[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2004054189A1 - Method and system for secure transmission of e-mail - Google Patents

Method and system for secure transmission of e-mail Download PDF

Info

Publication number
WO2004054189A1
WO2004054189A1 PCT/IB2003/005864 IB0305864W WO2004054189A1 WO 2004054189 A1 WO2004054189 A1 WO 2004054189A1 IB 0305864 W IB0305864 W IB 0305864W WO 2004054189 A1 WO2004054189 A1 WO 2004054189A1
Authority
WO
WIPO (PCT)
Prior art keywords
recipient
mail
message
server
securely
Prior art date
Application number
PCT/IB2003/005864
Other languages
French (fr)
Inventor
Troy Michael Ferraris
Original Assignee
Hunt, Derek, Hugh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunt, Derek, Hugh filed Critical Hunt, Derek, Hugh
Priority to AU2003285609A priority Critical patent/AU2003285609A1/en
Publication of WO2004054189A1 publication Critical patent/WO2004054189A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/08Annexed information, e.g. attachments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/216Handling conversation history, e.g. grouping of messages in sessions or threads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/56Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications

Definitions

  • THIS invention relates to a method of transmitting an e-mail message securely from a sender to a recipient, and to a system for implementing the method.
  • a method of transmitting an e- mail message securely from a sender to a recipient comprising:
  • a slave server receiving an e-mail message from the sender, extracting message identification data therefrom, transmitting the message identification data securely to a master server, encrypting the message, and transmitting the encrypted message to the recipient;
  • a master server receiving and storing the message identification data from the slave server, receiving a key request transmitted securely by the recipient of the encrypted message, authenticating the recipient, and transmitting a key securely to the authenticated recipient to permit the recipient to decrypt the encrypted message.
  • the step of authenticating the recipient may include registering the recipient on a database associated with the master server.
  • the registration of the recipient preferably includes recording a password selected by the recipient for use by the recipient in the authentication process.
  • secure transmissions of data between the slave server and the master server, and the recipient and the master server utilise an existing secure communications technology, such as the secure sockets layer (SSL) in existing software.
  • SSL secure sockets layer
  • an e-mail system for transmitting an e-mail message securely from a sender to a recipient, the system comprising: a master server; and
  • the slave server being connectable securely to the master server and operable to receive an e-mail message from the sender, to extract message identification data therefrom, to transmit the message identification data securely to the master server, to encrypt the e-mail message, and to transmit the encrypted message to the recipient; the master server being contactable securely by the recipient of the encrypted message to receive authentication data from the recipient, to authenticate the recipient, and to transmit a key to the recipient to permit the encryption of the encrypted message.
  • the master server may be located at a site remote from both the sender and the recipient.
  • the slave server is located at the same site as the sender.
  • the slave server may be a dedicated secure mail server, or may comprise an existing mail server running suitable secure mail software.
  • Figure 1 is a simplified schematic diagram showing a system for transmitting e-mail messages securely according to the invention.
  • FIG. 2 is a simplified flow diagram illustrating major steps in the method of the invention. DESCRIPTION OF AN EMBODIMENT
  • Figure 1 shows an example of a system for sending e-mail messages securely from a sender 10 to a recipient 12.
  • the sender and the recipient will be firms or companies each operating a network comprising a conventional mail server and several work stations.
  • a conventional mail server 14 is provided, to which are connected a number of work stations 16, which will typically be conventional PC's or laptop/notebook computers.
  • a secure slave mail server 18 of the invention is provided.
  • the slave server 18 can communicate with the conventional mail server 14, as indicated by the connection 20, and also with any of the work stations 16 as indicated by the connection 22.
  • Each work station as usual, communicates with the conventional mail server 14 as indicated by the connections 24.
  • a similar system comprising a conventional non-secure mail server 114 and a number of work stations 116.
  • Each of the work stations 116 can communicate with the mail server 114 via a respective connection 124.
  • a secure master e-mail server 26 Located remotely from both the sender and the recipient 12 is a secure master e-mail server 26, which can be accessed via the Internet and which typically comprises a server and associated database hosted on the Internet by an authorised service provider.
