[go: up one dir, main page]

GB2339367A - Secure communication - Google Patents

Secure communication Download PDF

Info

Publication number
GB2339367A
GB2339367A GB9805759A GB9805759A GB2339367A GB 2339367 A GB2339367 A GB 2339367A GB 9805759 A GB9805759 A GB 9805759A GB 9805759 A GB9805759 A GB 9805759A GB 2339367 A GB2339367 A GB 2339367A
Authority
GB
United Kingdom
Prior art keywords
message
encrypted
destination server
switch
layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9805759A
Other versions
GB2339367B (en
GB9805759D0 (en
Inventor
Sean B Newcombe
Christopher L Royle
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SEDEX Ltd
Original Assignee
SEDEX Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SEDEX Ltd filed Critical SEDEX Ltd
Priority to GB9805759A priority Critical patent/GB2339367B/en
Publication of GB9805759D0 publication Critical patent/GB9805759D0/en
Publication of GB2339367A publication Critical patent/GB2339367A/en
Application granted granted Critical
Publication of GB2339367B publication Critical patent/GB2339367B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Description

2339367 PATENTS ACT 1977 P12142GB-ALM/LH/vt "A method and apparatus for
electronic document exchange" THIS INVENTION relates to a method and apparatus for electronic document exchange and more particularly to the secure electronic exchange of documents over an open network.
It is well known that whilst the Internet offers a flexible form of communication using electronic mail, it does have serious drawbacks such as lack of security and uncertainties over delivery. Despite these drawbacks, the use of electronic mail is widespread and is increasingly being used by law firms and the like for the transfer of sensitive documentation.
Another concern is the verification by a recipient that an electronic mail message has not been tampered with or intercepted. Should an electronic mail message be intercepted, then it is perfectly possible for the person obtaining access to the message to forward the message on to the intended recipient after possibly having corrupted or otherwise interfered with the message.
It is an object of the present invention to address the above concerns and seek to provide a method and apparatus for the secure exchange of documentation over an open network.
By way of background, the basis of encryption systems is that a form of mathematical transform is applied to a message being encrypted. Security can
2 be gained in two ways. Firstly, by keeping the transform secret. This is not very effective because once the transform is known, the encryption is useless. The second way is to use a transform that takes some sort of a key as input. This is more secure as the transform may be known but if the key is not known, then the message cannot be simply extracted. The problem here is that a very secure method has to be found of getting the key to an intended recipient so that the message can be decrypted using the key. Obviously the same transport for the key cannot be used for the message.
Some time ago 'one way' encryption algorithms were developed. These can encrypt a message, usually a password, and there is no reverse algorithm to recover the message. This is a useful verification system. When a computer is set with a new password, this can be stored by one way encryption. There is no reverse process to show the password. When the password is entered for authentication, the computer encrypts the entered password and compares the result with the stored encrypted result. If the two match, then the password has been authenticated.
Public key encryption is a key driven algorithm mechanism in which a private key is first generated. The private key is kept strictly secret. A public key is also generated which is freely distributable and which poses no security risk. Should somebody wish to send an encrypted message, then the message is encrypted using the public key. When the message is received, the private key can be used to decrypt the message. The only way of decoding a message encrypted with a public key is by using the private key. Thus, even the person originating the message is unable to decrypt the message once it has been encoded with the public key. Decryption is only possible using the private key.
3 Another useful feature of public key encryption is that messages can be electronically signed so as to prove that a message has not been altered or otherwise tampered with. Once a message has been encrypted using that person's public key, that person's private key can then be used to "sign" the message by adding a simple checksurn of the encrypted message with their private key. When the signed encrypted message is received, a public key corresponding to the sender's private key can be used to do another checksum to ensure that the message has not been changed since any change or alteration to the message after signature would invalidate the checksum. Thus, positive confirmation is able to be provided to show that the message content is exactly as originally sent.
