[go: up one dir, main page]

CN1304610A - Security method and apparatus for a secure data transmission system - Google Patents

Security method and apparatus for a secure data transmission system Download PDF

Info

Publication number
CN1304610A
CN1304610A CN00800735.7A CN00800735A CN1304610A CN 1304610 A CN1304610 A CN 1304610A CN 00800735 A CN00800735 A CN 00800735A CN 1304610 A CN1304610 A CN 1304610A
Authority
CN
China
Prior art keywords
file
executable program
secure
program
received
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN00800735.7A
Other languages
Chinese (zh)
Inventor
亚历山大·V·什梅廖夫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MICROVAULT CORP
Original Assignee
MICROVAULT CORP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MICROVAULT CORP filed Critical MICROVAULT CORP
Publication of CN1304610A publication Critical patent/CN1304610A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
  • Communication Control (AREA)

Abstract

An apparatus and method for creating a secure file at a sending location using installed software. The secure file includes an executable program that is executed to decrypt the secure file when received and opened. A password or pass phrase may be included to prevent unauthorized access to the secure document. A secure reply option may be provided that, if selected, allows the received program to encrypt a reply and transmit the encrypted reply to the sending location. The installed software can then open the reply. In another embodiment, the executable program connects to a predetermined global computer network address, and provides the program to decrypt the secure message. In addition, the executable program and/or the program downloaded from the website can communicate with a second global computer network site that is commanded to make a specific selection action. The confirmation can be returned from the receiving location or from the second global computer network address to the sending location.

Description

用于保密数据传送系统的保密方法和设备Security method and apparatus for a secure data transfer system

本申请是申请号为60/125,437、申请日为1999年3月22日的临时专利申请的部分继续申请。This application is a continuation-in-part of Provisional Patent Application Serial No. 60/125,437, filed March 22, 1999.

                        本发明的背景技术Background technology of the present invention

1.本发明的领域1. Field of the invention

本发明涉及数据传送系统,尤其涉及传送保密文件的方法和设备,使得接收者不需要在接收端有特别的设备就能够检查文件并且提供保密响应。The present invention relates to a data transmission system, and more particularly to a method and device for transmitting a confidential document, enabling a recipient to check the document and provide a confidential response without having special equipment at the receiving end.

2.相关技术的描述2. Description of related technologies

大多数现有技术的保密数据系统要求在传送和接收端有特别的装置,以便恢复保密信息和提供保密应答。这种系统通常在消息的两端包括加密和解密装置。Most prior art secure data systems require special arrangements at the transmitting and receiving ends in order to recover secure information and provide secure responses. Such systems usually include encryption and decryption means at both ends of the message.

很清楚,发送者必须有将未加密电文转换为某些加密或编码格式的设备,该格式对于在接收端缺少兼容设备的人来说是难读的。由于在尝试获得保密通讯中有如此多的不同类型和风格的加密和编码,以及由于缺少单一的标准系统,因此,发送者和接收者具有兼容的加密系统的概率是很低的。Clearly, the sender must have the equipment to convert the unencrypted text into some encrypted or encoded format that is unreadable to someone who lacks compatible equipment on the receiving end. Because there are so many different types and styles of encryption and encoding in attempts to obtain secure communications, and because there is no single standard system, the probability that a sender and receiver will have compatible encryption systems is low.

互联网络(全球计算机网络)是一种用于信息交换的快速发展的媒体。虽然有许多信息是未定的值,但是作为一种电子商务载体的互联网络的使用意味着更加需要提供数据传输的保密性。The Internet (global computer network) is a rapidly developing medium for information exchange. Although much information is of undetermined value, the use of the Internet as a carrier of e-commerce means that there is a greater need to provide confidentiality for data transmission.

不同类型的数据传送表现出不同的风险和障碍并且要求适当地防止窜改、恶化、偷窃、非授权进入等等。许多对互联网络数据提供这种保密的软件和硬件产品要求在事务处理两端的用户(即发送者和接收者)具有相同的软件组成或至少一个高兼容装置。Different types of data transfer present different risks and obstacles and require adequate protection against tampering, corruption, theft, unauthorized access, etc. Many software and hardware products that provide such privacy to Internet data require users at both ends of the transaction (ie, sender and receiver) to have the same software components or at least one highly compatible device.

这种在数据交换的两端具有几乎相同软件的要求是很受限制的。想象涉及五个不同组织的各方的交换吧!这种要求可以(并且已经)用如来自Symantec的Norton Secret Stuff、来自PKWare的Zip和WinZip、来自VIAexpress的Universal Envelope以及来自本发明的受让人的Envelope98的产品进行处理。每个产品将要被传送的消息“打包”在一个“电子信封”里。这个“信封”包含所有的计算机代码和必需的逻辑,以在传送期间保护该消息并且在接收端提取它。This requirement to have nearly identical software at both ends of the data exchange is very restrictive. Imagine an exchange involving parties from five different organizations! This requirement can be (and has been) addressed with products such as Norton Secret Stuff from Symantec, Zip and WinZip from PKWare, Universal Envelope from VIAexpress, and Envelope98 from the assignee of the present invention. Each product "packages" the message to be delivered in an "electronic envelope". This "envelope" contains all the computer code and logic necessary to protect the message during transmission and extract it at the receiving end.

这种“信封”能够成功地保护发送的数据到达接收机。然而,在许多情况下,接收机可能希望(或被要求)应答,并且应答也必须在传送期间被保护。这样,问题又发生了。要求接收机安装和使用某种类型的密码软件或硬件来保护应答。This "envelope" successfully protects the transmitted data from reaching the receiver. In many cases, however, the receiver may wish (or be required) to acknowledge, and the acknowledgement must also be protected during transmission. In this way, the problem happened again. Receivers are required to install and use some type of cryptographic software or hardware to protect responses.

最重要的是,这个问题必须以一种简单使用的方式解决而且不能要求有过多的准备量(即创建和分配证书和公用密钥,维持鉴别链路和公用密钥环路)。一般地,在需要在两个实体(直接地或者经过专用的或公用的通讯系统)之间保密地和双向地传送数据的情况下,必须在两端安装相同的或高兼容性软件和/或硬件。每当一方希望与多方交换信息时就会出现困难。尽管这样,可能很难保证双方具有能够相互通讯的设备。Most importantly, this problem must be solved in a way that is simple to use and does not require an excessive amount of preparation (ie, creating and distributing certificates and public keys, maintaining authentication links and public key loops). Generally, where there is a need to transfer data securely and bi-directionally between two entities (directly or via a dedicated or public communication system), the same or highly compatible software and/or hardware. Difficulties arise whenever one party wishes to exchange information with multiple parties. Even so, it may be difficult to ensure that both parties have devices capable of communicating with each other.

有许多产品和技术可以解决这个问题。它们包括公知的PGP(“非常好的保密(pretty good privacy)”)、PEM、S/MIME以及SSL的技术。在每种情况下,系统不能交叉兼容(即,用PGP系统加密的消息不能用S/MIME来解密,反之也一样)。另外,这些系统的用户被迫进入一个系列复杂的操作来准备数据交换(即密钥产生、鉴别证书等)。一些系统要求可以信任的第三方参与来鉴别参加数据传送的各方的身份。There are many products and technologies that can solve this problem. They include the well-known technologies of PGP ("pretty good privacy"), PEM, S/MIME and SSL. In each case, the systems are not cross-compatible (ie, messages encrypted with the PGP system cannot be decrypted with S/MIME, and vice versa). In addition, users of these systems are forced to enter into a complex series of operations to prepare for data exchange (ie key generation, authentication certificates, etc.). Some systems require the participation of a trusted third party to authenticate the identities of the parties involved in the data transfer.

虽然现有的系统在某些情况下是有用的,但是它们的接收很慢并且由于高成本(在计算机资源和用户时间的形式上)和有限的交叉兼容性而受到限制。While existing systems are useful in certain situations, their adoption has been slow and limited due to high costs (in the form of computer resources and user time) and limited cross-compatibility.

例如,如果来自相同组织的两个用户希望使用PGP通信,他们将使用中心计算机(鉴别/密钥服务器)交换公用密钥。实质上,这种服务器将保证每个用户识别另一个用户以及给每个用户提供另一个用户的加密密钥。因为大多数组织将选择单个系统来使用保密信息交换(即PGP),现在用户可以容易地和保密地交换电子邮件。For example, if two users from the same organization wish to communicate using PGP, they will use a central computer (authentication/key server) to exchange public keys. Essentially, such a server would ensure that each user identifies the other user and provide each user with the other user's encryption key. Since most organizations will choose a single system to use for private message exchange (ie, PGP), users can now exchange e-mail easily and privately.

然而,如果两个用户来自不同的组织,则可能没有中心计算机用作“证书授权”。这样,用户必须亲自或通过邮件来交换密钥。他们也可以依靠可以信任的第三方提供这种服务。两个用户将仍然必须建立一个公共的标准,采用标准PGP、PEM、S/MIME等来加密他们的数据。一方或双方必须交换这种约定的标准。However, if the two users are from different organizations, there may not be a central computer to be used as a "certificate authority". Thus, users must exchange keys in person or by mail. They can also rely on trusted third parties to provide this service. Both users will still have to establish a common standard to encrypt their data using standard PGP, PEM, S/MIME, etc. One or both parties must exchange such agreed standards.

很明显,在这个过程中产生的额外开销使所需的交换极大的复杂化。如果交换在属于两个以上组织的两个以上用户之间进行,则复杂性的等级迅速增加。因此要求一种较简单的解决方案。Obviously, the extra overhead incurred in this process greatly complicates the required exchange. If the exchange is between two or more users belonging to two or more organizations, the level of complexity increases rapidly. A simpler solution is therefore required.

具有“电子信封”软件的两个用户可以交换信息而不用首先约定一个标准系统。然而,每个用户必须在他的计算机中安装某种形式的电子信封系统。甚至上面描述的“电子信封”系统也不能在多方之间双向传送数据,除非所有的“传送”方已经将相同的密码软件安装在他们的计算机上。Two users with "electronic envelope" software can exchange information without first agreeing to a standard system. However, each user must have some form of electronic envelope system installed in his computer. Even the "electronic envelope" system described above cannot transfer data in both directions between parties unless all "transmitting" parties have installed the same cryptographic software on their computers.

                   本发明的概述Summary of the invention

根据本发明,提供给用户经过包括电子邮件的专用和公用通讯网络发送“电子信封”的能力。发送的信息被防止在传输中非授权进入、恶化、窜改和偷窃,并且“电子信封”允许接收用户解密消息而不必安装任何密码软件或硬件。According to the present invention, users are provided with the ability to send "electronic envelopes" over private and public communication networks, including electronic mail. The information sent is protected from unauthorized access, deterioration, tampering and theft in transit, and the "electronic envelope" allows the receiving user to decrypt the message without having to install any cryptographic software or hardware.

本发明包括“保密应答”特性,它允许编码消息的接收者加密和返回一个消息给发送者,同样不需要安装任何密码软件。本发明给予接收者的应答与提供给发送者的原始加密相同级别的保护和保密。The present invention includes a "Secret Response" feature which allows the recipient of an encoded message to encrypt and return a message to the sender, again without requiring any cryptographic software to be installed. The present invention gives the recipient's reply the same level of protection and confidentiality as the original encryption provided to the sender.

本发明也较容易使用,只要求两个参与方通过任何可利用的通讯模式如电话会话、邮件、个人通讯或任何其它模式来交换密钥(称为“通行用语(passphrases)”)。密钥可以经常地改变,因此增强了保密性。The present invention is also relatively easy to use, requiring only that the two parties exchange keys (called "passphrases") through any available communication mode such as telephone conversations, mail, personal communication or any other mode. Keys can be changed frequently, thus enhancing security.

并不是要求所有交换信息的用户都安装本发明系统。例如,在服务销售商发送发票(经过电子邮件)给选择的客户的系统中,这些客户不需要安装任何密码软件。本发明提供所有必需的功能以允许支付的指令保密地返回给销售商。使用S/MIME或任何其它现有系统的相同系统将要求所有的用户与销售商交换密钥并且获得可兼容的软件。Not all users exchanging information are required to install the system of the present invention. For example, in a system where a service vendor sends invoices (via email) to selected customers, those customers do not need to install any cryptographic software. The present invention provides all the necessary functionality to allow instructions for payment to be returned securely to the vendor. The same system using S/MIME or any other existing system would require all users to exchange keys with the vendor and obtain compatible software.

可以想象来自不同公司的两个人,例如,Alice,在WidgetManufacturing Corporation(WMC)工作,和Bob,在Widget工厂所需部件的供应商WidgetBits,Inc.工作,需要进行加密通讯。Alice需要来自Bob的计划,以便在六个月内将Widget部件提供给WMC。It is conceivable that two people from different companies, for example, Alice, who works at Widget Manufacturing Corporation (WMC), and Bob, who works at WidgetBits, Inc., the supplier of components required by the Widget factory, need to communicate encrypted. Alice needs a plan from Bob to provide the Widget part to WMC within six months.

因为Widget的市场是这样一种竞争的环境,Alice和Bob都十分清楚地知道,如果他们的竞争对手获取Alice的请求信息或Bob的应答信息,则对于他们各自的商业利益可能有损害。因此,他们应使用本发明的系统来处理他们的商务。Because the Widget market is such a competitive environment, both Alice and Bob know very well that if their competitors obtain Alice's request information or Bob's response information, it may be harmful to their respective business interests. Therefore, they should use the system of the present invention to conduct their business.

Alice使用任何文字处理器开始创建“计划请求”(RFP)文件。随后她使用本发明来加密她的文件,将它“打包”在自解密“信封”中。她也将一种特性给予Bob,使他有能力来加密他的应答。最后,她使用任何她选择的手段来发送这个“信封”给Bob,仅举几个例子,这些手段有电子邮件、文件传输或复制文件到盘中并且将它邮寄。Alice starts creating a Request for Planning (RFP) document using any word processor. She then uses the invention to encrypt her file, "packaging" it in a self-decrypting "envelope". She also gives Bob a property that gives him the ability to encrypt his responses. Finally, she sends this "envelope" to Bob using whatever means she chooses, e-mail, file transfer, or copying the file to disk and mailing it, to name a few.

继续类似“信封”的讨论,当Bob接收到加密消息(“信封”)时,他使用先前接收的“通行短语”打开。然后该文件被解密。Bob确信在文件传输时没有人看到它并且没有被以任何方式损坏或修改。Continuing with the similar "envelope" discussion, when Bob receives an encrypted message ("envelope"), he opens it using a previously received "passphrase". The file is then decrypted. Bob is sure that no one saw the file while it was being transferred and that it was not corrupted or modified in any way.

Bob现在自由地写他的计划。他又使用任何文字处理器,创建文件发送给Alice作为他的答复。当文件准备好时,他再次打开原始的“信封”并且提供通行短语。提供创建保密应答的选择。如果选择,则使用与解密原始消息相同的通行短语来加密该计划。然后Bob在他的计划中使用任意处理手段自由地发送他的计划,返回给Alice作为保密应答文件。Bob is now free to write his plans. He again uses any word processor, creates a file to send to Alice as his reply. When the file is ready, he opens the original "envelope" again and provides the passphrase. Provides the option to create a confidential answer. If selected, the scheme is encrypted using the same passphrase used to decrypt the original message. Bob is then free to send his plan, using arbitrary processing in his plan, back to Alice as a confidential answer file.

一旦接收到保密的应答,Alice使用本发明的原始加密-解密程序与原始通行短语来解密它。现在她能够读Bob的计划并且继续处理她的商务。Once the encrypted reply is received, Alice decrypts it using the original encryption-decryption procedure and the original passphrase of the present invention. Now she can read Bob's plan and proceed with her business.

