WO2001069843A2 - Method and system for coordinating secure transmission of information - Google Patents
Method and system for coordinating secure transmission of information Download PDFInfo
- Publication number
- WO2001069843A2 WO2001069843A2 PCT/US2001/007767 US0107767W WO0169843A2 WO 2001069843 A2 WO2001069843 A2 WO 2001069843A2 US 0107767 W US0107767 W US 0107767W WO 0169843 A2 WO0169843 A2 WO 0169843A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- recipient
- key
- sender
- encrypted
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
Definitions
- the secure transmission of data is typically accomplished by using a secure channel or by using encryption techniques over a non-secure channel.
- a secure channel may be established by using a transmission medium that resides totally within a physically secure environment. For example, a government research center may locate a transmission medium (e.g. , cabling) between buildings that are fenced off from outside access. An outsider cannot access the information transmitted using that transmission medium, and thus the channel is considered secure. Such secure channels are often restricted to cabling between communication devices that are physically proximate.
- Encryption techniques allow for the secure transmission of information using a transmission medium that is itself not secure. That is, the encryption techniques secure the information, so the transmission medium does not need to be secure. Conventional encryption techniques can be categorized as symmetric or asymmetric.
- Symmetric encryption techniques such as the Data Encryption Standard (“DES”) and the Information Data Encryption Algorithm (“IDEA”), use the same key or password to encrypt and decrypt a message.
- DES Data Encryption Standard
- IDAA Information Data Encryption Algorithm
- the symmetric key needs to be sent from the sender to the recipient.
- the symmetric key is typically sent to the recipient separately from the encrypted message.
- the sender encrypts the message using the symmetric key and then transmits the encrypted message to the recipient.
- the recipient uses the symmetric key to decrypt the message.
- a difficulty with symmetric encryption techniques is that symmetric keys are susceptible to being intercepted while enroute to the recipient.
- This technique of sending messages is, however, susceptible to identity spoofing. If, however, the sender generates its own public and private key pair and publishes its public key, then the sender could digitally sign the message using its private key. The recipient would decrypt the signature using the public key of the sender. If the decryption is not successful, then the recipient would know that the message was sent by an impostor.
- a difficulty with asymmetric techniques is that the encrypting and decrypting of messages is computationally expensive. In contrast, symmetric techniques are relatively computationally inexpensive.
- PGP Pretty Good Privacy
- Such systems typically reduce the possibility of a "plain-text attack" against the asymmetric encryption of the symmetric key because the symmetric key has no text associated with it.
- Such systems are susceptible to cryptoanalytical attack techniques associated with symmetric encryption. It would be desirable to have an encryption technique that would help minimize the difficulties encountered by current encryption techniques.
- Figure 1 illustrates the communications between a client computer and a message server computer.
- Figure 2 illustrates the communications between a sender computer, a recipient computer, and a message server computer when a message is to be sent from the sender computer to the recipient computer.
- Figure 3 is a block diagram illustrating the components of the encryption system in one embodiment.
- Figure 4 is a flow diagram illustrating the processing of the receive request for temporary server public key in one embodiment.
- Figure 5 is a flow diagram illustrating the processing of the receive temporary client public key component in one embodiment.
- Figure 6 is a flow diagram illustrating the processing of the receive permanent client public key component in one embodiment.
- Figure 7 is a flow diagram illustrating the processing of the receive registration request component in one embodiment.
- Figure 8 is a flow diagram illustrating the processing of the receive request to send component in one embodiment.
- Figure 9 is a flow diagram illustrating the processing of the receive notification response component in one embodiment.
- Figure 10 is a flow diagram illustrating the processing of the receive session key response component in one embodiment.
- Figure 11 is a flow diagram illustrating the processing of the receive temporary server public key component in one embodiment.
- Figure 12 is a flow diagram illustrating the processing of the receive permanent server public key component in one embodiment.
- Figure 14 is a flow diagram illustrating the processing of the receive notification component in one embodiment.
- Figure 15 is a flow diagram illustrating the processing of the receives session key component in a embodiment.
- Figure 16 is a flow diagram illustrating the processing of the receive message component in one embodiment.
- the encryption system provides an asymmetric encryption mechanism (e.g., a public and private key pair for both the sender and the third party) for communicating between the sender and a third party and an asymmetric encryption mechanism for communicating between the recipient and the third party.
- asymmetric encryption mechanism e.g., a public and private key pair for both the sender and the third party
- the sender notifies the third party.
- the third party generates a symmetric key and encrypts the symmetric key using the asymmetric encryption mechanism associated with the sender.
- the third party then sends that encrypted symmetric key to the sender.
- the sender may generate the symmetric key and sent it in encrypted form to the third party so that the recipient, but not the third party, can decrypt the symmetric key.
- the sender Upon receiving the encrypted symmetric key, the sender decrypts the symmetric key, encrypts the message with the symmetric key, and sends the encrypted message to the recipient.
- the third party also encrypts the symmetric key using the asymmetric encryption mechanism associated with the recipient.
- the third party then sends that encrypted symmetric key to the recipient.
- the recipient decrypts it.
- the recipient decrypts the message using the symmetric key.
- the encryption system takes advantage of the computational efficiency of the symmetric techniques and avoids the problem of having the symmetric key sent with the message (even if encrypted).
- the asymmetric encryption mechanism for communicating between a third party and various clients uses a two-layer asymmetric encryption mechanism.
- a client who wants to send or receive messages first registers with the third party. During the registration process, both the third party and the client first generate a temporary public and private key pair and exchange their temporary public keys. The third party and the client then generate their own permanent public and private key pair and exchange their permanent public keys. The third party sends its permanent public key to the client in a form that is encrypted with the temporary public key of the client. When the client receives the permanent public key from the third party, it decrypts the key with its temporary private key.
- the client sends its permanent public key to the third party in a form that is encrypted with the temporary public key of the third party.
- the third party receives the permanent public key from the client, it decrypts the key with its temporary private key.
- the third party can then destroy its permanent public key that it generated for the client, and the client can destroy its permanent public key that it generated for the third party.
- the third party sends symmetric keys to the client, for sending or receiving, by encrypting the symmetric keys with the permanent public key of the client.
- the client computer 103 When the client computer 103 receives the temporary server public key, it generates a temporary client key pair and sends the temporary client public key to the server computer. The client computer also sends a registration request to the server computer.
- the server computer 104 receives the temporary client public key, it stores that key.
- the server computer 105 receives the registration request, it generates a permanent server key pair for use in communicating with that client computer.
- the server then encrypts the permanent server public key with the temporary client public key for that client computer.
- the server then sends the encrypted permanent server public key to the client computer.
- the client computer 106 receives the encrypted permanent server public key, it decrypts the permanent server public key using its temporary client private key.
- the client computer then generates a permanent client key pair.
- the client computer encrypts the permanent client public key with the permanent server public key and sends the encrypted permanent client public key to the server computer.
- the server computer 107 receives the permanent client public key, it decrypts the permanent client public key using its permanent server private key.
- the server computer then stores the permanent client public key in association with the client computer for use in future communications with the client computer.
- the client computer stores the permanent server public key for use in future communications with the server computer.
- the server computer may generate different sets of temporary and permanent key pairs for each client computer that registers.
- the encryption system could register various application programs executing at a client computer. In which case, the registration would be associated with the combination of client computer and application. In addition, the encryption system could associate registrations with users, rather than client computers.
- the server computer encrypts the session key using the permanent client public key of the recipient computer.
- the server computer sends the encrypted session key to the recipient computer.
- the recipient computer 205 receives the encrypted session key, it decrypts the session key using its permanent client private key.
- the recipient computer then encrypts a response using its permanent server public key and sends that response to the server computer.
- the server computer 206 receives the response from the recipient computer, it encrypts the session key using the permanent client public key of the sender computer.
- the server computer then sends the encrypted session key to the sender computer.
- the sender computer then encrypts a response using its permanent server public key and sends the response to the server computer.
- the server computer 208 receives that response, it decrypts the response using its permanent server private key for the sender computer.
- the sender computer 209 encrypts the message with the session key and sends the encrypted message to the recipient computer.
- the recipient computer 210 receives the message, it decrypts the message with the session key.
- the recipient computer then encrypts a response with the session key and sends a response to the sender computer.
- the sender computer 211 receives the response from the recipient computer, it decrypts the response using the session key to verify that the recipient computer successfully received the message.
- the ordering of the sending of these communications can vary.
- the symmetric key could be sent to the sender computer before being sent to the recipient computer.
- the request to send a message could be initiated from a computer other than the sender computer.
- the sender computer rather than the server computer, generates the session key.
- the server computer sends the permanent client public key of the recipient computer to the sender computer after receiving from the sender computer a request to send a message to the recipient computer.
- the sender computer creates a session key, encrypts it with the permanent client public key of the recipient computer, and sends the encrypted session key to the server computer.
- the sender computer may also encrypt the encrypted session key using the permanent server public key.
- the server computer Upon receipt of the encrypted session key, the server computer sends the encrypted session key to the recipient computer.
- the recipient computer Upon receipt of the encrypted session key, the recipient computer decrypts the session key and notifies the server computer, which in turn notifies the sender computer.
- the sender computer then sends the message to the recipient computer as outlined in 209-211 above.
- An advantage of this alternate embodiment is that the server computer does not have access to the session key in an unencrypted form. Thus, if the server computer somehow received the encrypted message, it could not decrypt the message.
- FIG. 3 is a block diagram illustrating the components of the encryption system in one embodiment.
- the client computers 310 and the 5 message server computer 320 are interconnected via the Internet 330.
- the computers may include a central processing unit, memory, input devices (e.g., keyboard and pointing devices), output devices (e.g., display devices), and storage devices (e.g., disk drives).
- the memory and storage devices are computer-readable media that may contain instructions that implement the i() encryption system.
- the data structures and message structures, including requests and responses may be stored or transmitted via a data transmission medium such as a signal on a communications link.
- Various communication channels other than the Internet may be used, such as local area networks, wide area networks, or point-to-point dial-up connections.
- the client computers include a client engine 311, a receive temporary server public key component 312, a receive permanent server public key component 313, and a send request to send component 314, a receive notification component 315, a receive session key component 316, a receive message component 317, a user interface component 318, and a key database 319.
- the client engine exchanges communications via the Internet with the message server computer and other client computers. When a communication is received, the client engine invokes the appropriate component for processing the communications.
- the user interface component provides a mechanism for receiving messages from a sender 5 computer and displaying messages to a user. The mechanism may be similar to a conventional electronic mail application that is adapted to invoke the various components necessary to ensure a secure transmission.
- the key database contains the permanent client private key of the client computer and the permanent server public key of the message server computer for this 0 client computer.
- the other components are described in detail below with reference to the flow diagrams that describe their processing.
- the server computer includes a server engine 321, a receive request for temporary server key component 322, a receive temporary client public key component 323, a receive registration request component 324, a receive permanent client public key component 325, a receive request to send component 326, a receive notification response component 327, a receive session key response component 328 and a key database 329.
- the server engine exchanges communications with the client computers and, when a communication is received, invokes the appropriate component for processing.
- the key database contains a permanent server private key and a permanent client public key for each client computer that has registered with the message server computer.
- the components of the message server computer are described below in detail with reference to flow diagrams describing their processing.
- Figures 4-10 are flow diagrams illustrating processing of the components of the message server computer in one embodiment.
- Figures 4-7 are flow diagrams illustrating the components of the message server computer used to register a client computer.
- Figure 4 is a flow diagram illustrating the processing of the receive request for temporary server public key in one embodiment. This component receives a request for a temporary server public key from a client computer. The receipt of the request may be considered to start the registration process.
- the component receives a request along with the identifier of the client computer.
- the identifier may either be unencrypted or encrypted, for example, with the non- client, computer specific, public key of the server computer.
- the component generates a temporary server key pair for that client computer.
- the component sends the temporary server public key to the client computer.
- the component stores the temporary server private key in association with the identifier of that client computer.
- Figure 5 is a flow diagram illustrating the processing of the receive temporary client public key component in one embodiment. This component is invoked when the message server computer receives a client temporary public key.
- the component receives the temporary client public key from the request along with the identifier of the client computer.
- the component stores the temporary client public key in association with the identifier of that client computer.
- Figure 6 is a flow diagram illustrating the processing of the receive permanent client public key component in one embodiment.
- This component is invoked when the message server computer receives a permanent client public key.
- the component receives the permanent client public key and identifier of the client computer.
- the component decrypts the permanent client public key using the permanent server private key for the identified client computer.
- the permanent client public key may be encrypted with the temporary server public key for that client computer.
- the component decrypts the permanent client public key using the temporary server private key for that client computer.
- the component persistently stores the permanent client public key in association with the identified client computer in the key database and then completes.
- Figure 7 is a flow diagram illustrating the processing of the receive registration request component in one embodiment.
- This component is invoked when the message server computer receives a request from a client computer to register after temporary public keys have been exchanged between the client computer and the server computer.
- the component generates a permanent server key pair for the requesting client computer, which is identified in the request.
- the component encrypts the permanent server public key with the temporary client public key for that client computer.
- the component persistently stores the permanent server private key in the key database, associating it with the identifier of that client computer.
- the component sends the permanent server public key to the client computer and then completes.
- Figures 8-11 are flow diagrams illustrating the processing of the server components used when a message is sent from a sender computer to a recipient computer.
- Figure 8 is a flow diagram illustrating the processing of the receive request to send component in one embodiment.
- This component is invoked by the message server computer when it receives a request to send a message from a sender computer to a recipient computer.
- the component receives the request along with the identifier of the sender computer.
- the component decrypts the request with the permanent server private key associated with that sender computer that is stored in the key database.
- the component encrypts a notification with the permanent client public key of the recipient computer.
- the component sends the notification to the recipient computer and then completes.
- Figure 9 is a flow diagram illustrating the processing of the receive notification response component in one embodiment.
- This component is invoked by the message server computer when a response to a notification is received from a recipient computer.
- the component receives a response from a recipient computer which includes the identifier of that recipient computer.
- the component decrypts the response using the permanent server private key for that recipient computer that is stored in the key database.
- the component generates a session key.
- the component encrypts the session key with the permanent client public key of the recipient computer.
- the component sends the encrypted session key to the recipient computer and then completes.
- Figure 10 is a flow diagram illustrating the processing of the receive session key response component in one embodiment.
- This component is invoked by the message server computer when a response to the sending of a session key is received from a sender computer or a recipient computer.
- the component receives the session key response along with the identifier of the client computer.
- the component decrypts the response using the permanent server private key of the client computer.
- decision block 1003 if the client computer is the recipient computer, then the component continues at block 1004, else the component completes.
- the component encrypts the session key with the permanent client public key of the sender computer.
- the component sends the encrypted session key to the sender computer and then completes.
- Figures 11-16 are flow diagrams illustrating the processing of a client computer in one embodiment.
- Figures 11-12 are flow diagrams illustrating the registration process of a client computer.
- Figure 11 is a flow diagram illustrating the processing of the receive temporary server public key component in one embodiment.
- the client computer invokes this component when it receives a temporary server public key from the message server computer.
- the component receives the temporary server public key from the message server computer.
- the component generates a temporary client key pair.
- the component sends the temporary client public key to the message server computer.
- the component may encrypt the temporary client public key with the temporary server public key.
- the component sends a registration request to the server and then completes. The sending of the registration request may be temporarily separated from the sending of the temporary client public key.
- Figure 12 is a flow diagram illustrating the processing of the receive permanent server public key component in one embodiment.
- This component is invoked when the client computer receives a permanent server public key from the message server computer.
- the component receives the permanent server public key from the message server.
- the component decrypts the permanent server public key using its temporary client private key.
- the component persistently stores the permanent server public key in the key database.
- the component generates a permanent client key pair.
- the component stores the permanent client private key in the key database.
- the component encrypts the permanent client public key using the permanent server public key.
- the component sends the permanent client public key to the message server computer and then completes.
- Figures 13-16 are flow diagrams illustrating the processing for sending a message from a client computer in one embodiment.
- Figure 13 is a flow diagram illustrating the processing of the request to send component in one embodiment. This component is invoked when a client computer wants to send a message to a recipient computer.
- the component encrypts a request using the permanent server public key of the message server computer stored in the key database.
- the component sends the request to the message server computer and then completes.
- Figure 14 is a flow diagram illustrating the processing of the receive notification component in one embodiment.
- This component is invoked when the client computer receives a notification that it will receive a message from a sender computer.
- the component receives the notification.
- the component decrypts the notification using its permanent client private key stored in the key database.
- the component encrypts a response using the permanent server public key stored in the key database.
- the component sends the response to the message server computer and then completes.
- Figure 15 is a flow diagram illustrating the processing of the receive session key component in one embodiment.
- This component is invoked when a client computer, sender computer or recipient computer, receives a session key.
- the component receives a session key from the message server component.
- the component decrypts the session key using the permanent client private key stored in the key database.
- the component encrypts a response with the permanent server public key stored in the key database.
- the component sends the response to the message server computer.
- decision block 1405 if the client computer is the sender computer, then the component continues at block 1506, else the component completes.
- block 1501 the component receives a session key from the message server component.
- the component decrypts the session key using the permanent client private key stored in the key database.
- the component encrypts a response with the permanent server public key stored in the key database.
- the component sends the response to the message server computer.
- decision block 1405 if the client computer is the sender computer, then the component continues at
- the component encrypts the message with the session key.
- FIG. 1507 the component sends the message to the recipient computer and then completes.
- Figure 16 is a flow diagram illustrating the processing of the receive message component in one embodiment.
- the receive message component is invoked when a client computer receives a message from a sender computer.
- the component receives the message along with the identifier of the sender computer.
- the component decrypts the message with the session key for that sender computer.
- the component encrypts a response using the session key of that sender computer. Alternatively, the response may be encrypted using a permanent client public key of the sender computer, rather than with the session key.
- the component sends the response to the sender computer and then completes.
- the encryption system is described in reference to computers, any type of device that is capable of performing the described processing can be used.
- the client devices may be personal digital assistants, cell phones, web appliances, and so on.
- the techniques of the encryption system may be used in conjunction with the Present Detection System to ensure that the recipient computer and optionally, the recipient, is available to receive the message. Accordingly, the invention is not limited, except by the appended claims.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A method and system for coordinating transmission between a sender and a recipient. In one embodiment, a third party coordinates the distribution of session keys (e.g., symmetric keys) for sender and recipient. A sender computer may generate a session key, encrypt it using a public key of the recipient, and send the encrypted session key to the third party. The third party then forwards the session key to the recipient computer. Upon receiving the session key, the recipient computer decrypts the session key so that the sender and recipient can communicate using a message encrypted with the session key.
Description
METHOD AND SYSTEM FOR COORDINATING SECURE TRANSMISSION OF INFORMATION
TECHNICAL FIELD
The described technology generally relates to sending information in a secure manner from one computer system to another.
BACKGROUND
The secure transmission of data is typically accomplished by using a secure channel or by using encryption techniques over a non-secure channel. A secure channel may be established by using a transmission medium that resides totally within a physically secure environment. For example, a government research center may locate a transmission medium (e.g. , cabling) between buildings that are fenced off from outside access. An outsider cannot access the information transmitted using that transmission medium, and thus the channel is considered secure. Such secure channels are often restricted to cabling between communication devices that are physically proximate. Encryption techniques allow for the secure transmission of information using a transmission medium that is itself not secure. That is, the encryption techniques secure the information, so the transmission medium does not need to be secure. Conventional encryption techniques can be categorized as symmetric or asymmetric. Symmetric encryption techniques, such as the Data Encryption Standard ("DES") and the Information Data Encryption Algorithm ("IDEA"), use the same key or password to encrypt and decrypt a message. Before a message can be successfully read by the recipient, the symmetric key needs to be sent from the sender to the recipient. The
symmetric key is typically sent to the recipient separately from the encrypted message. To send the message, the sender encrypts the message using the symmetric key and then transmits the encrypted message to the recipient. The recipient then uses the symmetric key to decrypt the message. A difficulty with symmetric encryption techniques is that symmetric keys are susceptible to being intercepted while enroute to the recipient. Moreover, depending on the technique used to send the symmetric key to the recipient, the sender and recipient may be unaware that the symmetric key has been intercepted. Asymmetric techniques assign two separate keys, a public key and a private key, to each participant in the secure communications. A message encrypted with a public key can be decrypted with the corresponding private key, and vice versa. A recipient who wants to receive secure messages first generates a public and private key pair. The recipient then publishes its public key for senders to use when sending secure messages to the recipient. To send a message to the recipient, the sender first encrypts the message using the recipient's public key and then sends the encrypted message to the recipient. Upon receipt of the encrypted message, the recipient decrypts the message using its confidential private key. This technique of sending messages is, however, susceptible to identity spoofing. If, however, the sender generates its own public and private key pair and publishes its public key, then the sender could digitally sign the message using its private key. The recipient would decrypt the signature using the public key of the sender. If the decryption is not successful, then the recipient would know that the message was sent by an impostor. A difficulty with asymmetric techniques is that the encrypting and decrypting of messages is computationally expensive. In contrast, symmetric techniques are relatively computationally inexpensive.
To overcome the trade-off between computational expense and security, some systems, such as Pretty Good Privacy ("PGP"), combine
asymmetric and symmetric encryption techniques. Each user of such a system generates a public and private key pair and publishes their public key. When a message is to be sent, such systems generate a symmetric key and encrypt the message using the symmetric key. Such systems then encrypt the symmetric key using the public key of the recipient. When the recipient receives the encrypted message and the encrypted symmetric key, the recipient decrypts the symmetric key using its private key. The recipient then uses the symmetric key to decrypt the message. Because symmetric keys are typically shorter than messages, the overhead of encrypting the symmetric key using the public key is low. Such systems typically reduce the possibility of a "plain-text attack" against the asymmetric encryption of the symmetric key because the symmetric key has no text associated with it. Such systems, however, are susceptible to cryptoanalytical attack techniques associated with symmetric encryption. It would be desirable to have an encryption technique that would help minimize the difficulties encountered by current encryption techniques.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 illustrates the communications between a client computer and a message server computer.
Figure 2 illustrates the communications between a sender computer, a recipient computer, and a message server computer when a message is to be sent from the sender computer to the recipient computer.
Figure 3 is a block diagram illustrating the components of the encryption system in one embodiment.
Figure 4 is a flow diagram illustrating the processing of the receive request for temporary server public key in one embodiment.
Figure 5 is a flow diagram illustrating the processing of the receive temporary client public key component in one embodiment.
Figure 6 is a flow diagram illustrating the processing of the receive permanent client public key component in one embodiment. Figure 7 is a flow diagram illustrating the processing of the receive registration request component in one embodiment.
Figure 8 is a flow diagram illustrating the processing of the receive request to send component in one embodiment.
Figure 9 is a flow diagram illustrating the processing of the receive notification response component in one embodiment.
Figure 10 is a flow diagram illustrating the processing of the receive session key response component in one embodiment.
Figure 11 is a flow diagram illustrating the processing of the receive temporary server public key component in one embodiment. Figure 12 is a flow diagram illustrating the processing of the receive permanent server public key component in one embodiment.
Figure 13 is a flow diagram illustrating the processing of the request to send component in one embodiment.
Figure 14 is a flow diagram illustrating the processing of the receive notification component in one embodiment.
Figure 15 is a flow diagram illustrating the processing of the receives session key component in a embodiment.
Figure 16 is a flow diagram illustrating the processing of the receive message component in one embodiment.
DETAILED DESCRIPTION
A method and system for coordinating the transmission of information between a sender and a recipient is provided. In one embodiment, the encryption system provides an asymmetric encryption
mechanism (e.g., a public and private key pair for both the sender and the third party) for communicating between the sender and a third party and an asymmetric encryption mechanism for communicating between the recipient and the third party. When the sender wants to send a message to the recipient, the sender notifies the third party. The third party generates a symmetric key and encrypts the symmetric key using the asymmetric encryption mechanism associated with the sender. The third party then sends that encrypted symmetric key to the sender. (Alternatively, the sender may generate the symmetric key and sent it in encrypted form to the third party so that the recipient, but not the third party, can decrypt the symmetric key.) Upon receiving the encrypted symmetric key, the sender decrypts the symmetric key, encrypts the message with the symmetric key, and sends the encrypted message to the recipient. The third party also encrypts the symmetric key using the asymmetric encryption mechanism associated with the recipient. The third party then sends that encrypted symmetric key to the recipient. Upon receiving the encrypted symmetric key, the recipient decrypts it. When the recipient receives the message from the sender that has been encrypted with the symmetric key, the recipient decrypts the message using the symmetric key. As explained below in more detail, the encryption system takes advantage of the computational efficiency of the symmetric techniques and avoids the problem of having the symmetric key sent with the message (even if encrypted).
In one embodiment, the asymmetric encryption mechanism for communicating between a third party and various clients (e.g., senders and recipients) uses a two-layer asymmetric encryption mechanism. A client who wants to send or receive messages first registers with the third party. During the registration process, both the third party and the client first generate a temporary public and private key pair and exchange their temporary public keys. The third party and the client then generate their own permanent public and private key pair and exchange their permanent public
keys. The third party sends its permanent public key to the client in a form that is encrypted with the temporary public key of the client. When the client receives the permanent public key from the third party, it decrypts the key with its temporary private key. Similarly, the client sends its permanent public key to the third party in a form that is encrypted with the temporary public key of the third party. When the third party receives the permanent public key from the client, it decrypts the key with its temporary private key. The third party can then destroy its permanent public key that it generated for the client, and the client can destroy its permanent public key that it generated for the third party. Eventually, the third party sends symmetric keys to the client, for sending or receiving, by encrypting the symmetric keys with the permanent public key of the client.
Figure 1 illustrates the communications between a client computer and a message server computer during registration. The message server computer functions as the third party to coordinate secure communications between client computers. Initially, the client computer 101 sends a request for a temporary server public key. When the server computer 102 receives the request, it generates a temporary server key pair. The server computer may generate a public and private key pair when it receives the request or may have pre-generated a set of public and private key pairs. The public and private key pairs may be generated by various asymmetric encryption techniques, such as the Rivest, Shamir, and Adelman ("RSA") algorithm. The server computer then sends a temporary server public key to the client computer. When the client computer 103 receives the temporary server public key, it generates a temporary client key pair and sends the temporary client public key to the server computer. The client computer also sends a registration request to the server computer. When the server computer 104 receives the temporary client public key, it stores that key. When the server computer 105 receives the registration request, it generates a permanent server key pair for use in communicating with that client
computer. The server then encrypts the permanent server public key with the temporary client public key for that client computer. The server then sends the encrypted permanent server public key to the client computer. When the client computer 106 receives the encrypted permanent server public key, it decrypts the permanent server public key using its temporary client private key. The client computer then generates a permanent client key pair. The client computer encrypts the permanent client public key with the permanent server public key and sends the encrypted permanent client public key to the server computer. When the server computer 107 receives the permanent client public key, it decrypts the permanent client public key using its permanent server private key. The server computer then stores the permanent client public key in association with the client computer for use in future communications with the client computer. Similarly, the client computer stores the permanent server public key for use in future communications with the server computer. The server computer may generate different sets of temporary and permanent key pairs for each client computer that registers. One skilled in the art will appreciate that the encryption system could register various application programs executing at a client computer. In which case, the registration would be associated with the combination of client computer and application. In addition, the encryption system could associate registrations with users, rather than client computers.
Figure 2 illustrates the communications between a sender computer, a recipient computer, and a message server computer when a message is to be sent from the sender computer to the recipient computer. Assuming that the sender computer and recipient computer are already registered, the sender computer 201 initiates the sending of the message by encrypting using its permanent server public key, a request to send a message to the recipient. The sender computer then sends the encrypted request to the server computer. When the server computer 202 receives the request, it decrypts the request using its permanent server private key for the sender
computer. The request may include the identification of the sender computer in an unencrypted format. Alternatively, the identification may be encrypted with a public key of the server that is known to all sender and recipient computers. The server computer then identifies the recipient from the request and encrypts a notification for the recipient computer using the permanent client public key for the recipient computer, which was received during the registration process for that recipient computer. The server computer then sends the encrypted notification to the recipient computer. When the recipient computer 203 receives the notification, it decrypts the notification using its permanent client private key. The recipient computer then encrypts a response using its permanent server public key and sends the response to the server computer. When the server computer 204 receives response from the recipient computer, it decrypts the response using its permanent server private key for that recipient computer. The server computer then generates a session key (e.g., a symmetric key) for use in encrypting the message that is to be sent from the sender computer and to the recipient computer. The server computer encrypts the session key using the permanent client public key of the recipient computer. The server computer sends the encrypted session key to the recipient computer. When the recipient computer 205 receives the encrypted session key, it decrypts the session key using its permanent client private key. The recipient computer then encrypts a response using its permanent server public key and sends that response to the server computer. When the server computer 206 receives the response from the recipient computer, it encrypts the session key using the permanent client public key of the sender computer. The server computer then sends the encrypted session key to the sender computer. Once the sender computer 207 receives the encrypted session key, it decrypts the session key using its permanent client private key. The sender computer then encrypts a response using its permanent server public key and sends the response to the server computer. When the server computer 208 receives that
response, it decrypts the response using its permanent server private key for the sender computer. To actually send the message, the sender computer 209 encrypts the message with the session key and sends the encrypted message to the recipient computer. When the recipient computer 210 receives the message, it decrypts the message with the session key. The recipient computer then encrypts a response with the session key and sends a response to the sender computer. When the sender computer 211 receives the response from the recipient computer, it decrypts the response using the session key to verify that the recipient computer successfully received the message. One skilled in the art will appreciate that the ordering of the sending of these communications can vary. For example, the symmetric key could be sent to the sender computer before being sent to the recipient computer. Also, the request to send a message could be initiated from a computer other than the sender computer. In an alternate embodiment, the sender computer, rather than the server computer, generates the session key. In such an embodiment, the server computer sends the permanent client public key of the recipient computer to the sender computer after receiving from the sender computer a request to send a message to the recipient computer. The sender computer creates a session key, encrypts it with the permanent client public key of the recipient computer, and sends the encrypted session key to the server computer. (The sender computer may also encrypt the encrypted session key using the permanent server public key.) Upon receipt of the encrypted session key, the server computer sends the encrypted session key to the recipient computer. Upon receipt of the encrypted session key, the recipient computer decrypts the session key and notifies the server computer, which in turn notifies the sender computer. The sender computer then sends the message to the recipient computer as outlined in 209-211 above. An advantage of this alternate embodiment is that the server computer does not have access to the session key in an unencrypted form. Thus, if the server
computer somehow received the encrypted message, it could not decrypt the message.
Figure 3 is a block diagram illustrating the components of the encryption system in one embodiment. The client computers 310 and the 5 message server computer 320 are interconnected via the Internet 330. The computers may include a central processing unit, memory, input devices (e.g., keyboard and pointing devices), output devices (e.g., display devices), and storage devices (e.g., disk drives). The memory and storage devices are computer-readable media that may contain instructions that implement the i() encryption system. In addition, the data structures and message structures, including requests and responses, may be stored or transmitted via a data transmission medium such as a signal on a communications link. Various communication channels other than the Internet may be used, such as local area networks, wide area networks, or point-to-point dial-up connections.
15 The client computers include a client engine 311, a receive temporary server public key component 312, a receive permanent server public key component 313, and a send request to send component 314, a receive notification component 315, a receive session key component 316, a receive message component 317, a user interface component 318, and a key database 319. 0 The client engine exchanges communications via the Internet with the message server computer and other client computers. When a communication is received, the client engine invokes the appropriate component for processing the communications. The user interface component provides a mechanism for receiving messages from a sender 5 computer and displaying messages to a user. The mechanism may be similar to a conventional electronic mail application that is adapted to invoke the various components necessary to ensure a secure transmission. The key database contains the permanent client private key of the client computer and the permanent server public key of the message server computer for this 0 client computer. The other components are described in detail below with
reference to the flow diagrams that describe their processing. The server computer includes a server engine 321, a receive request for temporary server key component 322, a receive temporary client public key component 323, a receive registration request component 324, a receive permanent client public key component 325, a receive request to send component 326, a receive notification response component 327, a receive session key response component 328 and a key database 329. The server engine exchanges communications with the client computers and, when a communication is received, invokes the appropriate component for processing. The key database contains a permanent server private key and a permanent client public key for each client computer that has registered with the message server computer. The components of the message server computer are described below in detail with reference to flow diagrams describing their processing. Figures 4-10 are flow diagrams illustrating processing of the components of the message server computer in one embodiment. Figures 4-7 are flow diagrams illustrating the components of the message server computer used to register a client computer. Figure 4 is a flow diagram illustrating the processing of the receive request for temporary server public key in one embodiment. This component receives a request for a temporary server public key from a client computer. The receipt of the request may be considered to start the registration process. In block 401, the component receives a request along with the identifier of the client computer. The identifier may either be unencrypted or encrypted, for example, with the non- client, computer specific, public key of the server computer. In block 402, the component generates a temporary server key pair for that client computer. In block 403, the component sends the temporary server public key to the client computer. In block 404, the component stores the temporary server private key in association with the identifier of that client computer. The component then completes.
Figure 5 is a flow diagram illustrating the processing of the receive temporary client public key component in one embodiment. This component is invoked when the message server computer receives a client temporary public key. In block 501, the component receives the temporary client public key from the request along with the identifier of the client computer. In block 502, the component stores the temporary client public key in association with the identifier of that client computer.
Figure 6 is a flow diagram illustrating the processing of the receive permanent client public key component in one embodiment. This component is invoked when the message server computer receives a permanent client public key. In block 601, the component receives the permanent client public key and identifier of the client computer. In block 602, the component decrypts the permanent client public key using the permanent server private key for the identified client computer. Alternatively, the permanent client public key may be encrypted with the temporary server public key for that client computer. In this case, the component decrypts the permanent client public key using the temporary server private key for that client computer. In block 603, the component persistently stores the permanent client public key in association with the identified client computer in the key database and then completes.
Figure 7 is a flow diagram illustrating the processing of the receive registration request component in one embodiment. This component is invoked when the message server computer receives a request from a client computer to register after temporary public keys have been exchanged between the client computer and the server computer. In block 701, the component generates a permanent server key pair for the requesting client computer, which is identified in the request. In block 702, the component encrypts the permanent server public key with the temporary client public key for that client computer. In block 703, the component persistently stores the permanent server private key in the key database, associating it with the
identifier of that client computer. In block 704, the component sends the permanent server public key to the client computer and then completes.
Figures 8-11 are flow diagrams illustrating the processing of the server components used when a message is sent from a sender computer to a recipient computer. Figure 8 is a flow diagram illustrating the processing of the receive request to send component in one embodiment. This component is invoked by the message server computer when it receives a request to send a message from a sender computer to a recipient computer. In block 801, the component receives the request along with the identifier of the sender computer. In block 802, the component decrypts the request with the permanent server private key associated with that sender computer that is stored in the key database. In block 803, the component encrypts a notification with the permanent client public key of the recipient computer. In block 804, the component sends the notification to the recipient computer and then completes.
Figure 9 is a flow diagram illustrating the processing of the receive notification response component in one embodiment. This component is invoked by the message server computer when a response to a notification is received from a recipient computer. In block 901, the component receives a response from a recipient computer which includes the identifier of that recipient computer. In block 902, the component decrypts the response using the permanent server private key for that recipient computer that is stored in the key database. In block 903, the component generates a session key. In block 904, the component encrypts the session key with the permanent client public key of the recipient computer. In block 905, the component sends the encrypted session key to the recipient computer and then completes.
Figure 10 is a flow diagram illustrating the processing of the receive session key response component in one embodiment. This component is invoked by the message server computer when a response to
the sending of a session key is received from a sender computer or a recipient computer. In block 1001, the component receives the session key response along with the identifier of the client computer. In block 1002, the component decrypts the response using the permanent server private key of the client computer. In decision block 1003, if the client computer is the recipient computer, then the component continues at block 1004, else the component completes. In block 1004, the component encrypts the session key with the permanent client public key of the sender computer. In block 1005, the component sends the encrypted session key to the sender computer and then completes.
Figures 11-16 are flow diagrams illustrating the processing of a client computer in one embodiment. Figures 11-12 are flow diagrams illustrating the registration process of a client computer. Figure 11 is a flow diagram illustrating the processing of the receive temporary server public key component in one embodiment. The client computer invokes this component when it receives a temporary server public key from the message server computer. In block 1101, the component receives the temporary server public key from the message server computer. In block 1102, the component generates a temporary client key pair. In block 1 103, the component sends the temporary client public key to the message server computer. In one embodiment, the component may encrypt the temporary client public key with the temporary server public key. In block 1104, the component sends a registration request to the server and then completes. The sending of the registration request may be temporarily separated from the sending of the temporary client public key.
Figure 12 is a flow diagram illustrating the processing of the receive permanent server public key component in one embodiment. This component is invoked when the client computer receives a permanent server public key from the message server computer. In block 1201, the component receives the permanent server public key from the message server. In block
1202, the component decrypts the permanent server public key using its temporary client private key. In block 1203, the component persistently stores the permanent server public key in the key database. In block 1204, the component generates a permanent client key pair. The component stores the permanent client private key in the key database. In block 1205, the component encrypts the permanent client public key using the permanent server public key. In block 1206, the component sends the permanent client public key to the message server computer and then completes.
Figures 13-16 are flow diagrams illustrating the processing for sending a message from a client computer in one embodiment. Figure 13 is a flow diagram illustrating the processing of the request to send component in one embodiment. This component is invoked when a client computer wants to send a message to a recipient computer. In block 1301, the component encrypts a request using the permanent server public key of the message server computer stored in the key database. In block 1302, the component sends the request to the message server computer and then completes.
Figure 14 is a flow diagram illustrating the processing of the receive notification component in one embodiment. This component is invoked when the client computer receives a notification that it will receive a message from a sender computer. In block 1401, the component receives the notification. In block 1402, the component decrypts the notification using its permanent client private key stored in the key database. In block 1403, the component encrypts a response using the permanent server public key stored in the key database. In block 1405, the component sends the response to the message server computer and then completes.
Figure 15 is a flow diagram illustrating the processing of the receive session key component in one embodiment. This component is invoked when a client computer, sender computer or recipient computer, receives a session key. In block 1501, the component receives a session key from the message server component. In block 1502, the component decrypts
the session key using the permanent client private key stored in the key database. In block 1503, the component encrypts a response with the permanent server public key stored in the key database. In block 1405, the component sends the response to the message server computer. In decision block 1405, if the client computer is the sender computer, then the component continues at block 1506, else the component completes. In block
1506, the component encrypts the message with the session key. In block
1507, the component sends the message to the recipient computer and then completes. Figure 16 is a flow diagram illustrating the processing of the receive message component in one embodiment. The receive message component is invoked when a client computer receives a message from a sender computer. In block 1601, the component receives the message along with the identifier of the sender computer. In block 1602, the component decrypts the message with the session key for that sender computer. In block 1603, the component encrypts a response using the session key of that sender computer. Alternatively, the response may be encrypted using a permanent client public key of the sender computer, rather than with the session key. In block 1604, the component sends the response to the sender computer and then completes.
From the foregoing, it will be appreciated that although specific embodiments of the encryption system have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention. Although the encryption system is described in reference to computers, any type of device that is capable of performing the described processing can be used. For example, the client devices may be personal digital assistants, cell phones, web appliances, and so on. Also, the techniques of the encryption system may be used in conjunction with the Present Detection System to ensure that the recipient computer and optionally, the recipient, is available to receive the
message. Accordingly, the invention is not limited, except by the appended claims.
Claims
L A computer-based method for coordinating transmitting information between a sender computer and a recipient computer, the method comprising: providing a sender public key and a recipient public key; receiving a request to transmit information between the sender computer and the recipient computer; encrypting a symmetric key using the sender public key and sending the encrypted symmetric key to the sender computer; and encrypting the symmetric key using the recipient public key and sending the encrypted symmetric key to the recipient computer whereby the sender computer can receive and decrypt the symmetric key using a sender private key, the recipient computer can receive and decrypt the symmetric key using a recipient private key, and the sender and recipient computers can transmit information that is encrypted using the symmetric key.
2. The method of claim 1 wherein the request to transmit information between the sender computer and the recipient computer is received from the sender computer.
3. The method of claim 1 wherein the request to transmit information between the sender computer and the recipient computer is encrypted using a public key of a message server computer.
4. The method of claim 1 including before sending the encrypted symmetric key to the recipient computer, verifying that the recipient computer is available to receive the encrypted symmetric key.
5. The method of claim 1 including before sending the encrypted symmetric key to the sender computer, verifying that the recipient computer received the encrypted symmetric key.
6. The method of claim 1 wherein the provided sender public key and the recipient public key are used to encrypt multiple symmetric keys for transmitting information between the sender computer and the recipient computer.
7. The method of claim 1 wherein a new symmetric key is used each time a request is received to transmit information between the sender computer and the recipient computer.
8. The method of claim 1 wherein the providing of the sender public key includes sending a temporary server public key to the sender computer and receiving from the sender computer the sender public key encrypted using the temporary server public key, and decrypting the sender public key using a temporary server private key.
9. The method of claim 1 wherein the providing of the recipient public key includes sending a temporary server public key to the recipient computer, receiving from the recipient computer the recipient public key encrypted using the temporary server public key, and decrypting the recipient public key using a temporary server private key.
10. The method of claim 1 wherein the providing of the sender public key includes sending a temporary server public key to the sender computer and receiving from the sender computer the sender public key encrypted using the temporary server public key, and decrypting the sender public key using a temporary server private key; and wherein the providing of the recipient public key includes sending a temporary server public key to the recipient computer and receiving from the recipient computer the recipient public key encrypted using the temporary server public key, and decrypting the recipient public key using a temporary server private key.
11. The method of claim 10 wherein the temporary server public key sent to the sender computer is different from the temporary server public key sent to the recipient computer.
12. The method of claim 1 including ensuring that a recipient is at the recipient computer before sending the encrypted symmetric key to the sender computer.
13. The method of claim 12 including ensuring that the recipient is authorized to receive the information.
14. The method of claim 1 wherein the providing, receiving, encrypting, and sending are performed under control of a message server computer, and whereby the information transmitted between the sender computer and the recipient computer is not sent to the message server computer.
15. The method of claim 1 wherein the public and private keys are RSA based.
16. The method of claim 1 wherein the symmetric key is DES based, IDEA based, or Triple-DES based.
17. A method for coordinating the fransmitting of information between a sender and a recipient, the method comprising: providing a sender asymmetric encryption mechanism for communications between the sender and a third party, and a recipient asymmetric encryption mechanism for communications between the recipient and the third party; and under control of the third party, encrypting a symmetric key using the sender asymmetric encryption mechanism and sending the encrypted symmetric key to the sender; and encrypting the symmetric key using the recipient asymmetric encryption mechanism and sending the encrypted symmetric key to the recipient whereby the sender can receive and decrypt the symmetric key using the sender asymmetric encryption mechanism, the recipient can receive and decrypt the symmetric key using a recipient asymmetric encryption mechanism, and the sender and recipient can transmit information that is encrypted using the symmetric key.
18. The method of claim 17 including receiving from the sender a request to transmit information to the recipient.
19. The method of claim 18 wherein the request to transmit information to the recipient is encrypted using an asymmetric encryption mechanism.
20. The method of claim 17 including before sending the encrypted symmetric key to the recipient, verifying that the recipient is available to receive the encrypted asymmetric key.
21. The method of claim 17 wherein the provided sender asymmetric mechanism and the provided recipient asymmetric mechanism are used to encrypt multiple symmetric keys for transmitting information between the sender and the recipient.
22. The method of claim 17 wherein a new symmetric key is used whenever a request is received to transmit information between the sender and the recipient.
23. The method of claim 17 wherein the information transmitted from the sender to the recipient is not sent to the third party.
24. The method of claim 17 wherein the asymmetric encryption mechanisms are RSA or Diffie-Hellman based.
25. The method of claim 17 wherein the symmetric key is DES, IDEA, or Triple-DES based.
26. A method in a computer system for coordinating the transmitting of information from a sender computer to a recipient computer, the sender computer and the recipient computer being client computers, the method comprising: registering asymmetric encryption data for a plurality of client computers, the registered client computers including the sender computer and the recipient computer; encrypting symmetric encryption data using the registered asymmetric data for the sender computer and sending the encrypted symmetric encryption data to the sender computer; and encrypting the symmetric encryption data using the registered asymmetric encryption data for the recipient computer and sending the encrypted symmetric encryption data to the recipient computer.
27. The method of claim 26 whereby the sender computer decrypts the sent symmetric encryption data using its asymmetric encryption data, encrypts the information using the decrypted symmetric encryption data, and sends the encrypted information to the recipient computer.
28. The method of claim 26 wherein the recipient computer decrypts the sent symmetric encryption data using its asymmetric encryption data, receives the encrypted information, and decrypts the received encrypted information using the decrypted symmetric encryption data.
29. The method of claim 26 wherein the registering includes receiving from the client computer the asymmetric encryption data for that client computer.
30. The method of claim 26 wherein the registering includes receiving asymmetric encryption data that is itself encrypted.
31. The method of claim 26 including before sending the encrypted symmetric encryption data to the recipient computer, ensuring that the recipient computer is available to receive the encrypted symmetric encryption data.
32. The method of claim 26 including before sending the encrypted symmetric encryption data to the sender computer, verifying that the recipient computer is available to receive encrypted information from the sender computer.
33. The method of claim 26 including, when multiple instances of information are to be transmitted between the sender computer and the recipient computer, encrypting different symmetric encryption data for each instance with the same asymmetric encryption data of the sender computer and with the same asymmetric encryption data of the recipient computer.
34. The method of claim 26 including ensuring that a person is at the recipient computer before sending the encrypted symmetric encryption data to the recipient computer.
35. The method of claim 34 including ensuring that the person is authorized to receive the information.
36. The method of claim 26 wherein the information is not sent to the computer system.
37. The method of claim 26 wherein the asymmetric encryption data is RSA or Diffie-Hellman based.
38. The method of claim 26 wherein the symmetric encryption data is DES, IDEA, or Triple-DES based.
39. A method in a sender computer for transmitting information to a recipient computer, the method comprising: establishing an asymmetric encryption mechanism with a server computer; sending to the server computer a request to send information to the recipient computer; receiving from the server computer a symmetric key encrypted using the asymmetric encryption mechanism; decrypting the symmetric key using the asymmetric encryption mechanism; encrypting information using the decrypted symmetric key; and sending to the recipient computer the encrypted information.
40. The method of claim 39 wherein the receiving of the symmetric key from the server computer indicates that the recipient computer is available to receive transmitted information.
41. The method of claim 40 wherein the receiving of the symmetric key from the server computer also indicates that a person is at the recipient computer.
42. The method of claim 41 wherein the receiving of the symmetric key from the server computer also indicates that the person is authorized to receive the information.
43. The method of claim 39 wherein the establishing includes sending a public key of the sender computer to the server computer.
44. The method of claim 39 including, for each request sent to the server computer, receiving from the server computer a different symmetric key encrypted with the same asymmetric encryption mechanism.
45. The method of claim 39 wherein the asymmetric encryption mechanism is RSA or Diffie-Hellman based.
46. The method of claim 39 wherein the symmetric key is DES, IDEA, or Triple-DES based.
47. The method of claim 39 wherein the establishing and the sending of the request are temporally separated.
48. The method of claim 39 wherein the establishing is independent of the sending of any request.
49. A method in a recipient computer for receiving information from a sender computer, the method comprising: establishing an asymmetric encryption mechanism with a server computer; receiving from the server computer a symmetric key encrypted using the asymmetric encryption mechanism; decrypting the symmetric key using the asymmetric encryption mechanism; receiving from the sender computer information encrypted using the symmetric key; and decrypting the received information using the decrypted symmetric key.
50. The method of claim 49 wherein the establishing includes sending a public key of the recipient computer to the server computer.
51. The method of claim 49 including receiving a different symmetric key encrypted with the asymmetric encryption mechanism for each request received by the server computer to transmit information to the recipient computer.
52. The method of claim 49 including receiving from the server computer an indication of the sender computer that is to send the information encrypted with the received symmetric key.
53. The method of claim 49 wherein the asymmetric encryption mechanism is RSA or Diffie Hellman based.
54. The method of claim 49 wherein the symmetric key is DES, IDEA, or Triple-DES based.
55. The method of claim 49 wherein the establishing and the receiving of the symmetric key are temporally separated.
56. The method of claim 49 wherein the establishing is independent of the receiving of information from a sender computer.
57. The method of claim 49 wherein the establishing is independent of the receiving of any symmetric key from the server computer.
58. A method in a computer system for coordinating transmitting of information from a sender computer to a recipient computer, the sender computer and recipient computer being client computers, the method comprising: registering asymmetric encryption data for a plurality of client computers, the registered client computers including the sender computer and the recipient computer; receiving from the sender computer symmetric encryption data that is encrypted by the sender computer using asymmetric encryption data of the recipient computer; and sending the received symmetric encryption data to the recipient computer so that the sender computer can then send information encrypted with the symmetric encryption data.
59. The method of claim 58 whereby after sending the symmetric encryption data to the recipient computer, the sender computer encrypts the information using the symmetric encryption data and sends the encrypted information to the recipient computer.
60. The method of claim 59 wherein the recipient computer decrypts the sent symmetric encryption data using its asymmetric encryption data, receives the encrypted information, and decrypts the received encrypted information using the decrypted symmetric encryption data.
61. The method of claim 58 wherein the registering includes receiving from each client computer asymmetric encryption data for that client computer.
62. The method of claim 58 including before sending the encrypted symmetric encryption data to the recipient computer, ensuring that the recipient computer is available to receive the encrypted symmetric encryption data.
63. The method of claim 58 including ensuring that a person is at the recipient computer before sending the encrypted symmetric encryption data to the recipient computer.
64. The method of claim 63 including ensuring that the person is authorized to receive the information.
65. The method of claim 58 wherein the information is not sent to the computer system.
66. The method of claim 58 wherein the asymmetiic encryption data is RSA or Diffie-Hellman based.
67. The method of claim 58 wherein the symmetric encryption data is DES, IDEA, or Triple-DES based.
68. A method in a sender computer for transmitting information to a recipient computer, the method comprising: sending to a server computer a symmetiic key that has been encrypted using an asymmetric key of the recipient computer; receiving from the server computer an indication that the recipient computer has received the symmetric key; and sending to the recipient computer the information encrypted using the symmetric key.
69. The method of claim 68 including before sending to the server computer the symmetric key, receiving from the server computer the asymmetiic key of the recipient computer.
70. The method of claim 69 including before receiving the asymmetiic key sending to the server computer a request to tiansmit information to the recipient computer.
71. The method of claim 68 wherein the symmetric key that is encrypted using an asymmetric key of the recipient computer is further encrypted using an asymmetric key of the server computer.
72. The method of claim 68 including before sending the symmetric key to the server computer, registering with the server computer.
73. The method of claim 68 wherein a different symmetric key is used for each transmission to the recipient computer.
74. The method of claim 68 wherein the asymmetiic key is RSA or Diffie-Hellman based.
75. The method of claim 68 wherein the symmetric key is DES, IDEA, or Triple-DES based.
76. A method in a recipient computer for receiving information from a sender computer, the method comprising: receiving from a server computer a symmetric key encrypted using an asymmetiic key of the recipient computer; decrypting the symmetiic key using an asymmetric key of the recipient computer; notifying the server computer that the symmetric key has been received; and after notifying the server, receiving from the sender computer information encrypted using the symmetric key; and decrypting the received information using the decrypted symmetiic key.
77. The method of claim 76 wherein the symmetric key is encrypted by the sender computer.
78. The method of claim 76 including receiving a different symmetric key encrypted with the asymmetric key for each request received by the server computer to transmit information to the recipient computer.
79. The method of claim 76 including receiving from the server computer an indication of the sender computer that is to send the information encrypted with the received symmetric key.
80. The method of claim 76 wherein the asymmetiic key is RSA or Diffie-Hellman based.
81. The method of claim 76 wherein the symmetiic key is DES, IDEA, or Triple-DES based.
82. A computer-readable medium containing instructions for controlling a computer system to coordinate tiansmitting of information from a sender computer to a recipient computer, the sender computer and recipient computer being client computers, by a method comprising: receiving a public key for the recipient computer; sending the received public key to the sender computer; receiving from the sender computer a symmetric key encrypted using the public key sent to the sender computer; and sending the received symmetric key to the recipient computer.
83. The computer-readable medium of claim 82 wherein the sender computer encrypts the information using the symmetric key and sends the encrypted information to the recipient computer.
84. The computer-readable medium of claim 83 wherein the recipient computer decrypts the sent symmetric key using its private key, receives the encrypted information, and decrypts the received encrypted information using the decrypted symmetiic key.
85. The computer-readable medium of claim 82 including includes receiving from each client computer a public key for that client computer.
86. The computer-readable medium of claim 82 including before sending the encrypted symmetric key to the recipient computer, ensuring that the recipient computer is available to receive the encrypted symmetric key.
87. The computer-readable medium of claim 82 including ensuring that a person is at the recipient computer before sending the encrypted symmetric key to the recipient computer.
88. The computer-readable medium of claim 87 including ensuring that the person is authorized to receive the information.
89. The computer-readable medium of claim 82 wherein the information is not sent to the computer system.
90. The computer-readable medium of claim 82 wherein the public key is RSA or Diffie-Hellman based.
91. The computer-readable medium of claim 82 wherein the symmetiic key is DES, IDEA, or Triple-DES based.
92. A computer-readable medium containing instructions for contiolling a sender computer to transmit information to a recipient computer, by a method comprising: sending to a server computer a symmetric key that has been encrypted using a public key of the recipient computer; receiving from the server computer an indication that the recipient computer has received the symmetric key; and sending to the recipient computer the information encrypted using the symmetric key.
93. The computer-readable medium of claim 92 including before sending to the server computer the symmetiic key, receiving from the server computer the public key of the recipient computer.
94. The computer-readable medium of claim 93 including before receiving the public key sending to the server computer a request to tiansmit information to the recipient computer.
95. The computer-readable medium of claim 92 wherein the symmetric key that is encrypted using the public key of the recipient computer is further encrypted using a public key of the server computer.
1 96. The computer-readable medium of claim 92 including
2 before sending the symmetric key to the server computer, registering with the
3 server computer.
i
97. The computer-readable medium of claim 92 wherein a
2 different symmetiic key is used for each tiansmission to the recipient
3 computer.
i
98. The computer-readable medium of claim 92 wherein the
2 public key is RSA or Diffie-Hellman based.
i
99. The computer-readable medium of claim 92 wherein the symmetric key is DES, IDEA, or Triple-DES based.
1 100. A computer-readable medium containing instructions for controlling a recipient computer to receive information from a sender
3 computer, by a method comprising: receiving from a server computer a symmetric key encrypted
5 using an public key of the recipient computer; decrypting the symmetric key using a private key of the recipient computer;
8 receiving from the sender computer information encrypted
9 using the symmetric key; and decrypting the received information using the decrypted i symmetric key.
1 101. The computer-readable medium of claim 100 wherein
2 the symmetric key is encrypted by the sender computer.
102. The computer-readable medium of claim 100 including receiving a different symmetric key encrypted with the public key for each transmission by the server computer to the recipient computer.
103. The computer-readable medium of claim 100 including receiving from the server computer an indication of the sender computer that is to send the information encrypted with the received symmetiic key.
104. The computer-readable medium of claim 100 wherein the public key is RSA or Diffie Hellman based.
105. The computer-readable medium of claim 100 wherein the symmetric key is DES, IDEA, or Triple-DES based.
106. A server computer for coordinating tiansmission of information from a sender computer to a recipient computer, comprising: means for receiving a public key for the recipient computer; means for sending the received public key to the sender computer; means for receiving from the sender computer a symmetric key using the public key sent to the sender computer; and means for sending the received symmetric key to the recipient computer.
107. The server computer of claim 106 including means for registering client computers.
108. The server computer of claim 107 wherein the means for registering computer uses temporary asymmetric keys to transmit permanent asymmetric keys.
109. A server computer for registering public keys, comprising: means for generating a temporary server public and private key pair; means for sending the temporary server public key to a client computer; means for receiving from the client computer a client public key encrypted with the temporary server public key; and means for decrypting the received client public key using the temporary server private key.
110. A computer system for coordinating secure transmission of information between client computers, comprising: a component for establishing a different asymmetiic encryption mechanism for communication between the computer system and each client computer; and a component that receives a request to transmit information between requested client computers; a component that, for each requested client computer, encrypts a symmetric key with the asymmetiic encryption mechanism of that client computer and sends the encrypted symmetric key to that client computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001250824A AU2001250824A1 (en) | 2000-03-10 | 2001-03-12 | Method and system for coordinating secure transmission of information |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18865700P | 2000-03-10 | 2000-03-10 | |
US60/188,657 | 2000-03-10 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001069843A2 true WO2001069843A2 (en) | 2001-09-20 |
WO2001069843A3 WO2001069843A3 (en) | 2003-11-06 |
Family
ID=22694039
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/007767 WO2001069843A2 (en) | 2000-03-10 | 2001-03-12 | Method and system for coordinating secure transmission of information |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2001250824A1 (en) |
WO (1) | WO2001069843A2 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2016701A1 (en) * | 2006-04-25 | 2009-01-21 | Stephen Laurence Boren | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks |
EP2120389A1 (en) * | 2007-03-21 | 2009-11-18 | Huawei Technologies Co., Ltd. | A method, system and communication device for generating session cryptographic |
US8478995B2 (en) | 2004-05-24 | 2013-07-02 | Litera Corp. | Method of encrypting and transferring data between a sender and a receiver using a network |
WO2015026336A1 (en) * | 2013-08-21 | 2015-02-26 | Intel Corporation | Processing data privately in the cloud |
US9497172B2 (en) | 2005-05-23 | 2016-11-15 | Litera Corp. | Method of encrypting and transferring data between a sender and a receiver using a network |
EP3214825A3 (en) * | 2016-03-01 | 2017-09-20 | Cay Jeglinski | Application management system |
CN111953582A (en) * | 2020-08-10 | 2020-11-17 | 四川阵风科技有限公司 | Encryption instant messaging method and system based on hardware device |
US11080694B2 (en) | 2018-11-27 | 2021-08-03 | Advanced New Technologies Co., Ltd. | System and method for information protection |
US11102184B2 (en) | 2018-11-27 | 2021-08-24 | Advanced New Technologies Co., Ltd. | System and method for information protection |
US11144918B2 (en) | 2018-08-06 | 2021-10-12 | Advanced New Technologies Co., Ltd. | Method, apparatus and electronic device for blockchain transactions |
US11218455B2 (en) | 2018-11-27 | 2022-01-04 | Advanced New Technologies Co., Ltd. | System and method for information protection |
US11282325B2 (en) | 2018-11-27 | 2022-03-22 | Advanced New Technologies Co., Ltd. | System and method for information protection |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5124117A (en) * | 1989-08-07 | 1992-06-23 | Matsushita Electric Industrial Co., Ltd. | Cryptographic key distribution method and system |
US5850444A (en) * | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
WO2001030016A2 (en) * | 1999-10-01 | 2001-04-26 | Ecomxml Inc. | A method for non-repudiation using a trusted third party |
-
2001
- 2001-03-12 WO PCT/US2001/007767 patent/WO2001069843A2/en active Application Filing
- 2001-03-12 AU AU2001250824A patent/AU2001250824A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5124117A (en) * | 1989-08-07 | 1992-06-23 | Matsushita Electric Industrial Co., Ltd. | Cryptographic key distribution method and system |
US5850444A (en) * | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
WO2001030016A2 (en) * | 1999-10-01 | 2001-04-26 | Ecomxml Inc. | A method for non-repudiation using a trusted third party |
Non-Patent Citations (2)
Title |
---|
LEIGHTON T ET AL: "SECRET-KEY AGREEMENT WITHOUT PUBLIC-KEY CRYPTOGRAPHY (EXTENDED ABSTRACT)" ADVANCES IN CRYPTOLOGY (CRYPTO). SANTA BARBARA, AUG. 22 - 26, 1993, PROCEEDINGS OF THE ANNUAL INTERNATIONAL CRYPTOLOGY CONFERENCE (CRYPTO), BERLIN, SPRINGER, DE, vol. CONF. 13, 22 August 1993 (1993-08-22), pages 456-479, XP000502371 ISBN: 3-540-57766-1 * |
MENEZES, VAN OORSCHOT, VANSTONE: "Handbook of applied cryptography" , CRC PRESS , BOCA RATON XP002252577 page 546, line 14 -page 547, line 16; figure 13.1 page 550, line 39 - last line * |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8478995B2 (en) | 2004-05-24 | 2013-07-02 | Litera Corp. | Method of encrypting and transferring data between a sender and a receiver using a network |
US9497172B2 (en) | 2005-05-23 | 2016-11-15 | Litera Corp. | Method of encrypting and transferring data between a sender and a receiver using a network |
EP2016701A1 (en) * | 2006-04-25 | 2009-01-21 | Stephen Laurence Boren | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks |
EP2016701A4 (en) * | 2006-04-25 | 2012-04-25 | Stephen Laurence Boren | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks |
US9166782B2 (en) | 2006-04-25 | 2015-10-20 | Stephen Laurence Boren | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks |
EP2120389A1 (en) * | 2007-03-21 | 2009-11-18 | Huawei Technologies Co., Ltd. | A method, system and communication device for generating session cryptographic |
EP2120389A4 (en) * | 2007-03-21 | 2010-07-21 | Huawei Tech Co Ltd | A method, system and communication device for generating session cryptographic |
WO2015026336A1 (en) * | 2013-08-21 | 2015-02-26 | Intel Corporation | Processing data privately in the cloud |
US9521126B2 (en) | 2013-08-21 | 2016-12-13 | Intel Corporation | Processing data privately in the cloud |
US10057263B2 (en) | 2016-03-01 | 2018-08-21 | Cay JEGLINSKI | Application management system |
EP3214825A3 (en) * | 2016-03-01 | 2017-09-20 | Cay Jeglinski | Application management system |
US11144918B2 (en) | 2018-08-06 | 2021-10-12 | Advanced New Technologies Co., Ltd. | Method, apparatus and electronic device for blockchain transactions |
US11295303B2 (en) | 2018-08-06 | 2022-04-05 | Advanced New Technologies Co., Ltd. | Method, apparatus and electronic device for blockchain transactions |
US11080694B2 (en) | 2018-11-27 | 2021-08-03 | Advanced New Technologies Co., Ltd. | System and method for information protection |
US11102184B2 (en) | 2018-11-27 | 2021-08-24 | Advanced New Technologies Co., Ltd. | System and method for information protection |
US11127002B2 (en) | 2018-11-27 | 2021-09-21 | Advanced New Technologies Co., Ltd. | System and method for information protection |
US11218455B2 (en) | 2018-11-27 | 2022-01-04 | Advanced New Technologies Co., Ltd. | System and method for information protection |
US11277389B2 (en) | 2018-11-27 | 2022-03-15 | Advanced New Technologies Co., Ltd. | System and method for information protection |
US11282325B2 (en) | 2018-11-27 | 2022-03-22 | Advanced New Technologies Co., Ltd. | System and method for information protection |
CN111953582A (en) * | 2020-08-10 | 2020-11-17 | 四川阵风科技有限公司 | Encryption instant messaging method and system based on hardware device |
Also Published As
Publication number | Publication date |
---|---|
WO2001069843A3 (en) | 2003-11-06 |
AU2001250824A1 (en) | 2001-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6826686B1 (en) | Method and apparatus for secure password transmission and password changes | |
KR100734162B1 (en) | Method and apparatus for secure distribution of public/private key pairs | |
US5748735A (en) | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography | |
US5509071A (en) | Electronic proof of receipt | |
US6904521B1 (en) | Non-repudiation of e-mail messages | |
US6292895B1 (en) | Public key cryptosystem with roaming user capability | |
Haller et al. | On internet authentication | |
US7688975B2 (en) | Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure | |
US7073066B1 (en) | Offloading cryptographic processing from an access point to an access point server using Otway-Rees key distribution | |
US20080285756A1 (en) | Random shared key | |
JPH07245605A (en) | Ciphering information repeater, subscriber terminal equipment connecting thereto and ciphering communication method | |
EP1282261A2 (en) | Method and system for the secure transfer of cryptographic keys via a network | |
US7660987B2 (en) | Method of establishing a secure e-mail transmission link | |
JPH07325785A (en) | Network user identifying method, ciphering communication method, application client and server | |
US20020018570A1 (en) | System and method for secure comparison of a common secret of communicating devices | |
WO2001069843A2 (en) | Method and system for coordinating secure transmission of information | |
JPH11298470A (en) | Key distribution method and system | |
US20030223586A1 (en) | Method and system for secure communications over a communications network | |
KR20040007417A (en) | Transaction certification | |
JP2001285286A (en) | Authentication method, recording medium, authentication system, terminal, and device for generating recording medium for authentication | |
Yeh et al. | Password-based user authentication and key distribution protocols for client–server applications | |
JP2000261428A (en) | Authentication device in decentralized processing system | |
US11736462B1 (en) | Hybrid content protection architecture for email | |
JPH09130376A (en) | User password authentication method | |
CN117155717B (en) | Authentication method based on identification password, and cross-network and cross-domain data exchange method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase in: |
Ref country code: JP |