WO2000046952A1 - Procede permettant d'envoyer un courrier electronique, de maniere sure, via un explorateur - Google Patents
Procede permettant d'envoyer un courrier electronique, de maniere sure, via un explorateur Download PDFInfo
- Publication number
- WO2000046952A1 WO2000046952A1 PCT/US2000/002865 US0002865W WO0046952A1 WO 2000046952 A1 WO2000046952 A1 WO 2000046952A1 US 0002865 W US0002865 W US 0002865W WO 0046952 A1 WO0046952 A1 WO 0046952A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- intermediary party
- receiver
- sender
- web site
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000004891 communication Methods 0.000 claims abstract description 17
- 238000012545 processing Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Definitions
- This invention relates to a method for sending secure email using a standard Internet browser, and more particularly to a method for sending confidential email between a business and its customers via an intermediary party or data center.
- the present invention solves these problems by permitting companies to securely communicate with others, such as their customers, using a standard web browser without requiring the customers to install, use and understand cumbersome encryption software.
- the present invention provides a method for sending email between a sender and a receiver over a public communications network using a standard browser.
- the sender of the message first opens a standard web browser and points it to a web site operated by an intermediary party. Then, the message sender enters a secure communication session with the intermediary party and logs into the intermediary party's web site with a valid access ID and password pair. After successful log in, the sender composes and submits a confidential email to the intermediary party's web site.
- the intermediary party takes over processing of the message.
- the intermediary party encrypts the email with a public key belonging to the receiver and signs the email with its own private key. Next, the intermediary party sends the encrypted email to the receiver. The receiver is then able to access the email using an encryption password.
- FIG. 1 shows the major components in the present system for sending secure email via a standard browser.
- FIGS. 2 A and 2B are flowcharts depicting the steps for sending secure email using a standard browser over the system shown in FIG. 1.
- the system 10 of the present invention uses an intermediary data center 12 and a data storage device 14, such as a database to permit customers 16 of a participating business 18, such as a financial institution, who have been authorized to communicate with the business 18 securely over the Internet 20 to log into an Internet web site maintained by the intermediary 12.
- a data storage device 14 such as a database
- the customer 16 After successfully logging in to the web site using, for example, an access ID and password, the customer 16 enters into a Secure Socket Layer (“SSL") encrypted session from which the customer 16 can upload confidential files or send confidential messages to the business 18 via the intermediary 12.
- SSL Secure Socket Layer
- the intermediary 12 operates at least one secure server 22 that connects to the customer's personal computer or other Internet access device in a SSL encrypted session upon customer log in via the Internet 20.
- the customer 16 submits the confidential message during the session, it is stored by the secure server 22 in the database 14.
- the business 18 subsequently logs into the intermediary 12 via the Internet 20 through a special web site using its own access ID and password. Once successfully logged in, the session between the business 18 and the intermediary 12 is also an encrypted SSL session. At this point, an authorized representative of the business 18 is able to access and read all secure email and files that have been sent by customers 16 to that business 18.
- FIGS. 2 A and 2B are flow charts showing the steps of the method of the present invention.
- a customer or user 16 of a business who seeks to communicate confidentially via a public communications network, such as the Internet, opens a browser such as NetscapeTM or Internet ExplorerTM at step 30.
- the user points the browser to a web site operated by an intermediary party 12 of the user and the business, and the user 16 enters an encrypted communication session with the business.
- the user 16 enters a SSL encrypted session.
- the user logs into the web site with a previously authorized access ID and password pair. Improper entry of an access ID and password prevents the user 16 from proceeding further at step 36 until a correct ID/password pair is entered. The number of times a user may attempt to enter a valid ID and password pair may be limited by the intermediary 12.
- the user Upon validation of the access ID and password, the user enters a secure session with the intermediary web site.
- the user 16 is presented with several options. The user may check to see if any messages from the business or the intermediary 12 have been received at step 40. At step 42, the user may access various services including securely sending a message at step 44 or sending a file at step 46 to the business or intermediary as email. If the user chooses to send a secure message at step 44, a web page including two fields, one for a subject and the other for message text, is presented to the user at step 48. The user completes these fields, attaches any files by specifying their location, and "sends" the email by selecting an option to do so at step 50. The user's message and any attached files are then submitted to the intermediary's web page through SSL encryption at step 52.
- the server 22 operated by the intermediary 12 reads the web page and stores the encrypted message in the intermediary's database 14 for processing at step 54. Processing of the message is virtually instantaneous, but in case of a backlog, there may be a slight delay in processing the message. Assuming the user only wants to send the business a confidential file, the user may do so by selecting the appropriate option at step 46. After the user has entered an access ID and password and is locked into a secure session with the intermediary's web site, the user is presented with a web page containing a field for the user to specify the location (path name) of the file to be transmitted at step 56. There may also be a location on the page to indicate the subject matter of the file being transferred.
- the user specifies the file to be sent and adds a subject line if desired.
- the user indicates that the file is ready to be transferred at step 60.
- the user remains in a SSL encrypted session with the intermediary.
- the file is sent through the intermediary's 12 server 22 for storage in the database until it is processed for transmission to the business 18 in a manner similar to that described for sending a message.
- Fig. 2B is a flow chart depicting the steps involved in processing messages or files sent by the user to the business 18 via the method of the present invention. Further processing of the messages takes advantage of known encryption technology such as PGP and the secure email infrastructure between the intermediary 12 and the business 18.
- the message or file being transferred will be encrypted by the intermediary 12 with the public PGP key of business 18 and signed with the intermediary's private key.
- the message is then sent to the business' email address through the conventional email network in an encrypted format at step 72 where the message waits until the business logs into the web site and requests its new messages.
- a notice that mail is waiting is presented at step 74.
- the business representative can then access and review this email using the business' encryption password and reply to the customer via the same process at step 76 if the reply is sensitive or through the regular email system if the reply is not confidential. If the reply message is confidential, sending it will occur in an encrypted session between the business 18 and the intermediary 12.
- messages or files from the business to its customers are then stored in the intermediary's database and made available to the particular customer upon the customer's next login to the intermediary's web site.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
L'invention concerne un procédé permettant d'envoyer un courrier électronique, de manière sûre, entre un émetteur (16) et un récepteur sur un réseau de communications (20) public, au moyen d'un explorateur standard. L'émetteur du message ouvre d'abord un explorateur (30) de Web standard, et le pointe vers un site Web fonctionnant à l'aide d'une partie intermédiaire (32). Puis, ledit émetteur du message lance une session de communications sûre au moyen de la partie intermédiaire, et entre automatiquement en communication avec le site du Web de ladite partie intermédiaire, à l'aide d'une identification d'accès valide et d'un mot de passe (34). Après une entrée en communication réussie, l'émetteur compose et soumet un courrier électronique (50) confidentiel au site Web (52) de la partie intermédiaire. Ladite partie intermédiaire crypte ensuite le courrier électronique à l'aide d'une clé publique appartenant au récepteur, et signe ledit courrier électronique avec sa propre clé privée. Puis, la partie intermédiaire envoie le courrier électronique crypté au récepteur. Le récepteur peut alors accéder au courrier électronique à l'aide d'un mot de passe.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU27554/00A AU2755400A (en) | 1999-02-05 | 2000-02-03 | Method for sending secure email via standard browser |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US24604499A | 1999-02-05 | 1999-02-05 | |
US09/246,044 | 1999-02-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000046952A1 true WO2000046952A1 (fr) | 2000-08-10 |
Family
ID=22929111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/002865 WO2000046952A1 (fr) | 1999-02-05 | 2000-02-03 | Procede permettant d'envoyer un courrier electronique, de maniere sure, via un explorateur |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2755400A (fr) |
WO (1) | WO2000046952A1 (fr) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2361153A (en) * | 2000-04-04 | 2001-10-10 | Global Knowledge Network Ltd | User security, privacy and anonymity on the Internet |
GB2368756A (en) * | 2000-11-02 | 2002-05-08 | Roke Manor Research | Email encryption system in which messages are sent via an encryption server which stores the public keys of intended recipients |
WO2002071719A1 (fr) * | 2001-03-05 | 2002-09-12 | David Paul Wiebe | Procede et systeme pour le chiffrement de messages numeriques |
FR2907253A1 (fr) * | 2006-10-11 | 2008-04-18 | Bardonneche Francois De | Dispositif d'affichage interactif |
US7363490B2 (en) | 2002-09-12 | 2008-04-22 | International Business Machines Corporation | Method and system for selective email acceptance via encoded email identifiers |
WO2014054009A1 (fr) * | 2012-10-02 | 2014-04-10 | Entersekt (Pty) Ltd | Système et procédé de messagerie électronique sécurisée |
US9847977B2 (en) | 2007-06-29 | 2017-12-19 | Microsoft Technology Licensing, Llc | Confidential mail with tracking and authentication |
US10608971B2 (en) | 2016-04-14 | 2020-03-31 | Secure Privilege, Llc | Technology for managing electronic communications having certain designations |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4458109A (en) * | 1982-02-05 | 1984-07-03 | Siemens Corporation | Method and apparatus providing registered mail features in an electronic communication system |
US5748735A (en) * | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
-
2000
- 2000-02-03 AU AU27554/00A patent/AU2755400A/en not_active Abandoned
- 2000-02-03 WO PCT/US2000/002865 patent/WO2000046952A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4458109A (en) * | 1982-02-05 | 1984-07-03 | Siemens Corporation | Method and apparatus providing registered mail features in an electronic communication system |
US5748735A (en) * | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2361153A (en) * | 2000-04-04 | 2001-10-10 | Global Knowledge Network Ltd | User security, privacy and anonymity on the Internet |
GB2368756A (en) * | 2000-11-02 | 2002-05-08 | Roke Manor Research | Email encryption system in which messages are sent via an encryption server which stores the public keys of intended recipients |
WO2002071719A1 (fr) * | 2001-03-05 | 2002-09-12 | David Paul Wiebe | Procede et systeme pour le chiffrement de messages numeriques |
US7363490B2 (en) | 2002-09-12 | 2008-04-22 | International Business Machines Corporation | Method and system for selective email acceptance via encoded email identifiers |
US7913079B2 (en) | 2002-09-12 | 2011-03-22 | International Business Machines Corporation | Method and system for selective email acceptance via encoded email identifiers |
FR2907253A1 (fr) * | 2006-10-11 | 2008-04-18 | Bardonneche Francois De | Dispositif d'affichage interactif |
US9847977B2 (en) | 2007-06-29 | 2017-12-19 | Microsoft Technology Licensing, Llc | Confidential mail with tracking and authentication |
US10511579B2 (en) | 2007-06-29 | 2019-12-17 | Microsoft Technology Licensing, Llc | Confidential mail with tracking and authentication |
WO2014054009A1 (fr) * | 2012-10-02 | 2014-04-10 | Entersekt (Pty) Ltd | Système et procédé de messagerie électronique sécurisée |
US10608971B2 (en) | 2016-04-14 | 2020-03-31 | Secure Privilege, Llc | Technology for managing electronic communications having certain designations |
US10862839B2 (en) | 2016-04-14 | 2020-12-08 | Secure Privilege, Llc | Technology for managing previously-transmitted electronic communications |
US11394678B2 (en) | 2016-04-14 | 2022-07-19 | Secure Privilege, Llc | Technology for managing the transmission of designated electronic communications |
Also Published As
Publication number | Publication date |
---|---|
AU2755400A (en) | 2000-08-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7251728B2 (en) | Secure and reliable document delivery using routing lists | |
US6539093B1 (en) | Key ring organizer for an electronic business using public key infrastructure | |
US7305545B2 (en) | Automated electronic messaging encryption system | |
US6931532B1 (en) | Selective data encryption using style sheet processing | |
US6367010B1 (en) | Method for generating secure symmetric encryption and decryption | |
US8156190B2 (en) | Generating PKI email accounts on a web-based email system | |
US6941459B1 (en) | Selective data encryption using style sheet processing for decryption by a key recovery agent | |
US7360079B2 (en) | System and method for processing digital documents utilizing secure communications over a network | |
US20020023213A1 (en) | Encryption system that dynamically locates keys | |
US20020016910A1 (en) | Method for secure distribution of documents over electronic networks | |
US20090077649A1 (en) | Secure messaging system and method | |
EP1249981A1 (fr) | Système et procédé pour système de surveillance de sécurité | |
CA2511335A1 (fr) | Systeme et procede pour des communications electroniques transparentes et securisees | |
US7966492B1 (en) | System and method for allowing an e-mail message recipient to authenticate the message | |
US20200382474A1 (en) | System And Method For Encryption, Storage And Transmission Of Digital Information | |
US20050033958A1 (en) | Method and system for secure transfer of electronic information | |
US8145707B2 (en) | Sending digitally signed emails via a web-based email system | |
WO2018218046A1 (fr) | Système d'envoi sécurisé de courrier électronique et/ou de fichiers vérifiables | |
EP1151573A1 (fr) | Systeme et procede de messagerie securisee | |
CA2522754A1 (fr) | Centre de messagerie securise | |
US8352742B2 (en) | Receiving encrypted emails via a web-based email system | |
US20030046362A1 (en) | System, method and computer product for PKI (public key infrastructure) enabled data transactions in wireless devices connected to the internet | |
WO2000046952A1 (fr) | Procede permettant d'envoyer un courrier electronique, de maniere sure, via un explorateur | |
US20060161627A1 (en) | System and method for verifying and archiving electronic messages | |
US20050138367A1 (en) | System and method for storing user credentials on a server copyright notice |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU CA JP MX |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
122 | Ep: pct application non-entry in european phase |