WO2000042748A1 - Web-based delivery of secure e-mail messages - Google Patents
Web-based delivery of secure e-mail messages Download PDFInfo
- Publication number
- WO2000042748A1 WO2000042748A1 PCT/US2000/001011 US0001011W WO0042748A1 WO 2000042748 A1 WO2000042748 A1 WO 2000042748A1 US 0001011 W US0001011 W US 0001011W WO 0042748 A1 WO0042748 A1 WO 0042748A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- secure
- message
- recipient
- computer
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/18—Commands or executable codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/224—Monitoring or handling of messages providing notification on incoming messages, e.g. pushed notifications of received messages
Definitions
- the invention relates generally to the secure delivery of data files through a computer network and, in particular, to delivery of data files which are cryptographically encrypted and/or signed in such a manner that the data files can be decrypted and the signatures can be verified.
- S/MIME Secure Multipurpose Internet Mail Extension
- S/MIME relies on MIME (Multipurpose Internet Mail Extensions) for specifying content and structure of S MIME messages and PKCS (Public-Key Cryptography Standards) for cryptographic functionality. Certificates conforming to the known ITU-T X.509 standard, i.e., X.509 certificates, are used to identify communicating parties.
- MIME Multipurpose Internet Mail Extensions
- PKCS Public-Key Cryptography Standards
- S/MIME version 3 of S/MIME became a standard in July 1999 and introduces a number of enhancements to S/MIME.
- S/MIME version 3 also introduces a new Cryptographic Message Syntax that is an extension and replacement of PKCS #7 vl.5 used in S/MIME version 2.
- S/MIME and RSA Data Security, Inc. can be found on the RSA Data Security, Inc. web site (http://www.rsa.com).
- the current status of S/MIME standardization and other S/MIME related documents can be found on IMC (Internet Mail Consortium) web site (http:///www.imc.org) and IETF S/MIME Working group web sites (http://www.imc.org/ietf-smime/, http://www.ietf.org/ html.charters/smime-charter.html).
- S/MIME version 2 The S/MIME version 2 standard is published in two RFC documents: S/MIME Version 2 Message Specification (RFC 2311) S/MIME Version 2 Certificate Handling (RFC 2312)
- the current practice of exchanging S/MIME messages calls for preparing an S/MIME file according to the S/MIME specifications and sending the S/MIME file as an attachment to an e-mail message.
- the recipient it is expected that the recipient has an S/MIME-capable e-mail reader to process the message.
- the recipient can use a stand alone S/MIME processing helper application to process the message.
- the recipient may simply lack S/MIME capability such that the S/MIME message is unusable and is simply stored in the recipient's computer without further handling.
- the recipient's e-mail reading program of choice may be a simple e-mail reader or an early version without the ability to properly authenticate and decrypt messages in S/MIME format.
- the e-mail reader ofthe recipient can rely on plug-ins or helper programs that are not installed on the recipient computer. In any case, a message in S/MIME format is just unreadable to the recipient and the recipient would probably not understand why this particular email message is unreadable without additional communication with the sender.
- S/MIME messaging generally requires that both the sender and recipient are aware of infrastructure required for public key cryptography, i.e., public key infrastructure (PKI).
- PKI public key infrastructure
- Such infrastructure includes public/private key pairs required for encryption, decryption, and signing and certificates required for authentication.
- the recipient may be unaware of such public key infrastructure in general and S/MIME in particular.
- the recipient must have a digital certificate which includes the pubic key ofthe recipient. If the recipient has a certificate, some familiarity with public key infrastructure by the recipient can be assumed. However, in case of signed message no public or private key ofthe recipient is required and, accordingly, no such assumption can be made with respect to the recipient's familiarity with public key infrastructure.
- a second obstacle to successful delivery and processing of a message in the S/MIME format is inter-version incompatibility. Even if the recipient's e-mail reader does have some level of S/MIME capability, S/MIME processing may fail due to a difference in S/MIME implementation by different vendors. S/MIME is an evolving standard; there are three different versions in use currently. If the sender uses an S/MIME program implementing a later version than the one implemented by the recipient's e-mail program, the recipient's e-mail reader could be unable to properly decrypt the message and verify the signature. As in the case described above, the message may simply appear to be unreadable and the recipient may not be able to determine the course of action needed to remedy the situation.
- the ordinary solution for such problems is to have recipients upgrade or obtain their e-mail reader or helper applications to properly implement the most recent standardized version ofthe S/MIME protocol.
- Installing additional software to a computer system can have adverse effects on the computer system by occupying additional system resources. Accordingly, the recipient can choose not to install new S/MIME software.
- the appropriate S/MIME software may not be available for the recipient's computing environment. Even if the recipient chooses to upgrade or obtain the S/MIME software, such installation can take considerable time and significantly delay viewing ofthe message by the recipient.
- S/MIME e-mail messages have another shortcoming. S/MIME messages are transferred as attachments to Internet e-mail. Some Internet e-mail gateways limit the size ofthe message and therefore the size of such attachments. Accordingly, the S/MIME message can be truncated. If the message is truncated, a portion ofthe data needed to properly decrypt the message and verify the signature is lost and the message becomes useless.
- What is needed is a mechanism by which e-mail can be sent to a recipient using a standardized, wide-supported secure e-mail protocol and by which the recipient can receive the e-mail notwithstanding failure ofthe recipient's e-mail reader to properly implement the secure e-mail protocol.
- messages which comport with a secure e- mail standard are delivered through a document delivery protocol such as the HTTP protocol ofthe World Wide Web rather than a conventional e-mail protocol such as SMTP/POP.
- Web-based secure e-mail delivery increases the likelihood of successful delivery by removing the burden of obtaining and maintaining secure e-mail processing software from the recipient and by having the recipient download the secure message from a Web server instead of receiving it as Internet mail attachment.
- the secure e-mail delivery system uses a notification message sent to the recipient by regular e-mail and a web server for delivery ofthe secure message through the World Wide Web according to HTTP.
- the secure e-mail delivery system exploits the ability of commonly available web browsers to automatically install and run software from a web server. Particularly useful is ability of such a browser to invoke JavaTM applets located on the server such that the software can be brought to the widest range of computing environments. Some web browsers currently have the ability to automatically download and install other types of software including plug-in applications and known ActiveX controls.
- the recipient responds to the notification message by submitting a URL through the World Wide Web to a web server which controls access to the secure e-mail message.
- the web server sends, in addition to the secure e-mail message itself, software which processes the secure message to thereby render the message readable to the recipient.
- processing includes, for example, decrypting the message and one or more attached data files and verifying a signature ofthe secure e-mail message.
- the secure e-mail delivery system There are two main components to the secure e-mail delivery system.
- the first component is the web server that accepts secure messages for delivery.
- the second component is the secure message processing software.
- the sender is assumed to have software capable of generating secure e-mail messages according to a secure e-mail message standard such as S/MIME, PGP/MIME, or OpenPGP. It is also assumed that the recipient has access to Internet e-mail with the ability to read short text messages — attachment capabilities are not required — and has a web browser capable of running an applet, and or downloading and installing software, such as the secure message processing software.
- the sender To send the secure message, the sender generates a secure message and submits the secure message to the web server ofthe secure e-mail delivery system along with the e- mail address ofthe intended recipient.
- Such submission can happen in many different ways: for example, through a web form hosted by the web server, using secure e-mail authoring software which is aware ofthe secure e-mail delivery system and the web server, or through the use of an Internet e-mail relay which is aware ofthe secure e-mail delivery system and the web server.
- the e-mail relay can detect e-mail which comports with a secure e-mail protocol supported by the secure e-mail delivery system and redirect such e-mail to the secure e-mail delivery system and allow other e-mail to continue transit according to a conventional e-mail protocol such as SMTP.
- a secure e-mail protocol supported by the secure e-mail delivery system
- the secure e-mail delivery system Upon such submission, the secure e-mail delivery system generates an e-mail message to the recipient informing the recipient about the secure message and including the Uniform Resource Locator (URL) to be used to retrieve the secure message.
- This URL points to the web server ofthe secure e-mail delivery system and contains enough information so that web server can locate the secure message.
- the recipient uses the web browser to access the URL on the web server.
- the web server generates the web page that instructs the web browser to invoke secure e-mail processing software.
- the recipient's web browser causes execution ofthe secure e-mail processing software which retrieves the secure message from the web server, processes the secure message, and presents the result to the recipient. Processing ofthe secure message can include decrypting the message and one or more attached data files and verifying any signature ofthe message.
- the secure e-mail delivery system enables the recipient to properly process secure messages without having installed secure message processing software prior to receiving the message.
- the secure message processing software is stored on the web server, the secure e-mail delivery system can ensure that the recipient has the latest available version ofthe secure message processing software.
- Figure 1 is a block diagram which depicts a secure e-mail delivery system including a delivery server which delivers secure e-mail in accordance with the present invention.
- Figure 2 is a block diagram showing the sender of Figure 1 in greater detail.
- Figure 3 is a logic flow diagram illustrating generation of a secure e-mail message according to one secure e-mail protocol.
- Figure 4 is a block diagram ofthe delivery server of Figure 1 in greater detail.
- Figures 5 and 6 are logic flow diagrams of delivery of a secure e-mail message according to the present invention.
- Figure 7 is a block diagram ofthe recipient of Figure 1 in greater detail.
- Figure 8 is a block diagram showing the secure e-mail receiver of Figure 7 in greater detail.
- Figure 9 is a logic flow diagram ofthe receipt of a secure e-mail message in accordance with the present invention.
- Figure 10 is a logic flow diagram ofthe processing of a secure e-mail message in accordance with one secure e-mail protocol.
- a delivery server 104 effects delivery of an e-mail message according to a secure e-mail protocol by (i) notifying a recipient 106 ofthe e-mail message, (ii) receiving data from the recipient identifying the message, and (iii) supplying, in response to the data, computer instructions which effect receipt and proper handling ofthe e-mail message according to the secure protocol.
- a sender 102 uses a secure e-mail protocol to send a secure e-mail message through computer network 108, which can be the Internet for example.
- the secure e-mail message is addressed to recipient 106.
- the secure message is routed to delivery server 104. While delivery server 104 is shown as a single computer system in Figure 1, it is appreciated that delivery server 104 can include multiple computer systems.
- Delivery server 104 assumes that recipient 106 does not have the appropriate software to properly handle the secure message according to the secure protocol. Accordingly, delivery server 104 assumes responsibility for proper implementation ofthe secure e-mail protocol within recipient 106.
- One such secure e-mail protocol is the S/MIME protocol, version 3.
- Other versions ofthe S/MIME protocol can also be the secure e-mail protocol.
- other secure e-mail protocols such as PGP/MIME and OpenPGP can be implemented.
- delivery server 104 sends a notification e- mail message using ordinary techniques to recipient 106.
- the notification e-mail message contains sufficient identification information to identify the specific secure message addressed to recipient 106 within delivery server 104.
- the identification information is a universal resource locator (URL) which includes data identifying the secure message and recipient 106 sends the URL to delivery server 104 using the hypertext transfer protocol (HTTP), for example, through a web browser 704 ( Figure 7) such as Netscape Navigator available from Netscape Corporation of Mountain View, California or Internet Explorer available from Microsoft Corporation of Redmond, Washington.
- URL universal resource locator
- HTTP hypertext transfer protocol
- delivery server 104 sends computer instructions which are to be executed by recipient 106 and which implement the secure e-mail protocol with which the secure message comports.
- the computer instructions comport with the JavaTM computer instruction language implemented by most currently available web browsers in an illustrative embodiment. Such web browsers, in response to receipt of such computer instructions, begin interpretation of such computer instructions, i.e., execution ofthe computer instructions as they arrive.
- the computer instructions define a computer program which is installed in the computer system of recipient 106 in persistent storage such that subsequent secure e- mail messages can be processed without requiring a second delivery ofthe computer instructions.
- delivery server 104 verifies that the program installed for recipient 106 is the most current program available and re-delivers and reinstalls the computer instructions if the program is not the most current.
- execution ofthe received computer instructions causes recipient 106 to retrieve the secure message from delivery server 104 and to process the retrieved secure e-mail message according to the secure e-mail protocol implemented by the received computer instructions.
- recipient 106 can securely receive e-mail according to an established secure e-mail protocol without first separately acquiring and properly installing software specifically designed to implement the secure e-mail protocol.
- sender 102 prepares and sends a message according to a secure e-mail protocol such as S/MIME. In addition, the message is addressed to recipient 104.
- Sender 102 is shown to be a computer system. However, it is understood that e-mail addresses generally to not specify a computer system but instead specify a human user or, alternatively, a computer process. For simplicity, sender 102 is therefore a human user of the computer system or a computer process executing within the computer system.
- recipient 106 is a human user ofthe computer system shown in the figures as recipient 106 or a computer process executing within the computer system.
- sender 102 includes an e-mail authoring process 202 ( Figure 2) which in turn includes a secure protocol module 204.
- E-mail authoring process 202 can be commercially available S/MIME-capable e-mail software, i.e., software which has the ability to produce S/MIME message given an initial set of documents and one or more recipient e-mail addresses.
- An example of such software is the WorldSecure/Mail e-mail client available from Worldtalk Corporation of Santa Clara, California (http://www.worldtalk.com).
- secure protocol module 204 is shown to be an integral component of e-mail authoring process 202, it is appreciated that secure protocol module 204 can be a plug-in or a helper application which adds functionality to e-mail authoring process 202.
- Logic flow diagram 300 ( Figure 3) illustrates one possible example ofthe packaging of a message by e-mail authoring process 202 and secure protocol module 204.
- Various secure e-mail protocols use various cryptographic protocols in addition to the sign-encrypt protocol illustrated in logic flow diagram 300.
- some secure e- mail protocols do not permit signing and/or can support such cryptographic protocols as encrypt-sign and sign-encrypt-sign.
- logic flow diagram 300 is simplified for clarity and involves steps which are known and conventional such as key management, certificate look-up and retrieval, and certificate validations, for example.
- e-mail authoring process 202 ( Figure 2) collects the information elements ofthe message, namely, one or more data files to include with the message and e- mail addresses of one or more recipients.
- secure protocol module 204 ( Figure 2) packages the one or more data files into a multipart MIME entity.
- secure protocol module 204 determines whether the secure e-mail message is to be signed as specified by sender 102 through e-mail authoring process 202.
- Sender 102 can specify whether the message is to be signed using conventional user interface techniques or, alternatively, can use logic to automatically determine whether signing the message is desired.
- step 308 If the message is to be signed, processing transfers to step 308. Conversely, if the message is not to be signed, step 308 is skipped.
- step 308 secure protocol module 204 signs the multipart MIME entity to form a signed data package.
- the signed data package conforms to the known PKCS #7 data format.
- secure protocol module 204 determines whether the message is to be encrypted.
- Sender 102 can specify whether the message is to be encrypted using conventional user interface techniques or, alternatively, can use logic to automatically determine whether encrypting the message is desired.
- steps 312-314 are skipped.
- step 312 secure protocol module 204 converts the signed data package to a new multipart MIME entity.
- step 314 secure protocol module 204 encrypts the new multipart MIME entity to form an encrypted data package which, in this illustrative embodiment, conforms to the known PKCS #7 data format.
- step 316 the data package is returned as the message to be sent.
- the data package is the signed data package of step 308 if the data is signed but not encrypted or is the encrypted data package of step 314 if the data is encrypted. Accordingly, the secure message can be signed and/or encrypted.
- Message submission module 206 communicates with delivery server 104 to submit the secure message for delivery.
- message submission module 206 directs the secure e-mail message created by e-mail authoring process 202 and secure protocol module 204 to delivery server 104.
- message submission module 206 is a component of e-mail authoring process 202 such that a human user of sender 102 uses a single, integrated user interface to compose and send a secure message to recipient 106.
- message submission module 206 uses HTTP to communicate with delivery server 104 through network 108 and, in particular, uses an HTTP "Post" command to send the secure message. HTTP and the HTTP "Post" command are known and are not described further herein.
- message submission module 206 is a web browser with the ability to upload data files by use ofthe HTTP "Post" command. Such would require that the message created through e-mail authoring process 202 and secure protocol module 204 be saved within sender 102 as a data file itself and separately transferred to delivery server 104 through message submission module 206.
- sender 102 sends the message formed according to logic flow diagram 300 by ordinary SMTP (Simple Mail Transfer Protocol).
- SMTP Simple Mail Transfer Protocol
- secure e-mail addressed to recipient 106 is directed by an e-mail relay to delivery server 104.
- Such a relay can be implemented using the well-known "sendmail" program to invoke another well-known program, namely, "procmail,” to process each incoming e-mail message according to a script.
- the script first checks each e-mail message for secure content and forwards the e-mail message to delivery server 104 if the e-mail message contains secure content or forwards the e-mail message to a conventional SMTP e-mail server otherwise.
- sender 102 can specify that all outbound e-mail is to be routed through the e-mail relay.
- sender 102 can specify such an e-mail relay as the outgoing SMTP server since most currently available e-mail readers/composers allow a user to specify the outgoing SMTP server.
- all e-mail sent by sender 102 according to a secure e-mail protocol is delivered through a secure e-mail delivery system such as that implemented by delivery server 104.
- the relay can be a part of a component ofthe routing architecture of network 108 itself.
- a large company, a university, or a commercial Internet service provider can install such an e-mail relay as an integral part of its e-mail routing.
- all e-mail directed to and/or from the large company, university, or commercial Internet service provider is processed by such an e-mail relay and the secure e-mail delivery system of delivery server 104 is available to all recipients reachable therethrough.
- routing information can be included in the e-mail address of recipient 106 such that sender 102 directs e-mail messages to recipient 106 to pass through the e-mail relay.
- Delivery server 104 is shown in greater detail in Figure 4.
- Delivery server 104 includes a web server 402 which in turn includes a customized filter to intercept and redirect all HTTP requests.
- all HTTP requests which are unrelated to secure messages delivered by delivery server 104 are directed to another, conventional HTTP web server.
- web server 402 can process ordinary HTTP requests in a conventional manner and simultaneously filter requests involving URLs which refer to secure messages to be delivered in the manner described herein.
- Web server 402 can use standard programming techniques to select specific HTTP requests for special processing, including CGI, NSAPI, Active Server Page, and Servlet, for example.
- Web server 402 is the primary interface between delivery server 104 and recipient 106 in the delivery ofthe secure message created in accordance with a secure e- mail protocol such as that illustrated by logic flow diagram 300 as described above.
- Delivery server 104 also includes an e-mail server 404.
- E-mail server 404 sends notification messages to an intended recipient in a manner described more completely below.
- Delivery server 104 includes secure message logic 406 which governs the overall operation and interaction ofthe components of delivery server 104.
- secure message logic 406 causes delivery ofthe secure message according to logic flow diagram 500 ( Figure 5).
- step 502 secure message logic 406 initiates delivery process with recipient 106 by generating a URL which contains key data to uniquely identify the secure message within a secure message database 408.
- step 504 secure message logic 406 ( Figure 4) sends a notification message including the URL and the key data contained therein to recipient 106 through e-mail server 404. The notification message is sent to recipient 106 using the recipient e-mail address included in the secure message and using the known SMTP protocol.
- recipient 106 ( Figure 1) receives the notification message which includes the URL and the key data contained therein.
- Recipient 106 submits the URL through network 108 to web server 402 ( Figure 4) using, for example, a conventional web browser 704 ( Figure 7) in recipient 106.
- web server 402 receives the URL and determines that the URL pertains to a secure message to be delivered.
- URLs which are not related to secure messages to be delivered by delivery server 104 are redirected to another, conventional HTTP web server or, alternative, are processed by web server 402 in a conventional manner.
- Web server 402 notifies secure message logic 406 of receipt ofthe URL.
- secure message logic 406 ( Figure 4) identifies the secure message identified by the key data within the URL and forms a reference to the secure message.
- secure message logic 406 retrieves a secure message receiver applet 410 and adds a reference to the secure message to the applet.
- secure message logic 406 builds an HTML document which includes a tag to secure message receiver applet 410 and includes the reference as a parameter to be used by secure message receiver applet 410 during execution.
- the reference to the secure message is the key data from the URL received in step 602.
- step 608 secure message logic 406 sends the HTML document, with the embedded tag to secure message receiver applet 410, to web server 402 to return to recipient 106 in response to the URL.
- Secure message receiver applet 410 executes within recipient 106 to handle the secure message in accordance with the secure e-mail protocol in a manner described more completely below.
- Recipient 106 is shown in greater detail in Figure 7.
- Recipient 106 includes an e- mail reader 702 which is conventional and by which the notification message described above is received and read.
- the notification e-mail includes the URL with key data in the form of an HTML attachment as described in U.S. Patent Application S/N 09/386,643 by Jeffrey C. Smith et al. entitled "Electronic Document Delivery System in Which Notification of Said Electronic Documents is Sent to a Recipient Thereof and that description is incorporated herein by reference.
- the notification message includes the HTML attachment which is opened by recipient 106.
- HTML data files such as the HTML attachment are associated with a web browser as the default application with which to open, i.e., process and display the contents of, HTML data files.
- a web browser as the default application with which to open, i.e., process and display the contents of, HTML data files.
- an HTML browser 704 is caused to execute and display the contents of the HTML attachment.
- HTML browser 704 is an ordinary web browser in this illustrative embodiment.
- the URL is included as text in the notification message.
- Some e-mail readers will automatically open an HTML browser in the manner described above when recipient 106 clicks on the URL.
- recipient 106 copies the URL from the notification message and independently starts the HTML browser and enters the URL. It is assumed that recipient 106 is able to use both e-mail reader 702 and HTML browser 704 and to retrieve an HTML document using HTML browser 704 and a URL found in a text message received through e-mail reader 702.
- the HTML attachment or the HTML document sent in response to the URL includes an embedded tag referring to secure message receiver applet 410 ( Figure 4) with the reference to the secure e-mail message to be delivered to recipient 106.
- Embedded tags are known components of HTML data files.
- HTML browser 704 In displaying the contents ofthe HTML attachment, HTML browser 704 ( Figure 7) requests secure message receiver applet 410 from web server 402 ( Figure 4).
- secure message receiver applet 410 is persistently installed in the computer system of recipient 106.
- comparison is made to the version ofthe persistently installed secure message receiver and the one most recently made available from delivery server 104. Such can be accomplished by initiating execution ofthe persistently installed secure message receiver which initially requests a newest version number from web server 402 of delivery server 104. If the newest version number is greater than the version ofthe persistently installed secure message receiver, the persistently installed secure message receiver initiates re-delivery and re-installation of a new secure message receiver.
- HTML browser 704 ( Figure 7) includes an applet interpreter 706 which, in this illustrative embodiment, is a JavaTM interpreter which executes computer instructions according to the JavaTM computer instruction language of Sun Microsystems, Inc. Receipt and execution ofthe computer instructions ofthe modified applet form secure e-mail receiver 708.
- Secure e-mail receiver 708 communicates with delivery server 104 to download the secure message and subsequently processes the secure message to render the message readable to recipient 106. Accordingly, secure e-mail receiver 708 requires cryptographic capabilities to decrypt the secure message and to verify the signature ofthe secure message.
- secure e-mail receiver 708 must be able to present the substantive content ofthe secure message or to save the substantive content to a local disk in such a manner that the substantive content is subsequently accessible, e.g., by storage at a location known recipient 106.
- secure e-mail receiver 708 is a JavaTM Applet that is cryptographically signed by delivery server 104 and that is transparently and dynamically downloaded via HTML browser 704 by virtue ofthe recipient simply accessing the URL included in the notification message. Secure e-mail receiver 708 is shown in greater detail in Figure 8.
- Secure e-mail receiver 708 includes a communication module 802 which is responsible for communicating with delivery server 104.
- communication module 802 is implemented using the known java.net.URLConnection class that supports the HTTP protocol and that enables retrieval of data from, and sending data to, a web server such as web server 402 ( Figure 4).
- Communication module 802 ( Figure 8) retrieves the secure message from web server 402 and, after processing ofthe secure message as described below, reports the success of such processing to web server 402 in this illustrative embodiment.
- Secure e-mail receiver 708 also includes a secure protocol module 804 which is responsible for decrypting the secure message, verifying the sender's signature, and extracting data files contained in the secure message.
- Secure protocol module 804 also provides supporting PKI functionality including key management, decryption, and signature and certificate verification as described more completely below.
- Communication module 802 moves the content ofthe secure message from communication module 802 to secure protocol module 804 through a pipe 806 in this illustrative embodiment.
- Communication module 802 streams the secure message through pipe 806 as the secure message is received such that the secure message can be processed simultaneously with receipt ofthe secure message.
- Pipes are known inter-module communications mechanisms and can be implemented using, for example, the known java ⁇ o package for classes.
- step 902 secure e-mail receiver 708 initializes communication module 802.
- step 904 secure e-mail receiver 708 instructs communication module 802 to retrieve the secure message from delivery server 104.
- step 906 secure e-mail receiver 708 forms pipe 806 between communication module 802 and secure protocol module 804 such that data received by communication module 802 are sent immediately to secure protocol module 804. If processing ofthe received secure message by secure protocol module 804 is successful, secure e-mail receiver 708 reports such success to web server 402 ( Figure 4) in step 908.
- secure e-mail receiver 708 also provides a user interface by which recipient 106 can save to local persistent storage, and subsequently retrieve and open, any data files contained in. and recovered from, the secure message. Furthermore, secure e-mail receiver 708 reports any errors occurring during the processing ofthe secure message by secure protocol module 804 to recipient 106.
- logic flow diagram 1000 represents but one illustrative example of processing according to a secure e-mail protocol.
- test step 1002 secure protocol module 804 determines whether the secure message is encrypted. If the secure message is not encrypted, secure protocol module 804 skips steps 1004-1006.
- step 1004 secure protocol module 804 decrypts the secure message.
- Step 1004 is the inverse of step 314 ( Figure 3) and the result is a MIME body.
- step 1006 secure protocol module 804 parses the MIME body. If the secure message is signed, the result of such parsing is the signed data produced in step 308 ( Figure 3). Conversely, if the secure message is not signed, the result of such parsing is the collection of data files collected in step 302 ( Figure 3).
- test step 1008 secure protocol module 804 determines whether the secure message is signed. If the secure message is not signed, secure protocol module 804 skips steps 1010-1012.
- step 1010 secure protocol module 804 verifies the signature ofthe secure message.
- Step 1010 is the inverse of step 308 ( Figure 3).
- the result ofthe verification of step 1010 ( Figure 10) is the MIME body produced in step 304 ( Figure 3).
- secure protocol module 804 reports the results of such signature verification to recipient 106, either as a report displayed to a user or as a report communicated to a process receiving the secure message.
- the report indicates whether the signature is verified and, if so, the identity ofthe sender as indicated by the signature.
- the report includes the certificate ofthe sender.
- step 1012 secure protocol module 804 parses the MIME body produced in step 1010. The result of such parsing is the collection of data files collected in step 302 ( Figure 3).
- the result of processing according to logic flow diagram 1000 ( Figure 10) by secure protocol module 804 is the collection of data files collected in step 302 ( Figure 3) either in step 1012 if the secure message is signed or in step 1006 if the secure message is not signed.
- secure protocol module 804 requires some level of public key infrastructure.
- secure protocol module 804 requires the ability to manage keys on behalf of recipient 106 and access to certificates from trusted certificate authorities.
- Asymmetric key encryption is known but is described here briefly for completeness.
- Asymmetric key encryption involves a pair of reciprocal keys; one is kept private and the other is made public and can be widely distributed. The keys are reciprocal in that data encrypted with either key can only be decrypted with the other key.
- the data file is encrypted with the public key of recipient 106.
- the public key of recipient 106 can be obtained from a trusted certificate authority for example. Trusted certificate authorities are known but are described briefly below for completeness.
- the data file can only be decrypted using the private key of recipient 106. Since the private key of recipient 106 is held in secrecy by recipient 106, only recipient 106 can decrypt the data file. Even the entity encrypting the data file using the public key of recipient 106 cannot reverse the encryption to recover the data file in a cleartext, unencrypted form.
- the data file — or a hash thereof — is encrypted using the private key ofthe signing entity.
- any person or process with access to the public key ofthe signing entity can decrypt the data file, or the hash thereof.
- Successful decryption ofthe data file or hash using the public key ofthe signing entity verifies the signature since only the signing entity has access to the private key ofthe signing entity. Accordingly, the signing entity is authenticated as the source ofthe data file.
- Public keys are frequently stored in the form of a certificate. Certificates are well known but are described briefly for completeness. A certificate combines data identifying an entity, such as a person or computer process, with a public key ofthe entity. A certificate authority signs the certificate to ensure that the certificate has not been tampered with. Thus, a certificate provides a relatively high degree of confidence in the association between the public key and the identity ofthe key owner.
- secure protocol module 804 imports such private keys and certificates from HTML browser 704 ( Figure 7). Such certificates are communicated to delivery server 104 ( Figure 1) and can be used, by sender 102 for example, in encrypting data for recipient 106 in step 314 ( Figure 3). In addition, secure protocol module 804 ( Figure 8) uses such imported private keys to decrypt such data in step 1004 ( Figure 10).
- secure protocol module 804 provides a user interface by which recipient 106 can view and manipulate keys. For example, recipient 106 can locate and add public keys from other entities to a keyring, i.e., a data structure which includes a number of public keys.
- the user interface provided by secure protocol module 804 in this illustrative embodiment allows recipient 106 to delete keys from the keyring.
- the user interface provided by secure protocol module 804 in this illustrative embodiment also allows recipient 106 to export keys to, and import keys from, a password-protected data file stored on persistent storage accessible by recipient 106.
- secure protocol module 804 receives certificates from a trusted certificate authority.
- the certificate authority provides certificates which can be used by secure protocol module 804 to verify a signature as in step 1010 ( Figure 10).
- secure protocol module 804 ( Figure 8) receives an initial list of trusted certificate authorities and allows recipient 106, by providing a user interface for example, to modify the list to include other certificate authorities trusted by recipient 106. It is important that the initial list of trusted certificate authorities for secure protocol module 804 is secure from tampering by attackers hoping to assume identities of other entities by manipulation of certificates.
- secure e-mail receiver 708 is received from delivery server 104 in a signed form, i.e., as signed by delivery server 104. Therefore, tampering with the contents of secure e-mail receiver 708, including a list of trusted certificate authorities, is prevented.
- a list of trusted certificate authorities can be retrieved from web server 402 ( Figure 4) of delivery server 104 each time such a list is needed by secure protocol module 804 ( Figure 8).
- the list is not modified by recipient 106.
- it is important that the list of trusted certificate authorities received from web server 402 is secure from tampering by attackers hoping to assume identities of other entities by manipulation of certificates.
- the list of trusted certificate authorities is received from delivery server 104 through a secure channel such as an SSL connection. Therefore, tampering with the list of trusted certificate authorities during delivery ofthe list is prevented.
- secure protocol module 804 can secure store such keys and certificates within persistent storage ofthe computer system of recipient 106.
- the private keys are stored locally by recipient 106 using the known PKCS #12 password-based encryption and a strong symmetric encryption algorithm such as the known Triple-DES algorithm.
- secure protocol module 804 in this embodiment is implemented using the RSA BSAFE Crypto- JTM 2.0 toolkit from RSA Data Security, Inc.
- This toolkit provides basic cryptographic functionality based on the known PKCS #1 standard.
- this toolkit includes modules which can generate and verify message digests and digital signatures as well as encrypt and decrypt data using a number of encryption algorithms. Familiarity with this toolkit and the S/MIME protocol in general are helpful in implementing this illustrative embodiment of secure protocol module 804.
- secure protocol module 804 In addition, the following components are known and are helpful in implementing this illustrative embodiment of secure protocol module 804:
- ASN.1 The ASN.l DER data format provides a universal way to represent and encode structured data. ASN.1 is used widely in public key cryptography. Secure protocol module 804 can parse and generate ASNJ DER encoding in this illustrative embodiment.
- PKCS #1 can calculate and verify message digests and digital signatures as well as encrypt and decrypt data using a number of encryption algorithms.
- PKCS #1 is provided by RSA BSAFE Crypto-JTM toolkit.
- X.509 specifies a format for certificates.
- PKCS #1 can parse and verify X.509 v3 certificates as well as build a certificate chain. This component of PKCS #1 also provides support for v3 certificate extensions required by S/MIME. X.509 can be implemented using ASNJ for certificate parsing and PKCS #1 for verification.
- PKCS #12 specifies password-protected data.
- secure protocol module 804 can extract private keys and certificates from password-protected PKCS # 12 data.
- secure protocol module 804 can also generate password-protected PKCS #12 data for a given set of keys and certificates, and a given password.
- PKCS #12 is implemented based on ASNJ, PKCS #1, and X.509.
- Private Key Database By implementing a private key database, secure protocol module 804 manages the private key or keys of recipient 106. In this illustrative embodiment, secure protocol module 804 supports adding, deleting, enumerating ofthe private keys. The private keys are stored protected by a user-defined password. While the term "password” can be considered to connote a single word, it is appreciated that "password” as used herein can include non-textual data and can include multiple words such as a passphrase. Secure protocol module 804 uses PKCS #12 to store the keys in the database and to import the keys from other applications.
- Trusted Certificate Authority Database By implementing a trusted certificate authority database, secure protocol module 804 can access the list of trusted certificate authorities. Secure protocol module 804 uses X.509 to manipulate certificates ofthe certificate authorities.
- PKCS #7 Signed Data: PKCS #7 specifies a cryptographic message syntax.
- secure protocol module 804 can verify the data signed using the PKCS #7 format and can extract the signed content and signer's signature of such data.
- Secure protocol module 804 uses ASNJ for parsing of PKCS #7 data; PKCS #1 for verifying the signature; and X.509 and the trusted certificate authority for verifying the signer's certificate.
- PKCS #7 also specifies a format for enveloped data.
- secure protocol module 804 can decrypt data which is encrypted and packaged using the PKCS #7 format.
- Secure protocol module 804 uses ASNJ for parsing of PKCS #7 data, the private key database for accessing the private key of recipient 106 needed to decrypt the secure message, and PKCS #1 for decryption.
- MIME Parser Secure protocol module 804 can parse MIME messages and extract any attachments included in such MIME message.
- Secure protocol module 804 implements a S/MIME message parser which processes S/MIME messages with decryption and signature verification applied as necessary.
- the S/MIME message parser relies on the MIME parser of secure protocol module 804 to detect and extract S/MIME content as well as to process the original content once all ofthe cryptographic layers of signing and encryption are removed by using both aspects of PKCS #7 described above as components (7) and (8).
- Certificate User Interface Secure protocol module 804 implements a certificate user interface which can report certificate information to recipient 106.
- the certificate user interface relies on X.509 to provide such information.
- Signature User Interface Secure protocol module 804 implements a signature user interface which can report S/MIME package signature information to recipient 106.
- the signature user interface can rely on the certificate user interface for displaying the signer's certificate and on signature info produced by PKCS #7 including, for example, the signing date and time.
- Private Key Database User Interface Secure protocol module 804 implements a private key database user which provides the user with access to private key database operations.
- the private key database user interface uses the certificate user interface to show a user's certificate and the private key database to carry out the operations.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU27281/00A AU2728100A (en) | 1999-01-14 | 2000-01-14 | Web-based delivery of secure e-mail messages |
EP00905628A EP1145507A1 (en) | 1999-01-14 | 2000-01-14 | Web-based delivery of secure e-mail messages |
CA002357016A CA2357016A1 (en) | 1999-01-14 | 2000-01-14 | Web-based delivery of secure e-mail messages |
JP2000594234A JP2002535884A (en) | 1999-01-14 | 2000-01-14 | Distribution of web-based secure email messages |
NO20013481A NO20013481L (en) | 1999-01-14 | 2001-07-13 | Secure e-mail transmission over the Internet |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11605399P | 1999-01-14 | 1999-01-14 | |
US60/116,053 | 1999-01-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000042748A1 true WO2000042748A1 (en) | 2000-07-20 |
Family
ID=22364951
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/001011 WO2000042748A1 (en) | 1999-01-14 | 2000-01-14 | Web-based delivery of secure e-mail messages |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1145507A1 (en) |
JP (1) | JP2002535884A (en) |
AU (1) | AU2728100A (en) |
CA (1) | CA2357016A1 (en) |
NO (1) | NO20013481L (en) |
WO (1) | WO2000042748A1 (en) |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002032044A2 (en) * | 2000-10-13 | 2002-04-18 | Eversystems Inc. | Secret key messaging |
WO2002043316A2 (en) * | 2000-11-27 | 2002-05-30 | Hotlocker.Com, Inc. | Method and system for encrypting shared documents for transmission and storage using triple des key to encrypt/decrypt shared documents and ecc public/privat key pair to transmit triple des key |
WO2002093849A2 (en) * | 2001-05-16 | 2002-11-21 | Kasten Chase Applied Research Limited | System for secure electronic information transmission |
WO2003030474A2 (en) * | 2001-09-28 | 2003-04-10 | Markport Limited | Mmsc access control |
EP1307020A2 (en) | 2001-10-24 | 2003-05-02 | Microsoft Corporation | Composable messaging protocol |
GB2382494A (en) * | 2001-10-31 | 2003-05-28 | Project Monday Ltd | Registered e-mail system |
JP2003233546A (en) * | 2002-02-08 | 2003-08-22 | Dentsu Tec Inc | Information providing system using code information |
US6941467B2 (en) | 2002-03-08 | 2005-09-06 | Ciphertrust, Inc. | Systems and methods for adaptive message interrogation through multiple queues |
WO2005098571A1 (en) * | 2004-04-09 | 2005-10-20 | Capital One Financial Corporation | Methods and systems for verifying the accuracy of reported information |
EP1643744A1 (en) * | 2004-10-04 | 2006-04-05 | Alcatel | Method for transfering video data to several users in an MMS-network |
EP1646194A1 (en) * | 2004-10-08 | 2006-04-12 | Sagem Communication | Method for producing a reliable delivery acknowledgement |
US7096498B2 (en) | 2002-03-08 | 2006-08-22 | Cipher Trust, Inc. | Systems and methods for message threat management |
US7124438B2 (en) | 2002-03-08 | 2006-10-17 | Ciphertrust, Inc. | Systems and methods for anomaly detection in patterns of monitored communications |
EP1956776A2 (en) | 2007-02-08 | 2008-08-13 | DLB Finance & Consultancy B.V. | Method and system for transmitting an electronic message |
US7458098B2 (en) | 2002-03-08 | 2008-11-25 | Secure Computing Corporation | Systems and methods for enhancing electronic communication security |
US7536712B2 (en) | 2001-10-16 | 2009-05-19 | Microsoft Corporation | Flexible electronic message security mechanism |
US7548952B2 (en) | 2002-05-31 | 2009-06-16 | International Business Machines Corporation | Method of sending an email to a plurality of recipients with selective treatment of attached files |
AU2003257282B2 (en) * | 2002-07-23 | 2009-06-18 | Echoworx Corporation | System, method and computer product for delivery and receipt of S/MIME encrypted data |
US7694128B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for secure communication delivery |
US7693947B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for graphically displaying messaging traffic |
EP2176990A1 (en) * | 2007-08-01 | 2010-04-21 | Echoworx Corporation | Method and system for delivering secure messages to a computer desktop |
EP2210381A1 (en) * | 2007-11-13 | 2010-07-28 | Telefonaktiebolaget L M Ericsson (publ) | Mail server and method for sending e-mails to their recipients |
US7870203B2 (en) | 2002-03-08 | 2011-01-11 | Mcafee, Inc. | Methods and systems for exposing messaging reputation to an end user |
US7903549B2 (en) | 2002-03-08 | 2011-03-08 | Secure Computing Corporation | Content-based policy compliance systems and methods |
US8132250B2 (en) | 2002-03-08 | 2012-03-06 | Mcafee, Inc. | Message profiling systems and methods |
US8160975B2 (en) * | 2008-01-25 | 2012-04-17 | Mcafee, Inc. | Granular support vector machine with random granularity |
US8239921B2 (en) | 2008-01-03 | 2012-08-07 | Dlb Finance & Consultancy B.V. | System and method of retrieving a service contact identifier |
US8443424B2 (en) | 2007-02-08 | 2013-05-14 | Scipioo Holding B.V. | Method and system for reducing the proliferation of electronic messages |
US8463921B2 (en) | 2008-01-17 | 2013-06-11 | Scipioo Holding B.V. | Method and system for controlling a computer application program |
US8549611B2 (en) | 2002-03-08 | 2013-10-01 | Mcafee, Inc. | Systems and methods for classification of messaging entities |
US8578480B2 (en) | 2002-03-08 | 2013-11-05 | Mcafee, Inc. | Systems and methods for identifying potentially malicious messages |
EP2485452A3 (en) * | 2011-02-07 | 2013-12-25 | Joaquin Ayuso de Paul | Systems and methods for establishing a communication session between communication devices |
US9009321B2 (en) | 2007-01-24 | 2015-04-14 | Mcafee, Inc. | Multi-dimensional reputation scoring |
US9544272B2 (en) | 2007-01-24 | 2017-01-10 | Intel Corporation | Detecting image spam |
US10007628B2 (en) | 2014-06-18 | 2018-06-26 | Qualcomm Incorporated | Dynamically adjustable multi-line bus shared by multi-protocol devices |
US10241955B2 (en) | 2014-06-18 | 2019-03-26 | Qualcomm Incorporated | Dynamically adjustable multi-line bus shared by multi-protocol devices |
CN112994899A (en) * | 2021-04-10 | 2021-06-18 | 北京国联易安信息技术有限公司 | Safe mail receiving and sending method for mobile terminal |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1410296A2 (en) | 2001-06-12 | 2004-04-21 | Research In Motion Limited | Method for processing encoded messages for exchange with a mobile data communication device |
US7254712B2 (en) | 2001-06-12 | 2007-08-07 | Research In Motion Limited | System and method for compressing secure e-mail for exchange with a mobile data communication device |
WO2002101580A1 (en) | 2001-06-12 | 2002-12-19 | Research In Motion Limited | Certificate management and transfer system and method |
EP1410601B1 (en) | 2001-07-10 | 2017-02-08 | BlackBerry Limited | System and method for secure message key caching in a mobile communication device |
DE60229645D1 (en) | 2001-08-06 | 2008-12-11 | Research In Motion Ltd | METHOD AND DEVICE FOR PROCESSING CODED MESSAGES |
JP2004265028A (en) * | 2003-02-28 | 2004-09-24 | Dainippon Printing Co Ltd | Client authentication method |
US9094429B2 (en) | 2004-08-10 | 2015-07-28 | Blackberry Limited | Server verification of secure electronic messages |
US7549043B2 (en) | 2004-09-01 | 2009-06-16 | Research In Motion Limited | Providing certificate matching in a system and method for searching and retrieving certificates |
US7631183B2 (en) | 2004-09-01 | 2009-12-08 | Research In Motion Limited | System and method for retrieving related certificates |
US7640428B2 (en) | 2004-09-02 | 2009-12-29 | Research In Motion Limited | System and method for searching and retrieving certificates |
US8572389B2 (en) | 2005-10-14 | 2013-10-29 | Blackberry Limited | System and method for protecting master encryption keys |
US7814161B2 (en) | 2006-06-23 | 2010-10-12 | Research In Motion Limited | System and method for handling electronic mail mismatches |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0869652A2 (en) * | 1997-04-01 | 1998-10-07 | Tumbleweed Software Corporation | Document delivery system |
-
2000
- 2000-01-14 CA CA002357016A patent/CA2357016A1/en not_active Abandoned
- 2000-01-14 AU AU27281/00A patent/AU2728100A/en not_active Abandoned
- 2000-01-14 EP EP00905628A patent/EP1145507A1/en not_active Withdrawn
- 2000-01-14 WO PCT/US2000/001011 patent/WO2000042748A1/en not_active Application Discontinuation
- 2000-01-14 JP JP2000594234A patent/JP2002535884A/en active Pending
-
2001
- 2001-07-13 NO NO20013481A patent/NO20013481L/en not_active Application Discontinuation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0869652A2 (en) * | 1997-04-01 | 1998-10-07 | Tumbleweed Software Corporation | Document delivery system |
Non-Patent Citations (3)
Title |
---|
LEVIEN R: "PROTECTING INTERNET E-MAIL FROM PRYING EYES", DATA COMMUNICATIONS,US,MCGRAW HILL. NEW YORK, vol. 25, no. 6, 1 May 1996 (1996-05-01), pages 117 - 118,120,122, XP000587586, ISSN: 0363-6399 * |
NADEAU M: "YOUR E-MAIL IS OBSOLETE", BYTE,US,MCGRAW-HILL INC. ST PETERBOROUGH, vol. 22, no. 2, 1 February 1997 (1997-02-01), pages 66 - 69,72,74,, XP000680521, ISSN: 0360-5280 * |
STALLINGS W: "S/MIME: E-MAIL GETS SECURE", BYTE,US,MCGRAW-HILL INC. ST PETERBOROUGH, vol. 23, no. 7, 1 July 1998 (1998-07-01), pages 41 - 42, XP000774260, ISSN: 0360-5280 * |
Cited By (61)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002032044A3 (en) * | 2000-10-13 | 2003-01-09 | Eversystems Inc | Secret key messaging |
WO2002032044A2 (en) * | 2000-10-13 | 2002-04-18 | Eversystems Inc. | Secret key messaging |
US6728378B2 (en) | 2000-10-13 | 2004-04-27 | Eversystems Information Comircio Representagco, Importageo E Exportagco Ltda. | Secret key messaging |
WO2002043316A2 (en) * | 2000-11-27 | 2002-05-30 | Hotlocker.Com, Inc. | Method and system for encrypting shared documents for transmission and storage using triple des key to encrypt/decrypt shared documents and ecc public/privat key pair to transmit triple des key |
WO2002043316A3 (en) * | 2000-11-27 | 2002-12-27 | Hotlocker Com Inc | Method and system for encrypting shared documents for transmission and storage using triple des key to encrypt/decrypt shared documents and ecc public/privat key pair to transmit triple des key |
WO2002093849A2 (en) * | 2001-05-16 | 2002-11-21 | Kasten Chase Applied Research Limited | System for secure electronic information transmission |
WO2002093849A3 (en) * | 2001-05-16 | 2003-01-23 | Kasten Chase Applied Res Ltd | System for secure electronic information transmission |
WO2003030474A3 (en) * | 2001-09-28 | 2003-12-11 | Markport Ltd | Mmsc access control |
WO2003030474A2 (en) * | 2001-09-28 | 2003-04-10 | Markport Limited | Mmsc access control |
US7536712B2 (en) | 2001-10-16 | 2009-05-19 | Microsoft Corporation | Flexible electronic message security mechanism |
EP1307020A3 (en) * | 2001-10-24 | 2006-09-13 | Microsoft Corporation | Composable messaging protocol |
EP1307020A2 (en) | 2001-10-24 | 2003-05-02 | Microsoft Corporation | Composable messaging protocol |
GB2382494A (en) * | 2001-10-31 | 2003-05-28 | Project Monday Ltd | Registered e-mail system |
JP2003233546A (en) * | 2002-02-08 | 2003-08-22 | Dentsu Tec Inc | Information providing system using code information |
US7490134B2 (en) | 2002-02-08 | 2009-02-10 | Dentsu, Inc. | Information providing system using code information |
CN100370442C (en) * | 2002-02-08 | 2008-02-20 | 株式会社电通Tec | Information providing system using code information |
US7124438B2 (en) | 2002-03-08 | 2006-10-17 | Ciphertrust, Inc. | Systems and methods for anomaly detection in patterns of monitored communications |
US8132250B2 (en) | 2002-03-08 | 2012-03-06 | Mcafee, Inc. | Message profiling systems and methods |
US7096498B2 (en) | 2002-03-08 | 2006-08-22 | Cipher Trust, Inc. | Systems and methods for message threat management |
US7903549B2 (en) | 2002-03-08 | 2011-03-08 | Secure Computing Corporation | Content-based policy compliance systems and methods |
US8042181B2 (en) | 2002-03-08 | 2011-10-18 | Mcafee, Inc. | Systems and methods for message threat management |
US7213260B2 (en) | 2002-03-08 | 2007-05-01 | Secure Computing Corporation | Systems and methods for upstream threat pushback |
US7225466B2 (en) | 2002-03-08 | 2007-05-29 | Secure Computing Corporation | Systems and methods for message threat management |
US7870203B2 (en) | 2002-03-08 | 2011-01-11 | Mcafee, Inc. | Methods and systems for exposing messaging reputation to an end user |
US8631495B2 (en) | 2002-03-08 | 2014-01-14 | Mcafee, Inc. | Systems and methods for message threat management |
US8578480B2 (en) | 2002-03-08 | 2013-11-05 | Mcafee, Inc. | Systems and methods for identifying potentially malicious messages |
US7458098B2 (en) | 2002-03-08 | 2008-11-25 | Secure Computing Corporation | Systems and methods for enhancing electronic communication security |
US7779466B2 (en) | 2002-03-08 | 2010-08-17 | Mcafee, Inc. | Systems and methods for anomaly detection in patterns of monitored communications |
US7519994B2 (en) | 2002-03-08 | 2009-04-14 | Secure Computing Corporation | Systems and methods for adaptive message interrogation through multiple queues |
US6941467B2 (en) | 2002-03-08 | 2005-09-06 | Ciphertrust, Inc. | Systems and methods for adaptive message interrogation through multiple queues |
US8069481B2 (en) | 2002-03-08 | 2011-11-29 | Mcafee, Inc. | Systems and methods for message threat management |
US7089590B2 (en) | 2002-03-08 | 2006-08-08 | Ciphertrust, Inc. | Systems and methods for adaptive message interrogation through multiple queues |
US7694128B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for secure communication delivery |
US7693947B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for graphically displaying messaging traffic |
US8549611B2 (en) | 2002-03-08 | 2013-10-01 | Mcafee, Inc. | Systems and methods for classification of messaging entities |
US7548952B2 (en) | 2002-05-31 | 2009-06-16 | International Business Machines Corporation | Method of sending an email to a plurality of recipients with selective treatment of attached files |
AU2003257282B2 (en) * | 2002-07-23 | 2009-06-18 | Echoworx Corporation | System, method and computer product for delivery and receipt of S/MIME encrypted data |
WO2005098571A1 (en) * | 2004-04-09 | 2005-10-20 | Capital One Financial Corporation | Methods and systems for verifying the accuracy of reported information |
US7809700B2 (en) | 2004-04-09 | 2010-10-05 | Capital One Financial Corporation | Methods and systems for verifying the accuracy of reported information |
US10445529B2 (en) | 2004-04-09 | 2019-10-15 | Capital One Services, Llc | Methods and systems for verifying the accuracy of reported information |
EP1643744A1 (en) * | 2004-10-04 | 2006-04-05 | Alcatel | Method for transfering video data to several users in an MMS-network |
EP1646194A1 (en) * | 2004-10-08 | 2006-04-12 | Sagem Communication | Method for producing a reliable delivery acknowledgement |
FR2876527A1 (en) * | 2004-10-08 | 2006-04-14 | Sagem | METHOD FOR PRODUCING A RELIABLE RECEPTION ACCUSE |
US9009321B2 (en) | 2007-01-24 | 2015-04-14 | Mcafee, Inc. | Multi-dimensional reputation scoring |
US10050917B2 (en) | 2007-01-24 | 2018-08-14 | Mcafee, Llc | Multi-dimensional reputation scoring |
US9544272B2 (en) | 2007-01-24 | 2017-01-10 | Intel Corporation | Detecting image spam |
EP1956776A3 (en) * | 2007-02-08 | 2010-04-21 | DLB Finance & Consultancy B.V. | Method and system for transmitting an electronic message |
EP1956776A2 (en) | 2007-02-08 | 2008-08-13 | DLB Finance & Consultancy B.V. | Method and system for transmitting an electronic message |
US8443424B2 (en) | 2007-02-08 | 2013-05-14 | Scipioo Holding B.V. | Method and system for reducing the proliferation of electronic messages |
WO2008097078A1 (en) * | 2007-02-08 | 2008-08-14 | Dlb Finance & Consultancy B.V. | Method and system for transmitting an electronic message |
EP2176990A1 (en) * | 2007-08-01 | 2010-04-21 | Echoworx Corporation | Method and system for delivering secure messages to a computer desktop |
EP2176990A4 (en) * | 2007-08-01 | 2013-01-09 | Echoworx Corp | Method and system for delivering secure messages to a computer desktop |
EP2210381A4 (en) * | 2007-11-13 | 2011-04-06 | Ericsson Telefon Ab L M | ELECTRONIC MAIL SERVER AND METHOD FOR SENDING ELECTRONIC MESSAGES TO THEIR RECIPIENTS |
EP2210381A1 (en) * | 2007-11-13 | 2010-07-28 | Telefonaktiebolaget L M Ericsson (publ) | Mail server and method for sending e-mails to their recipients |
US8239921B2 (en) | 2008-01-03 | 2012-08-07 | Dlb Finance & Consultancy B.V. | System and method of retrieving a service contact identifier |
US8463921B2 (en) | 2008-01-17 | 2013-06-11 | Scipioo Holding B.V. | Method and system for controlling a computer application program |
US8160975B2 (en) * | 2008-01-25 | 2012-04-17 | Mcafee, Inc. | Granular support vector machine with random granularity |
EP2485452A3 (en) * | 2011-02-07 | 2013-12-25 | Joaquin Ayuso de Paul | Systems and methods for establishing a communication session between communication devices |
US10007628B2 (en) | 2014-06-18 | 2018-06-26 | Qualcomm Incorporated | Dynamically adjustable multi-line bus shared by multi-protocol devices |
US10241955B2 (en) | 2014-06-18 | 2019-03-26 | Qualcomm Incorporated | Dynamically adjustable multi-line bus shared by multi-protocol devices |
CN112994899A (en) * | 2021-04-10 | 2021-06-18 | 北京国联易安信息技术有限公司 | Safe mail receiving and sending method for mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
EP1145507A1 (en) | 2001-10-17 |
NO20013481L (en) | 2001-09-11 |
CA2357016A1 (en) | 2000-07-20 |
AU2728100A (en) | 2000-08-01 |
JP2002535884A (en) | 2002-10-22 |
NO20013481D0 (en) | 2001-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1145507A1 (en) | Web-based delivery of secure e-mail messages | |
US6061448A (en) | Method and system for dynamic server document encryption | |
JP5204090B2 (en) | Communication network, e-mail registration server, network device, method, and computer program | |
US6904521B1 (en) | Non-repudiation of e-mail messages | |
US8166299B2 (en) | Secure messaging | |
US8489877B2 (en) | System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient | |
CA2394451C (en) | System, method and computer product for delivery and receipt of s/mime-encrypted data | |
US9667418B2 (en) | Electronic data communication system with encryption for electronic messages | |
US8370444B2 (en) | Generating PKI email accounts on a web-based email system | |
TW474080B (en) | Secure management of electronic documents in a networked environment | |
EP2288106A1 (en) | Data certification methods and apparatus | |
US20080187140A1 (en) | Method and System of Securely Transmitting Electronic Mail | |
WO2002093849A2 (en) | System for secure electronic information transmission | |
IL179466A (en) | Method of encrypting and transferring data between a sender and a receiver using a network | |
JP2011530248A (en) | Method and apparatus for encrypted message exchange | |
JPH10105057A (en) | Time stamp server system | |
EP1387239B1 (en) | Secure messaging | |
WO2005053254A1 (en) | Secure message model | |
JP4167137B2 (en) | Signature generation method and data exchange system | |
WO2005015862A1 (en) | Method and devices for secure transmission of electronic messages | |
Tan et al. | Securing multi-agent platform communication | |
Giacometti | Chimaera 1.0 Tutorial & Reference | |
WO2002071719A1 (en) | A method and system for encrypting digital messages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2357016 Country of ref document: CA Ref country code: CA Ref document number: 2357016 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 27281/00 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2000 594234 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000905628 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2000905628 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000905628 Country of ref document: EP |