One aspect of the present invention provides a method of electronic document exchange for sending a message from a local server over an open network to a destination server via an intermediate switch, the method comprising the steps of. encrypting the message to provide an inner encrypted message layer; further encrypting the message to provide an outer encrypted message layer; sending the message to the intermediate switch; decrypting the outer encrypted message layer; further encrypting the message to provide an outer encrypted message layer; sending the message to the destination server; decrypting the outer message layer; and providing the encrypted message to the intended recipient.
A further aspect of the present invention provides a method of secure electronic document exchange from a message originator at a local server over an open network to a destination server via an inter-mediate switch, each of the message originator, the intended recipient, the servers and the switch having a public key for encrypting messages and a private key for decrypting messages encrypted with the respective public key, the method comprising the steps of- 4 the message originator composing a message and addressing the message to the intended recipient; sending the message to the local server for transmission over the open network to the destination server; encrypting the message with the public key of the intended recipient; the local server adding a signature to the encrypted message and addressing the message to the destination server; further encrypting the message with the public key of the switch such that the message has an inner layer encrypted by the public key of the intended recipient and an outer layer encrypted by the public key of the switch; sending the message to the switch; the switch decrypting the outer encryption layer with the switch private key; the switch adding a signature to the encrypted message; the switch further encrypting the message with the public key of the destination server; sending the message to the destination server; the destination server decrypting the outer encryption layer to uncover the recipient address; and providing the encrypted message to the intended recipient.
In order that the present invention may be more readily understood, embodiments thereof will now be described, by way of example, with reference to the accompanying drawing which is a schematic representation of a system for secure electronic document exchange embodying the present invention.
Referring to the Figure, a system of a secure exchange of electronic documents over an open network such as the public Internet comprises a plurality of servers I each located at a customer's premises or in direct secure communication with a customer's premises and a plurality of switches 2 accessible by the customer servers I for the routing of messages through one or more switches 2 between the servers. The customer servers I are accessed by customers using a personal computer (PC) 3 or the like. A switch 2 is a server specifically utilised for the routing of electronic documents over the Internet.
The customer servers I and the switches 2 are in communication via the Internet 4. Preferably, each of the customer's personal computers 3 is in direct local area network communication with its server I although it is envisaged that remote access to a form of public server 5 is possible.
Each customer server I or public access server 5 and the or each switch 2 has a key pair associated with it. Thus, for example, the customer server I has a private key and a public key. The public key of the customer server I is accessible by the switches 2 and the other customer servers I or public access servers 5 so that messages can be encrypted by the switches 2 and the other servers 1,5 using the public key of the customer server I for subsequent decryption by the private key of the customer server 1. Similarly, the public key of the or each switch 2 is accessible to all the servers 1,5 so that messages can be encrypted for the switch 2 to decrypt using the switch's private key.
Each of the servers 1,5 and switches 2 incorporates signature means to append a signature to an encrypted message which is to be sent to another server 1,5 or switch 2. Preferably, the signature means is a simple algorithm to append a checksum of the encrypted message calculated by the server 1,5 or switch 2 sending the message for subsequent checking by the destination server or switch to ensure that the message has not been tampered with in any way in transit.
Referring to the Figure, a user composes a message to be sent over the document exchange system on a PC 3. The PC 3 is connected to a customer server I by a local area network. Once the message has been composed and addressed to the intended recipient, the message is sent from the PC 3 to the customer server 1. The customer server I receives the message and checks the address of the recipient. Once the customer server I has established that the 6 message is outbound to a valid destination address, the server I can start encryption. In the example shown in the Figure, the destination server is the public access server 5.
The server I requests from the nearest switch 2, via the Internet 4, the public key of the destination server 5, that is the server 5 nearest the locality of the address of the recipient. The switch 2 transmits the public key of the destination server 5 to the customer server I and the message including the address is encrypted by the customer server I with the public key of the destination server 5. The encrypted message is then addressed with the name of the destination server 5. The encrypted message is also signed, i.e. provided with a signature, by the customer server 1. As previously described, the signature can be in the form of a checksurn generated by the private key of the customer server 1.
The encrypted message is then further encrypted with the public key of the switch 2 through which the message is to be relayed to the destination server 5. The address of the switch 2 is then put on the double encrypted message. In effect, the double encrypted message comprises an inner encrypted layer of the message proper and an outer encrypted layer of the signature and address information. The double encrypted message is then sent to the switch 2.
When the switch 2 receives the double encrypted message, the outer layer is decrypted using the switch's private key to uncover the address of the destination server 5. Once this information has been decrypted, the switch 2 then signs the encrypted message, encrypts the encrypted message (so that once again the encrypted message is double encrypted) with the public key of the destination server 5 and sends the message to the destination server 5.
7 The destination server 5 receives the double encrypted message and decrypts the outer layer of encryption using its own private key to uncover the full destination address. The destination server 5 then waits for the intended recipient to collect their electronic mail.
In the present example, the intended recipient makes contact with the destination server 5, a public access server, using a lap-top computer 6. Preferably, communication with the destination server 5 is by way of a secure sockets layer (SSL) encrypted tunnel. The private key of the intended recipient is sent to the destination server 5 over the encrypted tunnel and the destination server 5 uses the private key to fully decrypt the message. The destination server 5 then forgets the intended recipient's private key. The decrypted message is then sent down the encrypted tunnel via SSL to the intended recipient's lap-top computer 6. Thus, the intended recipient receives the decrypted message.
It should be appreciated that in the above example, the intended recipient makes contact with the destination server 5 by way of a remote link. Of course, the intended recipient could be a personal computer 3 connected to the destination server 5 by way of a local area network or another form of secure and closed communication network.
In contrast to the simple example shown in the Figure, the actual system implementation will involve many switches 2 and a large number of users but the basic principles still apply to the message traffic through the system. Despite the large number of users and paths between servers 1,5, it should be fully appreciated that the use of signatures by the servers 1,5 and switches 2 serves to provide and preserve an audit trail identifying the path taken by a 8 message and providing verification that the message is exactly as originally composed before being sent over the public Internet.
With regard to the signature means, preferably each message is uniquely identified and information concerning all messages is retained. Thus, when a message is originated and sent to a server, a unique message identification code is generated and the date and time of receipt are logged. When the message arrives at the first switch 2, this information is recorded again as part of the signature. Further, the transmissions to subsequent switches 2 are also logged as is the arrival of the message at the destination server 5.
If required, the date and time of correct reception of the message by the intended recipient can be communicated back to the sender of the message so as to confirm the receipt of the message.
Thus, the present invention provides a secure method of electronic document exchange over an open network, such as the Internet, as well as offering the possibilities of message authentication and an audit trail.
9

Claims (20)

CLAIMS:
1. A method of electronic document exchange for sending a message from a local server over an open network to a destination server via an intermediate switch, the method comprising the steps ofencrypting the message to provide an inner encrypted message layer; further encrypting the message to provide an outer encrypted message layer; sending the message to the intermediate switch; decrypting the outer encrypted message layer; ftirther encrypting the message to provide an outer encrypted message layer; sending the message to the destination server; decrypting the outer message layer; and providing the encrypted message to the intended recipient.
2. A method according to Claim 1, wherein the method comprises the further steps of applying a signature to the inner encrypted message layer before further encrypting the message to provide the outer encrypted message layer; and the or each switch applying a further signature to the message before encrypting the message to provide the outer encrypted message layer.
3. A method according to Claim 2, wherein the signature provides an audit trail identifying the path taken by a message from the local server to the destination server.
4. A method according to Claim 2 or 3, wherein the signature is only applied if the message is exactly as originally composed before being sent over the open network.
5. A method according to any one of Claims 2 to 4, wherein the signature includes a unique message identification code.
6. A method according to any one of Claims 2 to 5, wherein the signature is a checksum of the encrypted message.
7. A method according to any preceding claim, wherein the message is routed via a plurality of intermediate switches between the local server and the destination server, each switch decrypting the outer encrypted message layer and further encrypting the message to provide another outer encrypted message layer.
8. A method according to any preceding claim, wherein the inner encrypted message layer is encrypted with a public key of the intended recipient.
9. A method according to any preceding claim, wherein the outer encrypted message layer is encrypted with a public key of the next switch through which the message is routed or a public key of the destination server.
10. A method according to any preceding claim, wherein confirmed receipt of the message by the destination server is communicated back to the local server.
11. A method according to any preceding claim, wherein connection to the local server or destination server is via an encrypted tunnel.
12. A method of secure electronic document exchange from a message originator at a local server over an open network to a destination server via an intermediate switch, each of the message originator, the intended recipient, the servers and the switch having a public key for encrypting messages and a private key for decrypting messages encrypted with the respective public key, the method comprising the steps of. the message originator composing a message and addressing the message to the intended recipient; sending the message to the local server for transmission over the open network to the destination server; encrypting the message with the public key of the intended recipient; the local server adding a signature to the encrypted message and addressing the message to the destination server; further encrypting the message with the public key of the switch such that the message has an inner layer encrypted by the public key of the intended recipient and an outer layer encrypted by the public key of the switch; sending the message to the switch; the switch decrypting the outer encryption layer with the switch private key; the switch adding a signature to the encrypted message; the switch further encrypting the message with the public key of the destination server; sending the message to the destination server; the destination server decrypting the outer encryption layer to uncover the recipient address; and providing the encrypted message to the intended recipient.
13. A method according to any preceding claim, wherein the open network comprises the Internet.
12
14. A method according to any preceding claim, wherein the step of providing the encrypted message to the intended recipient comprises the step of the destination server forwarding the encrypted message to the intended recipient.
15. A method according to any one of Claims I to 13, wherein the step of providing the encrypted message to the intended recipient comprises the step of the destination server waiting for the intended recipient to collect the encrypted message.
16. A method according to Claim 15, wherein the private key of the intended recipient is sent to the destination server by an encrypted tunnel and the destination server decrypts the encrypted message using the private key of the intended recipient, the private key of the recipient being then forgotten by the destination server and the fully decrypted message being available to the intended recipient over the encrypted tunnel.
17. An electronic document exchange system, or component thereof, operable in accordance with the method of any preceding claim.
18. A method substantially as hereinbefore described with reference to and as shown in the accompanying drawing.
19. An electronic document exchange system substantially as hereinbefore described and as shown in the accompanying drawing.
20. Any novel feature or combination of features disclosed herein.
GB9805759A 1998-03-17 1998-03-17 A method and apparatus for electronic document exchange Expired - Fee Related GB2339367B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9805759A GB2339367B (en) 1998-03-17 1998-03-17 A method and apparatus for electronic document exchange

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9805759A GB2339367B (en) 1998-03-17 1998-03-17 A method and apparatus for electronic document exchange

Publications (3)

Publication Number Publication Date
GB9805759D0 GB9805759D0 (en) 1998-05-13
GB2339367A true GB2339367A (en) 2000-01-19
GB2339367B GB2339367B (en) 2002-12-04

Family

ID=10828786

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9805759A Expired - Fee Related GB2339367B (en) 1998-03-17 1998-03-17 A method and apparatus for electronic document exchange

Country Status (1)

