CN1304610A - Security method and apparatus for a secure data transmission system - Google Patents
Security method and apparatus for a secure data transmission system Download PDFInfo
- Publication number
- CN1304610A CN1304610A CN00800735.7A CN00800735A CN1304610A CN 1304610 A CN1304610 A CN 1304610A CN 00800735 A CN00800735 A CN 00800735A CN 1304610 A CN1304610 A CN 1304610A
- Authority
- CN
- China
- Prior art keywords
- file
- executable program
- secure
- program
- received
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
Abstract
Description
本申请是申请号为60/125,437、申请日为1999年3月22日的临时专利申请的部分继续申请。This application is a continuation-in-part of Provisional Patent Application Serial No. 60/125,437, filed March 22, 1999.
本发明的背景技术Background technology of the present invention
1.本发明的领域1. Field of the invention
本发明涉及数据传送系统,尤其涉及传送保密文件的方法和设备,使得接收者不需要在接收端有特别的设备就能够检查文件并且提供保密响应。The present invention relates to a data transmission system, and more particularly to a method and device for transmitting a confidential document, enabling a recipient to check the document and provide a confidential response without having special equipment at the receiving end.
2.相关技术的描述2. Description of related technologies
大多数现有技术的保密数据系统要求在传送和接收端有特别的装置,以便恢复保密信息和提供保密应答。这种系统通常在消息的两端包括加密和解密装置。Most prior art secure data systems require special arrangements at the transmitting and receiving ends in order to recover secure information and provide secure responses. Such systems usually include encryption and decryption means at both ends of the message.
很清楚,发送者必须有将未加密电文转换为某些加密或编码格式的设备,该格式对于在接收端缺少兼容设备的人来说是难读的。由于在尝试获得保密通讯中有如此多的不同类型和风格的加密和编码,以及由于缺少单一的标准系统,因此,发送者和接收者具有兼容的加密系统的概率是很低的。Clearly, the sender must have the equipment to convert the unencrypted text into some encrypted or encoded format that is unreadable to someone who lacks compatible equipment on the receiving end. Because there are so many different types and styles of encryption and encoding in attempts to obtain secure communications, and because there is no single standard system, the probability that a sender and receiver will have compatible encryption systems is low.
互联网络(全球计算机网络)是一种用于信息交换的快速发展的媒体。虽然有许多信息是未定的值,但是作为一种电子商务载体的互联网络的使用意味着更加需要提供数据传输的保密性。The Internet (global computer network) is a rapidly developing medium for information exchange. Although much information is of undetermined value, the use of the Internet as a carrier of e-commerce means that there is a greater need to provide confidentiality for data transmission.
不同类型的数据传送表现出不同的风险和障碍并且要求适当地防止窜改、恶化、偷窃、非授权进入等等。许多对互联网络数据提供这种保密的软件和硬件产品要求在事务处理两端的用户(即发送者和接收者)具有相同的软件组成或至少一个高兼容装置。Different types of data transfer present different risks and obstacles and require adequate protection against tampering, corruption, theft, unauthorized access, etc. Many software and hardware products that provide such privacy to Internet data require users at both ends of the transaction (ie, sender and receiver) to have the same software components or at least one highly compatible device.
这种在数据交换的两端具有几乎相同软件的要求是很受限制的。想象涉及五个不同组织的各方的交换吧!这种要求可以(并且已经)用如来自Symantec的Norton Secret Stuff、来自PKWare的Zip和WinZip、来自VIAexpress的Universal Envelope以及来自本发明的受让人的Envelope98的产品进行处理。每个产品将要被传送的消息“打包”在一个“电子信封”里。这个“信封”包含所有的计算机代码和必需的逻辑,以在传送期间保护该消息并且在接收端提取它。This requirement to have nearly identical software at both ends of the data exchange is very restrictive. Imagine an exchange involving parties from five different organizations! This requirement can be (and has been) addressed with products such as Norton Secret Stuff from Symantec, Zip and WinZip from PKWare, Universal Envelope from VIAexpress, and Envelope98 from the assignee of the present invention. Each product "packages" the message to be delivered in an "electronic envelope". This "envelope" contains all the computer code and logic necessary to protect the message during transmission and extract it at the receiving end.
这种“信封”能够成功地保护发送的数据到达接收机。然而,在许多情况下,接收机可能希望(或被要求)应答,并且应答也必须在传送期间被保护。这样,问题又发生了。要求接收机安装和使用某种类型的密码软件或硬件来保护应答。This "envelope" successfully protects the transmitted data from reaching the receiver. In many cases, however, the receiver may wish (or be required) to acknowledge, and the acknowledgement must also be protected during transmission. In this way, the problem happened again. Receivers are required to install and use some type of cryptographic software or hardware to protect responses.
最重要的是,这个问题必须以一种简单使用的方式解决而且不能要求有过多的准备量(即创建和分配证书和公用密钥,维持鉴别链路和公用密钥环路)。一般地,在需要在两个实体(直接地或者经过专用的或公用的通讯系统)之间保密地和双向地传送数据的情况下,必须在两端安装相同的或高兼容性软件和/或硬件。每当一方希望与多方交换信息时就会出现困难。尽管这样,可能很难保证双方具有能够相互通讯的设备。Most importantly, this problem must be solved in a way that is simple to use and does not require an excessive amount of preparation (ie, creating and distributing certificates and public keys, maintaining authentication links and public key loops). Generally, where there is a need to transfer data securely and bi-directionally between two entities (directly or via a dedicated or public communication system), the same or highly compatible software and/or hardware. Difficulties arise whenever one party wishes to exchange information with multiple parties. Even so, it may be difficult to ensure that both parties have devices capable of communicating with each other.
有许多产品和技术可以解决这个问题。它们包括公知的PGP(“非常好的保密(pretty good privacy)”)、PEM、S/MIME以及SSL的技术。在每种情况下,系统不能交叉兼容(即,用PGP系统加密的消息不能用S/MIME来解密,反之也一样)。另外,这些系统的用户被迫进入一个系列复杂的操作来准备数据交换(即密钥产生、鉴别证书等)。一些系统要求可以信任的第三方参与来鉴别参加数据传送的各方的身份。There are many products and technologies that can solve this problem. They include the well-known technologies of PGP ("pretty good privacy"), PEM, S/MIME and SSL. In each case, the systems are not cross-compatible (ie, messages encrypted with the PGP system cannot be decrypted with S/MIME, and vice versa). In addition, users of these systems are forced to enter into a complex series of operations to prepare for data exchange (ie key generation, authentication certificates, etc.). Some systems require the participation of a trusted third party to authenticate the identities of the parties involved in the data transfer.
虽然现有的系统在某些情况下是有用的,但是它们的接收很慢并且由于高成本(在计算机资源和用户时间的形式上)和有限的交叉兼容性而受到限制。While existing systems are useful in certain situations, their adoption has been slow and limited due to high costs (in the form of computer resources and user time) and limited cross-compatibility.
例如,如果来自相同组织的两个用户希望使用PGP通信,他们将使用中心计算机(鉴别/密钥服务器)交换公用密钥。实质上,这种服务器将保证每个用户识别另一个用户以及给每个用户提供另一个用户的加密密钥。因为大多数组织将选择单个系统来使用保密信息交换(即PGP),现在用户可以容易地和保密地交换电子邮件。For example, if two users from the same organization wish to communicate using PGP, they will use a central computer (authentication/key server) to exchange public keys. Essentially, such a server would ensure that each user identifies the other user and provide each user with the other user's encryption key. Since most organizations will choose a single system to use for private message exchange (ie, PGP), users can now exchange e-mail easily and privately.
然而,如果两个用户来自不同的组织,则可能没有中心计算机用作“证书授权”。这样,用户必须亲自或通过邮件来交换密钥。他们也可以依靠可以信任的第三方提供这种服务。两个用户将仍然必须建立一个公共的标准,采用标准PGP、PEM、S/MIME等来加密他们的数据。一方或双方必须交换这种约定的标准。However, if the two users are from different organizations, there may not be a central computer to be used as a "certificate authority". Thus, users must exchange keys in person or by mail. They can also rely on trusted third parties to provide this service. Both users will still have to establish a common standard to encrypt their data using standard PGP, PEM, S/MIME, etc. One or both parties must exchange such agreed standards.
很明显,在这个过程中产生的额外开销使所需的交换极大的复杂化。如果交换在属于两个以上组织的两个以上用户之间进行,则复杂性的等级迅速增加。因此要求一种较简单的解决方案。Obviously, the extra overhead incurred in this process greatly complicates the required exchange. If the exchange is between two or more users belonging to two or more organizations, the level of complexity increases rapidly. A simpler solution is therefore required.
具有“电子信封”软件的两个用户可以交换信息而不用首先约定一个标准系统。然而,每个用户必须在他的计算机中安装某种形式的电子信封系统。甚至上面描述的“电子信封”系统也不能在多方之间双向传送数据,除非所有的“传送”方已经将相同的密码软件安装在他们的计算机上。Two users with "electronic envelope" software can exchange information without first agreeing to a standard system. However, each user must have some form of electronic envelope system installed in his computer. Even the "electronic envelope" system described above cannot transfer data in both directions between parties unless all "transmitting" parties have installed the same cryptographic software on their computers.
本发明的概述Summary of the invention
根据本发明,提供给用户经过包括电子邮件的专用和公用通讯网络发送“电子信封”的能力。发送的信息被防止在传输中非授权进入、恶化、窜改和偷窃,并且“电子信封”允许接收用户解密消息而不必安装任何密码软件或硬件。According to the present invention, users are provided with the ability to send "electronic envelopes" over private and public communication networks, including electronic mail. The information sent is protected from unauthorized access, deterioration, tampering and theft in transit, and the "electronic envelope" allows the receiving user to decrypt the message without having to install any cryptographic software or hardware.
本发明包括“保密应答”特性,它允许编码消息的接收者加密和返回一个消息给发送者,同样不需要安装任何密码软件。本发明给予接收者的应答与提供给发送者的原始加密相同级别的保护和保密。The present invention includes a "Secret Response" feature which allows the recipient of an encoded message to encrypt and return a message to the sender, again without requiring any cryptographic software to be installed. The present invention gives the recipient's reply the same level of protection and confidentiality as the original encryption provided to the sender.
本发明也较容易使用,只要求两个参与方通过任何可利用的通讯模式如电话会话、邮件、个人通讯或任何其它模式来交换密钥(称为“通行用语(passphrases)”)。密钥可以经常地改变,因此增强了保密性。The present invention is also relatively easy to use, requiring only that the two parties exchange keys (called "passphrases") through any available communication mode such as telephone conversations, mail, personal communication or any other mode. Keys can be changed frequently, thus enhancing security.
并不是要求所有交换信息的用户都安装本发明系统。例如,在服务销售商发送发票(经过电子邮件)给选择的客户的系统中,这些客户不需要安装任何密码软件。本发明提供所有必需的功能以允许支付的指令保密地返回给销售商。使用S/MIME或任何其它现有系统的相同系统将要求所有的用户与销售商交换密钥并且获得可兼容的软件。Not all users exchanging information are required to install the system of the present invention. For example, in a system where a service vendor sends invoices (via email) to selected customers, those customers do not need to install any cryptographic software. The present invention provides all the necessary functionality to allow instructions for payment to be returned securely to the vendor. The same system using S/MIME or any other existing system would require all users to exchange keys with the vendor and obtain compatible software.
可以想象来自不同公司的两个人,例如,Alice,在WidgetManufacturing Corporation(WMC)工作,和Bob,在Widget工厂所需部件的供应商WidgetBits,Inc.工作,需要进行加密通讯。Alice需要来自Bob的计划,以便在六个月内将Widget部件提供给WMC。It is conceivable that two people from different companies, for example, Alice, who works at Widget Manufacturing Corporation (WMC), and Bob, who works at WidgetBits, Inc., the supplier of components required by the Widget factory, need to communicate encrypted. Alice needs a plan from Bob to provide the Widget part to WMC within six months.
因为Widget的市场是这样一种竞争的环境,Alice和Bob都十分清楚地知道,如果他们的竞争对手获取Alice的请求信息或Bob的应答信息,则对于他们各自的商业利益可能有损害。因此,他们应使用本发明的系统来处理他们的商务。Because the Widget market is such a competitive environment, both Alice and Bob know very well that if their competitors obtain Alice's request information or Bob's response information, it may be harmful to their respective business interests. Therefore, they should use the system of the present invention to conduct their business.
Alice使用任何文字处理器开始创建“计划请求”(RFP)文件。随后她使用本发明来加密她的文件,将它“打包”在自解密“信封”中。她也将一种特性给予Bob,使他有能力来加密他的应答。最后,她使用任何她选择的手段来发送这个“信封”给Bob,仅举几个例子,这些手段有电子邮件、文件传输或复制文件到盘中并且将它邮寄。Alice starts creating a Request for Planning (RFP) document using any word processor. She then uses the invention to encrypt her file, "packaging" it in a self-decrypting "envelope". She also gives Bob a property that gives him the ability to encrypt his responses. Finally, she sends this "envelope" to Bob using whatever means she chooses, e-mail, file transfer, or copying the file to disk and mailing it, to name a few.
继续类似“信封”的讨论,当Bob接收到加密消息(“信封”)时,他使用先前接收的“通行短语”打开。然后该文件被解密。Bob确信在文件传输时没有人看到它并且没有被以任何方式损坏或修改。Continuing with the similar "envelope" discussion, when Bob receives an encrypted message ("envelope"), he opens it using a previously received "passphrase". The file is then decrypted. Bob is sure that no one saw the file while it was being transferred and that it was not corrupted or modified in any way.
Bob现在自由地写他的计划。他又使用任何文字处理器,创建文件发送给Alice作为他的答复。当文件准备好时,他再次打开原始的“信封”并且提供通行短语。提供创建保密应答的选择。如果选择,则使用与解密原始消息相同的通行短语来加密该计划。然后Bob在他的计划中使用任意处理手段自由地发送他的计划,返回给Alice作为保密应答文件。Bob is now free to write his plans. He again uses any word processor, creates a file to send to Alice as his reply. When the file is ready, he opens the original "envelope" again and provides the passphrase. Provides the option to create a confidential answer. If selected, the scheme is encrypted using the same passphrase used to decrypt the original message. Bob is then free to send his plan, using arbitrary processing in his plan, back to Alice as a confidential answer file.
一旦接收到保密的应答,Alice使用本发明的原始加密-解密程序与原始通行短语来解密它。现在她能够读Bob的计划并且继续处理她的商务。Once the encrypted reply is received, Alice decrypts it using the original encryption-decryption procedure and the original passphrase of the present invention. Now she can read Bob's plan and proceed with her business.
另一个使用本发明的例子是在电子商务环境中进行记帐和支付的处理系统。这种类型的系统使用了为多个专用目的提供保密应答的能力,并且实现不同于本发明优选实施例的用户接口。然而,提供保密应答的能力是不变的。Another example of use of the present invention is a billing and payment processing system in an electronic commerce environment. This type of system utilizes the ability to provide secure responses for a number of dedicated purposes and implements a different user interface than the preferred embodiment of the present invention. However, the ability to provide confidential responses is unchanged.
在一个(非常简单的)电子记帐和支付系统中,双方经过电子邮件连接通信。双方首先将约定一个口令或短语(它也可以是个人身份证号码或“密码”),通过它,传送的数据用密码加密。销售商发送给客户一个发票或反映交易活动的清单和欠资量。客户以支付指令和授权来回应。In a (very simple) electronic billing and payment system, two parties communicate over an e-mail connection. The two parties will first agree on a password or phrase (it can also be a personal identification number or "password") through which the data transmitted is encrypted with the password. The seller sends the customer an invoice or statement reflecting transaction activity and the amount owed. The customer responds with payment instructions and authorizations.
例如,销售商将准备一个清单。这个清单随后与设计来收集客户付费指令的专用程序一道加密和封闭在一个“信封”里。这个信封经过电子邮件发送给客户。客户使用先前与销售商约定建立的口令或短语打开信封。一旦信封的内容被解密,则清单就提供给客户。For example, a seller will prepare a checklist. This list is then encrypted and enclosed in an "envelope" along with a special program designed to collect customer payment instructions. This envelope is emailed to the customer. The customer opens the envelope using a password or phrase previously agreed upon with the vendor. Once the contents of the envelope are decrypted, the manifest is provided to the customer.
当客户准备对销售商支付时,信封被再次打开并且专用程序自动地执行,提供给客户各种支付选择。当客户已经选择支付方法时,保密应答就产生了(支付选择程序已自动请求来自原始信封的保密应答)。When the customer is ready to pay the vendor, the envelope is opened again and a dedicated program is automatically executed, providing the customer with various payment options. When the customer has selected a payment method, a confidential response is generated (the payment selection program has automatically requested a secure response from the original envelope).
保密应答随后通过电子邮件返回给销售商。当销售商收到客户的保密应答时,自动的处理过程将该答复解密,提取客户的支付指令并且将它们提交,以便进一步地处理。在本发明受让人的专利产品中具有实现这种电子记帐和支付的工作系统。The confidential response is then emailed back to the vendor. When the merchant receives the customer's confidential response, an automated process decrypts the response, extracts the customer's payment instructions and submits them for further processing. A working system for such electronic billing and payment is found in the patented product of the assignee of the present invention.
提供保密应答特性的目的是允许两个计算机用户在他们中只有一个具有所需的密码软件的情况下保密地通讯(即,使用加密的数据文件)。无论需要什么软件,双方都要解密发送的消息,并且要加密被传送的对于原始消息的应答。The purpose of providing the secure reply feature is to allow two computer users to communicate securely (ie, using encrypted data files) if only one of them has the required cryptographic software. Regardless of the software required, both parties decrypt the messages sent, and the replies to the original messages are encrypted for transmission.
保密答复也可以用于任何这样的情况下,即,在不知道正确的口令或短语而不能创建保密应答时,都需要确认消息已经接收并且被正确解密。另外,确认本身的内容可能对于竞争的商家或个人是有用的,这样,加密的应答提供所需的保密。Secret replies can also be used in any situation where confirmation that a message was received and correctly decrypted is required when a secret reply cannot be created without knowing the correct password or phrase. In addition, the content of the identification itself may be useful to competing businesses or individuals, such that encrypted responses provide the required secrecy.
在本发明受让人的专利产品中提供了这种实现电子记帐和支付的工作系统。提供保密应答特性的目的是允许两个计算机用户在他们中只有一个具有所需的密码软件的情况下保密地通讯(即,使用加密的数据文件)。无论需要什么软件,双方都要解密发送的消息,并且要加密被传送的对于原始消息的应答。Such a working system for implementing electronic billing and payment is provided in a patented product of the assignee of the present invention. The purpose of providing the secure reply feature is to allow two computer users to communicate securely (ie, using encrypted data files) if only one of them has the required cryptographic software. Regardless of the software required, both parties decrypt the messages sent, and the replies to the original messages are encrypted for transmission.
对于一个不同的例子,在一个越来越复杂的世界中,常常需要各种领域或专业的专家一起秘密地工作。许多时间这些专家必须几乎不引人注意地合作并且交换的信息是敏感的或是秘密级别的。所有各方都希望以最小的额外开销花费来执行信息交换。For a different example, in an increasingly complex world, experts in various fields or specialties are often required to work secretly together. Many times these experts must cooperate with little notice and the information exchanged is of a sensitive or secret level. All parties wish to perform the information exchange with minimal overhead expenditure.
例如,可以想象一个法律公司(XYZ合伙人)在争议诉讼案中代理著名的一方。所有涉及这个案件的材料被认为是很敏感的。然而,XYZ需要与另一个距离很远的公司(HIJ)的律师商量该案件某方面的情况。当然,时间是关键的。For example, imagine a law firm (XYZ Partners) representing a prominent party in a dispute lawsuit. All material involved in this case is considered sensitive. However, XYZ needs to discuss certain aspects of the case with lawyers at another firm (HIJ) located far away. Of course, timing is of the essence.
使用本发明,XYZ的律师可以通过公共的电子邮件网络保密地发送文件给HIJ。HIJ的律师可以随后编辑任何发送的文件或将他们的意见输入加到文件中,以及使用本发明,以相同的保密级别回答XYZ。Using the present invention, XYZ's attorney can confidentially send documents to HIJ over the public email network. HIJ's attorneys can then edit or add their input to any sent documents and, using the present invention, answer XYZ with the same level of confidentiality.
通过保密传送,保护了所有各方,并且合作成果只需要最小的额外开销和准备。Through confidential transfer, all parties are protected, and the collaborative effort requires minimal additional overhead and preparation.
因此,本发明的目的是提供一种方法和设备来发送加密消息,它能够加密地确认保密文件已经成功地接收和解密,在接收端不需要专门的硬件或软件。It is therefore an object of the present invention to provide a method and apparatus for sending encrypted messages which cryptographically confirms that a confidential document has been successfully received and decrypted, without the need for specialized hardware or software at the receiving end.
另一个目的是通过首先用虚设文件发送加密传输,检索来自远端计算机用户的保密文件。Another purpose is to retrieve confidential files from remote computer users by first sending encrypted transmissions with dummy files.
还有一个目的是通过使两个计算机用户合作开发文件如方案、商务计划、计算机软件、机械图等来促进保密合作工作环境。使用保护的传输,文件将可以从第一个用户发送到第二个用户并且第二个用户能够随后对文件进行任何需要的修改并且使用本发明返回它。Yet another object is to promote a confidential collaborative work environment by enabling two computer users to collaborate in the development of documents such as proposals, business plans, computer software, mechanical drawings, and the like. Using protected transfers, a file will be able to be sent from a first user to a second user and the second user can then make any desired modifications to the file and return it using the present invention.
本发明的另一个目的是通过使用本发明返回的用户登记信息,能够进行软件的保密分配。Another object of the present invention is to enable secure distribution of software by using the user registration information returned by the present invention.
本发明的另一个目的是能够将研制的有关产品的信息分配到限制的计算机用户群。根据本发明,这些用户将以评论、建议等方式来回答。Another object of the invention is to be able to distribute information about a developed product to a restricted group of computer users. According to the invention, these users will reply with comments, suggestions, etc.
结合附图和下面的描述可以理解具有本发明结构和操作方法的新特性与它的其它特性及优点,其中本发明的优选实施例通过举例来说明。它用于更好地理解,然而,这些附图仅仅是用于说明和描述,它们并不作为本发明的限定。The novel nature of the structure and method of operation of the invention, together with other characteristics and advantages thereof, will be understood when read in conjunction with the accompanying drawings and the following description, wherein the preferred embodiments of the invention are illustrated by way of example. It is used for better understanding, however, these drawings are only for illustration and description, they are not as limiting the present invention.
附图的简要说明A brief description of the drawings
图1是表示本发明的操作原理的流程图。Figure 1 is a flow chart illustrating the principle of operation of the present invention.
图2包括图2a-2d,是实现保密信息的发送、接收和返回所采用步骤的流程图。Figure 2, comprising Figures 2a-2d, is a flowchart of the steps taken to achieve the sending, receiving and returning of confidential information.
图3包括图3a-3d,是本发明过程的更详细流程图。Figure 3, comprising Figures 3a-3d, is a more detailed flowchart of the process of the present invention.
图4包括图4a-4b,是用于保密记帐和支付处理的本发明实施例的流程图。Figure 4, comprising Figures 4a-4b, is a flowchart of an embodiment of the present invention for secure billing and payment processing.
优选实施例的说明Description of the preferred embodiment
下面对程序流程的描述和各个图说明了当前正在实施的本发明,由本申请人转让给受让人,其产品是商标为Envelope98TM的保密传送产品。相同的过程可应用于对用户接口稍微改变的其它情况。The following description of program flow and various figures illustrate the present invention as it is currently practiced, assigned by the applicant to the assignee, the product of which is a secure transfer product under the Envelope98TM trademark. The same process can be applied to other cases with slight changes to the user interface.
从图1开始,示出了说明使用本发明的一般概况。使用专门的程序、包括可执行程序和加密文件的消息(envelope.exe),在接收和执行时创建,根据提供的预选口令或短语来解密信息内容。整个消息可以用电子邮件发送给接收者,调制解调器到调制解调器的文件经过电话线路传送,或者可以记录在盘上,该盘通过信使或经过邮局发送。Starting with Figure 1, a general overview illustrating the use of the invention is shown. Messages (envelope.exe) are created using specialized programs, including executable programs and encrypted files (envelope.exe), upon receipt and execution, to decrypt message content based on a preselected password or phrase provided. The entire message can be e-mailed to the recipient, modem-to-modem file transfer over the telephone line, or can be recorded on disk which is sent by courier or via the post office.
在接收端,接收方执行作为消息的集成部分(integral part)的程序(envelope.exe)。然后,接收的计算机请求约定的口令或短语,并且根据规定,在加密文件上操作以解密它们。然后,接收者作出选择以提供保密加密的应答。On the receiving end, the recipient executes the program (envelope.exe) that is an integral part of the message. The receiving computer then requests the agreed upon password or phrase and, as specified, operates on the encrypted files to decrypt them. The recipient then makes an option to provide a securely encrypted reply.
如果作出选择,则在准备答复之后,接收的消息被再次执行,并且当请求时应答选择加密应答消息并且应答可以使用在发送原始消息时使用的任何相同的方法传送返回给始发者。一旦始发者接收到消息,他的设备就能够解密返回的文件。If a choice is made, the received message is executed again after the reply is prepared, and the reply selects the encrypted reply message when requested and the reply can be transmitted back to the originator using any of the same methods used when sending the original message. Once the originator receives the message, his device is able to decrypt the returned file.
如图1所示,开始的步骤是创建envelope.exe文件12,这将在下面结合图2更详细地解释。在图1中,全球计算机网络用于传送在传送步骤14的文件。在接收端,文件被接收16并且发送的程序被执行,步骤18。如果接收者希望证实一个加密的应答,则接收的程序能够准备应答,步骤20,并且这个应答通过全球计算机网络返回,步骤22。该应答由原始发送者接收,步骤24,该发送者具有解密该应答的程序,步骤26。As shown in FIG. 1 , the initial step is to create an envelope.exe file 12 , which will be explained in more detail below in conjunction with FIG. 2 . In FIG. 1 , a global computer network is used to transfer the files in the transfer step 14 . At the receiving end, the file is received 16 and the sent program is executed, step 18 . If the recipient wishes to validate an encrypted response, the receiving program can prepare the response, step 20, and this response is returned, step 22, via the global computer network. The reply is received, step 24, by the original sender, which has a program to decrypt the reply, step 26.
在图2a中,通过解释发送消息的流程,详细地说明本发明的优选实施例。一开始,用户确定哪个文件要被发送、加密算法和口令或短语、是否包括保密应答选择、任何其它用户专用的消息和文件名。在下一步骤,解密引擎代码被写入并且加到其它的文件单元中。In Fig. 2a, a preferred embodiment of the present invention is illustrated in detail by explaining the flow of sending messages. Initially, the user specifies which file is to be sent, the encryption algorithm and password or phrase, whether to include a privacy answer option, any other user-specific messages, and the file name. In the next step, the decryption engine code is written and added to other file units.
发送的每个文件被顺序地检索,以及如果作出选择,则压缩。接下来,计算专用的数据并且在连续的步骤中使用用户确定的算法加密。准备文件标题并且设置文件用于传输。Each file sent is retrieved sequentially and, if selected, compressed. Next, the private data is calculated and encrypted in successive steps using a user-defined algorithm. Prepare file headers and set up files for transfer.
每个剩余的选择的数据文件接着经过相同的步骤处理,直到所有选择的文件都被压缩(如果已经作出选择)为止,还设置检错码、文件大小信息和任何必须附加和加密的其它信息。在所有的文件处理之后,该消息被关闭并且准备通过任何可利用的途径传输,这些途径包括全球计算机网络、调制解调器到调制解调器直接传输或在可传输介质上存储以及通过邮局或信使发送。Each remaining selected data file is then processed through the same steps until all selected files are compressed (if selections have been made), error detection codes, file size information and any other information that must be appended and encrypted are also set. After all file processing, the message is closed and ready for transmission via any available means, including worldwide computer networks, direct modem-to-modem transmission or storage on transmissible media, and sending via post office or courier.
现在参照图2b,示出了在接收端完成的步骤。当执行传送程序envelope.exe时,信封标题被读出并且与传送文件数量相关的信息被记录(noted)。Referring now to Figure 2b, the steps performed at the receiving end are shown. When the transfer program envelope.exe is executed, the envelope header is read out and information related to the number of transfer files is noted.
然后各种用户指令起作用,包括指示要被提取的文件、接收者计算机的目的地、口令或短语,包括在应答中的文件(如果有),以及是否进行应答,应答的目的地。Various user commands are then acted upon, including instructions indicating the file to be extracted, the destination of the recipient's computer, the password or phrase, the file (if any) to include in the answer, and whether to answer, the destination of the answer.
下面,每个传送的文件接着被解密、解压缩,经过完整性检查来验证并且写到接收者系统的预选目的地。如果进行保密应答,则在图2c中可以找到下一个步骤。Next, each transmitted file is then decrypted, decompressed, verified with integrity checks and written to the preselected destination on the recipient's system. If a confidential reply is made, the next step can be found in Figure 2c.
在接收消息之后,如果接收方准备发送应答,则用户再次执行接收的程序(即运行envelope.exe指令)。该程序(通过使用消息标题中的标记)知道原始的内容已经被解密并且询问用户是否创建保密应答。After receiving the message, if the receiver is ready to send a reply, the user executes the received program again (ie, runs the envelope.exe command). The program (by using a flag in the message header) knows that the original content has been decrypted and asks the user whether to create a secret reply.
如果用户请求应答,则程序要求加密文件名或加密文件,并且在加密文件之后,将它们“打包”在应答标题中。注意没有解密程序与应答一起返回,因为存在需要解密应答的软件是创建该消息的先决条件。If the user requests an answer, the program asks for encrypted filenames or encrypted files, and after encrypting the files, "packs" them in the answer header. Note that no decryption routine is returned with the reply, since the presence of software that needs to decrypt the reply is a prerequisite for creating the message.
如果提供和选择了保密应答,则用户确定哪个文件发送、文件名、口令或通行短语以及标题。当接收的程序再次执行时,压缩(如果要求)要返回的每个文件,专门信息被收集,并且每个文件由发送给接收者的程序加密,该接收者没有其它加密或解密软件可用于他的系统。当所有被返回的文件处理后,文件被关闭并且应答消息返回。If a confidential answer is provided and selected, the user determines which file to send, the file name, password or passphrase, and title. When the receiving program is executed again, each file to be returned is compressed (if required), specific information is collected, and each file is encrypted by the program sent to the recipient, who has no other encryption or decryption software available to him system. When all returned files have been processed, the file is closed and a reply message is returned.
图2d表示在原始发送者位置接收应答时具有下面的步骤。原始发送者的程序可以读出应答的标题并且提取所有必需的处理信息。然后处理原始接收者的应答指令,包括提取的文件、口令或通行短语以及发送文件的目的地。Figure 2d shows the receipt of a reply at the original sender's location with the following steps. The original sender's program can read the reply's header and extract all necessary processing information. The original recipient's reply instructions are then processed, including the file to extract, the password or passphrase, and the destination to send the file to.
接下来,每个返回的文件使用适当的算法解密。如果需要,该文件接着被解压缩。检查完整性内容并且将文件存储在选择的目的地。当所有的文件被存储时,认为完成了程序。Next, each returned file is decrypted using the appropriate algorithm. The file is then decompressed, if necessary. Contents are checked for integrity and the file is stored at the chosen destination. The procedure is considered complete when all files are stored.
转到图3a,接收端的处理在一部分流程图中说明。一开始,选择命令行的应答选择。如果当前没有文件名,则设置标记来指示要创建的应答,并且产生文件名。程序随后请求先前约定的口令或短语。一旦提供,则加密密钥由口令或短语产生并且消息被打开和读取。在读取标题后,程序检查看看是否应答选择被设置的标记指示,但消息还没有解密。如果是这样,则给出一个警告并且提供继续选择。如果选择不是继续,则退出程序。Turning to Figure 3a, processing at the receiving end is illustrated in a portion of a flowchart. To begin, select the answer option for the command line. If there is currently no filename, a flag is set indicating the answer to be created, and a filename is generated. The program then requests the previously agreed upon password or phrase. Once provided, an encryption key is generated from the passphrase or phrase and the message is opened and read. After reading the header, the program checks to see if the response option is indicated by the flag being set, but the message has not yet been decrypted. If so, a warning is given and the option to continue is offered. If you choose not to continue, exit the program.
参照图3b,如果继续处理,则下一个分支点为是否标记没有设置但消息已经解密。如果是肯定的,则请求用户决定是否要求应答。如果不要求应答,则清除标记。如果要求应答,则设置标记。Referring to Figure 3b, if processing continues, the next branch point is if the flag is not set but the message has been decrypted. If yes, the requesting user decides whether to ask for a reply. If no acknowledgment is required, the flag is cleared. Flag is set if an answer is required.
下一个分支点检验标记。如果它被设置,则验证密钥。如果没有,则消息被解密并且退出程序。密钥被验证,如果正确,则进行下一个检查。如果密钥不正确,则退出程序。下一个步骤是检查应答文件名。如果还没有设置,则从用户那里获得名字。如果名字设置了,则检查看看文件是否可使用。The next branch point check mark. If it is set, the key is verified. If not, the message is decrypted and the program exits. The key is verified, and if correct, the next check is performed. If the key is incorrect, exit the program. The next step is to check the answer file name. If not set, gets the name from the user. If the name is set, check to see if the file is available.
现在参照图3c继续该过程。创建用于应答输出文件的名字。询问用户创建的名字是否可接受。如果不能接受,则获得可接受的文件名。如果可接受,则必须确定是否可以创建文件。如果不能,则退出程序。如果可以,则加密文件,“信封”和数据文件的标题被写入并且显示该过程已经完成的消息。The process is now continued with reference to Figure 3c. The name of the output file to create for the answer. Ask if user-created names are acceptable. If not acceptable, get an acceptable filename. If acceptable, you must determine if the file can be created. If not, exit the program. If it can, the encrypted file, the "envelope" and the header of the data file are written and a message is displayed that the process has been completed.
现在转到图3d,没有采用接受的应答消息来检查在原始消息源的处理。因为原始的操作程序在这个源,因此,应答能够立刻打开和读取。标题识别被记录并且提供口令或短语。由口令或短语创建加密密钥并且提供用于解密输出文件的文件名。如果使用的密钥是不正确的,则退出程序。如果是正确的,则数据文件被解密并且验证为正确的和没有损坏的。如果它不是,则显示错误消息并且退出程序。如果是正确的,则没有错误消息而退出程序。Turning now to Figure 3d, the processing at the source of the original message is checked without using the accepted reply message. Because the original operating program is at this source, the reply can be opened and read immediately. Title identification is recorded and a password or phrase is provided. Creates an encryption key from a passphrase or phrase and provides a filename for decrypting the output file. If the key used is incorrect, the program exits. If correct, the data file is decrypted and verified to be correct and uncorrupted. If it is not, an error message is displayed and the program exits. If correct, the program exits without an error message.
在包括图4a和图4b的图4的流程图中说明了本发明的另一个实施例。在这个实施例中,说明了用于保密记帐和支付的简化程序。帐单提供给软件程序,该程序压缩帐单,加密它并且创建保密“信封”。创建电子邮件,它包括加密的帐单。然后,电子邮件服务器经过有时称为互联网络的全球计算机网络发送帐单。Another embodiment of the invention is illustrated in the flow diagram of Figure 4 comprising Figures 4a and 4b. In this embodiment, simplified procedures for secure billing and payment are described. The bill is provided to a software program which compresses the bill, encrypts it and creates a confidential "envelope". Create emails that include encrypted bills. The email server then sends the bill across a worldwide network of computers sometimes called the Internet.
现在转到图4b,接收包括帐单的消息并且打开附件。使用全球计算机网络,启动浏览器从特别授权以完成这个服务的网址取出解密程序。一旦获得,运行该解密程序。Turning now to Figure 4b, the message including the bill is received and the attachment is opened. Using the global computer network, a browser is activated to retrieve the decryption program from a URL specifically authorized to perform this service. Once obtained, run the decryption program.
接收者被提示个人身份号码(“密码”)或口令或通行短语。检查密码的有效性。如果无效,则它被打印出来并且关闭程序。如果有效,则程序解密该消息并且经过全球网络发送一个确认给发送者。帐单随后显示在浏览器窗口并且安排连接到记帐网址。在这一点上,支付授权可以被发送,或记帐网址可以提供其它帐单支付选择。票据机网址可以是一个中间服务供应商或一个金融机构,它能够被授权支付所有的或一部分帐单,否则承担支付责任。The recipient is prompted for a personal identification number ("password") or password or passphrase. Check the validity of the password. If invalid, it is printed and the program is closed. If valid, the program decrypts the message and sends an acknowledgment to the sender across the global network. The bill is then displayed in the browser window and a connection is made to the billing URL. At this point, payment authorization can be sent, or the billing site can offer other bill payment options. The bill machine website can be an intermediary service provider or a financial institution, which can be authorized to pay all or part of the bill, or else assume the responsibility for payment.
这样描述的系统中,保密消息能够发送,并且保密应答能够由接收者创建而不需要在接收者计算机上安装任何专门的软件程序。保密消息包括程序,当它执行时,能够观察接收的消息并且准备保密应答。然而,接收者不能使用该程序来创建新的保密消息给第三方或允许第三方创建保密应答。In the system thus described, secure messages can be sent, and secure replies can be created by the recipient without requiring any special software program to be installed on the recipient's computer. Secure messages include programs that, when executed, are able to observe received messages and prepare secure responses. However, recipients cannot use this procedure to create new confidential messages to third parties or to allow third parties to create confidential replies.
本发明的系统使自身保密地交换数据或用于在提供帐单和支付时保密的财务处理。在一个实施例中,可以使用的任何通讯装置,包括(但不限于)便携式介质的传递。在另一个实施例中,可以缩写传送的程序,以致于通过全球计算机网络创建一个链路,它提供所需的软件来解密消息并且创建保密应答。另外,可以采用保密的财务服务网址创建一个单独的链路,该网址可以根据提交的保密记帐控制财务处理。The system of the present invention lends itself to securely exchanging data or for confidential financial processing in providing billing and payment. In one embodiment, any communication means may be used, including (but not limited to) portable media delivery. In another embodiment, the program of transmission can be abbreviated so that a link is created through a global computer network that provides the software needed to decrypt the message and create a secure reply. Alternatively, a separate link can be created using a secure financial services web site that can control financial processing based on confidential billing submissions.
本发明的范围应该仅由下面附属的权利要求书的范围来限定。The scope of the present invention should be limited only by the scope of the following appended claims.
Claims (39)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12543799P | 1999-03-22 | 1999-03-22 | |
| US60/125,437 | 1999-03-22 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN1304610A true CN1304610A (en) | 2001-07-18 |
Family
ID=22419718
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN00800735.7A Pending CN1304610A (en) | 1999-03-22 | 2000-03-22 | Security method and apparatus for a secure data transmission system |
Country Status (7)
| Country | Link |
|---|---|
| EP (1) | EP1088433A1 (en) |
| JP (1) | JP2002540679A (en) |
| CN (1) | CN1304610A (en) |
| AU (1) | AU4019900A (en) |
| BR (1) | BR0005457A (en) |
| DE (1) | DE10080963T1 (en) |
| WO (1) | WO2000057613A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104285406A (en) * | 2012-05-16 | 2015-01-14 | 英特尔公司 | A system for securing and authenticating location-based services using distributed security |
Families Citing this family (24)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7392388B2 (en) | 2000-09-07 | 2008-06-24 | Swivel Secure Limited | Systems and methods for identity verification for secure transactions |
| WO2002045378A2 (en) * | 2000-11-28 | 2002-06-06 | Swivel Technologies Limited | Secure file transfer method and system |
| JP2002175447A (en) * | 2000-12-08 | 2002-06-21 | Tetsuo Kusumoto | Design ordering and collecting method |
| GB0106082D0 (en) | 2001-03-13 | 2001-05-02 | Mat & Separations Tech Int Ltd | Method and equipment for removing volatile compounds from air |
| GB2377774A (en) * | 2001-07-17 | 2003-01-22 | Tornado Entertainment Ltd | Data distrubution system |
| JP3524901B2 (en) * | 2001-12-03 | 2004-05-10 | おべ工業株式会社 | Pit cover opening and closing device for moving objects |
| GB0205045D0 (en) * | 2002-03-05 | 2002-04-17 | Bitarts Ltd | Software protection arrangement |
| US8010405B1 (en) | 2002-07-26 | 2011-08-30 | Visa Usa Inc. | Multi-application smart card device software solution for smart cardholder reward selection and redemption |
| US9852437B2 (en) | 2002-09-13 | 2017-12-26 | Visa U.S.A. Inc. | Opt-in/opt-out in loyalty system |
| US8626577B2 (en) | 2002-09-13 | 2014-01-07 | Visa U.S.A | Network centric loyalty system |
| US7121456B2 (en) | 2002-09-13 | 2006-10-17 | Visa U.S.A. Inc. | Method and system for managing token image replacement |
| US8015060B2 (en) | 2002-09-13 | 2011-09-06 | Visa Usa, Inc. | Method and system for managing limited use coupon and coupon prioritization |
| US6920611B1 (en) | 2002-11-25 | 2005-07-19 | Visa U.S.A., Inc. | Method and system for implementing a loyalty merchant component |
| US7827077B2 (en) | 2003-05-02 | 2010-11-02 | Visa U.S.A. Inc. | Method and apparatus for management of electronic receipts on portable devices |
| US8554610B1 (en) | 2003-08-29 | 2013-10-08 | Visa U.S.A. Inc. | Method and system for providing reward status |
| US7104446B2 (en) | 2003-09-03 | 2006-09-12 | Visa U.S.A., Inc. | Method, system and portable consumer device using wildcard values |
| US7051923B2 (en) | 2003-09-12 | 2006-05-30 | Visa U.S.A., Inc. | Method and system for providing interactive cardholder rewards image replacement |
| US8005763B2 (en) | 2003-09-30 | 2011-08-23 | Visa U.S.A. Inc. | Method and system for providing a distributed adaptive rules based dynamic pricing system |
| US8407083B2 (en) | 2003-09-30 | 2013-03-26 | Visa U.S.A., Inc. | Method and system for managing reward reversal after posting |
| US7653602B2 (en) | 2003-11-06 | 2010-01-26 | Visa U.S.A. Inc. | Centralized electronic commerce card transactions |
| WO2006000653A1 (en) * | 2004-05-26 | 2006-01-05 | France Telecom | Method and platform for manipulating secured data |
| DE102005028066B3 (en) | 2005-06-16 | 2006-12-07 | Deutsche Exide Gmbh | Pole bridge for a battery |
| US7992781B2 (en) | 2009-12-16 | 2011-08-09 | Visa International Service Association | Merchant alerts incorporating receipt data |
| US8429048B2 (en) | 2009-12-28 | 2013-04-23 | Visa International Service Association | System and method for processing payment transaction receipts |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2143874C (en) * | 1994-04-25 | 2000-06-20 | Thomas Edward Cooper | Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub |
| US5805702A (en) * | 1995-09-29 | 1998-09-08 | Dallas Semiconductor Corporation | Method, apparatus, and system for transferring units of value |
-
2000
- 2000-03-22 EP EP00919529A patent/EP1088433A1/en not_active Withdrawn
- 2000-03-22 AU AU40199/00A patent/AU4019900A/en not_active Abandoned
- 2000-03-22 WO PCT/US2000/007588 patent/WO2000057613A1/en not_active Ceased
- 2000-03-22 DE DE10080963T patent/DE10080963T1/en not_active Withdrawn
- 2000-03-22 CN CN00800735.7A patent/CN1304610A/en active Pending
- 2000-03-22 BR BR0005457-7A patent/BR0005457A/en not_active Application Discontinuation
- 2000-03-22 JP JP2000607384A patent/JP2002540679A/en active Pending
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104285406A (en) * | 2012-05-16 | 2015-01-14 | 英特尔公司 | A system for securing and authenticating location-based services using distributed security |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2002540679A (en) | 2002-11-26 |
| WO2000057613A1 (en) | 2000-09-28 |
| DE10080963T1 (en) | 2002-07-25 |
| BR0005457A (en) | 2001-01-30 |
| AU4019900A (en) | 2000-10-09 |
| EP1088433A1 (en) | 2001-04-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN1304610A (en) | Security method and apparatus for a secure data transmission system | |
| US7596689B2 (en) | Secure and reliable document delivery using routing lists | |
| US7360079B2 (en) | System and method for processing digital documents utilizing secure communications over a network | |
| JP5313311B2 (en) | Secure message system with remote decryption service | |
| US20070118735A1 (en) | Systems and methods for trusted information exchange | |
| US7644268B2 (en) | Automated electronic messaging encryption system | |
| KR101143770B1 (en) | A method of encrypting and transferring data between a sender and a receiver using a network | |
| US20020172367A1 (en) | System for secure electronic information transmission | |
| US20050138360A1 (en) | Encryption/decryption pay per use web service | |
| US20050102499A1 (en) | Apparatus for proving original document of electronic mail | |
| JPH09162860A (en) | Method and system for providing safe edi across open network | |
| CN1697367A (en) | A method and system for recovering password protected private data via a communication network without exposing the private data | |
| US7660987B2 (en) | Method of establishing a secure e-mail transmission link | |
| US20080235175A1 (en) | Secure Document Management System | |
| JP2009510628A (en) | Processing of protective electronic communication | |
| US20080235236A1 (en) | Secure Document Management System | |
| CA2554847C (en) | System and method for secure electronic data delivery | |
| WO2000046952A1 (en) | Method for sending secure email via standard browser | |
| US20080235394A1 (en) | Secure Document Management System | |
| CN118611920A (en) | Electronic tender document processing method, device, electronic device and storage medium | |
| EP1532505A2 (en) | Ensuring policy enforcement before allowing usage of private key | |
| US20040143740A1 (en) | Method of using hardware-type electronic signature in e-mail handling system | |
| EP1300980A1 (en) | Process for providing non repudiation of receipt (NRR) in an electronic transaction environment | |
| JP2003309557A (en) | Electronic signature method | |
| Carden | Public Key Infrastructure for Messaging Security. |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
| WD01 | Invention patent application deemed withdrawn after publication |