  • the slave server 18 functions as a secure SMTP (simple mail transport protocol) relay, which can be a stand-alone server, or which can effectively comprise software installed on an existing server at the customer's premises.
  • SMTP simple mail transport protocol
  • e-mail is sent by an SMTP server, which can either be at the user's premises, or be hosted by an Internet service provider (ISP) using a dial-up connection.
  • ISP Internet service provider
  • E-mail software on the client's work stations is set up by creating a mail account in which the SMTP address of the relevant mail server is configured. When sending e-mail, this account is used and e-mail is directed from the work station to the selected SMTP server, which in turn dispatches the e-mail to the intended recipient.
  • the slave server (whether a stand-alone server or an existing server with suitable software installed on it) is configured with the current SMTP settings.
  • a new, secure second mail account is created, pointing to the slave server as the SMTP server, with all other settings remaining the same as in the existing account.
  • a user simply sends the e-mail via the newly created secure account and the e-mail is directed to the slave server, rather than to the existing non-secure mail server.
  • This information is stored in a database associated with the master server.
  • the secure e-mail is transmitted to the recipient in the same way as a non- secure e-mail, that is, from the mail server 14 of the sender to the mail server 114 of the recipient, via a connection indicated at 28, typically via the Internet.
  • This encrypted, secure e-mail is received by the recipient's mail server 114 and sent on to the work station of the addressed recipient.
  • the secure e-mail includes a component which contains instructions to the recipient for opening the secure portion of the e-mail, and a link to the master server to allow the recipient to register if the recipient is not already registered.
  • the user double clicks on the secure e-mail attachment, launching a free viewer and prompting the recipient to provide an e-mail address and a password.
  • the recipient connects via his/her work station 116 to the master server 26 and, if necessary, performs a registration process, supplying personal identification details and a unique password. Assuming that the recipient is already registered on the database of the master server, the recipient provides his/her e-mail address and secret password. This process is carried out securely, for example, using the secure sockets layer (SSL) in Internet explorer or other Web browser software.
  • SSL secure sockets layer
  • the master server authenticates the recipient by checking the supplied e-mail address and password for validity. Additionally, the master server verifies, by comparing the message identification data with the supplied e-mail address, that the secure e-mail in question was intended for that recipient. If the authentication process is successful, the master server transmits a decryption key securely to the recipient at the relevant work station 116, allowing the secure e-mail to be opened and displayed by the viewer sent with the secure e-mail. The key is used automatically by the viewer and is not displayed to the recipient.
  • the record for the secure e-mail in question is tagged. After three unsuccessful attempts at accessing the secure e-mail, it is destroyed. All steps of the above described process are logged and reported back to the sender via the slave server.
  • the e-mail viewer provided with the secure e-mail message will contain one or more banners or other forms of advertising. It is proposed that recipients of the secure e-mail messages not be charged for the secure e-mail service, and it will be appreciated that only conventional software and equipment is required by the recipient in order to access the secure e-mail system of the invention.
  • the sender at whose premises the slave server 18 is installed, will receive monthly detailed billing, with each billed item including the sender, receiver, e-mail subject, date/time sent and date/time received. It is envisaged that the sender would be billed according to the number of secure e-mail messages sent.
  • the database associated with the master server 26 will typically have the following structure: Table: Transactions This table stores all transactions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A method of transmitting an e-mail message securely from a sender to a recipient comprises providing a slave server at the sender's site. The slave server receives an e-mail message from the sender and extracts message identification data from it, which is transmitted securely to a master server. The slave server encrypts the message and transmits it to the recipient. The master server receives and stores the message identification data from the slave server. The recipient of the encrypted message sends a key request securely to the master server, which authenticates the recipient and transmits a key securely to the authenticated recipient to permit the recipient to decrypt the encrypted message. The invention includes a system for implementing the method.

Description

Method and System for Secure Transmission of E-Mail
BACKGROUND OF THE INVENTION
THIS invention relates to a method of transmitting an e-mail message securely from a sender to a recipient, and to a system for implementing the method.
Conventional e-mail is notoriously insecure. Two security options are presently available. Firstly, the sender of an e-mail message can request a receipt notification. However, this can be cancelled by the recipient of the message, and even if a receipt notification is received, the sender cannot be certain that the message was received by the intended recipient. Secondly, the sender can digitally sign the e-mail using a public/private key system. This arrangement guarantees authenticity of the document and author, but does not prevent unauthorised viewing of the message.
Encryption systems requiring a unique key for decryption of a message, which must be sent to the recipient separately from the main, encrypted message, are cumbersome and inconvenient to use.
It is an object of the invention to provide an alternative method and system for transmitting e-mail messages securely. SUMMARY OF THE INVENTION
According to the invention there is provided a method of transmitting an e- mail message securely from a sender to a recipient, the method comprising:
at a slave server, receiving an e-mail message from the sender, extracting message identification data therefrom, transmitting the message identification data securely to a master server, encrypting the message, and transmitting the encrypted message to the recipient;
at a master server, receiving and storing the message identification data from the slave server, receiving a key request transmitted securely by the recipient of the encrypted message, authenticating the recipient, and transmitting a key securely to the authenticated recipient to permit the recipient to decrypt the encrypted message.
The step of authenticating the recipient may include registering the recipient on a database associated with the master server.
The registration of the recipient preferably includes recording a password selected by the recipient for use by the recipient in the authentication process.
Preferably, secure transmissions of data between the slave server and the master server, and the recipient and the master server, utilise an existing secure communications technology, such as the secure sockets layer (SSL) in existing software.
Further to the invention there is provided an e-mail system for transmitting an e-mail message securely from a sender to a recipient, the system comprising: a master server; and
at least one slave server,
the slave server being connectable securely to the master server and operable to receive an e-mail message from the sender, to extract message identification data therefrom, to transmit the message identification data securely to the master server, to encrypt the e-mail message, and to transmit the encrypted message to the recipient; the master server being contactable securely by the recipient of the encrypted message to receive authentication data from the recipient, to authenticate the recipient, and to transmit a key to the recipient to permit the encryption of the encrypted message.
The master server may be located at a site remote from both the sender and the recipient. Preferably, the slave server is located at the same site as the sender.
The slave server may be a dedicated secure mail server, or may comprise an existing mail server running suitable secure mail software.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a simplified schematic diagram showing a system for transmitting e-mail messages securely according to the invention; and
Figure 2 is a simplified flow diagram illustrating major steps in the method of the invention. DESCRIPTION OF AN EMBODIMENT
Figure 1 shows an example of a system for sending e-mail messages securely from a sender 10 to a recipient 12. In most cases, but not necessarily, the sender and the recipient will be firms or companies each operating a network comprising a conventional mail server and several work stations.
At the premises of the sender 10, a conventional mail server 14 is provided, to which are connected a number of work stations 16, which will typically be conventional PC's or laptop/notebook computers. In addition to the conventional mail server 14, a secure slave mail server 18 of the invention is provided. The slave server 18 can communicate with the conventional mail server 14, as indicated by the connection 20, and also with any of the work stations 16 as indicated by the connection 22. Each work station, as usual, communicates with the conventional mail server 14 as indicated by the connections 24.
At the premises of the recipient 12 a similar system is provided, comprising a conventional non-secure mail server 114 and a number of work stations 116. Each of the work stations 116 can communicate with the mail server 114 via a respective connection 124.
Located remotely from both the sender and the recipient 12 is a secure master e-mail server 26, which can be accessed via the Internet and which typically comprises a server and associated database hosted on the Internet by an authorised service provider.
The slave server 18 functions as a secure SMTP (simple mail transport protocol) relay, which can be a stand-alone server, or which can effectively comprise software installed on an existing server at the customer's premises. Conventionally, e-mail is sent by an SMTP server, which can either be at the user's premises, or be hosted by an Internet service provider (ISP) using a dial-up connection. E-mail software on the client's work stations is set up by creating a mail account in which the SMTP address of the relevant mail server is configured. When sending e-mail, this account is used and e-mail is directed from the work station to the selected SMTP server, which in turn dispatches the e-mail to the intended recipient.
In order to use the system of the invention, the slave server (whether a stand-alone server or an existing server with suitable software installed on it) is configured with the current SMTP settings. On each client work station 16 a new, secure second mail account is created, pointing to the slave server as the SMTP server, with all other settings remaining the same as in the existing account. To send a secure e-mail, a user simply sends the e-mail via the newly created secure account and the e-mail is directed to the slave server, rather than to the existing non-secure mail server.
When such an e-mail is received by the slave server, it:
1. Detaches all attachments.
2. Saves the content of the e-mail body.
3. Merges and compresses of the above files into a single compressed file (similar to a "zip" file)
4. Creates a random 128 Character key and encrypts the files using Blowfish encryption.
5. Creates a new "secure e-mail" message with the encrypted file attached. The body of the e-mail message contains instructions on how to open the attached encrypted file and a link to the master server (for new users). 6. Sends a secure information packet to the master server containing the following information extracted from the original e-mail:
1. Sender e-mail address
2. Receiver e-mail address
3. E-mail Subject
4. Key generated in step 4
5. Unique e-mail ID
This information is stored in a database associated with the master server.
The secure e-mail is transmitted to the recipient in the same way as a non- secure e-mail, that is, from the mail server 14 of the sender to the mail server 114 of the recipient, via a connection indicated at 28, typically via the Internet. This encrypted, secure e-mail is received by the recipient's mail server 114 and sent on to the work station of the addressed recipient. The secure e-mail includes a component which contains instructions to the recipient for opening the secure portion of the e-mail, and a link to the master server to allow the recipient to register if the recipient is not already registered. The user double clicks on the secure e-mail attachment, launching a free viewer and prompting the recipient to provide an e-mail address and a password.
The recipient connects via his/her work station 116 to the master server 26 and, if necessary, performs a registration process, supplying personal identification details and a unique password. Assuming that the recipient is already registered on the database of the master server, the recipient provides his/her e-mail address and secret password. This process is carried out securely, for example, using the secure sockets layer (SSL) in Internet explorer or other Web browser software.
Having received the recipient's e-mail address and password, the master server authenticates the recipient by checking the supplied e-mail address and password for validity. Additionally, the master server verifies, by comparing the message identification data with the supplied e-mail address, that the secure e-mail in question was intended for that recipient. If the authentication process is successful, the master server transmits a decryption key securely to the recipient at the relevant work station 116, allowing the secure e-mail to be opened and displayed by the viewer sent with the secure e-mail. The key is used automatically by the viewer and is not displayed to the recipient.
If the authentication process fails, the record for the secure e-mail in question is tagged. After three unsuccessful attempts at accessing the secure e-mail, it is destroyed. All steps of the above described process are logged and reported back to the sender via the slave server.
It is envisaged that the e-mail viewer provided with the secure e-mail message will contain one or more banners or other forms of advertising. It is proposed that recipients of the secure e-mail messages not be charged for the secure e-mail service, and it will be appreciated that only conventional software and equipment is required by the recipient in order to access the secure e-mail system of the invention.
The sender, at whose premises the slave server 18 is installed, will receive monthly detailed billing, with each billed item including the sender, receiver, e-mail subject, date/time sent and date/time received. It is envisaged that the sender would be billed according to the number of secure e-mail messages sent.
The simplified flow diagram of Figure 2 summarises the major steps of the above described method.
The database associated with the master server 26 will typically have the following structure: Table: Transactions This table stores all transactions
Fields: Date_Sent Date e-mail was sent
Date_Actioned Date destroyed, timed out or received
Status e.g. received
Count number of tries used to view
Sender Sender's e-mail address
Reciever recipient's e-mail address e-maillD unique ID of e-mail
Subject Subject of original e-mail
Key unlock key
SlavelD unique ID of slave to determine customer
Billed indicator for billing action
Recipients This table stores all registered receivers
Fields: E-mail e-mail address
Password password min 8 char
Name name
Surname surname
Etc... additional customer information
Table: Slaves This table stores all master accounts
Fields: SlavelD unique ID of slave Status active or locked (for nonpayment)
Company name of registered company Etc... additional customer information... It will be appreciated that the described method and system allow a company or individual wishing to transmit e-mail messages securely to do so without requiring the intended recipients of such messages to install special hardware or software at their own premises. The described system is relatively easy to install and users can easily select between the options of sending conventional, non-secure e-mails and secure e-mails using the system of the invention.
It will also be understood by those skilled in the art that the specific embodiment of the invention described above is purely exemplary, and that other encryption techniques and procedures could be used instead, within the ambit of the inventive concept.

Claims

1. A method of transmitting an e-mail message securely from a sender to a recipient, the method comprising:
at a slave server, receiving an e-mail message from the sender, extracting message identification data therefrom, transmitting the message identification data securely to a master server, encrypting the message, and transmitting the encrypted message to the recipient;
at a master server, receiving and storing the message identification data from the slave server, receiving a key request transmitted securely by the recipient of the encrypted message, authenticating the recipient, and transmitting a key securely to the authenticated recipient to permit the recipient to decrypt the encrypted message.
2. A method according to claim 1 wherein the step of authenticating the recipient includes registering the recipient on a database associated with the master server.
3. A method according to claim 2 wherein the registration of the recipient includes recording a password selected by the recipient for use by the recipient in the authentication process.
4. A method according to any one of claims 1 to 3 wherein secure transmissions of data between the slave server and the master server, and the recipient and the master server, utilise an existing secure communications technology.
5. A method according to any one of claims 1 to 4 wherein the message identification data extracted from the e-mail message and sent to the master server comprises the sender's e-mail address, the receiver's e-mail address, the e-mail subject, a key for decryption of the encrypted message, and a unique identification code.
6. A method according to any one of claims 1 to 5 wherein the encrypted message sent to the recipient is sent as a compressed, encrypted file attached to an e-mail message comprising instructions on how to open the encrypted file and a link to the master server.
7. A system for transmitting an e-mail message securely from a sender to a recipient, the system comprising:
a master server; and
at least one slave server,
the slave server being connectable securely to the master server and operable to receive an e-mail message from the sender, to extract message identification data therefrom, to transmit the message identification data securely to the master server, to encrypt the e-mail message, and to transmit the encrypted message to the recipient; the master server being contactable securely by the recipient of the encrypted message to receive authentication data from the recipient, to authenticate the recipient, and to transmit a key to the recipient to permit the encryption of the encrypted message.
8. A system according to claim 7 wherein the master server is located at a site remote from both the sender and the recipient.
9. A system according to claim 7 or claim 8 wherein the slave server is located at the same site as the sender.
10. A system according to any one of claims 7 to 9 wherein he slave server is a dedicated secure mail server.
11. A system according to any one of claims 7 to 9 wherein the slave server comprises an existing mail server running suitable secure mail software.
PCT/IB2003/005864 2002-12-12 2003-12-11 Method and system for secure transmission of e-mail WO2004054189A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003285609A AU2003285609A1 (en) 2002-12-12 2003-12-11 Method and system for secure transmission of e-mail

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA200210082 2002-12-12
ZA2002/10082 2002-12-12

Publications (1)

Publication Number Publication Date
WO2004054189A1 true WO2004054189A1 (en) 2004-06-24

Family

ID=32509107

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2003/005864 WO2004054189A1 (en) 2002-12-12 2003-12-11 Method and system for secure transmission of e-mail

Country Status (2)

Country Link
AU (1) AU2003285609A1 (en)
WO (1) WO2004054189A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1892635A1 (en) 2006-08-04 2008-02-27 Research In Motion Limited Method and system for retrieving a document associated with a message received on a mobile device
EP2573986A1 (en) * 2011-09-20 2013-03-27 Daon Holdings Limited Methods and systems for increasing the security of electronic messages
EP2624188A1 (en) * 2012-01-31 2013-08-07 Daon Holdings Limited Methods and systems for increasing the security of electronic messages
CN103248650A (en) * 2012-02-09 2013-08-14 中兴通讯股份有限公司 Document download method and system
US8661558B2 (en) 2011-09-20 2014-02-25 Daon Holdings Limited Methods and systems for increasing the security of electronic messages

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001017165A2 (en) * 1999-08-31 2001-03-08 Tumbleweed Communications Corp. Solicited authentication of a specific user
WO2001052485A1 (en) * 2000-01-16 2001-07-19 Eluv Holdings Ltd. Method and system for delivering secure e-mail
WO2002017578A2 (en) * 2000-08-22 2002-02-28 Sun Microsystems, Inc. Method and device for secure e-mail
US20030046533A1 (en) * 2000-04-25 2003-03-06 Olkin Terry M. Secure E-mail system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001017165A2 (en) * 1999-08-31 2001-03-08 Tumbleweed Communications Corp. Solicited authentication of a specific user
WO2001052485A1 (en) * 2000-01-16 2001-07-19 Eluv Holdings Ltd. Method and system for delivering secure e-mail
US20030046533A1 (en) * 2000-04-25 2003-03-06 Olkin Terry M. Secure E-mail system
WO2002017578A2 (en) * 2000-08-22 2002-02-28 Sun Microsystems, Inc. Method and device for secure e-mail

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1892635A1 (en) 2006-08-04 2008-02-27 Research In Motion Limited Method and system for retrieving a document associated with a message received on a mobile device
EP2573986A1 (en) * 2011-09-20 2013-03-27 Daon Holdings Limited Methods and systems for increasing the security of electronic messages
US8661558B2 (en) 2011-09-20 2014-02-25 Daon Holdings Limited Methods and systems for increasing the security of electronic messages
US20140130186A1 (en) * 2011-09-20 2014-05-08 Neil Stephen Denis Johnston Methods and systems for increasing the security of electronic messages
US8769286B2 (en) 2011-09-20 2014-07-01 Daon Holdings Limited Methods and systems for increasing the security of electronic messages
US9230127B2 (en) 2011-09-20 2016-01-05 Daon Holdings Limited Methods and systems for increasing the security of electronic messages
EP2624188A1 (en) * 2012-01-31 2013-08-07 Daon Holdings Limited Methods and systems for increasing the security of electronic messages
CN103248650A (en) * 2012-02-09 2013-08-14 中兴通讯股份有限公司 Document download method and system
EP2814199A1 (en) * 2012-02-09 2014-12-17 ZTE Corporation Method and system for downloading file
EP2814199A4 (en) * 2012-02-09 2015-04-08 Zte Corp Method and system for downloading file

Also Published As

Publication number Publication date
AU2003285609A1 (en) 2004-06-30

Similar Documents

Publication Publication Date Title
US8266421B2 (en) Private electronic information exchange
US6904521B1 (en) Non-repudiation of e-mail messages
US7117370B2 (en) System for transmitting secure data between a sender and a recipient over a computer network using a virtual envelope and method for using the same
US7277549B2 (en) System for implementing business processes using key server events
CN101336437B (en) A communication system for providing the delivery of e-mail message
US7640427B2 (en) System and method for secure electronic communication in a partially keyless environment
US20080065878A1 (en) Method and system for encrypted message transmission
US20020007453A1 (en) Secured electronic mail system and method
US20040133774A1 (en) System and method for dynamic data security operations
US20070174636A1 (en) Methods, systems, and apparatus for encrypting e-mail
US20060053280A1 (en) Secure e-mail messaging system
CN1832477B (en) System and method for determining a correspondent and server having compatible secure e-mail technology
CA2511335A1 (en) System and method for secure and transparent electronic communication
WO2002005477A2 (en) Secure and reliable document delivery
CN102118381A (en) Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method
CN103428077B (en) A kind of method and system being safely receiving and sending mails
CA2638407A1 (en) Method and system for delivering secure messages to a computer desktop
JP2000196583A (en) Broadcast communication system
JP3711931B2 (en) E-mail system, processing method thereof, and program thereof
KR100326361B1 (en) Method for transmitting security e-mail using cipher and certification on internet web
WO2004054189A1 (en) Method and system for secure transmission of e-mail
CN111541603A (en) Independent intelligent safety mail terminal and encryption method
EP1122928B1 (en) A system and method for authentication of electronic messages sent to a network server
WO2000046952A1 (en) Method for sending secure email via standard browser
CA2390817A1 (en) Method for the moderately secure transmission of electronic mail

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2005/05602

Country of ref document: ZA

Ref document number: 200505602

Country of ref document: ZA

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP