EP1151573A1 - Systeme et procede de messagerie securisee - Google Patents
Systeme et procede de messagerie securiseeInfo
- Publication number
- EP1151573A1 EP1151573A1 EP99951069A EP99951069A EP1151573A1 EP 1151573 A1 EP1151573 A1 EP 1151573A1 EP 99951069 A EP99951069 A EP 99951069A EP 99951069 A EP99951069 A EP 99951069A EP 1151573 A1 EP1151573 A1 EP 1151573A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- message
- server
- secure
- user
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
Definitions
- the present invention relates to a system and a method for securely sending and receiving messages, and, in particular, a system and method for management of the secure transmission of many different types of messages without active intervention by the user.
- E-mail electronic mail
- E-mail electronic mail
- the sender connects directly to the server, such that privacy may be more readily assured, by protecting a single peer-to-peer connection.
- e-mail messages bounce from node to node until they reach their destinations, since connections on the Internet are not peer-to-peer.
- multihop connections are easy to intercept, providing many potential opportunities to tamper with an Internet e-mail transmission.
- the computer of the user basically establishes a direct connection to each Web server from which Web page content is requested. Therefore, Web communication can be made secure by securing the channel for data transmission, which is the connection between the user computer and the Web server. Since Internet e-mail can pass through several servers before reaching the final destination, securing such a communication channel is impossible. Instead, the e-mail message itself must be secured.
- Providing secure transactions across the Internet has three goals.
- both parties must know that they are communicating with the actual person and not with an impostor. This is done with user authentication.
- one way to transmit a key safely is to use a technique called dual-key or asymmetric encryption, which has separate keys for encrypting and decrypting.
- Public keys are used to encrypt the messages sent to recipients, while the recipients use their private keys to decrypt these messages.
- the two keys are mathematically related, but the private key cannot be derived from the public key, so the public key can be freely distributed.
- the private key does not need to be transmitted beyond the computer of the private key owner.
- a more useful solution would provide a secure mechanism for sending many different types of messages, including e-mail messages, without requiring user intervention. Such a solution would be transparent and effective over a widely available platform. Furthermore, such a solution would also provide organization for these different types of messages, in order to display and store the information contained in these messages to the user in the most efficient manner. Unfortunately, such a solution is not currently available.
- the present invention is of a system and a method in which the user can exchange secure data transmissions with other user(s) within or optionally outside of the secured system.
- the system and method preferably do not require any user intervention for the creation of the secure data, by using transport-layer encryption and authentication technology, including but not limited to, the Secure Socket Layer (SSL) encryption and authentication interface.
- SSL Secure Socket Layer
- the system and method are suitable for the transmission and display of many different types of messages through a unified user interface.
- the data contained in these different types of messages may optionally and preferably be organized for the user for efficient display and data storage. All of these features are provided through a platform which is widely available and which is simple to operate, which is preferably the GUI (graphical user interface) display provided by Web browser software programs.
- a system for providing a private and secure message through a standard GUI (graphical user interface) platform comprising: (a) a sender computer for sending a message through the GUI platform; (b) a central, secure server for receiving the message from the sender computer; (c) a recipient computer for viewing the message from the central secure server through the GUI platform; and (d) a secure channel for automatically securing and authenticating the message between the central secure server and at least one of the sender computer and the recipient computer.
- a method for securing a data transmission between a sender for sending and a recipient for receiving the data transmission comprising the steps of: (a) providing a server; (b) providing a secure channel connected to the server; (c) sending a data transmission from the sender to the server through the secure channel such that the data transmission is substantially automatically secured and authenticated; (d) sending the data transmission from the server to the recipient; and (e) receiving the data transmission by the recipient.
- Web browser refers to any software program which can display text, graphics, or both, from Web pages on World Wide Web sites.
- Web page refers to any document written in a mark-up language including, but not limited to, HTML (hypertext mark-up language) or VRML (virtual reality modeling language), dynamic HTML, XML (extended mark-up language) or related computer languages thereof, as well as to any collection of such documents reachable through one specific Internet address or at one specific World Wide Web site, or any document obtainable through a particular URL (Uniform Resource Locator).
- HTML hypertext mark-up language
- VRML virtual reality modeling language
- XML extended mark-up language
- URL Uniform Resource Locator
- Web site refers to at least one Web page, and preferably a plurality of Web pages, virtually connected to form a coherent group.
- Web server refers to a computer or other electronic device which is capable of serving at least one Web page to a Web browser.
- network refers to a connection between any two or more computers which permits the transmission of data, including but not limited to, the Internet.
- the phrase “display a Web page” includes all actions necessary to render at least a portion of the information on the Web page available to the computer user.
- the phrase includes, but is not limited to, the static visual display of static graphical information, the audible production of audio information, the animated visual display of animation and the visual display of video stream data.
- computer user and “user” both refer to the person who operates the Web browser or other GUI interface and navigates through the system of the present invention by operating a computer.
- computer refers to a combination of a particular computer hardware system and a particular software operating system. Examples of such hardware systems include those with any type of suitable data processor.
- computer includes, but is not limited to, personal computers (PC) having an operating system such as DOS, WindowsTM, OS/2TM or Linux; MacintoshTM computers; computers having JAVATM-OS as the operating system; and graphical workstations such as the computers of Sun MicrosystemsTM and Silicon GraphicsTM, and other computers having some version of the UNIX operating system such as ADCTM or SOLARISTM of Sun MicrosystemsTM; a PalmPilotTM, a PilotPCTM, or any other handheld device; or any other known and available operating system.
- PC personal computers
- an operating system such as DOS, WindowsTM, OS/2TM or Linux
- MacintoshTM computers computers having JAVATM-OS as the operating system
- graphical workstations such as the computers of Sun MicrosystemsTM and Silicon GraphicsTM, and other computers having some version of the UNIX operating system such as ADCTM or SOLARISTM of Sun MicrosystemsTM; a PalmPilotTM, a PilotPCTM, or any other handheld device; or any other
- WindowsTM includes but is not limited to Windows95TM, Windows 3.xTM in which "x" is an integer such as "1”, Windows NTTM, Windows98TM, Windows CETM and any upgraded versions of these operating systems by Microsoft Corp. (USA).
- a software application could be written in substantially any suitable programming language, which could easily be selected by one of ordinary skill in the art.
- the programming language chosen should be compatible with the computer by which the software application is executed, and in particularly with the operating system of that computer. Examples of suitable programming languages include, but are not limited to, C, C++ and Java.
- the functions of the present invention when described as a series of steps for a method, could be implemented as a series of software instructions for being operated by a data processor, such that the present invention could be implemented as software, firmware or hardware, or a combination thereof.
- FIG. 1 is a schematic block diagram of an exemplary system according to the present invention
- FIG. 2 is a schematic block diagram of the standard, background art OSI Interface, with the Secure Socket Layer diagrammed;
- FIG. 3 a schematic block diagram of the standard, background art Secure Socket Layer 3.0;
- FIG. 4 is a flowchart of an exemplary method for sending a message from an internal user to another user according to the present invention
- FIG. 5 is a flowchart of an exemplary method for sending a message from an external user to an internal user according to the present invention
- FIG. 6 is a flowchart of an exemplary method for managing information related to an "address" or contact book according to the present invention
- FIG. 7 is a flowchart of an exemplary method for managing information related to messages posted to a bulletin board according to the present invention.
- FIG. 8 is a flowchart of an exemplary method for managing scheduling information according to the present invention. DESCRIPTION OF THE PREFERRED EMBODIMENTS
- the present invention is of a system and a method, in which the user can exchange secure data transmissions with other user(s) within or optionally outside of the secured system.
- the system and method preferably do not require any user intervention for the creation of the secure data, by using transport-layer encryption and authentication technology, including but not limited to, the Secure Socket Layer (SSL) encryption and authentication interface.
- SSL Secure Socket Layer
- the SSL encryption and authentication interface is used for securing the messages, since SSL is an industry standard for Web browser software programs and is provided as an automatic feature of these programs, such that the user could preferably operate the system of the present invention through the standard Web browser software program interface.
- the user preferably does not need to install any additional software programs on the user computer, apart from the Web browser software program, in order to operate the present invention.
- the system and method of the present invention are suitable for the transmission and display of many different types of messages through a unified user interface.
- the data contained in these different types of messages may optionally and preferably be organized for the user for efficient display and data storage. All of these features are provided through a platform which is widely available and which is simple to operate, which is preferably the GUI (graphical user interface) display provided by Web browser software programs.
- GUI graphical user interface
- the Web browser interface preferably provides the single, unifying interface for viewing the data contained in the messages, and for operating the system of the present invention to send and receive such messages.
- the system and the method of the present invention have a number of advantages over the background art.
- the present invention does not require the provision or exchange of public and/or private data encryption keys by the sending and receiving users.
- the present invention does not require special, proprietary software, but preferably operates only with a Web browser which complies with the industry standard for SSL.
- the present invention organizes and manages data from many different types of messages, which is not provided in the background art. The principles and operation of the system and method according to the present invention may be better understood with reference to the drawings and the accompanying description.
- Figures 1-5 focuses upon the transmission of e-mail messages, it is understood that this is for the purposes of illustration only and is without any intention of being limiting, as the system and method of the present invention are useful for the secure transmission of many different types of messages.
- Figures 6-8 describe additional examples of messages for which the system and method of the present invention are also useful, including information related to an "address” or contact book (Figure 6), messages posted to a bulletin board or “chat room” ( Figure 7) and the arrangement of scheduling information ( Figure 8).
- Figure 1 is a schematic block diagram of an exemplary private and secure system according to the present invention, with a server 18 containing the mailboxes for internal users 10,12 and external users 14 using standard Web browser software programs to communicate over the Internet 16.
- Internal it is meant that User A 10 is a member of the system of secure e-mail transmission which is provided by Private and Secure server 18, such that Internal User A 10 may both send and receive secure e-mail through Private and Secure server 18. Internal User A 10 then gains access to the encrypted e-mail inbox, containing encrypted data. Encrypted data 17 is sent to the browser of Internal User A 10 through a secure channel, such as the Secure Socket Layer channel, on Private and Secure server 18 and unencrypted automatically by the Secure Socket Layer implementation built into the Web browser of Internal User A 10.
- a secure channel such as the Secure Socket Layer channel
- External users 14 could also connect to the Private and Secure server 18 via standard e- mail software and send unencrypted data 15 to an Internal User 10 or 12 on Private and Secure server 18.
- external it is meant that External User 14 cannot send secure e-mail messages through Private and Secure server 18, although optionally and preferably, External User 14 can receive e-mail messages from Private and Secure server 18. As described in greater below with regard to Figure 4, these e-mail messages are not sent securely to External User 14, unless External User 14 is given a temporary and or limited function account with Private and Secure server 18, in which case External User 14 would receive messages in a similar manner as Internal User 10 or 12, for example.
- FIG. 2 shows the diagram of the Open System Interconnection (OSI) Interface for standard network architecture, which was developed by the International Standards Organization.
- the OSI model is composed of seven different layers. Each layer has its own function, adding information to the message to ensure it reaches the correct destination without errors. Information added to the beginning of a message is called a header. Information added to the end of the message is called a trailer. A message travels through the OSI layer in segments. The layers append an information-bearing header to each segment and a trailer to the end of the message. At the receiving end, corresponding or peer layers interpret information and implement commands in the header and trailer. Then they remove the header and trailer and transmit the data as intended by the sender.
- OSI Open System Interconnection
- TCP/IP Transmission Control/Internet Protocol
- IP Internet Protocol
- SSL Secure Socket Layer
- SSL Secure Socket Layer
- Key-exchange methods can include but are not limited to, DH (Diffie-Hellman) and DHE, which are non-proprietary methods developed by Whitfield Diffie and Martin Hellman; or an RSA method developed by RSA Data Security.
- SSL 3.0 requires that the client and server agree on a set of randomly generated keys. SSL 3.0 provides a solution for user-authentication by using Digital Certificates.
- Certificate standards include DSS, the Digital Signature Standard approved by the National Institute of Standards and Technology in 1994, or a proprietary certificate signed using RSA Data Security technology.
- a Certificate Authority is a bureau offering Authentication Signature to sites who would wish to offer SSL service to Internet Browsers.
- a site which wants to offer SSL needs to send authenticating information to a Certificate Authority.
- the reply from the Certificate Authority is the authenticating information, "Signed" by the private key and public key of the Authority, which forms a "Site Certificate”.
- the signature can be authenticated by any individual with the public key of the Authority.
- a Web Browser always uses encryption to exchange information with a secure site. For every session, the Web Browser generates a new encryption key and sends the key to the Web Server before communication starts. Both Web Browser and Web Server use this key to encrypt any information they exchange.
- the following steps are taken by the Browser to initiate a connection with a secure site. First the Browser requests the Site's Certificate, which contains the Site's information including name, name of Certificate Authority, Public Key, "Finger Prints" and "Signature”. Then the Browser authenticates the site using the Certificate Authority's public key. Next, the Browser produces an encryption key, and encrypts this key with the server's public key. The encrypted key is then sent to the Web Server. Finally, communication of the data can begin.
- FIG. 3 is a flow diagram that illustrates how Secure Socket Layer 3.0 implements the sending of a secure document (more detailed information can be found in the book "Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption” by Warwick Ford and Michael S. Baum, ISBN# 0134763424, incorporated as if fully set forth herein only for the purpose of describing SSL).
- the sender sends a document to the recipient, block 30.
- the message-digest function MD5 or SHA
- MAC Message Authentication Code
- the encryption methods can optionally include non-proprietary encryption methods specified by the Data Encryption Standard approved by the National Institute of Standards and Technology in 1994 such as DES, DES40, 3DES, or proprietary encryption methods developed by RSA Data Security such as RC2_CBC_40, RC4_128 and RC_40.
- the encrypted MAC is attached to the document, and both the encrypted MAC and the document are encrypted with the recipient's public key.
- the message is sent to the recipient via standard Internet communication, block 34.
- the recipient receives the message and decrypts it with the recipient's private key.
- the recipient produces a local copy of the document's MAC by using the same message-digest function that the sender used, block 37.
- the recipient compares the local copy of the MAC, block 38 to the unencrypted MAC, block 39. If they are identical, then the document has not been tampered with and only the sender could have created the original message.
- Figure 4 is a flow diagram of how an Internal User sends data transmissions to other users external to the Private and Secure System according to the present invention.
- four choices are offered to the Internal User with regard to the transmission of e-mail messages, or other messages, to users who are external to the secure system. More preferably, these choices are configured by the user and/or by a system manager as part of the "preferences" for operating the secure system according to the present invention.
- the first choice is for the system to refuse to send such a message, such that the user would receive a system notification, indicating that the message could not be sent since the intended recipient is external to the secure system.
- This choice may be preferred since messages cannot be sent securely to external recipients.
- the message would be sent securely from the user computer to the central secure server. However, the message would need to be sent as plaintext, without encryption or other secure protection, from the central secure server to the computer of the intended recipient who is external to the secure system. Thus, a more secure policy would optionally prevent such messages from being sent.
- the second choice would simply notify the Internal User if such a non-secure message is to be sent to the external user.
- the Internal User would optionally need to indicate acceptance of the transmission of the e-mail message to an external, non-secure user, by "clicking" on a GUI gadget, or otherwise indicating acceptance of such a non-secure transmission.
- the Internal User would thus be given the choice each time as to whether the non- secure e-mail message is to be sent to a user who is external to the secure system of the present invention.
- the third choice would provide a temporary, limited account for the external user to be able to read the message from the secure central server. The external user could then receive a secure message within the secure system of the present invention.
- the fourth choice is simply to allow all such non-secure messages to be sent, without notifying or alerting the Internal User.
- such a choice has the disadvantage that the e- mail message, or other message, would be sent without secure protection, as well as the further disadvantage that the Internal User would not necessarily be aware that the message is being sent to a user who is external to the secure system of the present invention.
- the specific preferred implementation of these choices is as follows. In the embodiment of Figure 4, the user establishes a routine connection to the Internet using an SSL (or similar technology) enabled browser.
- the sender for example Internal User A 10 of Figure 1, then connects to the Private and Secure server 18 and "log in" or gains access by using a valid name and password combination, block 50.
- decision block 51 the username/password combination is verified.
- sender Internal User A 10 composes the message(s) and attaches any file(s) or other data and sends the e-mail message to another user, block 52.
- a unique reference number is generated for that transmission, block 53.
- the e-mail message is encrypted and authentication information is attached, unless suppressed by the sender user, block 54. This process optionally and preferably occurs automatically, for example by implementing SSL or a similar technology.
- decision block 55 the system determines whether the user is internal or external to the system.
- the message is then stored in the inbox of Internal User B 12 on Private and Secure server 18, as shown in block 60.
- Internal User B 12 reads or rejects the e-mail message.
- a confirmation message is then sent to the sender, who is Internal User A 10, as shown in block 62.
- data such as an intranet (a network of computers which is private to a specific group or organization such as a company), where external data transmissions are not permitted, this transmission would optionally be rejected.
- a new user is created with a random password, block 57. The e-mail is then stored in the new user's inbox, block 58.
- an e-mail message is generated automatically and sent to External User 14 containing a time-stamped message indicating that there is at least one e-mail message waiting in the inbox on Private and Secure Server 18, which can be accessed with the name and password contained in the e-mail message.
- the External user 14 logs on to the Private and Secure server 18 and reads or rejects the e-mail message sent, block 61.
- a confirmation message is then sent to the sender Internal User A 10, block 62.
- FIG. 5 is a flow diagram of the process according to the present invention which occurs when an external user to the Private and Secure server 18 attempts to send an e-mail message to an internal user.
- External User 14 sends an e-mail message via conventional e-mail software to Internal User A 10, a recipient on the Private and Secure Server 18, block 70.
- the software on the Private and Secure server 18 determines if the recipient is a valid user on the system, decision block 71.
- a unique reference number is generated for the e-mail message.
- the e-mail message is then time-stamped and stored in the inbox of the recipient Internal User A 10 unencrypted, block 73.
- a time-stamped e-mail message generated by the system is sent back to External User 14, stating that the message was accepted at Private and Secure system 18 for Internal User A 10.
- the message includes the time when Internal User A 10 last interacted with the system.
- a warning statement that the message traveled through the standard unprotected e-mail system is included as well.
- a number of additional features of the present invention optionally and preferably may be included.
- all user details for interacting with the system of the present invention are stored on the secure server, such that these details are available to the user regardless of which computer the user uses.
- all of the messages and related information are also preferably stored on the secure server, in order to both maintain the security of this data, and to enable the user to access the data from substantially any computer which has a connection to the secure server, for example through the Internet, and which operates a standard Web browser or other standard GUI platform.
- SSL encryption and secure transmission protocol which is provided through currently available, standard Web browser software programs.
- the SSL protocol ensures that all data, regardless of content, is encrypted and thereby secured, in a manner which is transparent to the user.
- the optional but preferred extensions to the present invention which are described below in greater detail, are operable with the SSL protocol in a substantially similar manner to the transmission of e-mail messages which was previously described.
- An example of an additional, preferred feature of the system and method of the present invention is the provision of an "address" or contact book, as described with regard to Figure 6 below.
- the address book preferably includes multiple records.
- Information that may be optionally added to the address book may include e-mail address, group or groups to which the user belongs, address and other personal information, for example, company information, telephone numbers, and comments. This information may be optionally available to other users by setting optional flags. Users may also optionally select from whom they should accept messages, for example internal and/or external users.
- the system of the present invention is a messaging system which is provided through the Web browser interface by using personal addresses and other information which is stored on a central Web server, and as such can be used from anywhere, on any computer without prior setup.
- This approach means that personal e-mail parameters such as address books are optionally available to the user on the private and secure server and not on the actual machine being used to communicate with the private and secure server.
- Figure 6 is a flowchart of a method according to the present invention for managing such an address book, which is stored on the central secure server and is displayed by the Web browser or other standard GUI.
- the management of the address book includes several features, such as the addition of information concerning a new contact; the option of sharing at least some information with another user in a "read only” manner; and the option of allowing at least one other user to edit at least some of the information in the address book.
- information is entered into the address book concerning a new contact, such as the name of an individual, e-mail address, telephone number and so forth.
- the user may enter such information, according to a preferred embodiment of the present invention, the user receives a request to add the information automatically from another user, who may be either the new contact or a third party. In step 2, the user then has the option to allow or disallow this request.
- the user optionally sets a flag to allow at least one other user to read at least a portion of the information in the address book.
- the user may be identified as an individual, or as a member of a group, such as "fellow employee", for example.
- the information may be segregated according to type of contact, such that some contacts are labeled "private", while others are "public”; according to the type of information, such that the name and e-mail address of contacts are public, but not the telephone number; or a combination thereof, for example.
- step 4 the user optionally and preferably allows at least one other user to edit at least a portion of the information stored in the address book.
- a secretary may be allowed to enter information concerning a new contact into the address book of a manager, and/or to edit existing information, for example to change information concerning a known contact to update the contact information.
- the address book according to the present invention optionally allows the user to share information, and even to permit one or more other users to edit the stored information.
- Figure 7 is a flowchart of an exemplary method for managing information related to messages posted to a bulletin board according to the present invention.
- the bulletin board is provided for displaying messages, and is stored on the central secure server of the present invention.
- a set of permissions is determined for the bulletin board, optionally for each message on the board, and alternatively or additionally for each user who has access to the bulletin board. For example, only one or more specific users may be allowed to write new messages to the board, and/or to edit the board. Other users may be given permission to read certain messages, or even all messages on the board.
- step 3 access to the bulletin board is provided from the standard GUI platform, preferably a Web browser, to the secure central server through a secure channel, such as through SSL for example. Therefore, each message is transmitted and read securely, from substantially any computer which both operates the Web browser and is connected to the secure central server.
- step 4 a user reads or otherwise interacts with at least one message of the bulletin board, through the Web browser and secure communication channel.
- chat function in which messages are exchanged between at least two parties. If messages are exchanged between more than two parties, then the chat function may be referred to as a "chat room".
- each participant in the chat reads the text messages from the central server, preferably without downloading in order to maintain security. Therefore, although the user may optionally be notified of the existence of such a chat message, for example through the POP (Point of Presence) protocol, the user preferably must still read the message through the Web browser connected to the secure central server.
- POP Point of Presence
- the chat function of the present invention is not peer-to- peer, but rather is client-server, with the user operating a Web browser (the client) for receiving information from the secure central server of the present invention.
- the process of enabling users to receive the chat-related messages may optionally and preferably be controlled by a controlling user, who authenticates each user who wishes to join the chat room.
- the process is a "client-server” process, in which each user must actively read the chat messages which are held on the central server.
- the process of "chatting” is therefore asynchronous, in that a user posts a message and then waits for the intended recipient(s) to read the message. However, preferably other users are notified when a user leaves the "chat", or stops reading these messages.
- the user may receive a transcript of the chat session messages in which the user participated upon leaving the chat session.
- these chat functions may be implemented for different types of message data, including but not limited to, voice data, text data and a combination thereof.
- audio data such as voice data is to be included
- the hardware components of the user computer would preferably also include a microphone and sound card for receiving and playing the audio data, respectively. More preferably, the management and playing of such audio data would be performed by a software program intended for such purposes, which would preferably interact with the present invention through the unifying user interface of the system of the present invention.
- Figure 8 is a flowchart of an exemplary method for managing scheduling information according to the present invention.
- the scheduling information optionally and preferably includes such information as the date and time of a meeting or other appointment; the expected duration of the appointment; the location of the appointment, such as at the office of the user or outside of the office of the user; and so forth.
- all of the requests are sent as messages through the secure system of the present invention, while the scheduler itself is stored on, and operated by, the secure server of the present invention.
- this system is preferably implemented in a similar manner as for the previously described address book according to the present invention.
- a first user sends a request for a meeting to a second user.
- the request includes such particulars as the date, time, location and optionally the subject of the meeting.
- the scheduler of the first user optionally and preferably shows a tentative appointment time marked for the meeting.
- step 3 the second user receives the appointment request.
- step 4 if the second user accepts the request, then the appointment is preferably automatically marked in the scheduler of the second user, optionally with the associated information as previously described.
- step 5 once the second user has accepted the request, an acceptance reply is preferably automatically sent to the scheduler of the first user.
- step 6 preferably the scheduler of the first user then automatically changes the "tentative" designation of the meeting to "actual” or some other designation indicating that the request has been accepted.
- a user may authenticate another user.
- This mechanism enables full authentication within the system. For example, any user may ask and receive as many authentications as required.
- Authentication information is preferably automatically attached to all e-mail transmissions sent from that user.
- the user may optionally suppress this feature and require no authentication.
- the user may optionally create private sub- groups. These sub-groups may optionally be "open” or "closed".
- An open sub-group may consist of users who are authenticated by the same user. A message received by one member from another member can be trusted and if desired, the receiver can identify who the sender was. Additionally users in this group may optionally receive messages from users outside the group.
- a closed sub-group all users who are authenticated by the same user may optionally restrict access to their information section and may optionally not accept messages from any user not in the group.
- every message composed and sent by both internal and external users will generate a unique reference number, which is visible to both the sender and recipient.
- the present invention has a number of advantages over the prior art, particularly in the preferred implementation of Web browser-based messaging.
- the Web browser-based messaging system provides a total solution to the transmission of e-mail messages and other types of messages including attachments, without the need for any of the hardware or software required by other systems.
- the following is a partial list of items required by other messaging systems, which are preferably not required and/or used by the Private and Secure messaging system of the present invention: Firewall, Intranet, Router blocking, Plug-Ins, Helpers and Cookies.
- Any end- user wishing to use the Private and Secure messaging services of the present invention preferably needs only a computer, access to the Internet and a Web Browser or other widely available, non- proprietary GUI which supports SSL or whatever secure channel technology is used.
- the user can access data transmissions exchanged with recipients safely, easily and in complete privacy. There is total security from the moment a transmission is sent from the sender to the moment it is received by the recipient. All files that are waiting on the server or stored there are protected by encryption.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
L'invention concerne un système et un procédé dans lesquels l'utilisateur (10) peut échanger des transmissions de données sécurisées avec d'autres utilisateurs à l'intérieur (12) ou facultativement à l'extérieur (14) du système sécurisé. De préférence, le système et le procédé ne nécessitent aucune intervention de l'utilisateur pour la création des données sécurisées, du fait de l'utilisation d'une technologie de codage et d'authentification des couches de transport, y compris et de façon non exhaustive, une interface de codage et d'authentification de protocole SSL (24). De plus, le système et le procédé sont adaptés à la transmission et à l'affichage de nombreux types de messages différents par une interface utilisateur unifiée. En outre, les données contenues dans ces différents types de messages peuvent facultativement être organisées pour l'utilisateur afin d'obtenir un affichage et un stockage efficaces des données. Toutes ces caractéristiques sont obtenues par l'intermédiaire d'une plate-forme laquelle est largement disponible et simple à exploiter. Ainsi, de préférence l'utilisateur n'a pas besoin d'installer d'éventuels programmes supplémentaires sur son ordinateur, à part le programme du navigateur Web, pour exploiter le système et le procédé.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17561998A | 1998-10-20 | 1998-10-20 | |
US175619 | 1998-10-20 | ||
PCT/IL1999/000549 WO2000024154A1 (fr) | 1998-10-20 | 1999-10-20 | Systeme et procede de messagerie securisee |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1151573A1 true EP1151573A1 (fr) | 2001-11-07 |
Family
ID=22640962
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99951069A Withdrawn EP1151573A1 (fr) | 1998-10-20 | 1999-10-20 | Systeme et procede de messagerie securisee |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1151573A1 (fr) |
AU (1) | AU6364099A (fr) |
CA (1) | CA2347834A1 (fr) |
WO (1) | WO2000024154A1 (fr) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6832245B1 (en) | 1999-12-01 | 2004-12-14 | At&T Corp. | System and method for analyzing communications of user messages to rank users and contacts based on message content |
US8041768B2 (en) | 2000-03-17 | 2011-10-18 | Aol Inc. | Voice instant messaging |
US8132110B1 (en) | 2000-05-04 | 2012-03-06 | Aol Inc. | Intelligently enabled menu choices based on online presence state in address book |
US7979802B1 (en) | 2000-05-04 | 2011-07-12 | Aol Inc. | Providing supplemental contact information corresponding to a referenced individual |
US9356894B2 (en) | 2000-05-04 | 2016-05-31 | Facebook, Inc. | Enabled and disabled menu choices based on presence state |
US9100221B2 (en) | 2000-05-04 | 2015-08-04 | Facebook, Inc. | Systems for messaging senders and recipients of an electronic message |
US8122363B1 (en) | 2000-05-04 | 2012-02-21 | Aol Inc. | Presence status indicator |
US20130073648A1 (en) | 2000-05-04 | 2013-03-21 | Facebook, Inc. | Presenting a recipient of an e-mail with an option to instant message a sender or another recipient based on the sender's or the other recipient's address and online status |
US8001190B2 (en) | 2001-06-25 | 2011-08-16 | Aol Inc. | Email integrated instant messaging |
CA2417244C (fr) | 2000-07-25 | 2007-03-27 | America Online, Inc. | Messagerie video |
US6993574B2 (en) * | 2001-06-19 | 2006-01-31 | Zoetics, Inc. | Web-based communications addressing system and method |
US7774711B2 (en) | 2001-09-28 | 2010-08-10 | Aol Inc. | Automatic categorization of entries in a contact list |
US7716287B2 (en) | 2004-03-05 | 2010-05-11 | Aol Inc. | Organizing entries in participant lists based on communications strengths |
US7512652B1 (en) | 2001-09-28 | 2009-03-31 | Aol Llc, A Delaware Limited Liability Company | Passive personalization of buddy lists |
EP1443410A4 (fr) * | 2001-10-02 | 2006-05-31 | Seiko Epson Corp | Dispositif intermediaire permettant d'acheminer une communication sur un reseau |
US7945674B2 (en) | 2003-04-02 | 2011-05-17 | Aol Inc. | Degrees of separation for handling communications |
US7263614B2 (en) | 2002-12-31 | 2007-08-28 | Aol Llc | Implicit access for communications pathway |
US9742615B1 (en) | 2002-12-31 | 2017-08-22 | Aol Inc. | Popularity index |
US8117265B2 (en) | 2003-03-26 | 2012-02-14 | Aol Inc. | Identifying and using identities deemed to be known to a user |
US8595146B1 (en) | 2004-03-15 | 2013-11-26 | Aol Inc. | Social networking permissions |
US10592710B1 (en) * | 2018-10-02 | 2020-03-17 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US11210664B2 (en) * | 2018-10-02 | 2021-12-28 | Capital One Services, Llc | Systems and methods for amplifying the strength of cryptographic algorithms |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5790790A (en) * | 1996-10-24 | 1998-08-04 | Tumbleweed Software Corporation | Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof |
-
1999
- 1999-10-20 EP EP99951069A patent/EP1151573A1/fr not_active Withdrawn
- 1999-10-20 WO PCT/IL1999/000549 patent/WO2000024154A1/fr not_active Application Discontinuation
- 1999-10-20 AU AU63640/99A patent/AU6364099A/en not_active Abandoned
- 1999-10-20 CA CA002347834A patent/CA2347834A1/fr not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO0024154A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2000024154A1 (fr) | 2000-04-27 |
AU6364099A (en) | 2000-05-08 |
CA2347834A1 (fr) | 2000-04-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9917828B2 (en) | Secure message delivery using a trust broker | |
WO2000024154A1 (fr) | Systeme et procede de messagerie securisee | |
US7360079B2 (en) | System and method for processing digital documents utilizing secure communications over a network | |
US7640427B2 (en) | System and method for secure electronic communication in a partially keyless environment | |
JP5313311B2 (ja) | 遠隔解読サービスを備えたセキュアメッセージシステム | |
US6904521B1 (en) | Non-repudiation of e-mail messages | |
CA2527718C (fr) | Systeme, procede et programme informatique permettant d'envoyer des messages cryptes a des destinataires, l'emetteur ne possedant pas les justificatifs du destinataire | |
US7509678B2 (en) | Central console for monitoring configuration status for remote devices | |
US8156190B2 (en) | Generating PKI email accounts on a web-based email system | |
CA2394451C (fr) | Systeme, methode et produit informatique pour l'envoi et la reception de donnees cryptees s/mime | |
US20040133520A1 (en) | System and method for secure and transparent electronic communication | |
US20040133774A1 (en) | System and method for dynamic data security operations | |
US20020023213A1 (en) | Encryption system that dynamically locates keys | |
US8145707B2 (en) | Sending digitally signed emails via a web-based email system | |
JP2005295509A (ja) | 電子メールを使用した公開情報の認証された交換 | |
US20040030916A1 (en) | Preemptive and interactive data solicitation for electronic messaging | |
US8352742B2 (en) | Receiving encrypted emails via a web-based email system | |
WO2000046952A1 (fr) | Procede permettant d'envoyer un courrier electronique, de maniere sure, via un explorateur | |
Chadwick et al. | Secure role based messaging | |
CA2328548A1 (fr) | Systeme prive | |
KR20020067372A (ko) | 에스/마임 표준을 준수하는 보안 웹메일의 송수신 방법 | |
KR20020067371A (ko) | 에스/마임 표준을 준수하는 보안 웹메일 시스템 | |
Lobree et al. | E-Mail: Security. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20010510 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20030502 |