CN1849774A - Message security - Google Patents
Message security Download PDFInfo
- Publication number
- CN1849774A CN1849774A CNA2004800263389A CN200480026338A CN1849774A CN 1849774 A CN1849774 A CN 1849774A CN A2004800263389 A CNA2004800263389 A CN A2004800263389A CN 200480026338 A CN200480026338 A CN 200480026338A CN 1849774 A CN1849774 A CN 1849774A
- Authority
- CN
- China
- Prior art keywords
- terminal
- key
- seed
- user
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及一种安全加密传送信息的方法以及系统,尤其是用于传送电子邮件和用于通信网络。The invention relates to a method and system for securely encrypting and transmitting information, especially for transmitting emails and for communication networks.
背景技术Background technique
随着互联网及其它网络的使用不断增加,通过电子邮件(email)通信现在已经是一种很普通的行为。每天通过互联网发送无数封电子邮件,包含许多类型的信息。电子邮件也在公司和企业中使用,用于国内外通信。很多电子邮件包含敏感和机密的信息。With the increasing use of the Internet and other networks, communicating by electronic mail (email) is now a very common practice. Countless emails are sent over the Internet every day, containing many types of information. Email is also used in companies and businesses for domestic and international communication. Many emails contain sensitive and confidential information.
不幸的是,不是所有的电子邮件都能到达它们的目的地,甚至可能被错误的地址接收。而且,通常未授权人很容易破解服务器或进入网络阅读电子邮件。Unfortunately, not all emails reach their destination and may even be received by the wrong address. Also, it is often easy for an unauthorized person to hack a server or gain access to a network to read e-mail.
对于发送加密的电子邮件,已有许多方法:PGP(Pretty Good Privacy)(PGP和Pretty Good Privacy是PGP公司的注册商标)是一个用于发送加密电子邮件的应用程序。这个应用程序是一个插件,用于基于使用公开密钥的电子邮件程序。两个用户交换公开密钥,于是能用公开密钥加密并解密电子邮件或其它文件。而且,如果电子邮件用收件人的公开密钥加密并传送,发件方不能存取电子邮件。For sending encrypted e-mail, there are many methods: PGP (Pretty Good Privacy) (PGP and Pretty Good Privacy are registered trademarks of PGP Corporation) is an application program for sending encrypted e-mail. This application is a plug-in for email programs based on the use of public keys. Two users exchange public keys, which can then be used to encrypt and decrypt email or other files. Also, if the e-mail is encrypted and transmitted with the recipient's public key, the sender cannot access the e-mail.
也可以用一个文件作为电子邮件的附件,并给收件人提供密码存取附件。You can also use a file as an e-mail attachment and provide the recipient with a password to access the attachment.
这两种方法意味着每次存取新的加密文件或电子邮件时,都必须使用密码或个人密钥(personal key)。密码或个人密钥可能被忘记,或被未授权者获得。而且,测试表明很多人为了避免忘记密码/个人密钥,使用姓,昵称等,这些很容易被猜到或甚至被记录。Both methods mean that a password or personal key must be used every time a new encrypted file or email is accessed. Passwords or personal keys may be forgotten or obtained by unauthorized persons. Also, tests have shown that many people use last names, nicknames, etc. in order to avoid forgetting their passwords/personal keys, which can be easily guessed or even recorded.
国际专利申请WO 02/077773描述了一种系统、方法和计算机程序产品,它提供了一个加密的电子邮件阅读器和响应器。分布和初始化加密电子邮件的方法包括:第一个用户获得具有公/私钥加密的电子邮件客户软件应用程序的许可;由第一个用户提出请求,让第二个用户下载阅读器/响应器软件应用程序,以便在第一个用户和第二个用户之间交换加密的电子邮件;第二个用户下载并安装阅读器/响应器软件应用程序;第二个用户给第一个用户发送电子邮件,包括使用阅读器/响应器软件应用程序的发送密钥功能嵌入一个未加密的公开密钥;第一个用户接收来自第二个用户的电子邮件,其中未加密的公开密钥被嵌入在电子邮件中;第一个用户向第二个用户发送第二封电子邮件以做出响应,其中阅读器/响应器软件应用程序使用第二个用户的未加密公开密钥来加密第二封电子邮件信息为加密信息;第二个用户将来自第一个用户、带有加密信息作为附件的第二封电子邮件接收到第三方电子邮件软件应用程序上,其中第三方电子邮件软件应用程序不同于阅读器/响应器软件应用程序和电子邮件客户软件应用程序;第二个用户打开附件,执行阅读器/响应器软件应用程序,允许没有电子邮件客户软件的用户阅读并响应由有电子邮件客户软件的用户创建并发送的加密电子邮件。International patent application WO 02/077773 describes a system, method and computer program product which provides an encrypted e-mail reader and responder. Methods of distributing and initializing encrypted email include: first user obtaining permission for an email client software application with public/private key encryption; first user making a request for second user to download a reader/responder software application to exchange encrypted email between a first user and a second user; the second user downloads and installs a reader/responder software application; the second user sends an email to the first user mail, including an unencrypted public key embedded using the Reader/Responder software application's SendKey feature; the first user receives email from a second user with the unencrypted public key embedded in In e-mail; the first user sends a second e-mail in response to the second user, where the reader/responder software application encrypts the second e-mail using the second user's unencrypted public key The email message is encrypted; the second user receives a second email from the first user with the encrypted message as an attachment on a third-party email software application that is different from the A reader/responder software application and an e-mail client software application; a second user opens the attachment, executes the reader/responder software application, and allows the user without the e-mail client software to read and respond to the Encrypted emails created and sent by users of .
公开的美国申请2002059529涉及安全的电子邮件系统,对于预选出的电子邮件用户形成一个请求安全通信的共同参与用户组,包括安全列表服务器,共同参与用户组中的成员将所有安全的电子邮件发送到安全列表服务器上,该服务器包括用于储存证书数据的储存器和CPU,CPU将想要接收每封电子邮件信息的收件人的姓名与存储器中的数据相比较,并处理信息以促进向前认证传送,这种认证传送是按存储器数据的显示对收件人进行及时认证。Published US application 2002059529 relates to a secure e-mail system where pre-selected e-mail users form a group of participating users requesting secure communications, including a safelist server, members of the group of participating users send all secure e-mail to On a safelist server that includes memory for storing certificate data and a CPU that compares the names of recipients who want to receive each e-mail message with the data in memory and processes the information to facilitate forwarding Authenticated transmission, which is to authenticate the recipient in time according to the display of the memory data.
美国2003140235涉及一种在注册了生物特征集的发件人与注册了生物特征集的收件人之间交换电子信息的方法,该方法包括:a.在发件人和收件人之间交换注册的生物特征集;b.生成发件人的live-scan(数字式掌纹扫描工具)生物特征集;c.生成第一区别密钥,第一区别密钥源自发件人的live-scan生物特征集与发件人注册的生物特征集之间的差异;d.用第一区别密钥加密信息;e.用加密密钥对所述发件人的live-scan生物特征集进行加密;f.把加密后的信息和所述加密后的发件人live-scan生物特征集传送给收件人;g.收件人解密所述加密后的发件人live-scan生物特征集;h.收件人通过计算所述发件人的live-scan生物特征集与发件人注册的生物特征集之间的差异,重新生成第一区别密钥;以及i.利用重新生成的第一区别密钥解密信息。US 2003140235 relates to a method of exchanging electronic messages between a sender registered with a biometric set and a recipient registered with a biometric set, the method comprising: a. exchanging between the sender and the recipient Registered biometric feature set; b. generate the sender's live-scan (digital palmprint scanning tool) biometric feature set; c. generate the first distinguishing key, the first distinguishing key is derived from the sender's live-scan The difference between the scan biometric set and the sender's registered biometric set; d. Encrypt the message with the first distinguishing key; e. Encrypt the live-scan biometric set of said sender with the encryption key ; f. transmit the encrypted information and the encrypted sender's live-scan biometric feature set to the recipient; g. the recipient decrypts the encrypted sender's live-scan biometric feature set; h. the recipient regenerates the first distinguishing key by calculating the difference between said sender's live-scan biometric set and the sender's registered biometric set; and i. utilizes the regenerated first The distinct key decrypts the information.
WO 01/91366涉及一种在密码通信系统中生成伪随机密钥的装置和方法。如果给出一个使配置数据初始化的公用集,伪随机密钥可以通过密码通信系统的各种独立的伪随机密钥生成器重复生成。WO 01/91366 relates to an apparatus and method for generating pseudo-random keys in a cryptographic communication system. Given a common set of initial configuration data, pseudo-random keys can be repeatedly generated by various independent pseudo-random key generators of the cryptographic communication system.
WO 02/39660涉及一种使用原地生成的密钥在多个用户和一个中央服务提供者中间进行密码通信的系统和方法。每个用户与中央服务提供者进行通信,优选使用用户通信接口,该用户通信接口包括一个本地密钥生成器,在使用用户自己个人的种子值进行初始化以后,本地密钥生成器生成一个唯一的密钥。通过发布只有各个用户才有的不同用户个人种子,各个用户的本地密钥生成器生成唯一一组密钥。中央服务提供者也有一个本地密钥生成器,并且还优选拥有一份分配给授权用户的所有个人种子的副本。中央服务提供者优选在一种安全加密方式下与各个用户用由用户个人种子生成的密钥进行通信。通过使用生成唯一个人密钥的加密通信,向多个用户发布额外的公用种子值,然后通过使用生成密钥的信号加密,许可安全条件下存取所述的用户,从而导致从公用种子值到希望的用户组。WO 02/39660 relates to a system and method for cryptographic communication between users and a central service provider using keys generated in situ. Each user communicates with the central service provider, preferably using a user communication interface that includes a local key generator that, after initialization with the user's own personal seed value, generates a unique key. Each user's local key generator generates a unique set of keys by publishing a different user personal seed unique to each user. The central service provider also has a local key generator and preferably also has a copy of all personal seeds distributed to authorized users. The central service provider preferably communicates with individual users in a secure encrypted manner using keys generated from the user's personal seed. By using encrypted communication that generates a unique personal key, an additional public seed value is issued to multiple users, and then encrypted by using the signal that generates the key to grant access to said users under secure conditions, resulting in the conversion from the public seed value to desired user group.
在OTP中:One-time pad生成器程序是一个通过互联网发布的共享软件程序( http://www.fourmilab.ch/onetime)用于生成一次性密码本(one-time pads)或密码列表。In OTP: The One-time pad generator program is a shareware program distributed via the Internet ( http://www.fourmilab.ch/onetime ) for generating one-time pads or password lists.
发明内容Contents of the invention
根据本发明最优的实施方案,本发明的主要目的是提供一种安全的电子邮件系统,该系统允许对电子邮件进行加密和解密而不需要重复使用密码或个人密钥。本发明尤其涉及在至少两个远程站点生成同步加密密钥,用于加密并解密电子邮件或类似信息。According to the preferred embodiment of the present invention, the main object of the present invention is to provide a secure electronic mail system which allows encryption and decryption of electronic mail without the need to reuse passwords or personal keys. In particular, the present invention relates to the generation of synchronized encryption keys at at least two remote sites for use in encrypting and decrypting electronic mail or similar information.
本发明另一个目的是提供一种电子邮件系统,该系统能过滤不受欢迎的电子邮件,即所谓的垃圾邮件。Another object of the present invention is to provide an e-mail system which filters unwanted e-mails, so-called spam.
本发明另一个目的是提供一种电子邮件系统,该系统能容易地购买安全电子邮件软件程序。Another object of the present invention is to provide an e-mail system that enables easy purchase of secure e-mail software programs.
基于这些原因,根据最优的实施方案,本发明涉及一种传送电子信息的方法,优选从第一个终端的第一个用户传送电子邮件到第二个终端的第二个用户,包括下列步骤:所述的第一个终端以加密形式传送所述电子邮件,所述加密的电子邮件是通过第一个密钥生成器用一个种子生成的密钥进行加密的,向所述第二个用户一次性提供所述种子,以便让所述第二个终端提供的第二个密钥生成器生成密钥,将所述的种子提供给所述的第二个终端并将所述的种子存储在所述的第二个终端中,当每次所述的第二个用户收到从所述的第一个用户发送的加密电子邮件时,所述的第二个终端利用所述的种子生成一个密钥,同步各个终端的计数值;根据所述的种子和各个终端的计数值生成所述的密钥,与其它终端无关。For these reasons, and according to a preferred embodiment, the present invention relates to a method of transmitting electronic information, preferably electronic mail, from a first user of a first terminal to a second user of a second terminal, comprising the following steps : The first terminal transmits the email in an encrypted form, and the encrypted email is encrypted with a key generated by a seed through the first key generator, and sent to the second user once providing said seed so that a second key generator provided by said second terminal generates a key, providing said seed to said second terminal and storing said seed in said second terminal In the second terminal described above, when the second user receives an encrypted e-mail sent from the first user, the second terminal uses the seed to generate an encrypted email The key is used to synchronize the count value of each terminal; the key is generated according to the seed and the count value of each terminal, regardless of other terminals.
最优选的是,种子仅在第一次初始化时间获得。如果所述的第一个种子不能用了,例如当应用程序被重新安装或在新的电脑上安装时,优选获得第二个种子。Most preferably, the seed is only obtained at first initialization time. A second seed is preferably obtained if said first seed is no longer available, for example when the application is reinstalled or installed on a new computer.
根据一种实施方案,当有许多封电子邮件发送给收件人时,每封加密的电子邮件都获得一个动态序列号。这个动态序列号用来为相应的加密电子邮件生成一个密钥。According to one embodiment, when many emails are sent to the recipient, each encrypted email gets a dynamic serial number. This dynamic serial number is used to generate a key for the corresponding encrypted email.
根据一种实施方案,本发明还进一步包括下列步骤:同步各个终端的计数值;根据所述的种子和各个终端的计数值生成所述的密钥,与其它终端无关。种子以动态的且可交换的方式至少保存在一个终端中,优选保存在所有的终端中。计数值在各个终端的计数器中生成,计数值的同步化与计数器的同步化有关。在计数器初始同步化之后,仅在需要时终端执行补充的同步化步骤。基于种子和计数值的密钥-生成操作是靠一个以非动态和不可改变方式存储在至少一个终端中的算法来实现的。According to one embodiment, the present invention further includes the following steps: synchronizing the count value of each terminal; generating the key according to the seed and the count value of each terminal, regardless of other terminals. The seed is stored in at least one terminal, preferably in all terminals, in a dynamic and exchangeable manner. The count value is generated in the counter of each terminal, and the synchronization of the count value is related to the synchronization of the counter. After the initial synchronization of the counters, the terminal performs supplementary synchronization steps only when required. The key-generating operation based on the seed and count value is performed by means of an algorithm stored in at least one terminal in a non-dynamic and unalterable manner.
根据一个实施方案,本发明还包括如下步骤:根据收到的种子生成一个委托终端列表,并只接受来自所述列表中注册的电子邮件。因而,能阻止垃圾邮件。According to one embodiment, the present invention further includes the step of: generating a list of entrusted terminals according to the received seeds, and only accepting emails registered in said list. Thus, spam can be prevented.
出于安全原因,根据最优的实施方案,本发明包括所述的第一个用户通过电话、传真和书信至少一种方式提供给所述的第二个用户所述种子的步骤。For security reasons, according to a preferred embodiment, the invention includes the step of said first user providing said second user said seed by at least one of telephone, fax and letter.
加密电子邮件的附件与电子邮件一起被加密。Encrypted email attachments are encrypted along with the email.
本发明还涉及从第一个用户传送电子邮件到第二个用户的系统。该系统包括第一个终端和第二个终端,该系统进一步包括:所述第一个终端以加密邮件形式传送所述安全的电子邮件的方法,所述加密的电子邮件是通过第一个密钥生成器用一个种子生成的密钥进行加密的,向所述的第二个用户一次性提供所述的种子以便用第二个密钥生成器生成密钥的方法,将所述的种子提供给所述的第二个终端的方法并将所述的种子存储在所述的第二个终端中的方法,当每次所述第二个用户收到从所述第一个用户发送的加密电子邮件时所述第二个终端利用所述的种子生成密钥的方法。The invention also relates to a system for transmitting electronic mail from a first user to a second user. The system includes a first terminal and a second terminal, the system further includes: a method for the first terminal to transmit the secure e-mail in the form of an encrypted e-mail, the encrypted e-mail is passed through the first encrypted e-mail The key generator is encrypted with a key generated by a seed, and the seed is provided to the second user at one time so as to use the second key generator to generate a key, and the seed is provided to The method of the second terminal and the method of storing the seed in the second terminal, when each time the second user receives the encrypted electronic message sent from the first user A method in which the second terminal uses the seed to generate a key when sending an email.
各个终端包括密钥-生成单元,密钥-生成单元包括存储器,相同的种子存储在存储器中;计数器,周期改变计数值;和计算终端,适合在各个终端并与其它终端无关,根据原始值和由计数器发出的计数值生成密钥。在至少一个终端存储种子的存储器是动态存储器,以动态的且可交换的方式存储种子。各终端被设置为能感应到它们不同步的时候,然后重新设置同步化。至少一个终端的计算单元包括算法,算法以非动态的且不能改变的方式存储,并优选用硬件实现。终端之一是中央终端,它包含多个种子用于安全的加密传送,这些种子与若干不同的终端有关,每个终端具有一个原始值。Each terminal comprises a key-generating unit, the key-generating unit comprising a memory, in which the same seed is stored; a counter, which periodically changes the count value; and a calculation terminal, adapted at each terminal and independently of the other terminals, according to the original value and A key is generated from the count value emitted by the counter. The memory storing the seed in at least one terminal is a dynamic memory, storing the seed in a dynamic and exchangeable manner. Endpoints are set up to sense when they are out of sync and then reset to sync. The computing unit of at least one terminal comprises an algorithm, which is stored in a non-dynamic and unchangeable manner and is preferably implemented in hardware. One of the terminals is the central terminal, which contains several seeds for secure encrypted transmission, these seeds are related to several different terminals, each terminal has an original value.
本发明也涉及用于从第一个终端的第一个用户传送安全的电子邮件到第二个终端的第二个用户的计算机程序产品,包括代码用于:加密并传送所述第一个终端发送的所述电子邮件,用所述的第一个种子在所述的第一个终端生成密钥,获得所述的种子以便在所述的第二个终端用第二个密钥生成器生成密钥,将所述的种子在所述的第二个终端中存储,当每次所述第二个用户收到从所述第一个用户发送的加密电子邮件时,所述的第二个终端利用所述存储的种子生成一个密钥。The invention also relates to a computer program product for transmitting secure electronic mail from a first user of a first terminal to a second user of a second terminal, comprising code for: encrypting and transmitting said first terminal Send the email, use the first seed to generate a key at the first terminal, obtain the seed to generate at the second terminal with the second key generator Key, store the seed in the second terminal, when each time the second user receives the encrypted email sent from the first user, the second The terminal generates a key using said stored seed.
本发明还涉及用于从第一个终端的第一个用户传送安全的电子邮件到第二个终端的第二个用户的传送信号,包括含有代码的信号,其中代码用于:加密并传送从所述第一个终端发送的所述电子邮件,用所述的第一个种子在所述的第一个终端生成密钥,获得所述的种子以便在所述的第二个终端用第二个密钥生成器生成密钥,将所述的种子在所述的第二个终端中存储,当每次所述第二个用户收到从所述第一个用户发送的加密电子邮件时,所述的第二个终端利用所述存储的种子生成一个密钥。The invention also relates to a transmission signal for transmitting secure electronic mail from a first user of a first terminal to a second user of a second terminal, comprising a signal containing a code for: encrypting and transmitting from The email sent by the first terminal uses the first seed to generate a key at the first terminal, and obtains the seed so as to use the second A key generator generates a key, stores the seed in the second terminal, and each time the second user receives an encrypted email sent from the first user, Said second terminal generates a key using said stored seed.
本发明还涉及计算机可读介质,其中存储着用于从第一个终端的第一个用户传送安全的电子邮件到第二个终端的第二个用户的指令集,所述的指令集包括代码用于:加密并传送从所述第一个终端发送的所述电子邮件,用所述的第一个种子在所述的第一个终端生成密钥,获得所述的种子以便在所述的第二个终端用第二个密钥生成器生成密钥,将所述的种子在所述的第二个终端中存储,当每次所述第二个用户收到从所述第一个用户发送的加密电子邮件时,所述的第二个终端利用所述存储的种子生成一个密钥。该介质可以是存储器单元。The present invention also relates to a computer-readable medium having stored thereon a set of instructions for transmitting secure electronic mail from a first user of a first terminal to a second user of a second terminal, said set of instructions including codes for for: encrypting and transmitting said e-mail sent from said first terminal, generating a key at said first terminal using said first seed, obtaining said seed for use in said first terminal The two terminals use the second key generator to generate keys, store the seed in the second terminal, and each time the second user receives the key sent from the first user When encrypting emails, said second terminal generates a key using said stored seed. The medium may be a memory unit.
本发明还涉及指令集的销售方法,该指令集用于传送并接收从第一个终端的第一个用户到第二个终端的第二个用户的安全的电子邮件。该方法包括:所述的第一个终端以加密的形式传送所述安全的电子邮件,所述加密的电子邮件是通过第一个密钥生成器用一个种子生成密钥进行加密的,在所述安全的电子邮件中提供了指明销售方地址的可存取信息,从所述销售方地址获得第二个指令集用于解密所述电子邮件,并把所述第二个用户记为借方,由于他使用了所述第二个指令集加密新的电子邮件。最优的方法是计算机化的。账单是根据定购和接收所述第二个指令集开具的。第二个指令集是预先安装的指令集的进入密码。The invention also relates to a method of marketing a set of instructions for transmitting and receiving secure electronic mail from a first user of a first terminal to a second user of a second terminal. The method includes: said first terminal transmits said secure e-mail in encrypted form, said encrypted e-mail is encrypted by a first key generator with a seed generating key, said Accessible information is provided in the secure email specifying the seller's address from which a second set of instructions is obtained for decrypting the email and debiting the second user due to He used said second set of instructions to encrypt new emails. The optimal method is computerized. Billing is based on ordering and receiving said second set of instructions. The second command set is the entry code for the pre-installed command set.
本发明还涉及过滤接收器上电子邮件的方法,电子邮件从第一个终端的第一个用户到达第二个终端的第二个用户的接收器,所述的第一个终端以加密形式传送所述电子邮件,所述加密的电子邮件是通过第一个密钥生成器用一个种子生成的密钥进行加密的,向所述的第二个用户一次性提供所述的种子,以便用所述第二个终端提供的第二个密钥生成器生成密钥,所述的第二个终端根据所述种子生成的发件人-收件人关系生成一份受信任的发件人列表,并根据所述的列表进行接收电子邮件操作。该操作可以是存储、删除或退回所述电子邮件之一。The invention also relates to a method of filtering e-mails on a receiver from a first user of a first terminal to a receiver of a second user of a second terminal, said first terminal being transmitted in encrypted form The email, the encrypted email is encrypted with a key generated by a seed through the first key generator, and the second user is provided with the seed once to use the The second key generator provided by the second terminal generates a key, and the second terminal generates a trusted sender list according to the sender-recipient relationship generated by the seed, and Perform the operation of receiving emails according to the list. The action may be to store, delete or bounce one of said emails.
附图说明Description of drawings
下面参照附图对本发明进行描述,并对本发明优选的实施方案进行描述,但优选的实施方案并不限制本发明:The present invention is described below with reference to accompanying drawing, and preferred embodiment of the present invention is described, but preferred embodiment does not limit the present invention:
图1是根据本发明的网络通信步骤的流程图。FIG. 1 is a flowchart of network communication steps according to the present invention.
图2是描述计算机终端的结构图。FIG. 2 is a block diagram describing a computer terminal.
图3是描述本发明一部分步骤的流程图。Figure 3 is a flow chart describing a portion of the steps of the present invention.
图4是描述部分发明的流程图。Figure 4 is a flow chart describing part of the invention.
具体实施方式Detailed ways
基本上,本发明允许向发送方和接收方系统提供一个初始种子并生成,对于每封电子邮件都不同,但在各个发件人/收件人终端基于同一个种子生成相同的加密密钥,并且无需每次传送电子邮件时都提供这个种子。根据优选的实施方案,本发明是一个应用程序,是作为诸如Microsoft Outlook,Lotus Notes,OutlookExpress等电子邮件程序的插件来实现的。下面,参照Microsoft Outlook给出一些非限制性的实施例。然而,可以理解,本发明通常能应用于任何数据通信应用程序/系统,特别是电子邮件应用程序/系统。因而本发明也能应用于SMS和MMS传送。Basically, the invention allows to provide both sender and receiver systems with an initial seed and generate, different for each e-mail, the same encryption key generated at each sender/recipient terminal based on the same seed, And there is no need to provide this seed every time an email is sent. According to a preferred embodiment, the present invention is an application program implemented as a plug-in for e-mail programs such as Microsoft Outlook, Lotus Notes, OutlookExpress, etc. Below, some non-limiting examples are given with reference to Microsoft Outlook. However, it will be appreciated that the present invention can be applied to any data communication application/system in general, especially email application/system. Thus the invention can also be applied to SMS and MMS delivery.
图1描述的是两个用户使用计算机终端发送和接收电子邮件的示意性通信流程。发送终端用110表示,接收终端用120表示。很明显,作为例子只给出了两个终端,而本发明可以在若干个终端上使用。终端之间的通信通过互联网或使用电子邮件服务器例如运行Exchange Server的局域网上进行。Figure 1 depicts a schematic communication flow of two users using computer terminals to send and receive e-mails. A sending terminal is indicated with 110 and a receiving terminal is indicated with 120 . It is obvious that only two terminals are given as an example, whereas the invention can be used on several terminals. Communication between terminals is performed via the Internet or a LAN using an e-mail server such as Exchange Server running.
本发明的系统创建了一种电子邮件通信安全的方法。每对发件人/收件人的两个电子邮件地址之间的关系是唯一的(通道)。系统用每对发件人/收件人自己特定的加密密钥对每对发件人/收件人进行处理。The system of the present invention creates a method for email communication security. The relationship between the two email addresses of each sender/recipient pair is unique (channel). The system processes each sender/recipient pair with its own specific encryption key.
根据图1的流程图,终端110的用户发送(1)电子邮件给收件终端120的用户。终端110安装了本发明的应用程序,该应用程序对电子邮件进行加密。在下面的实施例中,假定发件人的电子邮件地址为“110@mail.com”,收件人的电子邮件地址为“120@mail.com”。用例如SHS-1,Blowfish或类似的常规加密算法加密电子邮件信息,并用加密密钥锁定电子邮件信息。如果加密应用程序检测到收件人不是委托的收件人其中之一,也就是说,该收件人不在向其提供解密应用程序或解密密码的收件人注册列表里面,应用程序要求发件人提供初始的密码或为特殊的收件人提供密码。由发件人提供的密码,例如120xxx,与收件人的其它有关信息(如电子邮件地址)一起储存于系统中。该密码用于:According to the flowchart of FIG. 1 , the user of
-生成密钥并初始化有密钥的通道,例如110120xxx,该通道用于传送电子邮件给收件人120;- generate a key and initialize a channel with the key, such as 110120xxx, which is used to send email to the
-生成密钥,例如120110xxxx,当接收来自120的电子邮件时,使用该密钥;以及- Generate a key, such as 120110xxxx, which is used when receiving emails from 120; and
-生成唯一的加密密钥用来传送电子邮件。密钥的生成将在下面进行详细描述。- Generate unique encryption keys for sending emails. Key generation is described in detail below.
应当指出的是通道在这里是指虚拟通道,并且与获得的发件人-收件人的关系有关。It should be noted that channel here refers to a virtual channel and is related to the obtained sender-recipient relationship.
如果收件人没有解密应用程序,电子邮件附带一封未加密的信息发给收件人,告知电子邮件被加密了,需要进入(2)程序提供者130,例如一个互联网服务商,以获得/下载(3)解密程序。加密的电子邮件也可以作为信息邮件的附件发送。如果密钥缺失,例如在安装完解密程序后,收件人没有收到解密许可,收件人被指示获得“密码”能生成密钥来解密电子邮件。例如,收件人可以给发件人打电话(4)获得(6)密码,对密钥的生成进行初始化。当安装了加密部分并输入了密码,加密的电子邮件可以被解密了。收件人的应用程序存储了发件人的信息并:If the recipient does not decrypt the application program, an unencrypted message is attached to the e-mail and sent to the recipient, informing that the e-mail is encrypted, and it is necessary to enter (2) the
-生成密钥并初始化有密钥的通道,例如120110xxx,该通道用来传送电子邮件给发件人110;- Generate a key and initialize a channel with the key, such as 120110xxx, which is used to transmit email to the
-用密钥初始化通道,例如110120xxx,当接收来自120的电子邮件时使用该通道;以及- Initialize the channel with a key, e.g. 110120xxx, to use when receiving emails from 120; and
-生成唯一的加密密钥用于接收来自发件人110的电子邮件。- Generate a unique encryption key for receiving emails from the
因此,创建了一个发件人-收件人关系。Thus, a sender-recipient relationship is created.
在后续步骤中,即当关系创建完成后并且发件人和收件人都有了初始化的密钥,不需要重新交换密码或口令。在各个终端的发件人和收件人的应用程序将自动验证并生成加密/解密密钥,例如根据发件人/收件人的电子邮件地址。In subsequent steps, when the relationship is created and both the sender and recipient have initialized keys, there is no need to re-exchange passwords or passphrases. The sender's and recipient's applications at the respective terminals will automatically authenticate and generate encryption/decryption keys, eg based on the sender's/recipient's email address.
下一次电子邮件从110发送到120时,发件人的应用程序检测到收件人120在注册列表中,并根据生成的通道为电子邮件生成一个新的唯一的加密密钥。该密钥用于加密信息。与电子邮件一起发送一个动态序列号,该动态序列号确定了电子邮件的次序和使用的密钥。The next time an email is sent from 110 to 120, the sender's application detects that the
在收件人站点,解密应用程序检测到加密信息所使用的加密密钥的动态序列。解密应用程序根据动态序列号(和更早存储的密码)生成密钥并解密电子邮件。如果动态序列号没有按顺序,例如,一封较低序列号的电子邮件比一封较高序列号的电子邮件收到得晚,该应用程序生成并存储所有的密钥直至用于解密特定的加密电子邮件的序列号。于是所有存储的密钥可以用来解密不连续的电子邮件。这些密钥在存储器单元中存储并加密,在相应的加密电子邮件被解密后该密钥可以被销毁。因此,本发明也可允许延迟解密电子邮件,并且也可在离线的方式下解密。At the recipient's site, the decryption application detects the dynamic sequence of encryption keys used to encrypt the message. The decryption app generates a key based on the dynamic serial number (and an earlier stored password) and decrypts the email. If the dynamic serial numbers are out of order, for example, an email with a lower serial number is received later than an email with a higher serial number, the application generates and stores all keys until used to decrypt a specific The serial number of the encrypted email. All stored keys can then be used to decrypt discrete emails. These keys are stored and encrypted in a memory unit, which can be destroyed after the corresponding encrypted email has been decrypted. Thus, the present invention also allows delayed decryption of e-mails, and also in an off-line manner.
发件方或电子邮件应用程序可以提供带有设置参数的信息,设置的参数强制收件方或电子邮件应用程序执行特定的操作。例如,发件方可以要求接收到的信息以特殊的方式存储,例如存储为加密的信息,否则根本不存储。这样确保了发件方能确信信息在收件人处存储时,未经授权者不能存取信息。也是可以是其它可能的指示,上述的例子只是起例证性的目的,并非是对本发明的限定,例如发件方可以要求查阅后立即删除电子邮件信息,并且不允许电子邮件信息以任何方式存储,以使安全性最大化。A sender or email application can provide a message with set parameters that force the recipient or email application to perform a specific action. For example, a sender may require that received information be stored in a special way, such as encrypted, or otherwise not be stored at all. This ensures that the sender can be confident that unauthorized persons cannot access the information while it is stored at the recipient. It can also be other possible instructions. The above examples are for illustrative purposes only, and are not intended to limit the present invention. For example, the sender can request to delete the email information immediately after viewing, and does not allow the email information to be stored in any way. to maximize security.
每个终端210,例如一台普通的个人电脑,如附图2中所示,包括主处理器240,ROM(只读存储器)250,RAM(随机存取存储器)260和程序存储单元270。ROM包含指令集,例如用于终端的功能性操作。RAM存储来自应用程序的指令。程序存储单元包括应用程序,如电子邮件应用程序,加密和解密应用程序等。Each terminal 210, such as an ordinary personal computer, includes a main processor 240, a ROM (read only memory) 250, a RAM (random access memory) 260 and a program storage unit 270 as shown in FIG. 2 . The ROM contains a set of instructions, eg, for the functional operation of the terminal. RAM stores instructions from applications. The program storage unit includes application programs such as e-mail applications, encryption and decryption applications, etc.
密钥-生成应用程序280包括,在存储单元或RAM中,相同的原始值SID,被称作种子,优选以动态和/相互/可交换的方式。原始值的存储优选与引导应用程序初始化一起实现,并且通过安全通道,如加密的信息或电话或类似来实现是有利的。或许,原始值不需要,不过却被物理传送,而相关单元的用户可以自行输入预先同意的值来替代物理传送。另外,如果需要,原始值可以交换,但一种替代方案是在密钥-生成单元整个寿命期内都使用同一个的原始值。这种情况下,原始值不需要在动态存储器中存储,而是可以使用永久性存储器。The key-generating application 280 comprises, in a storage unit or RAM, the same original value SID, called a seed, preferably in a dynamic and/mutual/exchangeable manner. The storage of the original value is preferably carried out together with the initialization of the boot application, and advantageously through a secure channel, such as an encrypted message or a phone call or similar. Perhaps, the original value is not required, but is instead physically transmitted, and the user of the relevant unit can enter a pre-agreed value on his own instead of the physical transmission. Also, the original value can be exchanged if desired, but an alternative is to use the same original value throughout the lifetime of the key-generating unit. In this case, the original value does not need to be stored in dynamic memory, instead permanent memory can be used.
另外,密钥-生成应用程序控制计数器281,使之周期性改变计数值X;并控制计算单元/应用程序282,使之适合在各个和每个单元且与其它单元无关,根据原始值和由计数器发出的计数值,生成密钥。In addition, the key-generating application controls the counter 281 to periodically change the count value X; The count value emitted by the counter to generate the key.
然而,计数器和计算单元在同一个单元中集成是有利的,同一个单元适合为处理器(CPU)。振荡器283或时钟同样能在处理器中集成,用于控制计数器也很好。优选使用实时时钟在CPU中集成。另外,计数器阶梯式增加,这样更容易使终端与其它终端保持一致(同步)。However, it is advantageous for the counter and calculation unit to be integrated in the same unit, suitably a processor (CPU). An oscillator 283 or clock can also be integrated in the processor, and is also good for controlling the counter. Preferably integrated in the CPU using a real-time clock. In addition, the counter is incremented in steps, which makes it easier to keep terminals in line (synchronize) with other terminals.
如果提供相同的原始值在存储器中存储,并使计数器同步以传送相同的计数值,那么可以在若干个密钥-生成应用程序中生成相同的密钥,与其它的,即运行应用程序的各个终端无关。If the same raw value is provided to be stored in memory, and the counters are synchronized to deliver the same count value, then the same key can be generated in several key-generating applications, with the others, i.e. each of the running applications Terminal has nothing to do.
于是这些密钥可以在终端之间用于加密或身份验证的目的。These keys can then be used between endpoints for encryption or authentication purposes.
而且,密钥-生成单元优选适合感应它们是否同步,如果它们不同步,实现同步。感应可以靠特殊的同步测试来完成,同步测试在密钥生成之前完成。Furthermore, the key-generating unit is preferably adapted to sense whether they are synchronized, and to achieve synchronization if they are not. Sensing can be done by means of a special synchronization test, which is done before key generation.
一种替代方案是,当使用不同的密钥时,可以先验证是否需要同步,之后可以重新设置为同步。例如可以通过单元之间交换计数值来实现同步。As an alternative, when a different key is used, it can be verified that sync is required and can be set back to sync afterwards. Synchronization can be achieved, for example, by exchanging count values between the units.
根据一个实施例,计算单元包括算法F,算法F对原始值(种子)、现有密钥和计数值进行哈希处理作为输入参数。之后,计数值一个数一个数的增加,即计数=计数+1。这一算法优选在计算单元的硬件中实现,或者可替代的是,算法在非动态和不能改变的存储器中存储。算法优选生成160位的密钥,当然其它长度的密钥也是可能的。每次,给密钥生成器一个指令产生一个新的密钥时,生成一个新的伪随机160位字码,该字码是根据“种子”和计数值计算出来的According to one embodiment, the calculation unit comprises an algorithm F which hashes the original value (seed), the existing key and the count value as input parameters. After that, the count value is increased one by one, that is, count=count+1. This algorithm is preferably implemented in the hardware of the computing unit, or alternatively the algorithm is stored in a non-dynamic and unchangeable memory. The algorithm preferably generates keys of 160 bits, although keys of other lengths are possible. Each time, when an instruction is given to the key generator to generate a new key, a new pseudo-random 160-bit code is generated, which is calculated based on the "seed" and the count value
密钥-生成应用程序还可以进一步包括接口部分,用于通信单元和密钥-生成单元之间能进行通信。优选的是,这种通信包括向密钥-生成单元发出指令生成密钥,然后发出指令使生成的密钥返回到通信单元。The key-generating application program may further include an interface part for communication between the communication unit and the key-generating unit. Preferably, such communication includes instructing the key-generating unit to generate a key and then instructing the generated key to be returned to the communication unit.
密钥-生成单元可以在硬件中实现并且以集成电路的形式执行,因此很难被篡改。然后电路可以添加到基本上任何类型的通信单元上,与其共同使用。例如,本发明的密钥-生成单元与电子邮件应用程序一起使用是可能的。The key-generating unit can be implemented in hardware and implemented in the form of an integrated circuit, so it is difficult to be tampered with. The circuitry can then be added to, and used in conjunction with, essentially any type of communication unit. For example, it is possible to use the key-generating unit of the present invention with an email application.
根据本发明的密钥-生成应用程序可以用于点对点通信或身份验证中的任何一种,即在两个终端之间,或在中央单元、电子邮件服务器或若干个用户、客户之间。这样的中央单元优选包括多个不同的密钥-生成应用程序,其中一个用于各个客户/用户/终端与中央单元之间的通信。另一种替代方案,密钥单元能包括若干不同的原始值,在这样情况下,对密钥-生成单元发出生成密钥的命令也包括关于应该使用哪个原始值的信息。同样的,对于与中央单元通信的若干单元具有相同的密钥生成单元是可能的,能使他们与中央单元中同一个的密钥-生成单元通信。The key-generating application according to the invention can be used for any kind of peer-to-peer communication or authentication, ie between two terminals, or between a central unit, an email server or several users, clients. Such a central unit preferably comprises a plurality of different key-generating applications, one of which is used for communication between the respective clients/users/terminals and the central unit. As another alternative, the key unit can comprise several different original values, in which case the command to generate the key to the key-generating unit also includes information about which original value should be used. Likewise, it is possible for several units communicating with the central unit to have the same key-generating unit, enabling them to communicate with the same key-generating unit in the central unit.
下面借助上面所描述的系统对加密传送或身份验证进行描述。第一步,在一个终端生成电子邮件并用密钥生成应用程序生成的密钥对电子邮件进行加密。电子邮件可以包含一个或几个附件,例如字处理文件、图片文件、JAVA小程序或任何其它数字数据。因此,根据本发明的电子邮件涉及带附件的和不带附件的信息两种。发送电子邮件到收件终端,并让收件人得到一个初始值,即所谓的密码或种子。将密码输入到收件方的解密应用程序中,未来希望相互通信的终端被创建,在这一过程中他们被提供以相同的原始值并且优选同步化。现在该系统已经准备好使用了,在随后的时间里,初始化后经过任意一段时间可以使用系统,并且至少一个终端向其它终端认证自身。当其它终端确定给出的身份是否是已知的,它是否有相应的密钥-生成应用程序,即如上定义的密钥-生成应用程序,并带有相应的原始值,获得认证。如果是,程序继续进行到下一步,相反程序中断。Encrypted transmission or authentication is described below with the aid of the system described above. In the first step, an email is generated at a terminal and encrypted with a key generated by a key generation application. An e-mail may contain one or several attachments, such as word processing files, picture files, JAVA applets, or any other digital data. Thus, electronic mail according to the present invention involves both messages with and without attachments. Send an e-mail to the receiving terminal and let the recipient get an initial value, the so-called password or seed. Entering the password into the recipient's decryption application, terminals wishing to communicate with each other in the future are created, during which they are provided with the same original value and preferably synchronized. Now that the system is ready for use, at a subsequent time, any time after initialization the system can be used and at least one terminal authenticates itself to other terminals. When the other terminal determines whether the given identity is known, whether it has a corresponding key-generating application, ie a key-generating application as defined above, with corresponding original values, authentication is obtained. If yes, the program continues to the next step, otherwise the program is interrupted.
然后用计算得到的密钥执行加密/解密/身份验证。然而,应该理解的是,加密传送和身份验证当然可以在同一过程同时实现。加密和身份验证的实现可以借助基本上使用密钥的任何加密算法,例如已知的DES和RC6,Bluefish等。Encryption/decryption/authentication is then performed with the computed key. However, it should be understood that encrypted transmission and authentication can of course be accomplished simultaneously in the same process. Encryption and authentication can be implemented with the help of basically any encryption algorithm using keys, such as known DES and RC6, Bluefish, etc.
本发明的另一个优点是应用程序能用作过滤器用于阻止不需要的电子邮件。如今,无数封广告电子邮件发送给收件人们,例如,Outlook里有个功能叫做“垃圾邮件”,它根据名单或一些参数把收到的电子邮件放到一个垃圾邮件文件夹里。然而当发件人的名称和垃圾邮件的内容改变了,这个功能就不起作用了。本发明针对这个问题用下面的方法解决:Another advantage of the present invention is that the application can be used as a filter for blocking unwanted e-mails. Nowadays, countless advertising emails are sent to the recipients, for example, there is a function in Outlook called "Junk Mail", which puts the received emails into a junk mail folder according to a list or some parameters. However, this feature does not work when the sender's name and spam content are changed. The present invention solves this problem with the following methods:
如上所述并参考图3,收件终端或服务器包括发件人-收件人对列表,核对300用于在列表中核对接收到的地址,和比较310用于将发件人的地址与存储的地址相比较。如果电子邮件能被解密,即发件人地址在列表中存在,电子邮件被解密320并传送给收件人。如果电子邮件不能被解密,即发件人的地址不在列表中,电子邮件或者移到垃圾邮件箱或者退回330给发件人。可以给退回的电子邮件附上一封信息,例如通知发件人需要加密程序才能发送电子邮件给希望的收件人。当然,不是列表中的发件人,但是收件人想要的发件人也可以发送电子邮件。由于这个原因,系统能存储340一份电子邮件的副本,或者只是通知收件人,这样发件人能得到通知要求其安装加密应用程序并从收件人处获得密码。很明显,过滤/阻止功能是一个可选的应用程序。As mentioned above and with reference to FIG. 3, the receiving terminal or server includes a list of sender-recipient pairs, checking 300 is used to check the received address in the list, and comparing 310 is used to compare the sender's address with the stored compared to the addresses. If the email can be decrypted, ie the sender's address is present in the list, the email is decrypted 320 and delivered to the recipient. If the email cannot be decrypted, ie the sender's address is not on the list, the email is either moved to the spam box or returned 330 to the sender. A message can be attached to the bounced e-mail, such as informing the sender that an encryption program is required to send the e-mail to the intended recipient. Of course, not the senders on the list, but the senders that the recipient wants can also send the email. For this reason, the system can store 340 a copy of the email, or simply notify the recipient so that the sender can be notified to install an encryption application and obtain a password from the recipient. Obviously, the filtering/blocking feature is an optional application.
如上面所提到的,本发明还允许以简单的方式购买整个或部分应用程序。As mentioned above, the present invention also allows the purchase of whole or parts of applications in a simple manner.
附图4对自动购买系统400进行了描述。收件人401收到一封信息性电子邮件,其附件为加密电子邮件,获得解密程序。优选的是,该解密程序以免费或共享软件形式提供。而加密应用程序必须购买。当解密程序被下载时,加密程序也被下载,但只有提供了许可号、密码或类似,才能使用加密程序。由于这个原因,顾客被指向一个购买地址410,例如在互联网上,能从那里获得许可。购买网站可能需要有关顾客的国家、语言等特定的信息,以便顾客能获得正确的版本。然后顾客被重新定位到提供交易信息的定购网站420。付款人可以用已知的方式进行交易,例如用信用卡、银行交易、现金交易等付款。根据交易方法,进行清算430或管理440。如果交易被接受了,购买站点420给注册处450发送信息并给交货部门460发指令。交货部门或者发送程序包、许可号或者发送(安装并)运行加密程序所必需的任何其它信息。交货部门能产生程序包/许可信息。如果预先安装了程序,密码/许可号能通过(加密)电子邮件或从网站下载交付。Figure 4 illustrates an automated purchasing system 400 . The
也可能给收件人提供发件人发的电子邮件并通知收件人到提供预付费程序下载以及密码的网站获得解密/加密应用程序来解密电子邮件。然而,这样情况下,收件人必须获得密码或其它进入程序的可能性。It is also possible to provide the recipient with an email from the sender and instruct the recipient to obtain a decryption/encryption application from a website that offers prepaid program downloads and passwords to decrypt the email. In this case, however, the recipient must obtain a password or other possibility to enter the procedure.
也可能提供一种服务器设备,加密的电子邮件通过该设备,例如通过开辟地址通道来实现。这种情况下,每封电子邮件能分别记入借方(所谓的ticker)而无需购买程序。It is also possible to provide a server device through which encrypted e-mails pass, for example by tunneling the addresses. In this case, each e-mail can be debited separately (so-called ticker) without purchasing the program.
以上的实施例涉及网络,在那里用户使用两个终端存取电子邮件。本发明也能应用在用户使用不同终端的情况下。在这种情况下,加密/解密程序和种子能作为移动应用,例如以硬件插件(如USB dongle)的形式,存储在信息载体介质如CD等上。因而,每次使用电子邮件应用程序时,都必须提供密钥/存储介质,以便从那里执行加密/解密应用程序。The above embodiments relate to networks where a user uses two terminals to access e-mail. The present invention can also be applied when users use different terminals. In this case, the encryption/decryption program and the seed can be stored on an information carrier medium such as a CD etc. as a mobile application, for example in the form of a hardware plug-in (such as a USB dongle). Thus, every time the email application is used, the key/storage medium must be provided to execute the encryption/decryption application from there.
在网络里,例如在组织机构或企业中,服务器处理客户所在的IP网络。客户只需要创建一条安全的电子邮件通道到正在运行的服务器上,这个服务器于是处理与网络上其它用户的安全联系。给每个用户提供一个唯一的密码,以便能根据本发明存取电子邮件信息并发送电子邮件信息。而且,可以给网络管理员提供管理员密码,管理员密码能让管理员读取信息并管理账户。为了进一步提高安全性,要求管理员必须使用硬件单元生成唯一的序列号是可能的,唯一的序列号用于身份验证的目的。这个唯一的序列号控制位于如中央服务器中的另一个的硬件或软件模块,基于服务器的模块生成序列号,如果它是正确的硬件单元并且它们相互之间同步,那么这个序列号与管理员模块生成的序列号相同。如果他们不相同,那么两个系统要试着相互同步几次。In a network, such as in an organization or enterprise, a server handles the IP network where the client is located. Clients simply need to create a secure e-mail channel to a running server, which then handles secure communications with other users on the network. Each user is provided with a unique password to be able to access email messages and send email messages in accordance with the present invention. Also, the network administrator can be provided with an administrator password that allows the administrator to read information and manage accounts. To further increase security, it is possible to require that the administrator must use the hardware unit to generate a unique serial number, which is used for authentication purposes. This unique serial number controls another hardware or software module located like in a central server, the server-based module generates the serial number, and if it is the correct hardware unit and they are synchronized with each other, then this serial number is the same as the administrator module The serial numbers generated are the same. If they are not the same, then the two systems try to synchronize with each other several times.
管理员使用的这种硬件单元可以提供为例如,但不限于,硬件插件使用USB(通用串行总线),RS232,RS485,以太网,Firewire,蓝牙,Centronics,SecureDigital,PCMCIA,PC-Card或类似的硬件连接标准。也可能使用软件模块来代替硬件单元,该软件模块或者在可管理的电脑上、工作站或类似的计算机设备上,或者在计算机介质存储设备上,该设备能连接到网络上或者能连接到在管理下连接到网络上的设备上。Such a hardware unit used by the administrator may be provided as, for example, but not limited to, a hardware plug-in using USB (Universal Serial Bus), RS232, RS485, Ethernet, Firewire, Bluetooth, Centronics, SecureDigital, PCMCIA, PC-Card or similar hardware connection standard. Instead of a hardware unit, it is also possible to use a software module, either on a managed computer, workstation or similar computing device, or on a computer media storage device, which can be connected to a network or to a managed Next, connect to the device on the network.
还可能提供带有压缩工具的系统,用于压缩加密的电子邮件。任何传统的压缩方法都能使用。It is also possible to provide a system with compression tools for compressing encrypted e-mails. Any conventional compression method can be used.
可以选择的是,加密和/或解密的电子邮件能以解密或加密的形式保存。在这种情况下,优选电子邮件用密码进行加密。出于安全原因,尤其是在公司里,应该有个人密码和一个管理员密钥(网络管理员)。Optionally, encrypted and/or decrypted emails can be stored in decrypted or encrypted form. In this case, emails are preferably encrypted with a password. For security reasons, especially in companies, there should be personal passwords and an administrator key (network administrator).
以上描述和说明的实施方案不能限定本发明。在附加权利要求的范围内,根据应用、需求和需要,能以若干种方式对本发明进行改进。The embodiments described and illustrated above do not limit the invention. Within the scope of the appended claims, the invention can be modified in several ways, depending on the application, wants and needs.
Claims (31)
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SE03024569 | 2003-09-12 | ||
| SE0302456A SE527561C2 (en) | 2003-09-12 | 2003-09-12 | Electronic mail transmission method in internet environment, involves storing seed for key generation provided from sender's terminal, in receiver's terminal |
| US60/502,254 | 2003-09-12 | ||
| SE04002382 | 2004-02-04 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN1849774A true CN1849774A (en) | 2006-10-18 |
Family
ID=28787336
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNA2004800263389A Pending CN1849774A (en) | 2003-09-12 | 2004-09-13 | Message security |
Country Status (3)
| Country | Link |
|---|---|
| CN (1) | CN1849774A (en) |
| SE (1) | SE527561C2 (en) |
| ZA (1) | ZA200601931B (en) |
Cited By (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101170401B (en) * | 2006-10-27 | 2011-02-02 | 鸿富锦精密工业(深圳)有限公司 | Email encryption/decryption system and its method |
| CN101399627B (en) * | 2008-09-27 | 2012-08-29 | 北京数字太和科技有限责任公司 | Method and system for synchronization recovery |
| CN103379451A (en) * | 2013-06-21 | 2013-10-30 | 宇龙计算机通信科技(深圳)有限公司 | Check method and system for information instantly burned after being read |
| CN104159118A (en) * | 2014-07-30 | 2014-11-19 | 天津大学 | Image byte XOR algorithm based on pseudo random sequence and LSB algorithm |
| CN104798355A (en) * | 2012-09-18 | 2015-07-22 | 思杰系统有限公司 | Mobile device management and security |
| CN104854840A (en) * | 2012-12-12 | 2015-08-19 | 德国邮政股份公司 | Method for securely transmitting a digital message |
| US9378359B2 (en) | 2011-10-11 | 2016-06-28 | Citrix Systems, Inc. | Gateway for controlling mobile device access to enterprise resources |
| US9521147B2 (en) | 2011-10-11 | 2016-12-13 | Citrix Systems, Inc. | Policy based application management |
| US9521117B2 (en) | 2012-10-15 | 2016-12-13 | Citrix Systems, Inc. | Providing virtualized private network tunnels |
| US9602474B2 (en) | 2012-10-16 | 2017-03-21 | Citrix Systems, Inc. | Controlling mobile device access to secure data |
| US9606774B2 (en) | 2012-10-16 | 2017-03-28 | Citrix Systems, Inc. | Wrapping an application with field-programmable business logic |
| US9654508B2 (en) | 2012-10-15 | 2017-05-16 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
| US9774658B2 (en) | 2012-10-12 | 2017-09-26 | Citrix Systems, Inc. | Orchestration framework for connected devices |
| US9854063B2 (en) | 2012-10-12 | 2017-12-26 | Citrix Systems, Inc. | Enterprise application store for an orchestration framework for connected devices |
| US9948657B2 (en) | 2013-03-29 | 2018-04-17 | Citrix Systems, Inc. | Providing an enterprise application store |
| US9971585B2 (en) | 2012-10-16 | 2018-05-15 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
| US9985850B2 (en) | 2013-03-29 | 2018-05-29 | Citrix Systems, Inc. | Providing mobile device management functionalities |
| US10097584B2 (en) | 2013-03-29 | 2018-10-09 | Citrix Systems, Inc. | Providing a managed browser |
| US10284627B2 (en) | 2013-03-29 | 2019-05-07 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
| US10701082B2 (en) | 2013-03-29 | 2020-06-30 | Citrix Systems, Inc. | Application with multiple operation modes |
| US10908896B2 (en) | 2012-10-16 | 2021-02-02 | Citrix Systems, Inc. | Application wrapping for application management framework |
-
2003
- 2003-09-12 SE SE0302456A patent/SE527561C2/en not_active IP Right Cessation
-
2004
- 2004-09-13 CN CNA2004800263389A patent/CN1849774A/en active Pending
-
2006
- 2006-03-07 ZA ZA200601931A patent/ZA200601931B/en unknown
Cited By (32)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101170401B (en) * | 2006-10-27 | 2011-02-02 | 鸿富锦精密工业(深圳)有限公司 | Email encryption/decryption system and its method |
| CN101399627B (en) * | 2008-09-27 | 2012-08-29 | 北京数字太和科技有限责任公司 | Method and system for synchronization recovery |
| US9378359B2 (en) | 2011-10-11 | 2016-06-28 | Citrix Systems, Inc. | Gateway for controlling mobile device access to enterprise resources |
| US10469534B2 (en) | 2011-10-11 | 2019-11-05 | Citrix Systems, Inc. | Secure execution of enterprise applications on mobile devices |
| US10063595B1 (en) | 2011-10-11 | 2018-08-28 | Citrix Systems, Inc. | Secure execution of enterprise applications on mobile devices |
| US9521147B2 (en) | 2011-10-11 | 2016-12-13 | Citrix Systems, Inc. | Policy based application management |
| US10044757B2 (en) | 2011-10-11 | 2018-08-07 | Citrix Systems, Inc. | Secure execution of enterprise applications on mobile devices |
| US9529996B2 (en) | 2011-10-11 | 2016-12-27 | Citrix Systems, Inc. | Controlling mobile device access to enterprise resources |
| US11134104B2 (en) | 2011-10-11 | 2021-09-28 | Citrix Systems, Inc. | Secure execution of enterprise applications on mobile devices |
| US10402546B1 (en) | 2011-10-11 | 2019-09-03 | Citrix Systems, Inc. | Secure execution of enterprise applications on mobile devices |
| CN104798355A (en) * | 2012-09-18 | 2015-07-22 | 思杰系统有限公司 | Mobile device management and security |
| US9774658B2 (en) | 2012-10-12 | 2017-09-26 | Citrix Systems, Inc. | Orchestration framework for connected devices |
| US9854063B2 (en) | 2012-10-12 | 2017-12-26 | Citrix Systems, Inc. | Enterprise application store for an orchestration framework for connected devices |
| US9654508B2 (en) | 2012-10-15 | 2017-05-16 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
| US9973489B2 (en) | 2012-10-15 | 2018-05-15 | Citrix Systems, Inc. | Providing virtualized private network tunnels |
| US9521117B2 (en) | 2012-10-15 | 2016-12-13 | Citrix Systems, Inc. | Providing virtualized private network tunnels |
| US9606774B2 (en) | 2012-10-16 | 2017-03-28 | Citrix Systems, Inc. | Wrapping an application with field-programmable business logic |
| US9858428B2 (en) | 2012-10-16 | 2018-01-02 | Citrix Systems, Inc. | Controlling mobile device access to secure data |
| US9602474B2 (en) | 2012-10-16 | 2017-03-21 | Citrix Systems, Inc. | Controlling mobile device access to secure data |
| US9971585B2 (en) | 2012-10-16 | 2018-05-15 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
| US10545748B2 (en) | 2012-10-16 | 2020-01-28 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
| US10908896B2 (en) | 2012-10-16 | 2021-02-02 | Citrix Systems, Inc. | Application wrapping for application management framework |
| CN104854840B (en) * | 2012-12-12 | 2018-06-29 | 德国邮政股份公司 | A kind of method of safe transmission electronic information |
| CN104854840A (en) * | 2012-12-12 | 2015-08-19 | 德国邮政股份公司 | Method for securely transmitting a digital message |
| US9948657B2 (en) | 2013-03-29 | 2018-04-17 | Citrix Systems, Inc. | Providing an enterprise application store |
| US10284627B2 (en) | 2013-03-29 | 2019-05-07 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
| US10097584B2 (en) | 2013-03-29 | 2018-10-09 | Citrix Systems, Inc. | Providing a managed browser |
| US9985850B2 (en) | 2013-03-29 | 2018-05-29 | Citrix Systems, Inc. | Providing mobile device management functionalities |
| US10701082B2 (en) | 2013-03-29 | 2020-06-30 | Citrix Systems, Inc. | Application with multiple operation modes |
| US10965734B2 (en) | 2013-03-29 | 2021-03-30 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
| CN103379451A (en) * | 2013-06-21 | 2013-10-30 | 宇龙计算机通信科技(深圳)有限公司 | Check method and system for information instantly burned after being read |
| CN104159118A (en) * | 2014-07-30 | 2014-11-19 | 天津大学 | Image byte XOR algorithm based on pseudo random sequence and LSB algorithm |
Also Published As
| Publication number | Publication date |
|---|---|
| SE0302456D0 (en) | 2003-09-12 |
| SE0302456L (en) | 2005-03-13 |
| ZA200601931B (en) | 2007-06-27 |
| SE527561C2 (en) | 2006-04-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7600121B2 (en) | Message security | |
| CN1849774A (en) | Message security | |
| US20070172066A1 (en) | Message security | |
| US11943350B2 (en) | Systems and methods for re-using cold storage keys | |
| US20020178366A1 (en) | Method for performing on behalf of a registered user an operation on data stored on a publicly accessible data access server | |
| CN104662941B (en) | For the method, apparatus and system supporting key to use | |
| US20060020799A1 (en) | Secure messaging | |
| CN113346995B (en) | Method and system for preventing falsification in mail transmission process based on quantum security key | |
| CN1711738A (en) | Providing a user device with a set of access codes | |
| CN1469273A (en) | IC card and authentication method in electronic ticket sales system | |
| CN1701295A (en) | Method and system for single sign-on access to computer grid | |
| CN1565117A (en) | Data certification method and apparatus | |
| CN1653746A (en) | Method for authenticating and verifying sms communications | |
| CN1478347A (en) | Secure file transfer method and system | |
| JP2010522488A (en) | Secure electronic messaging system requiring key retrieval to distribute decryption key | |
| CN113886771B (en) | A software authorization authentication method | |
| CN101938471A (en) | Secure Electronic Information Request Delivery System | |
| US7660987B2 (en) | Method of establishing a secure e-mail transmission link | |
| CN118900199A (en) | System and method for secure electronic data transmission | |
| WO2019234801A1 (en) | Service provision system and service provision method | |
| AU2004303326B2 (en) | Message security | |
| JP2003198632A (en) | Electronic mail system and method for processing the same and its program | |
| RU2373653C2 (en) | Safety of messages | |
| CN105577606A (en) | Method and device for realizing register of authenticator | |
| JP4479389B2 (en) | Computer program for document management and document management apparatus and method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20061018 |
|
| C20 | Patent right or utility model deemed to be abandoned or is abandoned |