另一个使用本发明的例子是在电子商务环境中进行记帐和支付的处理系统。这种类型的系统使用了为多个专用目的提供保密应答的能力,并且实现不同于本发明优选实施例的用户接口。然而,提供保密应答的能力是不变的。Another example of use of the present invention is a billing and payment processing system in an electronic commerce environment. This type of system utilizes the ability to provide secure responses for a number of dedicated purposes and implements a different user interface than the preferred embodiment of the present invention. However, the ability to provide confidential responses is unchanged.

在一个(非常简单的)电子记帐和支付系统中,双方经过电子邮件连接通信。双方首先将约定一个口令或短语(它也可以是个人身份证号码或“密码”),通过它,传送的数据用密码加密。销售商发送给客户一个发票或反映交易活动的清单和欠资量。客户以支付指令和授权来回应。In a (very simple) electronic billing and payment system, two parties communicate over an e-mail connection. The two parties will first agree on a password or phrase (it can also be a personal identification number or "password") through which the data transmitted is encrypted with the password. The seller sends the customer an invoice or statement reflecting transaction activity and the amount owed. The customer responds with payment instructions and authorizations.

例如,销售商将准备一个清单。这个清单随后与设计来收集客户付费指令的专用程序一道加密和封闭在一个“信封”里。这个信封经过电子邮件发送给客户。客户使用先前与销售商约定建立的口令或短语打开信封。一旦信封的内容被解密,则清单就提供给客户。For example, a seller will prepare a checklist. This list is then encrypted and enclosed in an "envelope" along with a special program designed to collect customer payment instructions. This envelope is emailed to the customer. The customer opens the envelope using a password or phrase previously agreed upon with the vendor. Once the contents of the envelope are decrypted, the manifest is provided to the customer.

当客户准备对销售商支付时,信封被再次打开并且专用程序自动地执行,提供给客户各种支付选择。当客户已经选择支付方法时,保密应答就产生了(支付选择程序已自动请求来自原始信封的保密应答)。When the customer is ready to pay the vendor, the envelope is opened again and a dedicated program is automatically executed, providing the customer with various payment options. When the customer has selected a payment method, a confidential response is generated (the payment selection program has automatically requested a secure response from the original envelope).

保密应答随后通过电子邮件返回给销售商。当销售商收到客户的保密应答时,自动的处理过程将该答复解密,提取客户的支付指令并且将它们提交,以便进一步地处理。在本发明受让人的专利产品中具有实现这种电子记帐和支付的工作系统。The confidential response is then emailed back to the vendor. When the merchant receives the customer's confidential response, an automated process decrypts the response, extracts the customer's payment instructions and submits them for further processing. A working system for such electronic billing and payment is found in the patented product of the assignee of the present invention.

提供保密应答特性的目的是允许两个计算机用户在他们中只有一个具有所需的密码软件的情况下保密地通讯(即,使用加密的数据文件)。无论需要什么软件,双方都要解密发送的消息,并且要加密被传送的对于原始消息的应答。The purpose of providing the secure reply feature is to allow two computer users to communicate securely (ie, using encrypted data files) if only one of them has the required cryptographic software. Regardless of the software required, both parties decrypt the messages sent, and the replies to the original messages are encrypted for transmission.

保密答复也可以用于任何这样的情况下,即,在不知道正确的口令或短语而不能创建保密应答时,都需要确认消息已经接收并且被正确解密。另外,确认本身的内容可能对于竞争的商家或个人是有用的,这样,加密的应答提供所需的保密。Secret replies can also be used in any situation where confirmation that a message was received and correctly decrypted is required when a secret reply cannot be created without knowing the correct password or phrase. In addition, the content of the identification itself may be useful to competing businesses or individuals, such that encrypted responses provide the required secrecy.

在本发明受让人的专利产品中提供了这种实现电子记帐和支付的工作系统。提供保密应答特性的目的是允许两个计算机用户在他们中只有一个具有所需的密码软件的情况下保密地通讯(即,使用加密的数据文件)。无论需要什么软件,双方都要解密发送的消息,并且要加密被传送的对于原始消息的应答。Such a working system for implementing electronic billing and payment is provided in a patented product of the assignee of the present invention. The purpose of providing the secure reply feature is to allow two computer users to communicate securely (ie, using encrypted data files) if only one of them has the required cryptographic software. Regardless of the software required, both parties decrypt the messages sent, and the replies to the original messages are encrypted for transmission.

对于一个不同的例子,在一个越来越复杂的世界中,常常需要各种领域或专业的专家一起秘密地工作。许多时间这些专家必须几乎不引人注意地合作并且交换的信息是敏感的或是秘密级别的。所有各方都希望以最小的额外开销花费来执行信息交换。For a different example, in an increasingly complex world, experts in various fields or specialties are often required to work secretly together. Many times these experts must cooperate with little notice and the information exchanged is of a sensitive or secret level. All parties wish to perform the information exchange with minimal overhead expenditure.

例如,可以想象一个法律公司(XYZ合伙人)在争议诉讼案中代理著名的一方。所有涉及这个案件的材料被认为是很敏感的。然而,XYZ需要与另一个距离很远的公司(HIJ)的律师商量该案件某方面的情况。当然,时间是关键的。For example, imagine a law firm (XYZ Partners) representing a prominent party in a dispute lawsuit. All material involved in this case is considered sensitive. However, XYZ needs to discuss certain aspects of the case with lawyers at another firm (HIJ) located far away. Of course, timing is of the essence.

使用本发明,XYZ的律师可以通过公共的电子邮件网络保密地发送文件给HIJ。HIJ的律师可以随后编辑任何发送的文件或将他们的意见输入加到文件中,以及使用本发明,以相同的保密级别回答XYZ。Using the present invention, XYZ's attorney can confidentially send documents to HIJ over the public email network. HIJ's attorneys can then edit or add their input to any sent documents and, using the present invention, answer XYZ with the same level of confidentiality.

通过保密传送,保护了所有各方,并且合作成果只需要最小的额外开销和准备。Through confidential transfer, all parties are protected, and the collaborative effort requires minimal additional overhead and preparation.

因此,本发明的目的是提供一种方法和设备来发送加密消息,它能够加密地确认保密文件已经成功地接收和解密,在接收端不需要专门的硬件或软件。It is therefore an object of the present invention to provide a method and apparatus for sending encrypted messages which cryptographically confirms that a confidential document has been successfully received and decrypted, without the need for specialized hardware or software at the receiving end.

另一个目的是通过首先用虚设文件发送加密传输,检索来自远端计算机用户的保密文件。Another purpose is to retrieve confidential files from remote computer users by first sending encrypted transmissions with dummy files.

还有一个目的是通过使两个计算机用户合作开发文件如方案、商务计划、计算机软件、机械图等来促进保密合作工作环境。使用保护的传输,文件将可以从第一个用户发送到第二个用户并且第二个用户能够随后对文件进行任何需要的修改并且使用本发明返回它。Yet another object is to promote a confidential collaborative work environment by enabling two computer users to collaborate in the development of documents such as proposals, business plans, computer software, mechanical drawings, and the like. Using protected transfers, a file will be able to be sent from a first user to a second user and the second user can then make any desired modifications to the file and return it using the present invention.

本发明的另一个目的是通过使用本发明返回的用户登记信息,能够进行软件的保密分配。Another object of the present invention is to enable secure distribution of software by using the user registration information returned by the present invention.

本发明的另一个目的是能够将研制的有关产品的信息分配到限制的计算机用户群。根据本发明,这些用户将以评论、建议等方式来回答。Another object of the invention is to be able to distribute information about a developed product to a restricted group of computer users. According to the invention, these users will reply with comments, suggestions, etc.

结合附图和下面的描述可以理解具有本发明结构和操作方法的新特性与它的其它特性及优点,其中本发明的优选实施例通过举例来说明。它用于更好地理解,然而,这些附图仅仅是用于说明和描述,它们并不作为本发明的限定。The novel nature of the structure and method of operation of the invention, together with other characteristics and advantages thereof, will be understood when read in conjunction with the accompanying drawings and the following description, wherein the preferred embodiments of the invention are illustrated by way of example. It is used for better understanding, however, these drawings are only for illustration and description, they are not as limiting the present invention.

               附图的简要说明A brief description of the drawings

图1是表示本发明的操作原理的流程图。Figure 1 is a flow chart illustrating the principle of operation of the present invention.

图2包括图2a-2d,是实现保密信息的发送、接收和返回所采用步骤的流程图。Figure 2, comprising Figures 2a-2d, is a flowchart of the steps taken to achieve the sending, receiving and returning of confidential information.

图3包括图3a-3d,是本发明过程的更详细流程图。Figure 3, comprising Figures 3a-3d, is a more detailed flowchart of the process of the present invention.

图4包括图4a-4b,是用于保密记帐和支付处理的本发明实施例的流程图。Figure 4, comprising Figures 4a-4b, is a flowchart of an embodiment of the present invention for secure billing and payment processing.

              优选实施例的说明Description of the preferred embodiment

下面对程序流程的描述和各个图说明了当前正在实施的本发明,由本申请人转让给受让人,其产品是商标为Envelope98TM的保密传送产品。相同的过程可应用于对用户接口稍微改变的其它情况。The following description of program flow and various figures illustrate the present invention as it is currently practiced, assigned by the applicant to the assignee, the product of which is a secure transfer product under the Envelope98TM trademark. The same process can be applied to other cases with slight changes to the user interface.

从图1开始,示出了说明使用本发明的一般概况。使用专门的程序、包括可执行程序和加密文件的消息(envelope.exe),在接收和执行时创建,根据提供的预选口令或短语来解密信息内容。整个消息可以用电子邮件发送给接收者,调制解调器到调制解调器的文件经过电话线路传送,或者可以记录在盘上,该盘通过信使或经过邮局发送。Starting with Figure 1, a general overview illustrating the use of the invention is shown. Messages (envelope.exe) are created using specialized programs, including executable programs and encrypted files (envelope.exe), upon receipt and execution, to decrypt message content based on a preselected password or phrase provided. The entire message can be e-mailed to the recipient, modem-to-modem file transfer over the telephone line, or can be recorded on disk which is sent by courier or via the post office.

在接收端,接收方执行作为消息的集成部分(integral part)的程序(envelope.exe)。然后,接收的计算机请求约定的口令或短语,并且根据规定,在加密文件上操作以解密它们。然后,接收者作出选择以提供保密加密的应答。On the receiving end, the recipient executes the program (envelope.exe) that is an integral part of the message. The receiving computer then requests the agreed upon password or phrase and, as specified, operates on the encrypted files to decrypt them. The recipient then makes an option to provide a securely encrypted reply.

如果作出选择,则在准备答复之后,接收的消息被再次执行,并且当请求时应答选择加密应答消息并且应答可以使用在发送原始消息时使用的任何相同的方法传送返回给始发者。一旦始发者接收到消息,他的设备就能够解密返回的文件。If a choice is made, the received message is executed again after the reply is prepared, and the reply selects the encrypted reply message when requested and the reply can be transmitted back to the originator using any of the same methods used when sending the original message. Once the originator receives the message, his device is able to decrypt the returned file.

如图1所示,开始的步骤是创建envelope.exe文件12,这将在下面结合图2更详细地解释。在图1中,全球计算机网络用于传送在传送步骤14的文件。在接收端,文件被接收16并且发送的程序被执行,步骤18。如果接收者希望证实一个加密的应答,则接收的程序能够准备应答,步骤20,并且这个应答通过全球计算机网络返回,步骤22。该应答由原始发送者接收,步骤24,该发送者具有解密该应答的程序,步骤26。As shown in FIG. 1 , the initial step is to create an envelope.exe file 12 , which will be explained in more detail below in conjunction with FIG. 2 . In FIG. 1 , a global computer network is used to transfer the files in the transfer step 14 . At the receiving end, the file is received 16 and the sent program is executed, step 18 . If the recipient wishes to validate an encrypted response, the receiving program can prepare the response, step 20, and this response is returned, step 22, via the global computer network. The reply is received, step 24, by the original sender, which has a program to decrypt the reply, step 26.

在图2a中,通过解释发送消息的流程,详细地说明本发明的优选实施例。一开始,用户确定哪个文件要被发送、加密算法和口令或短语、是否包括保密应答选择、任何其它用户专用的消息和文件名。在下一步骤,解密引擎代码被写入并且加到其它的文件单元中。In Fig. 2a, a preferred embodiment of the present invention is illustrated in detail by explaining the flow of sending messages. Initially, the user specifies which file is to be sent, the encryption algorithm and password or phrase, whether to include a privacy answer option, any other user-specific messages, and the file name. In the next step, the decryption engine code is written and added to other file units.

发送的每个文件被顺序地检索,以及如果作出选择,则压缩。接下来,计算专用的数据并且在连续的步骤中使用用户确定的算法加密。准备文件标题并且设置文件用于传输。Each file sent is retrieved sequentially and, if selected, compressed. Next, the private data is calculated and encrypted in successive steps using a user-defined algorithm. Prepare file headers and set up files for transfer.

每个剩余的选择的数据文件接着经过相同的步骤处理,直到所有选择的文件都被压缩(如果已经作出选择)为止,还设置检错码、文件大小信息和任何必须附加和加密的其它信息。在所有的文件处理之后,该消息被关闭并且准备通过任何可利用的途径传输,这些途径包括全球计算机网络、调制解调器到调制解调器直接传输或在可传输介质上存储以及通过邮局或信使发送。Each remaining selected data file is then processed through the same steps until all selected files are compressed (if selections have been made), error detection codes, file size information and any other information that must be appended and encrypted are also set. After all file processing, the message is closed and ready for transmission via any available means, including worldwide computer networks, direct modem-to-modem transmission or storage on transmissible media, and sending via post office or courier.

现在参照图2b,示出了在接收端完成的步骤。当执行传送程序envelope.exe时,信封标题被读出并且与传送文件数量相关的信息被记录(noted)。Referring now to Figure 2b, the steps performed at the receiving end are shown. When the transfer program envelope.exe is executed, the envelope header is read out and information related to the number of transfer files is noted.

然后各种用户指令起作用,包括指示要被提取的文件、接收者计算机的目的地、口令或短语,包括在应答中的文件(如果有),以及是否进行应答,应答的目的地。Various user commands are then acted upon, including instructions indicating the file to be extracted, the destination of the recipient's computer, the password or phrase, the file (if any) to include in the answer, and whether to answer, the destination of the answer.

下面,每个传送的文件接着被解密、解压缩,经过完整性检查来验证并且写到接收者系统的预选目的地。如果进行保密应答,则在图2c中可以找到下一个步骤。Next, each transmitted file is then decrypted, decompressed, verified with integrity checks and written to the preselected destination on the recipient's system. If a confidential reply is made, the next step can be found in Figure 2c.

在接收消息之后,如果接收方准备发送应答,则用户再次执行接收的程序(即运行envelope.exe指令)。该程序(通过使用消息标题中的标记)知道原始的内容已经被解密并且询问用户是否创建保密应答。After receiving the message, if the receiver is ready to send a reply, the user executes the received program again (ie, runs the envelope.exe command). The program (by using a flag in the message header) knows that the original content has been decrypted and asks the user whether to create a secret reply.

如果用户请求应答,则程序要求加密文件名或加密文件,并且在加密文件之后,将它们“打包”在应答标题中。注意没有解密程序与应答一起返回,因为存在需要解密应答的软件是创建该消息的先决条件。If the user requests an answer, the program asks for encrypted filenames or encrypted files, and after encrypting the files, "packs" them in the answer header. Note that no decryption routine is returned with the reply, since the presence of software that needs to decrypt the reply is a prerequisite for creating the message.

如果提供和选择了保密应答,则用户确定哪个文件发送、文件名、口令或通行短语以及标题。当接收的程序再次执行时,压缩(如果要求)要返回的每个文件,专门信息被收集,并且每个文件由发送给接收者的程序加密,该接收者没有其它加密或解密软件可用于他的系统。当所有被返回的文件处理后,文件被关闭并且应答消息返回。If a confidential answer is provided and selected, the user determines which file to send, the file name, password or passphrase, and title. When the receiving program is executed again, each file to be returned is compressed (if required), specific information is collected, and each file is encrypted by the program sent to the recipient, who has no other encryption or decryption software available to him system. When all returned files have been processed, the file is closed and a reply message is returned.

图2d表示在原始发送者位置接收应答时具有下面的步骤。原始发送者的程序可以读出应答的标题并且提取所有必需的处理信息。然后处理原始接收者的应答指令,包括提取的文件、口令或通行短语以及发送文件的目的地。Figure 2d shows the receipt of a reply at the original sender's location with the following steps. The original sender's program can read the reply's header and extract all necessary processing information. The original recipient's reply instructions are then processed, including the file to extract, the password or passphrase, and the destination to send the file to.

接下来,每个返回的文件使用适当的算法解密。如果需要,该文件接着被解压缩。检查完整性内容并且将文件存储在选择的目的地。当所有的文件被存储时,认为完成了程序。Next, each returned file is decrypted using the appropriate algorithm. The file is then decompressed, if necessary. Contents are checked for integrity and the file is stored at the chosen destination. The procedure is considered complete when all files are stored.

转到图3a,接收端的处理在一部分流程图中说明。一开始,选择命令行的应答选择。如果当前没有文件名,则设置标记来指示要创建的应答,并且产生文件名。程序随后请求先前约定的口令或短语。一旦提供,则加密密钥由口令或短语产生并且消息被打开和读取。在读取标题后,程序检查看看是否应答选择被设置的标记指示,但消息还没有解密。如果是这样,则给出一个警告并且提供继续选择。如果选择不是继续,则退出程序。Turning to Figure 3a, processing at the receiving end is illustrated in a portion of a flowchart. To begin, select the answer option for the command line. If there is currently no filename, a flag is set indicating the answer to be created, and a filename is generated. The program then requests the previously agreed upon password or phrase. Once provided, an encryption key is generated from the passphrase or phrase and the message is opened and read. After reading the header, the program checks to see if the response option is indicated by the flag being set, but the message has not yet been decrypted. If so, a warning is given and the option to continue is offered. If you choose not to continue, exit the program.

参照图3b,如果继续处理,则下一个分支点为是否标记没有设置但消息已经解密。如果是肯定的,则请求用户决定是否要求应答。如果不要求应答,则清除标记。如果要求应答,则设置标记。Referring to Figure 3b, if processing continues, the next branch point is if the flag is not set but the message has been decrypted. If yes, the requesting user decides whether to ask for a reply. If no acknowledgment is required, the flag is cleared. Flag is set if an answer is required.

下一个分支点检验标记。如果它被设置,则验证密钥。如果没有,则消息被解密并且退出程序。密钥被验证,如果正确,则进行下一个检查。如果密钥不正确,则退出程序。下一个步骤是检查应答文件名。如果还没有设置,则从用户那里获得名字。如果名字设置了,则检查看看文件是否可使用。The next branch point check mark. If it is set, the key is verified. If not, the message is decrypted and the program exits. The key is verified, and if correct, the next check is performed. If the key is incorrect, exit the program. The next step is to check the answer file name. If not set, gets the name from the user. If the name is set, check to see if the file is available.

现在参照图3c继续该过程。创建用于应答输出文件的名字。询问用户创建的名字是否可接受。如果不能接受,则获得可接受的文件名。如果可接受,则必须确定是否可以创建文件。如果不能,则退出程序。如果可以,则加密文件,“信封”和数据文件的标题被写入并且显示该过程已经完成的消息。The process is now continued with reference to Figure 3c. The name of the output file to create for the answer. Ask if user-created names are acceptable. If not acceptable, get an acceptable filename. If acceptable, you must determine if the file can be created. If not, exit the program. If it can, the encrypted file, the "envelope" and the header of the data file are written and a message is displayed that the process has been completed.

现在转到图3d,没有采用接受的应答消息来检查在原始消息源的处理。因为原始的操作程序在这个源,因此,应答能够立刻打开和读取。标题识别被记录并且提供口令或短语。由口令或短语创建加密密钥并且提供用于解密输出文件的文件名。如果使用的密钥是不正确的,则退出程序。如果是正确的,则数据文件被解密并且验证为正确的和没有损坏的。如果它不是,则显示错误消息并且退出程序。如果是正确的,则没有错误消息而退出程序。Turning now to Figure 3d, the processing at the source of the original message is checked without using the accepted reply message. Because the original operating program is at this source, the reply can be opened and read immediately. Title identification is recorded and a password or phrase is provided. Creates an encryption key from a passphrase or phrase and provides a filename for decrypting the output file. If the key used is incorrect, the program exits. If correct, the data file is decrypted and verified to be correct and uncorrupted. If it is not, an error message is displayed and the program exits. If correct, the program exits without an error message.

在包括图4a和图4b的图4的流程图中说明了本发明的另一个实施例。在这个实施例中,说明了用于保密记帐和支付的简化程序。帐单提供给软件程序,该程序压缩帐单,加密它并且创建保密“信封”。创建电子邮件,它包括加密的帐单。然后,电子邮件服务器经过有时称为互联网络的全球计算机网络发送帐单。Another embodiment of the invention is illustrated in the flow diagram of Figure 4 comprising Figures 4a and 4b. In this embodiment, simplified procedures for secure billing and payment are described. The bill is provided to a software program which compresses the bill, encrypts it and creates a confidential "envelope". Create emails that include encrypted bills. The email server then sends the bill across a worldwide network of computers sometimes called the Internet.

现在转到图4b,接收包括帐单的消息并且打开附件。使用全球计算机网络,启动浏览器从特别授权以完成这个服务的网址取出解密程序。一旦获得,运行该解密程序。Turning now to Figure 4b, the message including the bill is received and the attachment is opened. Using the global computer network, a browser is activated to retrieve the decryption program from a URL specifically authorized to perform this service. Once obtained, run the decryption program.

接收者被提示个人身份号码(“密码”)或口令或通行短语。检查密码的有效性。如果无效,则它被打印出来并且关闭程序。如果有效,则程序解密该消息并且经过全球网络发送一个确认给发送者。帐单随后显示在浏览器窗口并且安排连接到记帐网址。在这一点上,支付授权可以被发送,或记帐网址可以提供其它帐单支付选择。票据机网址可以是一个中间服务供应商或一个金融机构,它能够被授权支付所有的或一部分帐单,否则承担支付责任。The recipient is prompted for a personal identification number ("password") or password or passphrase. Check the validity of the password. If invalid, it is printed and the program is closed. If valid, the program decrypts the message and sends an acknowledgment to the sender across the global network. The bill is then displayed in the browser window and a connection is made to the billing URL. At this point, payment authorization can be sent, or the billing site can offer other bill payment options. The bill machine website can be an intermediary service provider or a financial institution, which can be authorized to pay all or part of the bill, or else assume the responsibility for payment.

这样描述的系统中,保密消息能够发送,并且保密应答能够由接收者创建而不需要在接收者计算机上安装任何专门的软件程序。保密消息包括程序,当它执行时,能够观察接收的消息并且准备保密应答。然而,接收者不能使用该程序来创建新的保密消息给第三方或允许第三方创建保密应答。In the system thus described, secure messages can be sent, and secure replies can be created by the recipient without requiring any special software program to be installed on the recipient's computer. Secure messages include programs that, when executed, are able to observe received messages and prepare secure responses. However, recipients cannot use this procedure to create new confidential messages to third parties or to allow third parties to create confidential replies.

本发明的系统使自身保密地交换数据或用于在提供帐单和支付时保密的财务处理。在一个实施例中,可以使用的任何通讯装置,包括(但不限于)便携式介质的传递。在另一个实施例中,可以缩写传送的程序,以致于通过全球计算机网络创建一个链路,它提供所需的软件来解密消息并且创建保密应答。另外,可以采用保密的财务服务网址创建一个单独的链路,该网址可以根据提交的保密记帐控制财务处理。The system of the present invention lends itself to securely exchanging data or for confidential financial processing in providing billing and payment. In one embodiment, any communication means may be used, including (but not limited to) portable media delivery. In another embodiment, the program of transmission can be abbreviated so that a link is created through a global computer network that provides the software needed to decrypt the message and create a secure reply. Alternatively, a separate link can be created using a secure financial services web site that can control financial processing based on confidential billing submissions.

本发明的范围应该仅由下面附属的权利要求书的范围来限定。The scope of the present invention should be limited only by the scope of the following appended claims.

Claims (39)

1.一种用于文件保密传输的方法,包括下列步骤:1. A method for file confidential transmission, comprising the following steps: 在发送位置使用保密程序,创建包括可执行程序和文件的加密文件;Create encrypted files, including executable programs and files, using secure programs at the sending location; 发送所述加密文件给远端接收者;Send the encrypted file to the remote receiver; 在缺少所述保密程序的位置接收所述的加密文件;receiving said encrypted file at a location lacking said security program; 在接收位置,执行接收的所述可执行程序;以及at the receiving location, executing said executable program received; and 用所述接收的程序解密所述接收的文件。The received file is decrypted with the received program. 2.如权利要求1所述的方法,还包括下列步骤:2. The method of claim 1, further comprising the steps of: 包括通行短语作为所述可执行程序一部分以防止接收的所述加密文件的非授权解密。A passphrase is included as part of the executable program to prevent unauthorized decryption of the received encrypted file. 3.如权利要求2所述的方法,还包括在所述加密文件创建中使用的加密算法的所述通行短语。3. The method of claim 2, further comprising said passphrase of an encryption algorithm used in said encrypted file creation. 4.如权利要求1所述的方法,其中,所述可执行程序包括一个验证步骤,作为运行时的一个步骤,用于确认接收文件的完整性。4. 2. The method of claim 1, wherein said executable program includes a verification step as a run-time step for confirming the integrity of the received file. 5.如权利要求1所述的方法,其中创建步骤包括在所述文件加密之前的文件压缩步骤。5. 2. The method of claim 1, wherein the step of creating includes the step of compressing the file prior to encrypting the file. 6.如权利要求1所述的方法,还包括保密应答选择的步骤,该步骤进一步包括下列步骤:6. The method of claim 1, further comprising the step of selecting a confidential response, the step further comprising the steps of: 在所述可执行程序中提供一个用于保密应答的选择;providing an option for confidential responses in said executable program; 在所述接收端选择保密应答选择;selecting a confidential response option at the receiving end; 使用所述接收的可执行程序,以创建类似于在传送端由保密程序创建的保密应答文件;using said received executable program to create a secure answer file similar to that created by the secure program at the transmitting end; 从所述远端位置传送所述保密应答文件到所述发送位置;以及transmitting the confidential answer document from the remote location to the sending location; and 在所述发送位置使用所述保密程序,以解密所述保密应答文件:using said secure program at said sending location to decrypt said secure answer file: 因此,缺少保密程序的接收位置能够接收保密消息并且发送保密应答。Thus, receiving locations that lack security procedures are able to receive secure messages and send secure replies. 7.如权利要求6所述的方法,还包括下列步骤:在所述保密文件的创建中包含通行短语,其中所述接收的可执行程序请求所述通行短语,用于所述传送程序的执行。7. 6. The method of claim 6, further comprising the step of including a passphrase in creation of said secure file, wherein said received executable program requests said passphrase for execution of said transfer program. 8.如权利要求6所述的方法,还包括下列步骤:在所述传送位置验证所述保密应答文件的完整性。8. 6. The method of claim 6, further comprising the step of verifying the integrity of said confidential answer file at said transfer location. 9.用于文件保密传输的设备,包括:9. Equipment used for secure file transfers, including: 在发送位置包括保密程序的创建装置,用于创建将可执行程序与文件集成的加密文件;comprising, at the sending location, means for creating a secure program for creating an encrypted file integrating the executable program with the file; 用于传送所述加密文件到远端接收者的装置;means for transmitting said encrypted file to a remote recipient; 用于在缺少所述保密程序的位置接收所述加密文件的装置;means for receiving said encrypted file at a location lacking said security program; 用于在接收位置执行接收的所述可执行程序的装置;以及means for executing said executable program received at a receiving location; and 响应所述可执行程序的运行来解密所接收的文件的装置。means for decrypting the received file in response to execution of said executable program. 10.如权利要求9所述的设备,还包括:10. The device of claim 9, further comprising: 包含通行短语作为所述可执行程序一部分以防止接收的所述加密文件被非授权解密的装置。means for including a passphrase as part of said executable program to prevent unauthorized decryption of said encrypted file received. 11.如权利要求10所述的设备,其中,所述创建装置包括在所述加密文件创建中使用的加密算法的所述通行短语。11. The apparatus of claim 10, wherein said creating means includes said passphrase of an encryption algorithm used in said encrypted file creation. 12.如权利要求9所述的设备,其中,用于执行的所述装置包括用于确认接收文件完整性的验证装置。12. 9. The apparatus of claim 9, wherein said means for performing includes verifying means for confirming the integrity of the received file. 13.如权利要求9所述的设备,其中,所述创建装置包括在所述文件加密之前用于压缩文件的压缩装置。13. 9. The apparatus of claim 9, wherein said creating means includes compression means for compressing a file prior to encryption of said file. 14.如权利要求9所述的设备,还包括用于创建保密应答的装置,该装置包括:14. The apparatus of claim 9, further comprising means for creating a secret answer comprising: 在所述可执行程序中选择保密应答的选择装置;selection means for selecting a confidential response in said executable program; 在所述接收端创建保密应答的装置,该装置包括响应所接收的可执行程序来创建类似于在传送端由保密程序创建的保密应答文件的装置;means for creating a confidential response at said receiving end, the means including means responsive to the received executable program for creating a confidential response file similar to that created by the secure program at the transmitting end; 在所述远端位置从所述远端位置传送所述保密应答文件到所述发送位置的装置;以及means at said remote location for transmitting said confidential answer document from said remote location to said sending location; and 在所述发送位置执行所述保密程序以解密所述保密应答文件的装置,means for executing said security procedure at said sending location to decrypt said security response document, 因此,缺少保密程序的接收位置能够接收保密消息并且发送保密应答。Thus, receiving locations that lack security procedures are able to receive secure messages and send secure replies. 15.如权利要求14所述的设备,还包括在所述保密文件的创建中包含通行短语的装置,其中,所接收的可执行程序响应所述的通行短语,用于所述传送程序的执行。15. 14. The apparatus of claim 14, further comprising means for including a passphrase in creation of said secure file, wherein the received executable program is responsive to said passphrase for execution of said transmitted program. 16.如权利要求14所述的设备,其中,用于执行的所述装置包括在所述传送位置验证所述保密应答文件完整性的装置。16. 14. The apparatus of claim 14, wherein said means for performing includes means for verifying the integrity of said confidential answer file at said transfer location. 17.一种用于文件保密传输的方法,包括下列步骤:17. A method for file confidential transmission, comprising the following steps: 在发送位置使用保密程序来创建包括可执行程序和文件的加密文件;Use a secure program at the sending location to create encrypted files including executable programs and files; 传送所述加密文件到远端接收者;transmitting the encrypted file to a remote recipient; 在缺少所述保密程序的位置接收所述的加密文件;receiving said encrypted file at a location lacking said security program; 在接收位置,执行所接收的可执行程序;at the receiving location, executing the received executable program; 连接到全球计算机网络的预定网址;A predetermined website connected to a global computer network; 从所述预定网址检索适当的可执行程序,用于解密所接收的加密文件;以及Retrieving an appropriate executable program from said predetermined URL for decrypting the received encrypted file; and 使用所检索的程序解密所接收的文件。The received file is decrypted using the retrieved program. 18.如权利要求17所述的方法,还包括下列步骤:18. The method of claim 17, further comprising the steps of: 包括通行短语作为所述可执行程序一部分,以使所述的预定网址能够下载所述适当的可执行程序,因此,防止所接收的加密文件的非授权解密。Including a passphrase as part of the executable program enables the predetermined web site to download the appropriate executable program, thereby preventing unauthorized decryption of received encrypted files. 19.如权利要求18所述的方法,还包括在所述加密文件创建中使用的加密算法中的所述通行短语。19. The method of claim 18, further comprising said passphrase in an encryption algorithm used in said encrypted file creation. 20.如权利要求17所述的方法,其中,所述适当的可执行程序包括一个验证步骤,作为执行时的一个步骤,用于确认接收文件的完整性。20. 17. The method of claim 17, wherein said suitable executable program includes a verification step as a step upon execution for confirming the integrity of the received file. 21.如权利要求17所述的方法,其中,创建步骤包括在所述文件加密之前的文件压缩步骤。twenty one. 17. The method of claim 17, wherein the step of creating includes the step of compressing the file prior to encrypting the file. 22.如权利要求17所述的方法,还包括保密应答选择的步骤,该步骤包括下列步骤:twenty two. The method of claim 17, further comprising the step of selecting a confidential response comprising the steps of: 在所述适当的可执行程序中提供用于保密应答的选择;providing an option for confidential responses in said appropriate executable program; 在所述接收端选择保密应答选择;selecting a confidential response option at the receiving end; 使用所接收的适当可执行程序,以创建类似于在传送端由保密程序原始创建的保密应答文件;以及use the appropriate executable program received to create a security answer file similar to that originally created by the security program on the transmitting side; and 从所述远端位置传送所述保密应答文件到所述发送位置;以及transmitting the confidential answer document from the remote location to the sending location; and 在所述发送位置使用所述保密程序,以解密所述的保密应答文件,using said security program at said sending location to decrypt said security response document, 因此,缺少保密程序的接收位置能够接收保密消息并且发送保密应答。Thus, receiving locations that lack security procedures are able to receive secure messages and send secure replies. 23.如权利要求22所述的方法,还包括在所述保密文件的创建中包含通行短语的步骤,其中所述接收的可执行程序请求所述通行短语用于所述适当的可执行程序的捕获。twenty three. 22. The method of claim 22, further comprising the step of including a passphrase in creation of said secure file, wherein said received executable program requests said passphrase for capture of said appropriate executable program. 24.如权利要求22所述的方法,还包括下列步骤:在所述传送位置验证所述保密应答文件的完整性。twenty four. 22. The method of claim 22, further comprising the step of verifying the integrity of said confidential answer file at said transfer location. 25.用于文件保密传输的设备,包括:25. Equipment used for secure file transfers, including: 在发送位置包括保密程序的创建装置,用于创建将可执行程序与文件集成的加密文件;comprising, at the sending location, means for creating a secure program for creating an encrypted file integrating the executable program with the file; 用于传送所述加密文件到远端接收者的装置;means for transmitting said encrypted file to a remote recipient; 用于在缺少所述保密程序的位置接收所述加密文件的装置;means for receiving said encrypted file at a location lacking said security program; 用于在接收位置执行所接收的可执行程序的装置;means for executing the received executable program at the receiving location; 响应所述可执行程序运行、连接全球计算机网络的预定网址以检索适当的可执行程序、用于解密所述接收文件的装置。means for decrypting said received file responsive to said executable program being run, linked to a predetermined web site on a global computer network to retrieve the appropriate executable program. 26.如权利要求25所述的设备,还包括:26. The device of claim 25, further comprising: 包含通行短语作为所述可执行程序一部分,能够与所述预定网址通讯使所述适当的可执行程序授权下载并且防止所接收的加密文件被非授权解密的装置。Means including a passphrase as part of said executable program, capable of communicating with said predetermined web site to authorize downloading of said appropriate executable program and to prevent unauthorized decryption of received encrypted files. 27.如权利要求26所述的设备,其中,所述创建装置包括在所述加密文件创建时使用的加密算法中的所述通行短语。27. 26. The apparatus of claim 26, wherein said creating means includes said passphrase in an encryption algorithm used when said encrypted file was created. 28.如权利要求25所述的设备,还包括用于运行所述适当的可执行程序的装置,其中,用于运行的所述装置包括确认接收文件完整性的验证装置。28. 25. The apparatus of claim 25, further comprising means for running said suitable executable program, wherein said means for running includes verification means for confirming the integrity of the received file. 29.如权利要求25所述的设备,其中所述创建装置包括在所述文件加密之前用于压缩文件的压缩装置。29. 25. The apparatus of claim 25, wherein said creating means includes compressing means for compressing a file prior to encrypting said file. 30.如权利要求25所述的设备,还包括用于创建保密应答的装置,该装置包括:30. The apparatus of claim 25, further comprising means for creating a secret answer, the means comprising: 在所述适当的可执行程序中选择保密应答的选择装置;selection means for selecting a secure response in said appropriate executable program; 在所述接收端创建保密应答的装置,它包括响应所接收的适当可执行程序来创建类似于在传送端由保密程序创建的保密应答文件的装置;means for creating a secure response at said receiving end, including means responsive to receiving the appropriate executable program to create a secure answer file similar to that created by the secure program at the transmitting end; 在所述远端位置把所述保密应答文件从所述远端位置传送到所述发送位置的装置;以及means at said remote location for transmitting said confidential response document from said remote location to said sending location; and 在所述发送位置执行所述保密程序,以解密所述保密应答文件的装置,means for executing said security procedure at said sending location to decrypt said security response document, 因此,缺少保密程序的接收位置能够接收保密消息并且发送保密应答。Thus, receiving locations that lack security procedures are able to receive secure messages and send secure replies. 31.如权利要求30所述的设备,还包括在所述保密文件的创建中包含通行短语的装置,其中,所接收的可执行程序响应所述通行短语,下载所述的适当可执行程序。31. 30. The apparatus of claim 30, further comprising means for including a passphrase in creation of said secure file, wherein said executable program being received downloads said appropriate executable program in response to said passphrase. 32.如权利要求30所述的设备,包括用于执行所述适当的可执行程序的装置,所述适当的可执行程序包括在所述发送位置验证所述保密应答文件完整性的装置。32. 30. The apparatus of claim 30, including means for executing said suitable executable program, said suitable executable program including means for verifying the integrity of said confidential answer file at said sending location. 33.如权利要求17所述的方法,还包括应答选择步骤,该步骤包括下列步骤:33. The method of claim 17, further comprising the step of answer selection comprising the steps of: 在所述可执行程序中提供用于应答的选择;providing an option for answering in said executable program; 在所述接收端选择应答选择;selecting an answer option at said receiving end; 使用所接收的适当可执行程序,以连接第二个预定的全球计算机网址;以及use the appropriate executable program received to connect to a second predetermined global computer site; and 命令所述的第二个全球计算机网址作出选择的动作;command said second global computer site to make a selection; 因此,缺少保密程序的接收位置能够接收保密消息并且发送指令到选择的全球计算机网址。Thus, receiving locations lacking secure programs are able to receive secure messages and send instructions to selected global computer sites. 34.如权利要求33所述的方法,还包括在所述保密文件的创建中包含通行短语的步骤,其中,所接收的可执行程序请求所述的通行短语,用于所述适当的执行程序的捕获。34. 33. The method of claim 33, further comprising the step of including a passphrase in creation of said secure file, wherein said received executable program requests said passphrase for capture of said appropriate executable program . 35.如权利要求33所述的方法,还包括发送接收确认到所述发送位置的步骤。35. 33. The method of claim 33, further comprising the step of sending an acknowledgment of receipt to said sending location. 36.如权利要求33所述的方法,还包括引导所选择的第二个全球计算机网址发送确认消息到所述发送位置的步骤。36. 33. The method of claim 33, further comprising the step of directing the selected second global computer site to send a confirmation message to said sending location. 37.如权利要求25所述的设备,还包括用于创建应答的装置,该装置包括:37. The apparatus of claim 25, further comprising means for creating an answer comprising: 用所述的适当可执行程序连接第二个预定的全球通讯网址的通讯装置;以及Link the communication device of the second predetermined global communication site with the appropriate executable program; and 在所述远程位置传送预定指令到所述第二个全球计算机网址的装置。means for transmitting predetermined instructions at said remote location to said second global computer site. 38.如权利要求37所述的设备,还包括用于传送接收确认到所述发送位置的装置。38. 37. The apparatus of claim 37, further comprising means for transmitting an acknowledgment of receipt to said sending location. 39.如权利要求37所述的设备,还包括用于引导所述第二个全球计算机网址发送接收确认到所述发送网址的装置。39. 37. The apparatus of claim 37, further comprising means for directing said second global computer site to send an acknowledgment of receipt to said sending site.
CN00800735.7A 1999-03-22 2000-03-22 Security method and apparatus for a secure data transmission system Pending CN1304610A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12543799P 1999-03-22 1999-03-22
US60/125,437 1999-03-22

Publications (1)

Publication Number Publication Date
CN1304610A true CN1304610A (en) 2001-07-18

Family

ID=22419718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN00800735.7A Pending CN1304610A (en) 1999-03-22 2000-03-22 Security method and apparatus for a secure data transmission system

Country Status (7)

Country Link
EP (1) EP1088433A1 (en)
JP (1) JP2002540679A (en)
CN (1) CN1304610A (en)
AU (1) AU4019900A (en)
BR (1) BR0005457A (en)
DE (1) DE10080963T1 (en)
WO (1) WO2000057613A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104285406A (en) * 2012-05-16 2015-01-14 英特尔公司 A system for securing and authenticating location-based services using distributed security

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7392388B2 (en) 2000-09-07 2008-06-24 Swivel Secure Limited Systems and methods for identity verification for secure transactions
WO2002045378A2 (en) * 2000-11-28 2002-06-06 Swivel Technologies Limited Secure file transfer method and system
JP2002175447A (en) * 2000-12-08 2002-06-21 Tetsuo Kusumoto Design ordering and collecting method
GB0106082D0 (en) 2001-03-13 2001-05-02 Mat & Separations Tech Int Ltd Method and equipment for removing volatile compounds from air
GB2377774A (en) * 2001-07-17 2003-01-22 Tornado Entertainment Ltd Data distrubution system
JP3524901B2 (en) * 2001-12-03 2004-05-10 おべ工業株式会社 Pit cover opening and closing device for moving objects
GB0205045D0 (en) * 2002-03-05 2002-04-17 Bitarts Ltd Software protection arrangement
US8010405B1 (en) 2002-07-26 2011-08-30 Visa Usa Inc. Multi-application smart card device software solution for smart cardholder reward selection and redemption
US9852437B2 (en) 2002-09-13 2017-12-26 Visa U.S.A. Inc. Opt-in/opt-out in loyalty system
US8626577B2 (en) 2002-09-13 2014-01-07 Visa U.S.A Network centric loyalty system
US7121456B2 (en) 2002-09-13 2006-10-17 Visa U.S.A. Inc. Method and system for managing token image replacement
US8015060B2 (en) 2002-09-13 2011-09-06 Visa Usa, Inc. Method and system for managing limited use coupon and coupon prioritization
US6920611B1 (en) 2002-11-25 2005-07-19 Visa U.S.A., Inc. Method and system for implementing a loyalty merchant component
US7827077B2 (en) 2003-05-02 2010-11-02 Visa U.S.A. Inc. Method and apparatus for management of electronic receipts on portable devices
US8554610B1 (en) 2003-08-29 2013-10-08 Visa U.S.A. Inc. Method and system for providing reward status
US7104446B2 (en) 2003-09-03 2006-09-12 Visa U.S.A., Inc. Method, system and portable consumer device using wildcard values
US7051923B2 (en) 2003-09-12 2006-05-30 Visa U.S.A., Inc. Method and system for providing interactive cardholder rewards image replacement
US8005763B2 (en) 2003-09-30 2011-08-23 Visa U.S.A. Inc. Method and system for providing a distributed adaptive rules based dynamic pricing system
US8407083B2 (en) 2003-09-30 2013-03-26 Visa U.S.A., Inc. Method and system for managing reward reversal after posting
US7653602B2 (en) 2003-11-06 2010-01-26 Visa U.S.A. Inc. Centralized electronic commerce card transactions
WO2006000653A1 (en) * 2004-05-26 2006-01-05 France Telecom Method and platform for manipulating secured data
DE102005028066B3 (en) 2005-06-16 2006-12-07 Deutsche Exide Gmbh Pole bridge for a battery
US7992781B2 (en) 2009-12-16 2011-08-09 Visa International Service Association Merchant alerts incorporating receipt data
US8429048B2 (en) 2009-12-28 2013-04-23 Visa International Service Association System and method for processing payment transaction receipts

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2143874C (en) * 1994-04-25 2000-06-20 Thomas Edward Cooper Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
US5805702A (en) * 1995-09-29 1998-09-08 Dallas Semiconductor Corporation Method, apparatus, and system for transferring units of value

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104285406A (en) * 2012-05-16 2015-01-14 英特尔公司 A system for securing and authenticating location-based services using distributed security

Also Published As

Publication number Publication date
JP2002540679A (en) 2002-11-26
WO2000057613A1 (en) 2000-09-28
DE10080963T1 (en) 2002-07-25
BR0005457A (en) 2001-01-30
AU4019900A (en) 2000-10-09
EP1088433A1 (en) 2001-04-04

Similar Documents

Publication Publication Date Title
CN1304610A (en) Security method and apparatus for a secure data transmission system
US7596689B2 (en) Secure and reliable document delivery using routing lists
US7360079B2 (en) System and method for processing digital documents utilizing secure communications over a network
JP5313311B2 (en) Secure message system with remote decryption service
US20070118735A1 (en) Systems and methods for trusted information exchange
US7644268B2 (en) Automated electronic messaging encryption system
KR101143770B1 (en) A method of encrypting and transferring data between a sender and a receiver using a network
US20020172367A1 (en) System for secure electronic information transmission
US20050138360A1 (en) Encryption/decryption pay per use web service
US20050102499A1 (en) Apparatus for proving original document of electronic mail
JPH09162860A (en) Method and system for providing safe edi across open network
CN1697367A (en) A method and system for recovering password protected private data via a communication network without exposing the private data
US7660987B2 (en) Method of establishing a secure e-mail transmission link
US20080235175A1 (en) Secure Document Management System
JP2009510628A (en) Processing of protective electronic communication
US20080235236A1 (en) Secure Document Management System
CA2554847C (en) System and method for secure electronic data delivery
WO2000046952A1 (en) Method for sending secure email via standard browser
US20080235394A1 (en) Secure Document Management System
CN118611920A (en) Electronic tender document processing method, device, electronic device and storage medium
EP1532505A2 (en) Ensuring policy enforcement before allowing usage of private key
US20040143740A1 (en) Method of using hardware-type electronic signature in e-mail handling system
EP1300980A1 (en) Process for providing non repudiation of receipt (NRR) in an electronic transaction environment
JP2003309557A (en) Electronic signature method
Carden Public Key Infrastructure for Messaging Security.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication