[go: up one dir, main page]

WO2005027404B1 - Message security - Google Patents

Message security

Info

Publication number
WO2005027404B1
WO2005027404B1 PCT/SE2004/001314 SE2004001314W WO2005027404B1 WO 2005027404 B1 WO2005027404 B1 WO 2005027404B1 SE 2004001314 W SE2004001314 W SE 2004001314W WO 2005027404 B1 WO2005027404 B1 WO 2005027404B1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
key
seed
generating
user
Prior art date
Application number
PCT/SE2004/001314
Other languages
French (fr)
Other versions
WO2005027404A1 (en
Inventor
Peter Davin
Original Assignee
Secured Email Ab
Peter Davin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from SE0302456A external-priority patent/SE527561C2/en
Priority claimed from SE0400238A external-priority patent/SE0400238D0/en
Application filed by Secured Email Ab, Peter Davin filed Critical Secured Email Ab
Priority to CA002538029A priority Critical patent/CA2538029A1/en
Priority to JP2006526047A priority patent/JP4750033B2/en
Priority to AU2004303326A priority patent/AU2004303326B2/en
Priority to BRPI0414348-5A priority patent/BRPI0414348A/en
Priority to EP04775419A priority patent/EP1665625A1/en
Priority to MXPA06002729A priority patent/MXPA06002729A/en
Publication of WO2005027404A1 publication Critical patent/WO2005027404A1/en
Publication of WO2005027404B1 publication Critical patent/WO2005027404B1/en
Priority to IL174176A priority patent/IL174176A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a method of transmitting an electrical message, preferably an email from a first user having a first terminal to a second user having a second terminal, comprising the steps of: transmitting said email in an encrypted form by said first terminal, said encrypted e-mail being encrypted by means of a key generated by a first key generator using a seed, providing once said second user with said seed for generating a key with a second key generator provided in said second terminal, providing to and storing said seed in said second terminal, using said seed by said second terminal for generating a key each time an encrypted email from said first user to said second user is received, synchronising a counting value in each terminal; and generating said key on the basis of said seed and a counting value in each terminal, independently of other terminal.

Claims

23 AMENDED CLAIMS [received by the International Bureau on April 04, 2004 (04.04.2004); Claims 1 and 17 are Amended. Claims 4-5 and 26-31 are deleted. Claims 23-24 remain unchanged] CLAIMS
1. A method of transmitting an electrical message, preferably an email from a first user having a first terminal to a second user having a second terminal, comprising the steps of: transmitting said email in an encrypted form by said first terminal, said encrypted email being encrypted by means of a key generated by a first key generator using a seed, providing once said second user with said seed for generating a key with a second key generator provided in said second terminal, providing to and storing said seed in said second terminal, using said seed by said second terminal for generating a key each time an encrypted email from said first user to said second user is received; synchronising a counting value in each terminal; generating said key on the basis of said seed and a counting value in each terminal, independently of other terminal, obtaining a dynamic serial numbers for each encrypted electrical message, used for generating a key for corresponding encrypted message.
2. The method of claim 1, wherein said seed is obtained only first time initiating time.
3. The method of claim 1, wherein a second seed is obtained if said first seed is unusable.
4. The method of claim 1, wherein the seed is saved in a dynamic and exchangeable fashion at least in one of the terminal, and preferably in all terminals.
5. The method of claim 1 or 4, wherein said counting value is generated in a counter in each terminal, the synchronisation of the counting values involving synchronisation of the counters.
6. The method of one of claims 1-5, wherein following the initial synchronisation of the counters, the terminals execute supplementary synchronisation steps only when needed.
7. The method as claimed in any one of the claims 1-6, wherein said key- generating operation on the basis of the seed and the counting value is effected by means of a calculating algorithm stored in a non-dynamic and non-changeable fashion in at least one of the terminals.
8. The method of claim 1, comprising the step of generating a list entrusted terminals based on the received seed.
9. The method of claim 8, comprising accepting emails only from registries in said list.
10. The method according to any of the preceding claims, comprising providing said seed by said first user to said second user through at least one of phone call, fax or letter.
11. The method according to any of the preceding claims, wherein said encrypted email is provided with attachments encrypted together with the email.
12. The method according to any of the preceding claims, wherein a transmitting party supplies a message with setting parameters that forces the receiving party to take special action.
13. The method according to any of the preceding claims, wherein a network administrator is supplied with a master password that enables the administrator to access the messages and administer the accounts.
14. The method according to claim 13, wherein the administrator is provided with a hardware unit generating a unique sequence number that is used for authenticating purposes.
15. A system for transmitting an electrical message, preferably an email from a first user using a first terminal to a second user using a second terminal, the system further comprising: means for transmitting said secure email in form of an encrypted mail by said first terminal, said encrypted e-mail being encrypted by means of a key generated by a first key generator using a seed, 25 means for providing once said second user with said seed for generating a key with a second key generator, means for providing to and means for storing said seed in said second terminal, means for generating a key each time an encrypted email from said first user to said second user is received by said second terminal using said seed; each terminal comprises a key-generating unit, said key-generating unit comprising a memory, in which identical seeds are stored, a counter to periodically change a counting value, and a calculating terminal adapted to generate in each terminal and independently of other terminals, a key on the basis of the original value and a counting value issued from the counter, wherin the terminals are arranged to sense when they are not synchronised and then to reset synchronisation, and means for obtaining a dynamic serial numbers for each encrypted electrical message, used for generating a key for corresponding encrypted message..
16. The system of claim 15, wherein said memory for storing of the seed in at least one of the terminals is a dynamic memory arranged to store the seed in a dynamic and exchangeable fashion.
17. The system of one of claims 15 or 16, wherein the calculating unit of at least one of the terminals comprises a calculating algorithm, which is stored in a non-dynamic and non-changeable fashion, and which preferably is hardware- implemented.
18. The system of one of claims 15 to 17, wherein one of the terminals is a central terminal comprising a plurality of seeds for secure encrypted transmission involving several different terminals having one original value each.
19. The system of one of claims 15 to 18, comprising a first unit for generating a unique sequence of numbers, which is controlled against a second unit, located in the system, which generates a sequence number which is identical to the one generated by the first unit, and if it is a correct unit and they are synchronized with each other. 26
20. A computer program product for transmitting a secure e-mail from a first user having a first terminal to a second user having a second terminal, comprising a code for: encrypting and transmitting said email from said first terminal, generating a key using said first seed in said first terminal, obtaining said seed for generating a key with a second key generator in said second terminal, storing said seed in said second terminal, generating a key each time an encrypted email from said first user to said second user is received by said second terminal using said stored seed; obtaining a dynamic serial number for each encrypted email; used for generating a key for corresponding encrypted email, generating a key for corresponding encrypted email using said dynamic serial number; synchronising a counting value in each terminal; and generating said key on the basis of said seed and a counting value in each terminal, independently of other terminal.
21. A propagated signal for transmitting a secure e-mail from a first user having a first terminal to a second user having a second terminal, comprising signal comprising a code for: encrypting and transmitting said email from said first terminal, generating a key using said first seed in said first terminal, obtaining said seed for generating a key with a second key generator in said second terminal, storing said seed in said second terminal, generating a key each time an encrypted email from said first user to said second user is received by said second terminal using said stored seed, obtaining a dynamic serial number for each encrypted email; generating a key for corresponding encrypted email using said dynamic serial number; - synchronising a counting value in each terminal; and generating said key on the basis of said seed and a counting value in each terminal, independently of other terminal. 27
22. A computer readable medium having stored therein instruction sets for transmitting a secure e-mail from a first user having a first terminal to a second user having a second terminal, said instruction set comprising a code for: encrypting and transmitting said email from said first terminal, generating a key using said first seed in said first terminal, obtaining said seed for generating a key with a second key generator in said second terminal, storing said seed in said second terminal, generating a key each time an encrypted email from said first user to said second user is received by said second terminal using said stored seed, obtaining a dynamic serial number for each encrypted email; generating a key for corresponding encrypted email using said dynamic serial number; synchronising a counting value in each terminal; and generating said key on the basis of said seed and a counting value in each terminal, independently of other terminal.
23. The medium of claim 22, wherein said medium is a memory unit.
PCT/SE2004/001314 2003-09-12 2004-09-13 Message security WO2005027404A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
CA002538029A CA2538029A1 (en) 2003-09-12 2004-09-13 Message security
JP2006526047A JP4750033B2 (en) 2003-09-12 2004-09-13 Message security
AU2004303326A AU2004303326B2 (en) 2003-09-12 2004-09-13 Message security
BRPI0414348-5A BRPI0414348A (en) 2003-09-12 2004-09-13 message security
EP04775419A EP1665625A1 (en) 2003-09-12 2004-09-13 Message security
MXPA06002729A MXPA06002729A (en) 2003-09-12 2004-09-13 Message security.
IL174176A IL174176A (en) 2003-09-12 2006-03-08 Message security

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US50225403P 2003-09-12 2003-09-12
US60/502,254 2003-09-12
SE0302456A SE527561C2 (en) 2003-09-12 2003-09-12 Electronic mail transmission method in internet environment, involves storing seed for key generation provided from sender's terminal, in receiver's terminal
SE0302456-9 2003-09-12
SE0400238A SE0400238D0 (en) 2003-09-12 2004-02-04 Message security
SE0400238-2 2004-02-04

Publications (2)

Publication Number Publication Date
WO2005027404A1 WO2005027404A1 (en) 2005-03-24
WO2005027404B1 true WO2005027404B1 (en) 2005-06-16

Family

ID=34317277

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2004/001314 WO2005027404A1 (en) 2003-09-12 2004-09-13 Message security

Country Status (8)

Country Link
EP (1) EP1665625A1 (en)
KR (1) KR20070015359A (en)
AU (1) AU2004303326B2 (en)
BR (1) BRPI0414348A (en)
CA (1) CA2538029A1 (en)
IL (1) IL174176A (en)
MX (1) MXPA06002729A (en)
WO (1) WO2005027404A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8788350B2 (en) 2008-06-13 2014-07-22 Microsoft Corporation Handling payment receipts with a receipt store
AU2016203876B2 (en) * 2009-05-15 2018-05-10 Visa International Service Association Verification of portable consumer devices
US9165285B2 (en) 2010-12-08 2015-10-20 Microsoft Technology Licensing, Llc Shared attachments
US11308449B2 (en) 2011-04-28 2022-04-19 Microsoft Technology Licensing, Llc Storing metadata inside file to reference shared version of file
US10552799B2 (en) 2011-04-28 2020-02-04 Microsoft Technology Licensing, Llc Upload of attachment and insertion of link into electronic messages
US9137185B2 (en) 2011-04-28 2015-09-15 Microsoft Technology Licensing, Llc Uploading attachment to shared location and replacing with a link
US10185932B2 (en) 2011-05-06 2019-01-22 Microsoft Technology Licensing, Llc Setting permissions for links forwarded in electronic messages

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7120696B1 (en) * 2000-05-19 2006-10-10 Stealthkey, Inc. Cryptographic communications using pseudo-randomly generated cryptography keys
US7149308B1 (en) * 2000-11-13 2006-12-12 Stealthkey, Inc. Cryptographic communications using in situ generated cryptographic keys for conditional access

Also Published As

Publication number Publication date
IL174176A (en) 2011-11-30
AU2004303326B2 (en) 2009-02-19
WO2005027404A1 (en) 2005-03-24
BRPI0414348A (en) 2006-11-14
KR20070015359A (en) 2007-02-02
IL174176A0 (en) 2006-08-01
MXPA06002729A (en) 2006-09-04
EP1665625A1 (en) 2006-06-07
AU2004303326A1 (en) 2005-03-24
CA2538029A1 (en) 2005-03-24

Similar Documents

Publication Publication Date Title
CN107734021B (en) Block chain data uploading method and system, computer system and storage medium
Diffie et al. Authentication and authenticated key exchanges
CN110098923B (en) Method and equipment for generating and verifying temporary password
US8667288B2 (en) System and method for message verification in broadcast and multicast networks
US7813503B2 (en) Method and system for generation of cryptographic keys for use in cryptographic systems
US6072876A (en) Method and system for depositing private key used in RSA cryptosystem
Khader et al. Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol
JP5230439B2 (en) Information management system
WO2004100496B1 (en) Ends - messaging protocol that recovers and has backward security
US20110219233A1 (en) Quadratic residue based password authenticated key exchange method and system
US6640303B1 (en) System and method for encryption using transparent keys
CN110570197B (en) Data processing method and device based on block chain
JP2010166228A (en) Device, method and program for integration of distributed encrypted data
WO2005027404B1 (en) Message security
CN109166199A (en) A kind of generation method of password, device and equipment
JPH10171759A (en) System for multiplying information in network for distributing merchandise or service
GB2530084A (en) Key usage detection
Brickell et al. Secure audio teleconference
CN109302283A (en) Cloud storage method and system is acted on behalf of in anti-quantum calculation based on public asymmetric key pond
RU2006112010A (en) MESSAGE SECURITY
US7627116B2 (en) Random data method and apparatus
JP2002539489A (en) Voice and data encryption method using encryption key split combiner
CN116506158A (en) Internet of things equipment encryption transmission method and system based on smart city
JPH11215114A (en) Method and device for updating cryptographic key and medium for recording cryptographic key updating program
CN118764197B (en) Key generation verification method, device and medium based on offline mode

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200480026338.9

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GE GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MK MN MW MX MZ NA NI NO NZ PG PH PL PT RO RU SC SD SE SG SK SY TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SZ TZ UG ZM ZW AM AZ BY KG MD RU TJ TM AT BE BG CH CY DE DK EE ES FI FR GB GR HU IE IT MC NL PL PT RO SE SI SK TR BF CF CG CI CM GA GN GQ GW ML MR SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
B Later publication of amended claims

Effective date: 20050404

DPEN Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2538029

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 2006/01931

Country of ref document: ZA

Ref document number: 200601931

Country of ref document: ZA

WWE Wipo information: entry into national phase

Ref document number: 174176

Country of ref document: IL

Ref document number: 1250/DELNP/2006

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: PA/a/2006/002729

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 2004303326

Country of ref document: AU

Ref document number: 1020067004927

Country of ref document: KR

Ref document number: 2006526047

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 2004775419

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2004303326

Country of ref document: AU

Date of ref document: 20040913

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2006112010

Country of ref document: RU

WWP Wipo information: published in national office

Ref document number: 2004775419

Country of ref document: EP

ENP Entry into the national phase

Ref document number: PI0414348

Country of ref document: BR

WWP Wipo information: published in national office

Ref document number: 1020067004927

Country of ref document: KR