by the Client to the ePO 20 in later requests in this session so that the ePostal servers can identify the session, and therefore also the symmetric key to use.
- An alternative for encrypting the direct comms is the use of fixed public/private key pairs between the ePO 20 and the Client.
- the ePostal preference uses symmetric encryption which is faster than asymmetric encryption, and because the one-time-use session- based key is more secure than reusing keys.
- Authenticate the Client C3 The Client builds a request message with the session id and a data block including a Client id number, unknown even to the Client user, and hash of a user password.
- the hash of the password can either be stored on the Client, or the user can be asked for the password and a hash created.
- the data block is then encrypted using the session symmetric key and rewritten as hex characters.
- the Client comms the message to the ePO 20 which reads the session id, retrieves the associated symmetric key, and decrypts the data block.
- the ePO 20 authenticates both the Client id number and password hash to its records and stores that this session is authenticated (or not).
- the ePO 20 then builds and sends a response to the Client that the authentication is accepted (or not).
- This ePO 20 response message to the Client does not contain the session id because the Client, unlike the ePO 20 which sees these direct comms as asynchronous, sends a message to the ePO 20 and then waits on a reply.
- Authentication alternatives include authentication of only one or more than two parameters.
- the ePO 20 can also change Client ids periodically to improve security. Transmit the messages C4 To this point the direct comms have only established the means to keep later communications of this session secure and to authenticate the Client to the ePO 20.
- the transmitted messages that follow are those that assist in the actual performance of some operating or administrative function which results in the performance of ePostal premium services characteristic of the ePostal system 10. These messages are prepared and transmitted in the same manner as the two messages in step C3 above, Authenticate the Client.
- the Client builds and sends to the ePO 20 a request message.
- the message contains the session id, a data field indicating the size of the encrypted data block, and the encrypted data block, encrypted with the session symmetric key and rewritten in hex characters.
- the message data has a unique structure for the ePostal communication system 10, fitting its particular data requirements, communication needs and capabilities, and the ePostal communication system 10 of this invention.
- the ePO 20 decrypts and processes the data according to the instructions contained within the data block.
- the ePO 20 then prepares a response message to the Client which, like the Client's request message, has a unique structure for the ePostal communication system 10.
- the ePO 20 response message to the Client in this step C4, as in step C3 and as mentioned above in the step C3 description, does not contain the session id because the Client, unlike the ePO 20 which sees these direct comms as asynchronous, sends a message to the ePO and then waits on a reply.
- the ePO 20 response contains a data field indicating the size of the encrypted data block and then the encrypted data block, encrypted with the session symmetric key and rewritten in hex characters. From this point in this description of the invention, when data is mentioned as being encrypted for any transmission, it will mean that the encrypted data block is rewritten in hex characters or the like to transform encrypted data so that it can be transmitted in the direct comms as discussed above. Then, the ePO 20 comms its response message to the Client which decrypts the data block and processes the data according to the instructions contained within the data block. Close the connection C5
- the Client When the Client has fulfilled its communication needs from this session, the Client direct comms the ePO 20 a request message to end the session.
- the ePO 20 responds with acceptance. It should be understood throughout this application that where an acceptance is mentioned as the content of a response from either the ePO or the Client, that instead a message with a declination to accept, an error message or a similar type message could also result, m those other situations, ad hoc measures not pertaining to the described general process would be subsequently taken to resolve the problem.
- the set of steps will vary from those discussed above. In many cases, ePostal system 10 will operate best when it combines, in various ways, step C3 with step C4 and/or step C4 with step C5.
- the particular combination depends on the purposes of the direct communications used and how the combinations of data and the instructions for their use in the data blocks can best be constructed for the most efficient and assured performance of the ePostal functions. For example, it may be preferred to authenticate, process data from, and respond to the Client all in one set of request and response communications between the Client and ePO 20.
- a unique message structure is used, and the message contains instructions for the recipient of the direct comms, either the ePO 20 or the Client, on how to process the data in the messages.
- the unique message structure is disclosed in and described with reference to Fig. 17.
- the data fields in the direct comms messages are very similar for request messages from the Client and response messages from the ePO 20. Both are comprised of an encrypted data block with the data block size just before it.
- request messages from the Client also contain a session id which is needed so that the ePostal servers can identify the session, and therefore also the symmetric key to use.
- the response messages from the ePO 20 do not contain the session id because the Client, unlike the ePO 20 which sees these direct comms as asynchronous, sends a message to the ePO 20 and then waits on a reply.
- the structure of the data block which is encrypted is also unique for the ePostal communications system 10 and is shown in Fig. 17.
- First in the data block 40 is a block of random noise 42 whose size is also known; this data aids in the security performance of the encryption.
- message type 44 that specifies to the recipient the type or purpose of the request or response message; the recipient by this message type knows what data to expect in the rest of the data block and what to do with it.
- Sender 12 as defined above as the terminal and its ePostal Client software is authenticated.
- the individual person or user who opened the Account with the ePostal software at Sender 12 can also certify himself as the person actually sending the eLetter from the Client.
- the individual user can also have an Account on more than one terminal with the ePostal Client software, such as on a desktop at the office and on a laptop for travel.
- the individual user can also have multiple Accounts across multiple terminals, facilitating an individual to work with the ePost Office 20 on personal and business Accounts on any of his terminals.
- the individual user can use multiple email addresses with any of his ePostal Accounts and on any of his terminals.
- the alternative to this above multiple-capability service is to limit the number of Accounts, terminals with the Client software, and email addresses which an individual user can have with the ePostal system 10. While this limiting alternative would be simpler to manage and track, the presently preferred structure for operation of the ePostal system 10 is the multiple Account, terminal, and email address method because it provides the individual user a far more robust, comprehensive service.
- the Sender 12 in Fig. 1 can choose to send his email over the Internet either in the conventional manner, or using the ePost Office 20.
- the users need to do little more in the form of the invention shown in Fig. 1 than what they do in sending or receiving a conventional email.
- the Sender 12 user opens the email application Sl and creates an email, Step S2, as usual (with or without attachment) within the email application.
- the Sender 12 user needs only to click (Step S3) on an icon and proceed through (Step S4) an easy to follow set of selections of services he or she wants applied to the email by the ePostal system, clicking to continue, confirm and send the eLetter from the Sender's own p.c, all electronically and apparently the same to the Sender user, via the Sender's own ISP 19, the Internet 18, and the Recipient's ISP 19, to the Recipient 14 user, as shown in Fig. 1.
- the Sender software 22 reflects that the Sender 12 user has subscribed to the ePostal Service and has an account with it.
- Exemplary software 24, 24' according to the present invention that implements the ePost Office 20 in a manner according to the present invention are shown and described in Figs. 2A, 2B, 3A-C, 4B, 6, and 7, respectively.
- the Recipient software 26 reflects that the Recipient 14 user has subscribed to the ePostal Service and has an account with it. It will be understood by those skilled in the art that the specific code implementations of this software 22, 24, 24' and 26 will depend on the operating environment, e.g., the nature of the hardware, system and application software, the nature of the communications system and its operating protocol, interfaces, and the use of features such as encryption, filters, and firewalls. Users of the ePostal System can have different combinations of operating systems and email and browser software. This invention uses interfaces, add-ins, or various sets of procedures and programming each for interfacing with different combinations of sender or recipient operating systems and application (email and browser) software, which also function to interface through the links with the postal server 20.
- the ePost Office 20 and its software 24, 24' in cooperation with the software 22 and 26, accomplishes the mail processing functions of the traditional postal services in a completely electronic process. More specifically, the present invention, as delineated in detail in Figs. 2A, 2B, 3A-3C, 4A-1, 4A-2, 4B, 6 and 7, operates to provide: • Assistance to the Sender 12 users in selecting services to be provided
- Sender 12 exemplary software 22 as disclosed in or with reference to Figs. 2A and 2B include:
- a user can choose to use the services before or after creating a new email. In either case, the user indicates in some way that he has finished creating his new email, and is ready to send it via the ePostal system 10. Therefore, while both possibilities for when to choose to use the ePostal system 10 need to be addressed for the ease of use of the services, both also require that the new message window contain a means to select the ePostal process.
- the ePostal system 10 accommodates both alternatives to provide the most flexible and easy to use services for the user.
- an alternative process is to give the user one or more continuing screens of ePostal service selections to choose from, and then a second screen to allow the user to review which services he has selected and to confirm his selection.
- the ePostal system preferably presents to the user as few screens as possible, e.g. using only one screen by which the user selects the services, reviews, and confirms them for sending.
- the ePostal system 10 preferably uses the two-screen approach.
- ePostal software 22 and 24 which is present will be that which works with the existing combination of operating system, email application and web browser software.
- the correct ePostal software version is determined at the time of installation of software 22 and 24, after the ePost Office 20 analyzes the information provided by the user about his operating system, email application and web browser and after the ePO 20 performs any possible verification check on that data.
- the exemplary Sender software 22 (described above and shown in
- the Sender 12 begins to process at step SP2 a new eLetter after the user selects the services to be applied and clicks to send the email through the ePostal system. Again there are alternatives and choices for how the Sender 12 does this processing.
- Sender 12 determines the cost of the selected services and the number of ePostal credits required.
- the Sender 12 can use direct comms at the time of Sender 12 processing to verify at the ePO 20 credit bank that the Sender 12 has sufficient ePostal credits to cover the new eLetter at step SP3.
- the Sender 12 has a local ePostal credit bank at Sender 12 which tracks the balance and history of ePostal credit use for each Account on Sender 12 at step SP4.
- the ePostal system 10 has both the local bank at Sender 12 and the official credit bank at the ePO 20 because Sender 12 may not be online, or capable of going online, to use direct comms to check the Sender 12 Account credit balances at the ePO 20. With the local bank at Sender 12, there is then a capability for estimating the official Account credit balances which are maintained at the ePO 20 without going online.
- the Sender 12 checks the credit balance at the ePO 20 using direct comms, and if the Sender 12 cannot be online, Sender 12 has the local credit bank to estimate Account credit balances for the new eLetter.
- Sender 12 software 22 informs the user of the need to purchase new credits and initiates the process of purchasing ePostal credits using direct comms with the ePO 20.
- Another alternative is that the user purchases ePostal credits by going to the ePO 20 website using his web browser and then uses the ePost Office 20 software 24 as shown in Figs. 3A-C.
- both of the alternatives for purchasing credits are available to the user, via direct comms and at the website.
- the Sender 12 determines if each of the eLetter recipient email addresses is associated with some user Account at the ePost Office 20, e.g. by the Sender 12 using direct comms with the ePO 20.
- An alternative to checking on each recipient's status at the ePO 20 is not to check the recipient email address status at step;SP6.
- the selected alternative for operation of the ePostal system 10 depends upon the privacy policy of the management of the ePostal system 10 regarding the disclosure of user information to others.
- Another alternative implementation of the present invention is to reverse the order, that is checking recipient email addresses and then ePostal credits.
- the order in which the specific steps of processing an eLetter are actually carried out is not important. In fact, as will be appreciated by those skilled in the art, there are many alternatives for doing so. On the other hand, there some processing steps that have an inherent order to them or else they cannot be done. The importance of sequencing depends upon the specific processing step which can depend upon the software 22 version which has been installed on the Sender 12, the ePostal services selected by the user, and other variables which would be understood by those skilled in the art as indicated at step SP7.
- the Sender 12 processing of an eLetter is also dependent at step SP7 upon the selected steps for sending, processing and delivering an eLetter from the Sender 12 to the Recipient 14 as described earlier.
- the two major alternatives are sending the eLetter message itself either through the ePost Office 20, or bypassing the ePO 20 and sending the eLetter message directly to the Recipient 14.
- the ePO 20 sends the eLetter message and most if not all of the ePostal processing data through the Recipient ISP 19 mail server to the Recipient 14, with the remainder sent to the Recipient 14 via ePostal direct comms
- Typical steps in processing an eLetter at Sender 12 at step SP8 are discussed below and shown in Figs. 18A and 18B. They pertain generally to all possible alternatives for sending the eLetter from Sender 12 to Recipient 14, including the generally preferred implementation, which is sending the eLetter message itself and most, if not all, of the ePostal processing data from Sender 12 through the ePO 20 to Recipient 14.
- Sender 12 processes an eLetter so that the eLetter is prepared with sufficient ePostal data and instructions so that ePost Office 20 and the ePostal system 10 generally (including the Recipient 14) will know how to continue the processing and delivery of the eLetter to Recipient 14.
- This data can be added to the eLetter at various alternative locations in the eLetter such as: within the subject, or the body, or as an attachment (which can be thought of as part of the body), or as a custom header.
- the ePostal system 10 uses a custom header or multiple custom headers at step SP9. If a particular email application at Sender 12 does not allow custom headers or requires that the data be at some other location, then another location would be used.
- Sender 12 prepares the custom header at step SP9 to include not only data to process the eLetter at the ePO 20, but also data to verify and authenticate the eLetter. Verification indicates that the eLetter message was not changed during transmission from Sender 12 to ePO 20, and authentication indicates the eLetter did actually originate from Sender 12.
- the preferred arrangement of this invention is that the sequence at the ePO 20 first identify, verify and authenticate the eLetter and then perform the rest of the processing. This is.
- 19 as parts 1-3.. There are three parts, 19-1, 19-2 and 19-3. Alternatively, these three parts can be treated as all forming one custom header, or they can be three custom headers, or more headers. Preferably, there is one custom header with three parts.
- the physical sequence of the three parts in the custom header is ordinarily not that important. However, preferably they are ordered in the logical sequence in which they are used.
- Fig. 19-1 contains identification numbers for Sender 12. These numbers identify Sender 12 to the ePO 20 upon arrival of the eLetter at the ePO 20. These numbers tell the ePO 20 which encryption key should be used to decrypt Part 2 of the custom header.
- Fig. 19-2 contains the MDC (Message Digest Code) value and the encryption key for decrypting Part 3 of the custom header.
- the MDC is used for verifying the eLetter when it arrives at the ePO. It is also one of a number of ways to authenticate that the eLetter is from Sender 12.
- Fig. 19-3 contains ePostal processing data, including:
- a unique set of data e.g., numbers, which identify the eLetter and which is used for processing and tracking future transactions regarding the eLetter
- any data in Parts 1, 2, and 3 will include the data size unless the ePO 20 knows that information some other way. Also, although not shown in Fig. 19, random noise can be added to the data in Parts 2 and 3 before they are encrypted for security purposes. As mentioned in the description of direct communications, because there will be encrypted data in the custom header, the custom header will be rewritten in hex code for transmission.
- the header can have only two parts rather than three, or more than three parts. Two parts is a minimum since one part is required to be in plain text so that the ePO 20 can read the Sender 12 identification numbers to know which encryption key is required to decrypt the rest of the custom header.
- three parts provides added security in that it allows for another encryption of data in Part 3 with another encryption key which adds security and which when decrypted can provide further evidence of verification and authentication, other than just using the data in Part 2. Having more than three parts and more encryption steps can add greater security, but this structure should not be necessary except in unusual situations.
- the preferred header structure and method of operating the ePostal system 10 is using a custom header with three parts as shown in Fig. 19, at step SP9 Fig. 18 A, and described above.
- the exemplary Sender software 22 (described above with reference to Figs. 2A and 2B) and the Sender exemplary processing (described above with reference to Figs. 18 A and 18B) use a custom header as part of eLetter processing, with the original "To/cc/bcc" information removed from their headers and placed in Part 3 of the custom header at step SPlO in Fig. 18 A.
- An ePO 20 email address at step SPl 1 is then placed in the "To" header, directing the eLetter to the ePO 20.
- An SMTP alternative for sending the eLetter is to use SMTP relay routing which would keep the original Recipient 14 addresses in the "To", "cc" and "bcc" headers.
- an eLetter for each Recipient 14 is received separately at the ePO 20, and the ePO 20 then processes and forwards each of them to the Recipients 14.
- This alternative can simplify some processing of eLetters with multiple recipients at the ePO 20, but delivery of the eLetters to the ePO 20 is greatly more uncertain because there is no guarantee that the Sender ISP 19 will relay each, or any, of the different recipient address eLetters to the ePO 20.
- the ePostal system 10 preferably sends, as mentioned above, by removing the Recipient 14 addresses from the "To", "cc” and “bcc” headers, placing them into Part 3 of the custom header at step SPlO, and replacing them with the specified ePO 20 address at step SPl 1 for this Sender 12 in the "To" header which sends the eLetter directly to the ePO 20.
- the ePostal system maintains simple addressing information that matches the actual transmission route. This avoids other potential problems that relaying can cause.
- the encryption algorithm can be asymmetric or symmetric, and within those two categories there are a number of specific alternatives.
- Alternative algorithms can be publicly and commercially available and/or those that are proprietary to the ePostal system 10. Further, the algorithms used can be included in Sender software 22 or in the software cryptographic libraries of the Sender 12's terminal operating systems, which libraries are called by the Sender software 22 to be used.
- the arrangement for any of the encryption and decryption processes performed by the ePostal system 10 software, whether at a Client, network level or the ePost Office 20, depends upon the Client software, the ePostal network software operating environment (in Fig. 8), and the ePostal system 10 needs and resources for a cryptographic systems compatibility.
- the preferred form also depends upon the relative security and speed of the encryption/decryption algorithm that is selected.
- the preferred form of the ePostal system 10 for encrypting an eLetter message body is the use of a symmetric algorithm and a key selected to be long enough to provide the desired level of security.
- the ePostal system 10 uses an algorithm that can be called from the Sender 12 operating system.
- a sufficient symmetric algorithm is provided in the Sender software 22.
- These same alternatives and preferences can be applied to all cryptographic functions performed by the ePostal system 10 such as encryption, decryption, and hashing functions. There are also situations where specific ePostal system 10 needs require some other preferred alternative. An example is when direct communications begin between the Client and the ePO 20 — an asymmetric public/private key pair is used. Also, as stated previously, will be understood that whenever the ePostal communications system 10 has encrypted data to be transmitted on the Internet, the encrypted data is rewritten in hex characters or some other similar form such as UUEncode to allow for the transmission. W
- Sender 12 processing includes encryption of the eLetter message body at step SP 13 if the user selected this ePostal service.
- encryption there are the alternatives of requiring or not requiring the user to input his passphrase for security purposes.
- the ePostal system 10 default for this selection does not 5 require the user to input his or her passphrase, but also allows the user to change this default using the ePostal options and preferences screens, which can only be done using his or her passphrase.
- the Sender 12 performs the encryption with a one-time-use, sufficiently strong, symmetric key and algorithm using the Sender 12 0 operating system cryptographic library as the resource. Such library and algorithm is known to the ePO 20.
- the Sender 12 puts the symmetric key into Part 3 of the custom header of the eLetter at step SP 14. It is noted that before encrypting the eLetter message body, the Sender 12 also creates the MDC hash of the message body at step SP 12. 5 The Sender 12 finishes building Part 3 of the custom header at step SP15 including all the exemplary data shown in Fig. 19.
- the Sender 12 preferably encrypts the entire Part 3 with a one-time-use, sufficiently strong, symmetric key and algorithm using the Sender 12 operating system cryptographic library as the resource at step SPl 6. 0 After encrypting Part 3, Sender 12 builds Part 2 of the custom header at step
- the Client stores at Sender 12 an encryption key which can be used for encrypting Part 2.
- an encryption key which can be used for encrypting Part 2.
- the preference of the ePostal system 10 between the asymmetric and symmetric alternatives, is to use a symmetric key because symmetric algorithms are faster and relatively stronger.
- Sender 12 if online, uses direct cornms with the ePO 20 to obtain from the ePO 20 a one-time-use symmetric key to be used for encrypting Part 2 of the custom header for just this eLetter.
- the ePostal system 10 can use both alternatives. If Sender 12 is online, Sender 12 uses direct comms at step SP 19 to the ePO 20 for obtaining a onetime-use symmetric key and leaves with the ePO 20 certain Sender 12 identification numbers tied to the specific one-time key and eLetter. If Sender 12 cannot go online, Sender 12 uses the stored symmetric key at step SP20 for encrypting Part 2 of the custom header. In both cases, the Sender 12 identification numbers in Part 1 of the custom header identify for the ePO 20 what encryption key it should use to decrypt Part 2 when the eLetter and its ePostal processing data in the custom header arrives at the ePO 20. The symmetric key stored at the Client and at the ePO 20 for encrypting and decrypting Part 2 can also be changed regularly for security purposes.
- Sender 12 completes the eLetter processing by putting the Sender 12 identification numbers into Part 1 of the custom header at step SP22.
- Sender 12 puts the custom header into the eLetter at step SP23 and sends the newly processed eLetter to the Sender 12 email application "outbox" or outgoing email holding folder at step SP24.
- the email application waits for an email "transport” send/receive event at step SP26 at which time the email application communicates with the Sender ISP 19 mail server to perform the actual "transport” send of the eLetter from the "outbox.”
- An alternative to this process is that, if possible, Sender 12 puts the eLetter into the email application "outbox” before the Sender 12 processes it. Then, when the actual "transport” send/receive event occurs, Sender 12 processes the eLetter and the eLetter is transported to the Sender ISP 19.
- the first alternative of processing before the "transport” event is the option selected.
- the processed eLetter will sit for a while in the email application "outbox.”
- the Sender 12 is able to retrieve, upon the request of the user, the processed eLetter from the email application "outbox" and allow the user to make changes to the eLetter recipients, subject, body, and to the ePostal services selected for the eLetter, including cancellation of ePostal services for the eLetter at step SP25.
- Sender 12 After the eLetter is sent to the Sender ISP 19, Sender 12 identifies the eLetter was sent at step SP27, resets all the original data for "To", "cc” and "bcc” email addresses at step SP28, decrypts the eLetter message body if it was encrypted at step SP29, and sorts the eLetter into the appropriate ePostal sent items folder at step SP30. It also performs any special sorting which might be offered to the user by the user options and preferences menu items. Sender 12 also updates the local credit bank for the ePostal credits used for the just sent eLetter.
- eLetters are where a copy of a sent eLetter is placed at Sender 12 after it is sent, and where a received eLetter is placed after it is processed at Recipient 14.
- the basic special folders are therefore ePostal Sent Items and Inbox folders.
- the preferred arrangement of the ePostal system 10, to assure security of the ePostal folders and to allow optimum flexibility for eLetter movement and sorting by the ePostal user, is to: • Allow eLetters to be moved to any other ePostal folder
- Sender preferred processing steps when the selection of services at Sender 12 includes the Notification to Sender 12 Of the Receipt and Opening (NORO) of his eLetter at Recipient 14 and the certification of the Recipient 14 user as the one who opened the eLetter at step SP33, the following describes exemplary alternative system structures and arrangements for delivering those notifications.
- Alternatives include how many notifications to Sender 12 will occur for a single eLetter, such as notifications at both instances, when the eLetter is received and when the eLetter is opened, or only one notification, when the eLetter is opened.
- Alternatives also include how the notifications are made to Sender 12.
- the preferred arrangement of the ePostal system 10 is to present the range of options to the user in the ePostal options and preferences section of the ePostal menu item in the email application, and allow the user to choose at step SP34.
- Some of the many alternatives include: giving no incentives at all to anyone, giving every Recipient 14 the same incentive for opening an eLetter, varying incentives by 5 individual and group as the ePostal system 10 management decides, and allowing Sender 12 to decide how much incentive Sender 12 will give to Recipient 14 to open the eLetter.
- the ePostal system 10 provides the capability to operate all of these alternative modes, and others, in order that the ePostal system 10 and the Sender 12 have the greatest flexibility in using the "incentives to open eLetter" 0 ePostal feature.
- Sender 12 can require the user to enter 5 his passphrase, or not.
- Recipient 14 can require the user to enter his passphrase before the incoming eLetter is decrypted, or not.
- the ePostal system 10 installs the Client software so that the ePostal default is not requiring the passphrase on encryption, but requiring it on decryption.
- the user will be allowed to select the other mentioned alternatives in the 0 ePostal user options and preferences menu at step SP34.
- ePost Office 20 (“ePO” is an abbreviation for ePost Office) exemplary software 24,24' as disclosed in or with reference to Figs. 3A-C, 4B, 6 and 7 involve managing all processing and administrative operations at 5 ePost Office 20 including:
- Processing Sender's 12 email for all requested services such as tagging, prioritization, authentication of Sender's terminal, certification of individual Sender, encryption, notifications, certification of individual Recipient, pre-paid replies, hard copy delivery, etc. Tagging, prioritization and other security coding prevent fraudulent use of ePostal markings and indicators.
- ePost Office software 24, 24' described above and disclosed in or with reference to Figs. 3A-C, 4B, 6 and 7, can be implemented in alternative forms in the operation of the ePost Office software 24, 24'.
- ePO software 24, 24' an exemplary sequence of processing steps and presently preferred system structures for operation are described below and shown in Figs. 2OA and 2OB.
- the particular implementation is ePO 20 dependent on the manner chosen for sending, processing and delivering an eLetter from the Sender 12 to the Recipient
- the ePO 20 manages the delegated processing of, and shares the results of, ePO 20 processing with the Sender 12, Recipient 14 and ePostal network software 28 via the ePostal system direct comms which were discussed earlier.
- the ePost Office 20 processes an eLetter using the exemplary ePost Office software 24, 24'.
- the sequence of the steps described below and referred to and/or shown in Figs. 2OA and 2OB is exemplary and can vary depending on factors such as the method used to send and deliver an eLetter from Sender 12 to Recipient 14, the amount of processing done by the ePO 20 on an eLetter, and the services selected by Sender 12.
- the ePO 20 begins processing an incoming eLetter at step EPl by first identifying if the incoming email is an eLetter. It is understood that if, at any stage in the ePO 20 processing, the expected processing data is not present or is wrong, the email is rejected from processing and dealt with as appropriate to the specific situation.
- the ePO 20 parses Part 1 of the custom header at step EP5. Reference is again made to Fig. 19.
- the ePO 20 finds the Sender 12 identification numbers at step EP6 which indicate to the ePO 20 the symmetric encryption key to use to decrypt Part 2 of the custom header at step EP7. Creating and communicating the encryption keys used by Sender 12 in processing an eLetter were discussed in connection with the Sender software 22.
- the ePostal system 10 above preferably uses the ePO 20 to decrypt Part 2 with the symmetric key at step EP8 described above, store the message body MDC hash at step EP9, and obtain the symmetric key used to decrypt Part 3 at step EPlO.
- the ePostal system 10 preferably uses the ePO 20 to decrypt Part 3 with the symmetric key from Part 2 at step EPl 1.
- the ePO identifies the ePostal services selected by Sender 12 at step EP 12.
- the ePO 20 decrypts the eLetter message body at step EP 13 using the symmetric key stored in Part 3 of the custom header, if encryption is an ePostal service selected by Sender 12.
- This invention contemplates an alternative to the decryption of an encrypted eLetter message body during processing at the ePO 20, namely, that the encrypted eLetter is not decrypted.
- the decryption, the processing while in plain text, and the re-encryption are all done in a "black box" environment where there is no possible access by anyone at the ePostal system during processing to the eLetter while it is in plain text.
- the eLetter must be decrypted in order to be screened for technical and content risk, and that a better validation of the MDC hash of the message body can be made if it is decrypted which effects both the verification of the message and the authentication of the Sender 12 by the ePO 20. Therefore, it is preferred that the ePostal system 10 decrypt all encrypted incoming eLetters so that they can be properly screened for technical and content risk and so that a proper validation of the MDC hash of the message body can be made.
- the ePO 20 screens the eLetter for technical and content risk at step EP 14.
- the ePO 20 creates the MDC hash of the message body at step EP 15 and compares that MDC hash to the MDC hash stored in Part 2 of the custom header at step EPl 6. If the result is the same, this verifies the content of the eLetter at step EP17 is what was sent by the Sender 12.
- the ePO 20 authenticates the Sender 12 at step EP 18. There are many techniques for doing this. In one form, various data can be stored at the ePO 20 which is tied only to the Sender 12, and when that data is transmitted by Sender 12 to the ePO 20 and is protected by encryption during transmission, that data authenticates the Sender 12 at the ePO 20. In a presently preferred form, the ePostal system 10 uses the MDC not only for message verification, but also for Sender 12 authentication. The MDC authenticates the Sender 12 because only Sender 12 can know the Sender 12 identification numbers in Part 1 of the custom header which (1) point the ePO 20 to the symmetric key which, other than Sender 12, only the ePO 20 would have and (2) verifies the MDC hash of the message body.
- the ePostal system 10 improves security of the ePostal processing data by periodically changing not only the symmetric keys which are used with Parts 2 and 3, but also the sequences of data in Parts 2 and 3.
- the ePO 20 places into the eLetter any administrative messages for the Recipient at step EP20 including processing information and messages for recipients without the Recipient software 26.
- the ePO 20 creates a new MDC hash of the message body at step EP21 if it has changed because of the addition of any administrative messages.
- the ePO 20 re-encrypts the eLetter message body at step EP22, if encryption was an ePostal service selected by Sender 12.
- re-encryption of the message body uses the same symmetric key as used to originally encrypt it, the key which was stored in Part 3 of the custom header of the eLetter from the Sender 12.
- re-encryption uses a new symmetric key.
- the ePO 20 reuses the original symmetric key because the security of the encryption is not diminished in doing so, and less time is spent if generating a new key is not required.
- the ePO identifies the ePostal services selected by Sender 12, calculates the ePostal credits required for the eLetter at step EP23, and adjusts the Sender 12 Account credit balance accordingly at step EP25.
- the ePO 20 preferably maintains the official credit bank records for all ePostal Accounts. If sufficient credits are not available, the ePO 20 initiates procedures at step EP26 to request the user at Sender 12 to buy more ePostal credits while the eLetter is processed. Business policy determines extending unpurchased credits to Sender 12 in such a situation.
- the present invention contemplates alternatives for pricing of ePostal services, and for how payment for services is made.
- the major pricing alternatives include: a periodic subscription rate, one fee per eLetter regardless of the selected services as used, and tiered pricing per eLetter depending on the selected services as used.
- tiered pricing at step EP24 is preferred for the ePostal services selected for each eLetter as used. This preference can, of course, vary according to the type of customer and the business environment.
- Alternatives for the payment of services include: periodic billing of users for services provided, payment for services as used, and prepayment by various means for a given amount of ePostal credits which are then used up as the services are used.
- the ePostal system 10 preferably uses prepayment for a given amount of ePostal credits which are used up as the services are used. Economic models for this approach which are widely accepted include buying a book of postage stamps and replenishing the credits in a mailroom postage meter.
- the ePO performs administrative checks at step EP27 using data stored in Part
- the ePO 20 then begins the processing of the outgoing eLetter at step EP29 with the exemplary ePO sequence of processing steps and preferred methods as described below and as shown in Figs. 2OA and 2OB.
- the ePO 20 processes an outgoing eLetter so that the eLetter is prepared with sufficient ePostal data and instructions and in a way so that the eLetter will be delivered through the Recipient ISP 19 to the Recipient 14 and so that the Recipient 14 will know how to receive and finish the processing of the eLetter.
- the ePostal system 10 preferably uses custom headers at step EP30. Again, the number of specific headers is not significant. However, for eLetters sent from the ePO 20 to Recipient 14, the preferred form of the ePostal system 10 is two headers, or two parts to one header. For the rest of this exemplary discussion, reference is made to two headers. The preference for two headers can change if the content or processing at the Recipient 14 requires more.
- a particular email application at Recipient 14 does not allow custom headers, requires that the data be at some other location in the eLetter, or does not allow for the ePostal processing data to be delivered this way, then another location or delivery arrangement is used.
- the ePO 20 has knowledge of the Recipient 14 operating system and email application, and therefore knows of such constraints.
- the ePO 20 prepares the custom headers to include not only data to process the eLetter at the Recipient 14, but also data to verify and authenticate the eLetter. Verification, as with the Sender 12, indicates that the eLetter message was not changed during transmission from the ePO 20 to the Recipient 14. Authentication indicates the eLetter to the Recipient 14 did actually come from the ePO 20 and therefore originally, before the ePO 20, from Sender 12. As in the case of the Sender 12 processing, the Recipient 14 can process the incoming eLetter in numerous alternative sequences. This means the data in the custom headers can be arranged in many different ways.
- the Recipient 14 preferably first identifies itself within the eLetter. Second, it verifies and authenticates the eLetter. Then it performs the rest of the processing. This is because, if any of the identification, verification or authentication cannot be done, it is desirable that the Recipient 14 not process the email. Such an email might not be an eLetter. Therefore the data in the custom header that allows the Recipient to identify itself in the eLetter is preferably available before any other data. Then the data for verification and authentication is preferably available from the custom headers before, or at least at the same time as, the data for processing.
- Custom Header 1 is structured so as best to accommodate multiple recipients of the eLetter (including both the Recipient 14 with an email address associated with a user Account at the ePO 20 and the recipient with an email address that is not associated with a user Account).
- Alternative arrangements accommodate multiple recipients such as using other types of data structures in a custom header and in the eLetter, and sending from the ePO 20 a separate eLetter for each recipient.
- FIG. 21 A presently preferred ePostal system 10 arrangement is shown in Fig. 21. It enables the ePO 20 to receive and send one eLetter for each eLetter sent by Sender 12, which provides for operational and security advantages.
- Custom Header 2 is constructed at step EP31 as shown in Fig. 21, with ePostal processing data, including:
- the MDC for verifying the eLetter is not changed during transmission to Recipient. It is also one of a number of ways for the Recipient to authenticate that the eLetter is from the ePO 20 and therefore from the Sender 12.
- the "To", “cc”, and “bcc” information is removed from Part 2 of the custom header in the eLetter from Sender 12 and put into this Custom Header 2, along with its hash value.
- the "From” and “Reply-To” information is also put into Custom Header 2, along with its hash value. The hashes of this data allow for additional ways to check the security of the eLetter and to authenticate the ePO 20 and Sender 12.
- the ePostal system 10 the ePO 20 reuses the symmetric key which was stored in Part 3 of the custom header of the eLetter sent by Sender 12.
- Custom Header 2 is then encrypted at step EP32 with an encryption key generated at the ePO 20.
- the ePostal system 10 uses a symmetric key.
- Custom Header 1 is constructed at step EP33 with the ePostal processing data, as shown in Fig. 21.
- This Header is comprised of a series of number pairs, one pair for each recipient email address, regardless whether the email address is associated with an ePostal Account or not.
- the pair of numbers is comprised of a Recipient identification number and a decryption key at step EP34. For a recipient email address which is not associated with an ePostal
- the ePO 20 creates a record for that recipient address and gives it a Recipient identification number to be used in Custom Header 1. This record enables the ePO 20 to track the eLetter to this recipient email address and any future eLetters and other ePostal system 10 actions regarding this recipient.
- the decryption key which is stored in Custom Header 1 is used by the
- this decryption key is the same symmetric key which the ePO 20 generated (as discussed above) and is used to encrypt Custom Header 2.
- This decryption key is the same for each Recipient, because the encrypted Custom Header 2 is the same for each Recipient.
- the Recipient identification number is one which Recipient 14 recognizes as belonging to Recipient 14 because the Recipient identification number is also stored at Recipient 14. A recipient without an Account at the ePO will not recognize the identification number; in fact, such a recipient will not know what to do with the Custom Header or eLetter because the recipient does not have the Recipient software 26. This situation is discussed in more detail below in connection with the Recipient software 26.
- the ePO 20 then, for each pair of numbers, encrypts the symmetric key at step
- the symmetric key is mixed with different random noise to improve encryption security.
- the ePO 20 preferably uses a different symmetric encryption key to encrypt the symmetric key in each Recipient number pair.
- the encryption key used for each Recipient identification number is the one which matches to that Recipient identification number in the records of the ePO 20. (Note that when the eLetter arrives at Recipient 14 and the Recipient 14 finds a Recipient identification number in Custom Header 1 which matches a Recipient identification number in Recipient 14's own record list of such numbers, the Recipient 14 uses the decryption key stored with that Recipient identification number to decrypt the symmetric key in Custom Header
- the ePO 20 then puts Custom Headers 1 and 2 into the eLetter EP36.
- any data in Custom Headers 1 and 2 will include the data size unless the ePO 20 knows that information some other way.
- the ePostal system 10 preferably uses random noise added to the data in Custom Header 2 (as mentioned earlier about Custom Header 1) before it is encrypted for improved security purposes.
- the structure of the data in Custom Header 2 is varied to strengthen further encryption security. As mentioned above in the description of direct communications, and because there will be encrypted data in the custom headers, the custom headers are rewritten in hex code, or some other similarly performing code, so that they can be transmitted.
- the ePO 20 copies the original "To", “cc”, and “bcc” information from Part 3 of the custom header in the eLetter from Sender 12 into the eLetter "To", “cc”, and “bcc” headers at step EP37.
- the ePO if it has not done so already, removes the custom header from the eLetter which was put into the eLetter by Sender 12 at step EP38.
- the ePO 20 sends the outgoing eLetter message at step EP39 with its Custom Headers 1 and 2, to send and deliver an eLetter from Sender 12 to Recipient 14with all of the necessary ePostal processing data for the Recipient 14 to receive, identify, verify, authenticate, and finish processing of the eLetter.
- the ePO 20 completes all required data base record-keeping at step EP40 regarding the eLetter at this stage of its processing and delivery.
- Recipient 14 exemplary software 26 as disclosed in or with reference to Figs.4A-1 and 4A-2 include:
- Recipients 14 that do not have ePostal accounts and the exemplary software 26 as disclosed in or with reference to Figs 4A- 1 and 4A-2 can also receive email and access eLetters processed through the ePost Office 20, as shown in Figs. 3 and 4B.
- the email from Sender 12 received by a recipient without ePostal account and software has limited benefits from the ePostal system beyond screening for technical and content risk. For example, such non-account recipient cannot verify the email was actually processed by the ePost Office, or is from the Sender 12. Therefore the email lacks the related security benefits of the ePostal system 10, much like regular email.
- this email can offer such non-account recipients an option for verifying that the email was from Sender 12 and processed by the ePost Office 20.
- the email can provide the non-account recipient a code which. enables that recipient to see Sender's 12 eLetter at the ePost Office window, or website 20.
- These eLetters have many of the features and benefits of the ePostal system such as technical and content screening, value and priority indicators, authentication of Sender's 12 terminal, certification of the Sender 12 user, encryption and pre-paid replies to Sender 12, but also the significant limitations associated with not being received by and residing in recipient's own email application.
- the present invention includes various alternative software and arrangements of operation with respect to the exemplary Recipient software 26 (described above and disclosed in or with reference to Figs. 4A-1 and 4A-2) and the sequence of Recipient preferred processing steps (described below and shown in Figs. 22A and 22B).
- Recipient 14 alternatives depend on the arrangements chosen for sending, processing and delivering an eLetter from the Sender 12 to the Recipient 14 as described above regarding alternatives for sending, processing and delivering an eLetter.
- the alternative arrangements for processing an eLetter at the Recipient 14 which are discussed below and shown in Figs. 22A and 22B, pertain generally to all possible alternatives for sending the eLetter from Sender 12 to Recipient 14.
- the Recipient 14 receives and processes an eLetter using the Recipient software 26.
- the Recipient 14 sequence of steps RPl (described below and shown in Figs. 22A and 22B) is exemplary. It could vary, e.g., in by the form used to send and deliver an eLetter from Sender 12 to Recipient 14, the amount of processing done by the ePO 20 on an eLetter, the services selected by Sender 12, and the nature of the operating system and email application at Recipient 14.
- the three major steps of processing at the Recipient 14 is identification RP2, verification and authentication RP3, and then other general processing RP4. It is understood that if, at any stage of processing, the expected processing data is not present or is wrong, the email is rejected from further processing and is dealt with as appropriate to the specific situation step RPlO.
- the identification step RP2 at the Recipient 14 begins with the arrival of an email to the email application at the Recipient 14 via some TCP protocol such as POP3.
- the Recipient 14 does not use such an email application, but rather uses another software application such as a web browser for email
- the ePostal Recipient software 26 works with it, albeit with a somewhat different process than described below (as mentioned with respect to the ePostal software installation and activation preferred arrangement.) Specifically how, where and when the Recipient 14 learns that a new email has arrived is dependent upon the nature of the Recipient 14 operating system and email application. An exemplary time could be before or after the email is put into the email application's mail folders. If in an exemplary fashion the Recipient 14 learns of the new email after it is put into an email application mail folder, the Recipient 14 screens the email application mail folders for any newly arriving email.
- the Recipient 14 when Recipient 14 finds a new email, the Recipient 14 first checks at step RP5 whether the incoming email is an eLetter by determining if the "From" address of the email is an address known to it as an authorized "From" address for the ePost Office 20. Second, the Recipient 14, as an outcome of the preferred methods explained in the section about outgoing eLetters being processed by the ePost Office software 24, 24', looks for whether there is ePostal processing data in the eLetter, namely whether there is a SMTP Custom Header 1 at step RP6. If there is such a header, the email is considered an eLetter for further processing.
- the verification and authentication step RP3 starts with the Recipient 14 parsing the headers and Custom Headers in the eLetter.
- the Recipient 14 checks for a match of the "Delivered-To" address in the email among the "Original-To" and the "To/cc/bcc" data fields of the email at step RP7. If there is not a match, there is a possibility of an alias address at step RP8.
- the ePostal system 10 in the case of a possible alias address the Recipient 14 via direct comms, gives the ePO 20 the data indicating an alias.
- the ePO 20 responds by direct comms back to the Recipient with further instructions such as the correct Recipient identification numbers and decryption key to continue processing the eLetter.
- the Recipient 14 finds the Recipient identification number at step RPl 1 in the Recipient 14 data records which is paired with the Delivered-To address in the email.
- the Recipient 14 compares that Recipient identification number to each of the Recipient identification numbers in Custom Header 1 to find the associated encrypted symmetric key at step RP12.
- the Recipient 14 finds in the Recipient 14 data records at step RP 13 the decryption symmetric key at step RP 14 associated with the matched Recipient identification number in Custom Header 1.
- the Recipient 14 decrypts the encrypted symmetric key at step RPl 5 which is stored in Custom Header 1 and is paired with the matching Recipient identification number.
- the Recipient 14 also removes the random noise from the symmetric key which was added for improved security as a preferred step of the ePostal system 10 before it was encrypted at the ePO 20.
- the Recipient 14 using the decrypted symmetric key from Custom Header 1 decrypts at step RP 16 Custom Header 2, making all the data in Custom Header 2 available for use, such the list of ePostal services that the Sender 12 selected.
- the Recipient 14 identifies the ePostal services at step RP 17 selected by
- the ePO 20 performs those services if and when needed in the Recipient 14 processing using techniques known to those skilled in the art.
- the Recipient decrypts the eLetter message body at step RP 18 using the symmetric key which is stored in Custom Header 2.
- the Recipient 14 creates a MDC hash of the eLetter message body at step RP 19 and compares that to the MDC hash at step RP20 of the message body that is stored in Custom Header 2. A match of the two MDC hashes verifies that the message at step RP21 has not been changed during transmission from the ePO 20 to the Recipient 14.
- the Recipient 14 can also authenticate the ePO 20 as the sender of the eLetter which has arrived at Recipient 14.
- the Recipient 14 can also authenticate the ePO 20 as the sender of the eLetter which has arrived at Recipient 14.
- Various data can be stored at the Recipient 14 which is tied only to the ePO 20, and when that data is transmitted by the ePO 20 to the Recipient .14 and is protected by encryption during transmission, that data authenticates the ePO 20 at the Recipient 14.
- the presently preferred arrangement includes using the MDC not only for message verification but also for ePO 20 authentication at step RP21.
- the match of the MDC hash that the Recipient 14 creates of the message body to the decrypted MDC hash stored in Custom Header 2 authenticates the ePO 20, as well as verifies the message. This is because only the ePO 20 can know the Recipient identification number in Custom Header 1 which points the Recipient 14 to the symmetric key which only the Recipient 14 would have (other than the ePO 20).
- the Recipient 14 prepares the eLetter for display to the ePostal Account user by updating the "From" and "Reply-To" information in the eLetter at step RP23 with the original "From" data which was stored in Custom Header 2.
- the Recipient 14 prepares the eLetter for display by processing the Administrative content at step RP24 which was added to the message body at the ePO 20.
- an ePostal Administrative message is placed at the beginning of all eLetter message bodies which are delivered to recipients at step RP38 who do not have the Recipient software 26.
- the recipient's email application places the eLetter in its regular email inbox folder at step RP39 and does not differentiate the eLetter from other email, the reasons for the ePostal Administrative message are significant and include:
- Exemplary alternatives for Recipient processing include: sending separate eLetters to Recipients 14 without this Administrative content and to recipients (without the Recipient software 26) with the Administrative content; sending the same Administrative content to all Recipients whether or not they have the Recipient software 26, and allowing both kinds of Recipients to see the Administrative content; and the preferably adding the Administrative content to all eLetters while they are being processed at the ePO 20, and then having Recipient 14 (with software 26) remove the content before the Recipient 14 user sees the eLetter displayed.
- the recipient without software 26 has no way of removing the Administrative content; that recipient user will see the Administrative message when the eLetter is displayed.
- the Recipient 14 adds other Administrative content to the eLetter message body at step RP25 as defined by the data in Custom Header 2. This content would include information for the Recipient 14 user such as: • the time and date of processing the eLetter at the ePO
- the ePostal system 10 enables the Recipient 14 using option and preference screens to choose how to receive this information. It can be provided in a number of ways, such as explained above, including as content on the eLetter itself or shown in a special pop up ePostal screen, as requested by the Recipient 14 user.
- the Recipient 14 uses the information in Custom Header 2, sets the class of the mail message for this eLetter at step RP26 so that the ePostal priority class indicator which was selected by Sender 12 is displayed. The steps in doing this will depend on the email application at Recipient 14.
- Recipient 14 sorts the eLetter into its ePostal folder at step RP27.
- Recipient software 26 described above and shown in Figs. 4A-1 and 4A-2, there are alternative arrangements for sorting, movement, and storage of eLetters between ePostal folders.
- These ePostal incoming folders receive a copy of a received eLetter at the Recipient 14 after it is processed by the Recipient 14.
- the basic ePostal incoming folder is the ePostal Inbox folder.
- ePostal folders can be created either by the Recipient 14 using ePostal option and preference screens or by the ePO 20 during Client installation, or via direct conims and ePO eLetters.
- Recipient 14 besides sorting all eLetters into ePostal folders, can also sort at the option of the Recipient 14 user all other email, whose sender's email address did not have a match in the Recipient 14 user's email address book, into a single separate folder, making all such email easy to discard.
- the Recipient 14 When the Recipient 14 user selects the eLetter at step RP32, before Recipient 14 displays the eLetter in readable plain text, the Recipient 14 requests the Recipient 14 user to input his passphrase for identification and security purposes. When the user inputs his passphrase, the Recipient 14 displays the eLetter, which had been encrypted, in readable plain text at step RP33. The Recipient 14 as well as the Sender 12 can request the ePO 20 to retain in its eLetter repository at the ePO 20 this eLetter at step RP34 as well as any other eLetter.
- the ePostal system 10 allows the user to choose using the ePostal option and preference screens, whether or not the passphrase entry is required.
- the ePostal system 10 allows the Recipient 14 (and the Sender 12) using ePostal option and preference screens to save an encrypted version of the eLetter in ePostal folders designated for such encrypted eLetters.
- These stored encrypted eLetters can be opened later by the Recipient 14 when the Recipient 14 user enters his Passphrase.
- the Recipient 14 if online or as soon as it can be online, preferably uses ePostal direct comms, as described above, to let the ePO 20 know that the eLetter has arrived at Recipient 14 at step RP29.
- This direct comms confirms to the ePO 20 that the eLetter was delivered to, and has been processed successfully by, Recipient 14.
- the ePO 20 records this information.
- the Recipient 14 When the Recipient 14 user opens this eLetter, the Recipient 14, if online or as soon as it can be online, preferably uses ePostal direct comms as discussed earlier to confirm to the ePO 20 that the eLetter has been opened at step RP36. If the Sender 12 user had requested the certification of the Recipient 14 user as the one who opens the eLetter, Recipient 14 performs the certification when the eLetter is opened and reports that to the ePO 20 by direct comms as well at step RP36. The ePO 20 records this information.
- the Recipient 14 uses direct comms to notify the ePO 20 of receipt and opening regardless of whether the Sender 12 selected to receive the same notifications. If the Sender 12 did select the notification of receipt and opening (NORO) services, there are alternatives for how these notifications are provided to the Sender 12. Those alternatives include the notifications being given to Sender 12 by either the ePO 20 or the Recipient 14. Preferably the NORO communications are made to the Sender 12 by the ePO 20 which is the far simpler and secure alternative. In other forms, the Sender 12 receives both a notification of receipt and of opening when they individually occur, or only one notification of both after the eLetter is opened. In a preferred form the ePostal system 20 allows the Sender 12 to make this choice at the time he selects this ePostal service.
- the Recipient 14 when the Recipient 14 user opens the eLetter, the Recipient 14 , preferably at the time of opening, estimates the ePostal incentive to open (ITO) credit that will be added to the Recipient 14 user's Account at the ePO 20 (after Recipient 14 using direct comms notifies the ePO 20 of eLetter opening) and adds that estimated credit to the Recipient 14 local bank of ePostal credits at step RP35. The Recipient 14 also adds to the local bank of credits any Sender 12 ITO which the Sender 12 selected for this eLetter. This ends the description of the exemplary sequence of steps of the Recipient
- Fig. 5 Another feature of this invention as shown in Fig. 5, like traditional postal services, is that the Sender 12 user can "go" to the ePost Office 20 to mail/send eLetters, and Recipient 14 user can "go” to the ePost Office 20 to pick up eLetters from an ePO "box."
- An example of where this would be valuable is when the Sender 12 and Recipient 14 users are away from their terminals that have the ePostal software 22, 26.
- any terminal with a web browser as shown in Figs.
- a variant of the feature described in the above paragraph and also shown in Fig. 5 is where users can "go" to the ePost Office 20 to mail/send eLetters and pick up eLetters from an ePO "box" even though they do not have ePostal software installed on any terminal but as long as they have opened ePostal accounts at the ePO website.
- the user using any terminal with a web browser, as shown in Figs. 6 and 7, can go to the ePO website, log in, and access their account information and tools for sending eLetters and for reading, forwarding, or otherwise handling the eLetters that are held at the ePO for them.
- Senders 12 and Recipients 14 can have connection to email and Internet access services other than through an ISP, such as from within a corporate intranet or some other organizational network.
- Fig. 8 shows the corporate intranet example of this non-ISP connection, wherein ePostal software can operate not only at individual Senders' 12 terminals, but also at corporate servers. While corporations are a typical environment for such networks and servers, as is well known, networks of varying size and capabilities operating with varying protocols are used by many entities. For convenience, they are included herein by the terms "corporate”, “corporate network”, “corporate intranet", and "corporate server".
- the ePostal operations for the whole organization are much better managed if the Network ePostal software 28 works with both the Sender ePostal software at Senders 12 and the Corporate eMail Servers 13, rather than if ePostal software is only at the individual Senders 12 computers.
- Such a system configuration would include: management of available ePostal features, administration of the company's total ePostal credits, communications with the ePost Office 20, and various related data collection and retention activities.
- Corporate Sender 12 users are not only individuals but also business information systems groups such as accounting and billing.
- Network ePostal software 28 would assist those Information Systems 17 and the Corporate eMail Servers 13 to prepare, send and provide ePostal services (including ePost Office "postage metering") for business documents sent in the form of eLetters such as customer bills and announcements.
- a business and its employees can also be Recipient 14 users, as well as Senders 12, residing within the same corporate network.
- Sending operations when the Network ePostal software 28 works with both the Recipient ePostal software at Recipients 14 and with the Corporate eMail Servers 13, both the corporate network and the ePostal operations can be more effective and efficient.
- An example of a resulting benefit is the exclusion of many more low value, low priority emails from ever entering the corporate network.
- Network ePostal software 28 can assist at the network server level not only with business intranets but also with other organizational and ISP networks, where exact features and programming of Network ePostal software for a specific network would vary depending on the network technical configurations and the organizational needs.
- sender pay to use the ePostal services, just as with conventional postal services, and can obtain different levels of services for different fees.
- This in itself has the advantage of prioritizing the email, not only in contrast with all conventional email, but also between eLetters of the ePostal system itself.
- the payment aspect limits the usage of the system, which provides an automatic market solution to the problem of the increasing volume of "free" email traffic; as discussed earlier, this traffic noise has two components: 1) the overload of legitimate and wanted email, and 2) the unwanted, nuisance email.
- senders are interested in solving problems pertaining not only to email volumes, but also email quality.
- Senders seek the greater options of security that are inherent and optional with the ePostal system; they also can enjoy the benefits of differentiated, secure/encrypted and tracked emails, more productive email management, ease of use, general accessibility, and support in business intranets and other networks. Certain senders will pay to process their most important email through the ePostal system because of "value" ⁇ value not only to senders but also to Recipients 14 users.
- Recipients are far more likely to open eLetters than other regular email.
- the ePostal system successfully addresses for the recipient the Internet mail problems and opportunities of general security, legitimate overload, priority management, encryption, tracking, ease of use, and nuisance email.
- the recipient 14 knows that the sender considers the eLetter important enough to pay to send to the recipient, unlike all of recipient's other regular, free email. That is, the sender is willing to give up something of value in order to have the recipient open his eLetter, where as senders of other regular "free" email are not. • The recipient knows eLetters are screened for technological risk (viruses and worms) and content risk (offensive material) during processing at the ePost Office. Therefore, the recipient does not have the anxiety and pain in opening eLetters that he or she does with regular email.
- each eLetter has an authentication of the sender's terminal and email address. More specifically, the recipient will know that his own terminal has verified that the eLetter came from the ePost Office, which earlier verified the original email was from the sender's terminal and can even certify the individual sender. The ePost Office also gives each eLetter a date and time stamp of processing which can be verified. Recipients could also request the sender to have the ePostal system deliver a hard copy of the eLetter to the recipient.
- eLetters will be more clearly and quickly seen because they are marked with ePostal identification and priority markings.
- eLetters can be collected upon receipt and placed in a special ePostal folder (or various ePostal folders organized by ePostal priority, sender address, industry, etc.) in the recipient's email application.
- a specified ePostal folder can even open by default.
- the recipient If the recipient is away from his own terminal for an extended time, he or she can rent an ePostal mail box at the ePost Office website in which his incoming eLetters can be held during that time. Using another terminal with a web browser, the recipient can access his account and ePostal website tools to read
- the ePostal system does not interfere with the recipients receiving all their regular email and will not delete any of the Recipient's non-ePostal email, unless the recipients choose otherwise. It will not interfere with their other email security measures. However, the ePostal system can, if recipients choose, sort out and place all non-ePostal and non- Address Book (unknown Senders) email into a separate folder. This "third category" folder of unsolicited, unknown, unwanted, nuisance email could then be easily deleted in mass.
- recipients with an ePostal account besides having the full range of ePostal features available for receiving and managing eLetters, can be credited an economic incentive to open eLetters. This credit can be used by recipients to send their own eLetters through the ePostal system, or after a certain credit balance is reached, it can be given to the recipients periodically.
- Differentiated eLetters The ePostal system marks the eLetter with distinguishing priority and service indicators. Senders know, when a recipient scans his email log, the recipient will see not only that the eLetter has been processed by the ePostal system (and therefore known by the recipient to be secure, credible, and important enough for the sender to pay for its delivery) but also these priority and service indicators differentiate it from all the other regular "free" email that the recipient has in his Inbox, and from other lesser priority (and lesser cost) eLetters that have come through the ePostal system. The sender knows the recipient understands the eLetter has minimal risk from viruses and offensive material, and the eLetter' s sender is verified.
- the sender also realizes that the recipient can sort eLetters to make them more easily viewable and accessible. Therefore, the sender knows the recipient is far more likely to open and read ePostal eLetters than regular email. Essentially, the effect of all these features (priority indicators, sorting and security) is to put the sender's eLetter "on top" of the recipient's pile of regular email.
- An appropriate analogy is choosing overnight delivery rather than conventional mail, but not because of faster delivery — but because the recipients are more apt to look at and open premium delivered "mail containers" before they open regular mail.
- eLetters can be securely encrypted by senders in an extremely quick, easy, and generally available way. Senders do not need to obtain and distribute special digital keys to whomever they might need to dash off an important, encrypted email. This presents a new, very valuable option to senders who require secure, encrypted communications such as mentioned earlier about HIPAA and the health care industry. Senders, as well as recipients, can archive encrypted eLetters for content verification purposes.
- Senders can also pre-pay for responses from recipients to their eLetters back through the ePostal system which should appeal to recipients and increase such responses (and value) for senders. • Ease and flexibility of use. ePostal services are easy to use for senders.
- Selections for services are all made from within and work seamlessly with the sender's email application.
- the sender's sent eLetters can be automatically managed into special folders by priority, recipient, etc., separating them from his regular sent email. And when the sender is not at his or her own terminal, he or she can access at the ePO website his ePostal account and tools for sending (and receiving) eLetters.
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006800540484A CN101410829B (en) | 2006-02-13 | 2006-02-13 | System and method for message transmit-receive and document management |
PCT/US2006/005052 WO2007094772A1 (en) | 2006-02-13 | 2006-02-13 | Messaging and document management system and method |
BRPI0621341-3A BRPI0621341A2 (en) | 2006-02-13 | 2006-02-13 | communication system and communication method for electronic mail |
JP2008555202A JP5173841B2 (en) | 2006-02-13 | 2006-02-13 | Communication and document management system and method |
MX2008010317A MX2008010317A (en) | 2006-02-13 | 2006-02-13 | Messaging and document management system and method. |
CA2637868A CA2637868C (en) | 2006-02-13 | 2006-02-13 | Messaging and document management system and method |
EP06720704A EP1989642A4 (en) | 2006-02-13 | 2006-02-13 | Messaging and document management system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2006/005052 WO2007094772A1 (en) | 2006-02-13 | 2006-02-13 | Messaging and document management system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007094772A1 true WO2007094772A1 (en) | 2007-08-23 |
Family
ID=38371835
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/005052 WO2007094772A1 (en) | 2006-02-13 | 2006-02-13 | Messaging and document management system and method |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP1989642A4 (en) |
JP (1) | JP5173841B2 (en) |
CN (1) | CN101410829B (en) |
BR (1) | BRPI0621341A2 (en) |
CA (1) | CA2637868C (en) |
MX (1) | MX2008010317A (en) |
WO (1) | WO2007094772A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013115956A1 (en) * | 2012-01-31 | 2013-08-08 | International Business Machines Corporation | Identity verification for at least one party to a text-based communication |
WO2014035674A1 (en) * | 2012-08-28 | 2014-03-06 | Alcatel Lucent | Direct electronic mail |
CN113595882A (en) * | 2021-07-27 | 2021-11-02 | 中国人民解放军91977部队 | Automatic message and power receiving and transmitting system and method based on message and power service |
US11393580B2 (en) | 2013-12-31 | 2022-07-19 | Mckesson Corporation | Systems and methods for determining and communicating a prescription benefit coverage denial to a prescriber |
US11398992B1 (en) | 2017-02-01 | 2022-07-26 | Mckesson Corporation | Method and apparatus for parsing and differently processing different portions of a request |
US11418468B1 (en) * | 2018-07-24 | 2022-08-16 | Mckesson Corporation | Computing system and method for automatically reversing an action indicated by an electronic message |
US11514137B1 (en) | 2016-03-30 | 2022-11-29 | Mckesson Corporation | Alternative therapy identification system |
US11562437B1 (en) | 2019-06-26 | 2023-01-24 | Mckesson Corporation | Method, apparatus, and computer program product for providing estimated prescription costs |
US11587657B2 (en) | 2020-09-04 | 2023-02-21 | Mckesson Corporation | Method, apparatus, and computer program product for performing an alternative evaluation procedure in response to an electronic message |
US11587179B2 (en) | 2014-02-14 | 2023-02-21 | Mckesson Corporation | Systems and methods for determining and communicating patient incentive information to a prescriber |
US11610240B1 (en) | 2020-02-17 | 2023-03-21 | Mckesson Corporation | Method, apparatus, and computer program product for partitioning prescription transaction costs in an electronic prescription transaction |
US11636548B1 (en) | 2019-06-26 | 2023-04-25 | Mckesson Corporation | Method, apparatus, and computer program product for providing estimated prescription costs |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11328265B1 (en) * | 2011-05-02 | 2022-05-10 | Givoly Inventions, LLC | System, method, and computer program product for allocating time to achieve objectives |
CN104820698B (en) * | 2015-05-08 | 2018-05-11 | 中国人民解放军61600部队 | A kind of distributed consensus implementation method of data screening algorithm |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6742016B1 (en) * | 2000-03-24 | 2004-05-25 | Hewlett-Packard Devolpment Company, L.P. | Request acceptor for a network application system and a method thereof |
WO2004084042A2 (en) | 2003-03-17 | 2004-09-30 | Epostal Services, Inc. | Messaging and document management system and method |
US6996520B2 (en) * | 2002-11-22 | 2006-02-07 | Transclick, Inc. | Language translation system and method using specialized dictionaries |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3201322B2 (en) * | 1997-12-09 | 2001-08-20 | 日本電気株式会社 | Email billing system |
AU2003269292A1 (en) * | 2003-09-09 | 2005-03-29 | Ghazal Abadi Naeini | Global village communication protocol (gvcp) |
US20060021018A1 (en) * | 2004-07-21 | 2006-01-26 | International Business Machines Corporation | Method and system for enabling trust infrastructure support for federated user lifecycle management |
-
2006
- 2006-02-13 CN CN2006800540484A patent/CN101410829B/en not_active Expired - Fee Related
- 2006-02-13 EP EP06720704A patent/EP1989642A4/en not_active Withdrawn
- 2006-02-13 MX MX2008010317A patent/MX2008010317A/en active IP Right Grant
- 2006-02-13 JP JP2008555202A patent/JP5173841B2/en not_active Expired - Fee Related
- 2006-02-13 BR BRPI0621341-3A patent/BRPI0621341A2/en not_active IP Right Cessation
- 2006-02-13 WO PCT/US2006/005052 patent/WO2007094772A1/en active Application Filing
- 2006-02-13 CA CA2637868A patent/CA2637868C/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6742016B1 (en) * | 2000-03-24 | 2004-05-25 | Hewlett-Packard Devolpment Company, L.P. | Request acceptor for a network application system and a method thereof |
US6996520B2 (en) * | 2002-11-22 | 2006-02-07 | Transclick, Inc. | Language translation system and method using specialized dictionaries |
WO2004084042A2 (en) | 2003-03-17 | 2004-09-30 | Epostal Services, Inc. | Messaging and document management system and method |
Non-Patent Citations (1)
Title |
---|
See also references of EP1989642A4 |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013115956A1 (en) * | 2012-01-31 | 2013-08-08 | International Business Machines Corporation | Identity verification for at least one party to a text-based communication |
GB2514941A (en) * | 2012-01-31 | 2014-12-10 | Ibm | Identity verification for at least one party to a text-based communication |
US9077749B2 (en) | 2012-01-31 | 2015-07-07 | International Business Machines Corporation | Identity verification for at least one party to a text-based communication |
GB2514941B (en) * | 2012-01-31 | 2016-12-07 | Ibm | Identity verification for at least one party to a text-based communication |
WO2014035674A1 (en) * | 2012-08-28 | 2014-03-06 | Alcatel Lucent | Direct electronic mail |
CN104604188A (en) * | 2012-08-28 | 2015-05-06 | 阿尔卡特朗讯公司 | Direct electronic mail |
US9338119B2 (en) | 2012-08-28 | 2016-05-10 | Alcatel Lucent | Direct electronic mail |
US11393580B2 (en) | 2013-12-31 | 2022-07-19 | Mckesson Corporation | Systems and methods for determining and communicating a prescription benefit coverage denial to a prescriber |
US11587179B2 (en) | 2014-02-14 | 2023-02-21 | Mckesson Corporation | Systems and methods for determining and communicating patient incentive information to a prescriber |
US11514137B1 (en) | 2016-03-30 | 2022-11-29 | Mckesson Corporation | Alternative therapy identification system |
US11398992B1 (en) | 2017-02-01 | 2022-07-26 | Mckesson Corporation | Method and apparatus for parsing and differently processing different portions of a request |
US11418468B1 (en) * | 2018-07-24 | 2022-08-16 | Mckesson Corporation | Computing system and method for automatically reversing an action indicated by an electronic message |
US11562437B1 (en) | 2019-06-26 | 2023-01-24 | Mckesson Corporation | Method, apparatus, and computer program product for providing estimated prescription costs |
US11636548B1 (en) | 2019-06-26 | 2023-04-25 | Mckesson Corporation | Method, apparatus, and computer program product for providing estimated prescription costs |
US11610240B1 (en) | 2020-02-17 | 2023-03-21 | Mckesson Corporation | Method, apparatus, and computer program product for partitioning prescription transaction costs in an electronic prescription transaction |
US11587657B2 (en) | 2020-09-04 | 2023-02-21 | Mckesson Corporation | Method, apparatus, and computer program product for performing an alternative evaluation procedure in response to an electronic message |
CN113595882A (en) * | 2021-07-27 | 2021-11-02 | 中国人民解放军91977部队 | Automatic message and power receiving and transmitting system and method based on message and power service |
Also Published As
Publication number | Publication date |
---|---|
CA2637868C (en) | 2014-09-02 |
EP1989642A4 (en) | 2009-04-29 |
CN101410829B (en) | 2013-06-19 |
BRPI0621341A2 (en) | 2011-12-06 |
CA2637868A1 (en) | 2007-08-23 |
MX2008010317A (en) | 2008-09-23 |
EP1989642A1 (en) | 2008-11-12 |
JP2009527047A (en) | 2009-07-23 |
CN101410829A (en) | 2009-04-15 |
JP5173841B2 (en) | 2013-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7627640B2 (en) | Messaging and document management system and method | |
CA2637868C (en) | Messaging and document management system and method | |
CA2461061C (en) | Automatic delivery selection for electronic content | |
JP3932319B2 (en) | Email firewall using encryption / decryption with stored key | |
US20030023695A1 (en) | Modifying an electronic mail system to produce a secure delivery system | |
US20090077649A1 (en) | Secure messaging system and method | |
CA2514836C (en) | Messaging and document management system and method | |
DK2632096T3 (en) | Procedure for certification of delivery of electronic messages | |
US20050198165A1 (en) | Systems and methods for electronic information distribution | |
KR20060120047A (en) | Method and system for delivering electronic messages using a trusted delivery system | |
RU2419137C2 (en) | System and method to hand over documents and to control circulation of documents | |
US8069118B2 (en) | Mediated electronic messaging with value-added services | |
WO2002091131A2 (en) | Modifying an electronic mail system to produce a secure delivery system | |
WO2001082553A2 (en) | System and method for establishing a network of members | |
Mapeka | An incremental approach to a secure e-commerce environment | |
CA2601654A1 (en) | Secure messaging system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2637868 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/a/2008/010317 Country of ref document: MX |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008555202 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 7384/DELNP/2008 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2008135759 Country of ref document: RU Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006720704 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200680054048.4 Country of ref document: CN |
|
ENP | Entry into the national phase |
Ref document number: PI0621341 Country of ref document: BR Kind code of ref document: A2 Effective date: 20080813 |