AU2002213182A1 - Secret key messaging - Google Patents
Secret key messagingInfo
- Publication number
- AU2002213182A1 AU2002213182A1 AU2002213182A AU1318202A AU2002213182A1 AU 2002213182 A1 AU2002213182 A1 AU 2002213182A1 AU 2002213182 A AU2002213182 A AU 2002213182A AU 1318202 A AU1318202 A AU 1318202A AU 2002213182 A1 AU2002213182 A1 AU 2002213182A1
- Authority
- AU
- Australia
- Prior art keywords
- secret key
- key messaging
- messaging
- secret
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/88—Medical equipments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US24056500P | 2000-10-13 | 2000-10-13 | |
US60/240,565 | 2000-10-13 | ||
PCT/US2001/032008 WO2002032044A2 (en) | 2000-10-13 | 2001-10-11 | Secret key messaging |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2002213182A1 true AU2002213182A1 (en) | 2002-04-22 |
Family
ID=22907062
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2002213182A Abandoned AU2002213182A1 (en) | 2000-10-13 | 2001-10-11 | Secret key messaging |
Country Status (5)
Country | Link |
---|---|
US (1) | US6728378B2 (en) |
EP (1) | EP1325583A2 (en) |
AU (1) | AU2002213182A1 (en) |
BR (1) | BR0114602A (en) |
WO (1) | WO2002032044A2 (en) |
Families Citing this family (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6256393B1 (en) * | 1998-06-23 | 2001-07-03 | General Instrument Corporation | Authorization and access control of software object residing in set-top terminals |
US20020112015A1 (en) * | 1999-03-02 | 2002-08-15 | International Business Machines Corporation | Selective security encryption of electronic communication for selected recipients |
US6714967B1 (en) * | 1999-07-30 | 2004-03-30 | Microsoft Corporation | Integration of a computer-based message priority system with mobile electronic devices |
JP2001211157A (en) * | 2000-01-25 | 2001-08-03 | Murata Mach Ltd | Secret key registering method, secret key register secret key issuing method, cipher communication method, cipher communication system and recording medium |
GB2366706B (en) * | 2000-08-31 | 2004-11-03 | Content Technologies Ltd | Monitoring electronic mail messages digests |
US7003800B1 (en) * | 2000-11-06 | 2006-02-21 | Ralph Victor Bain | Self-decrypting web site pages |
EP1241857A1 (en) * | 2001-03-15 | 2002-09-18 | Nokia Corporation | Method for accessing files stored in a mobile terminal device supporting an internet protocol |
US20020178353A1 (en) * | 2001-04-11 | 2002-11-28 | Graham Randall James | Secure messaging using self-decrypting documents |
JP2002344441A (en) * | 2001-05-11 | 2002-11-29 | Ricoh Co Ltd | Digital data encryption system, digital data reproducing device, digital data enciphering method, digital data reproducing method and program for making computer execute the method |
US8117450B2 (en) * | 2001-10-11 | 2012-02-14 | Hewlett-Packard Development Company, L.P. | System and method for secure data transmission |
FR2834158B1 (en) * | 2001-12-21 | 2005-02-11 | Radiotelephone Sfr | ELECTRONIC SIGNATURE METHOD |
WO2003079619A1 (en) * | 2002-03-20 | 2003-09-25 | Research In Motion Limited | System and method for transmitting and utilizing attachments |
AUPS217002A0 (en) * | 2002-05-07 | 2002-06-06 | Wireless Applications Pty Ltd | Clarence tan |
US7539726B1 (en) * | 2002-07-16 | 2009-05-26 | Sonicwall, Inc. | Message testing |
US7908330B2 (en) * | 2003-03-11 | 2011-03-15 | Sonicwall, Inc. | Message auditing |
US8924484B2 (en) * | 2002-07-16 | 2014-12-30 | Sonicwall, Inc. | Active e-mail filter with challenge-response |
US8396926B1 (en) | 2002-07-16 | 2013-03-12 | Sonicwall, Inc. | Message challenge response |
JP2004078053A (en) * | 2002-08-22 | 2004-03-11 | Sony Corp | Ciphering device |
US8266215B2 (en) | 2003-02-20 | 2012-09-11 | Sonicwall, Inc. | Using distinguishing properties to classify messages |
US7406502B1 (en) | 2003-02-20 | 2008-07-29 | Sonicwall, Inc. | Method and system for classifying a message based on canonical equivalent of acceptable items included in the message |
US7299261B1 (en) | 2003-02-20 | 2007-11-20 | Mailfrontier, Inc. A Wholly Owned Subsidiary Of Sonicwall, Inc. | Message classification using a summary |
JP3923028B2 (en) * | 2003-04-28 | 2007-05-30 | シャープ株式会社 | Image recording system and image recording apparatus |
US7949877B2 (en) * | 2003-06-30 | 2011-05-24 | Realnetworks, Inc. | Rights enforcement and usage reporting on a client device |
US7461257B2 (en) * | 2003-09-22 | 2008-12-02 | Proofpoint, Inc. | System for detecting spoofed hyperlinks |
EP1521390B1 (en) * | 2003-10-01 | 2008-08-13 | Hewlett-Packard Development Company, L.P. | Digital signature method and apparatus |
EP1542396B1 (en) * | 2003-11-27 | 2007-05-30 | Océ-Technologies B.V. | Secure data transmission in a network system of image processing devices |
EP1536305A1 (en) * | 2003-11-27 | 2005-06-01 | Océ-Technologies B.V. | Secure transmission of electronic documents |
UA68467C2 (en) * | 2003-12-18 | 2004-08-16 | Close Joint Stock Company Comm | Method for registering a user by a control authorities for subsequent operations with a service organization |
EP1782246B1 (en) * | 2004-07-07 | 2020-02-12 | Sciencelogic, LLC | Self configuring network management system |
US9537731B2 (en) * | 2004-07-07 | 2017-01-03 | Sciencelogic, Inc. | Management techniques for non-traditional network and information system topologies |
US7660987B2 (en) * | 2004-10-29 | 2010-02-09 | Baylis Stephen W | Method of establishing a secure e-mail transmission link |
US20060136717A1 (en) | 2004-12-20 | 2006-06-22 | Mark Buer | System and method for authentication via a proximate device |
US8295484B2 (en) * | 2004-12-21 | 2012-10-23 | Broadcom Corporation | System and method for securing data from a remote input device |
KR100771911B1 (en) | 2005-02-04 | 2007-11-01 | 삼성전자주식회사 | How to set security keys between wireless network devices |
US20060184785A1 (en) * | 2005-02-16 | 2006-08-17 | David Carroll Challener | Apparatus, system, and method for securing I/O communications between a blade and a peripheral interface device of a blade-based computer system |
US7529937B2 (en) * | 2005-03-07 | 2009-05-05 | Microsoft Corporation | System and method for establishing that a server and a correspondent have compatible secure email |
US7702107B1 (en) | 2005-07-27 | 2010-04-20 | Messing John H | Server-based encrypted messaging method and apparatus |
US7664947B2 (en) * | 2005-10-12 | 2010-02-16 | The Boeing Company | Systems and methods for automated exchange of electronic mail encryption certificates |
US8549295B2 (en) | 2006-05-31 | 2013-10-01 | Microsoft Corporation | Establishing secure, mutually authenticated communication credentials |
US8028026B2 (en) * | 2006-05-31 | 2011-09-27 | Microsoft Corporation | Perimeter message filtering with extracted user-specific preferences |
US8726020B2 (en) * | 2006-05-31 | 2014-05-13 | Microsoft Corporation | Updating configuration information to a perimeter network |
ATE552685T1 (en) * | 2006-11-15 | 2012-04-15 | Research In Motion Ltd | SECURE CUSTOMER CREDENTIAL-BASED SESSION AUTHENTICATION METHOD AND DEVICE |
US8418235B2 (en) * | 2006-11-15 | 2013-04-09 | Research In Motion Limited | Client credential based secure session authentication method and apparatus |
DE602006006072D1 (en) * | 2006-11-22 | 2009-05-14 | Research In Motion Ltd | System and method for a secure recording protocol using shared knowledge of mobile subscriber credentials |
US20080118059A1 (en) * | 2006-11-22 | 2008-05-22 | Research In Motion Limited | System and method for secure record protocol using shared knowledge of mobile user credentials |
FR2909243B1 (en) * | 2006-11-23 | 2009-02-06 | Sagem Comm | METHOD AND SYSTEM FOR LOCKING / UNLOCKING NETWORK ACCESS FUNCTIONS OF A MULTI FUNCTION TERMINAL. |
US8341417B1 (en) * | 2006-12-12 | 2012-12-25 | Cisco Technology, Inc. | Data storage using encoded hash message authentication code |
US20080189381A1 (en) * | 2007-02-01 | 2008-08-07 | Universal Data Protection Corporation | Method and system for secure communication between devices |
US20080294895A1 (en) * | 2007-02-15 | 2008-11-27 | Michael Bodner | Disaggregation/reassembly method system for information rights management of secure documents |
US20080222040A1 (en) * | 2007-02-15 | 2008-09-11 | Halsted Mark J | Disaggregation/reassembly method system for information rights management of secure documents |
US8041763B2 (en) * | 2007-06-12 | 2011-10-18 | International Business Machines Corporation | Method and system for providing sharable bookmarking of web pages consisting of dynamic content |
GB0713915D0 (en) * | 2007-07-18 | 2007-08-29 | Solutions & Services Uk Ltd E | E-mail system |
US8559637B2 (en) * | 2008-09-10 | 2013-10-15 | Verizon Patent And Licensing Inc. | Securing information exchanged via a network |
US20100100465A1 (en) * | 2008-10-17 | 2010-04-22 | Innovapost Inc. | Trusted third party authentication and notarization for email |
US8848904B2 (en) * | 2008-10-24 | 2014-09-30 | University Of Maryland, College Park | Method and implementation for information exchange using Markov models |
US8856525B2 (en) * | 2009-08-13 | 2014-10-07 | Michael Gregor Kaplan | Authentication of email servers and personal computers |
US8468580B1 (en) * | 2009-08-20 | 2013-06-18 | Apple Inc. | Secure communication between trusted parties |
US8799666B2 (en) * | 2009-10-06 | 2014-08-05 | Synaptics Incorporated | Secure user authentication using biometric information |
US8463938B2 (en) * | 2009-10-23 | 2013-06-11 | Comcast Cable Communications, Llc | Address couplet communication filtering |
EP2534619A4 (en) | 2010-02-12 | 2015-10-21 | Service Heartbeat Llc | Workflow and resource management system with integrated bi-directional communications |
US9129107B2 (en) * | 2011-02-10 | 2015-09-08 | SecurenCrypt, LLC | Document encryption and decryption |
US8732462B2 (en) * | 2011-07-07 | 2014-05-20 | Ziptr, Inc. | Methods and apparatus for secure data sharing |
US8645681B1 (en) * | 2011-09-28 | 2014-02-04 | Emc Corporation | Techniques for distributing secure communication secrets |
US9673983B2 (en) * | 2012-09-14 | 2017-06-06 | Qualcomm Incorporated | Apparatus and method for protecting message data |
DE102013102849A1 (en) * | 2013-03-20 | 2014-09-25 | HvS-Consulting AG | Method and device for the persistent decryption of electronic messages such as e-mails |
US10461942B1 (en) * | 2016-07-20 | 2019-10-29 | United Services Automobile Association | Multi-factor authentication with code rotation |
WO2018076190A1 (en) * | 2016-10-26 | 2018-05-03 | 华为技术有限公司 | Communication method, terminal, core network user plane device and access network device |
US11070368B2 (en) | 2018-09-11 | 2021-07-20 | Dycrav Security Incorporated | System, method, and program for transmitting and receiving any type of secure digital data |
WO2020128639A1 (en) * | 2018-12-19 | 2020-06-25 | Telit Communications S.P.A. | Systems and methods for managing a trusted application in a computer chip module |
JP7445135B2 (en) * | 2020-08-27 | 2024-03-07 | 富士通株式会社 | Communication program, communication device, communication method, and communication system |
DE102020212451A1 (en) * | 2020-10-01 | 2022-04-07 | Robert Bosch Gesellschaft mit beschränkter Haftung | Method of digitally signing a message |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL114361A (en) | 1995-06-27 | 1998-08-16 | Veritas Technology Solutions L | File encryption method |
US5943423A (en) * | 1995-12-15 | 1999-08-24 | Entegrity Solutions Corporation | Smart token system for secure electronic transactions and identification |
US6014688A (en) | 1997-04-25 | 2000-01-11 | Postx Corporation | E-mail program capable of transmitting, opening and presenting a container having digital content using embedded executable software |
CA2357016A1 (en) * | 1999-01-14 | 2000-07-20 | Tumbleweed Communications Corp. | Web-based delivery of secure e-mail messages |
AU3491300A (en) | 1999-02-19 | 2000-09-04 | Messagemedia, Inc. | Message encryption system and method |
US6367010B1 (en) | 1999-07-02 | 2002-04-02 | Postx Corporation | Method for generating secure symmetric encryption and decryption |
GB0022724D0 (en) * | 2000-09-15 | 2000-11-01 | Innovation Venture Ltd | Secure messaging |
-
2001
- 2001-10-11 EP EP01981545A patent/EP1325583A2/en not_active Withdrawn
- 2001-10-11 US US09/975,848 patent/US6728378B2/en not_active Expired - Fee Related
- 2001-10-11 AU AU2002213182A patent/AU2002213182A1/en not_active Abandoned
- 2001-10-11 BR BR0114602-5A patent/BR0114602A/en not_active Application Discontinuation
- 2001-10-11 WO PCT/US2001/032008 patent/WO2002032044A2/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
WO2002032044A2 (en) | 2002-04-18 |
US20020078351A1 (en) | 2002-06-20 |
BR0114602A (en) | 2004-09-28 |
EP1325583A2 (en) | 2003-07-09 |
US6728378B2 (en) | 2004-04-27 |
WO2002032044A3 (en) | 2003-01-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2002213182A1 (en) | Secret key messaging | |
AU1224701A (en) | Key encryption using client-unique additional key | |
AU2001259262A1 (en) | Lock construction | |
AU2002212457A1 (en) | Distributing public keys | |
AU2001268071A1 (en) | Cryptographic communications using pseudo-randomly generated cryptography keys | |
AU2001271302A1 (en) | Encryption system that dynamically locates keys | |
AU2001291783A1 (en) | Encryption | |
AU2002222217A1 (en) | Directoryless public key cryptographic system and method | |
AU2002365343A1 (en) | Time-based encryption key | |
AU757159C (en) | Biometric key | |
AU2002214083A1 (en) | Secure keyboard | |
AU2001221106A1 (en) | User key validation | |
AU2002254663A1 (en) | Pipelined deciphering round keys generation | |
AU2001241872A1 (en) | Combination lock | |
AU2001250373A1 (en) | Encrypting and decrypting | |
AU4672001A (en) | Improved key and lock mechanisms | |
AU2001287874A1 (en) | Secure messaging | |
AU2001240817A1 (en) | Security feature | |
AU2001280190A1 (en) | Key holder | |
AU2002218340A1 (en) | Key pair generation | |
AU2002301313A1 (en) | Padlocks | |
AU2002229540A1 (en) | Encryption system | |
AU2002210230A1 (en) | Lock | |
CA90648S (en) | Key | |
AUPQ870100A0 (en) | Security doorbell |