Country Link
GB (1) GB2339367B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000051029A3 (en) * 1999-02-26 2002-03-28 Atabok Inc Method and apparatus for delivering electronic data through a proxy server
US7051003B1 (en) 1998-02-26 2006-05-23 Atabok Japan, Inc. Method and apparatus for delivering electronic data through a proxy server
WO2008027331A3 (en) * 2006-08-28 2008-08-21 Ses Americom Inc Iptv blackout management
WO2015184382A3 (en) * 2014-05-30 2016-03-10 Apple Inc. Controller networks for an accessory management system
CN106664226A (en) * 2014-05-30 2017-05-10 苹果公司 Controller network for an accessory management system
US9979625B2 (en) 2014-02-05 2018-05-22 Apple Inc. Uniform communication protocols for communication between controllers and accessories
US10177933B2 (en) 2014-02-05 2019-01-08 Apple Inc. Controller networks for an accessory management system
US10206170B2 (en) 2015-02-05 2019-02-12 Apple Inc. Dynamic connection path detection and selection for wireless controllers and accessories
US10454783B2 (en) 2014-02-05 2019-10-22 Apple Inc. Accessory management system using environment model
US10496508B2 (en) 2017-06-02 2019-12-03 Apple Inc. Accessory communication control
US10595073B2 (en) 2018-06-03 2020-03-17 Apple Inc. Techniques for authorizing controller devices
US11805009B2 (en) 2018-06-03 2023-10-31 Apple Inc. Configuring accessory network connections

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2094113A (en) * 1981-02-09 1982-09-08 Western Electric Co Improvements in or relating to cryptography
EP0687087A2 (en) * 1994-06-07 1995-12-13 AT&T Corp. Secure data transmission method
GB2324449A (en) * 1996-02-22 1998-10-21 Visa Int Service Ass Key replacement in a public key cryptosystem
WO1999000958A1 (en) * 1997-06-26 1999-01-07 British Telecommunications Plc Data communications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2094113A (en) * 1981-02-09 1982-09-08 Western Electric Co Improvements in or relating to cryptography
EP0687087A2 (en) * 1994-06-07 1995-12-13 AT&T Corp. Secure data transmission method
GB2324449A (en) * 1996-02-22 1998-10-21 Visa Int Service Ass Key replacement in a public key cryptosystem
WO1999000958A1 (en) * 1997-06-26 1999-01-07 British Telecommunications Plc Data communications

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7051003B1 (en) 1998-02-26 2006-05-23 Atabok Japan, Inc. Method and apparatus for delivering electronic data through a proxy server
WO2000051029A3 (en) * 1999-02-26 2002-03-28 Atabok Inc Method and apparatus for delivering electronic data through a proxy server
WO2008027331A3 (en) * 2006-08-28 2008-08-21 Ses Americom Inc Iptv blackout management
US10305770B2 (en) 2014-02-05 2019-05-28 Apple Inc. Uniform communication protocols for communication between controllers and accessories
US10454783B2 (en) 2014-02-05 2019-10-22 Apple Inc. Accessory management system using environment model
US9979625B2 (en) 2014-02-05 2018-05-22 Apple Inc. Uniform communication protocols for communication between controllers and accessories
US10177933B2 (en) 2014-02-05 2019-01-08 Apple Inc. Controller networks for an accessory management system
US12231318B2 (en) 2014-02-05 2025-02-18 Apple Inc. Uniform communication protocols for communication between controllers and accessories
US12363017B2 (en) 2014-02-05 2025-07-15 Apple Inc. Uniform communication protocols for communication between controllers and accessories
US11283703B2 (en) 2014-02-05 2022-03-22 Apple Inc. Uniform communication protocols for communication between controllers and accessories
CN106664226B (en) * 2014-05-30 2020-05-22 苹果公司 Method, apparatus, and system for a controller network for an accessory management system
WO2015184382A3 (en) * 2014-05-30 2016-03-10 Apple Inc. Controller networks for an accessory management system
CN106664226A (en) * 2014-05-30 2017-05-10 苹果公司 Controller network for an accessory management system
US10206170B2 (en) 2015-02-05 2019-02-12 Apple Inc. Dynamic connection path detection and selection for wireless controllers and accessories
US10362536B2 (en) 2016-01-08 2019-07-23 Apple Inc. Dynamic connection path detection and selection for wireless controllers and accessories
US10496508B2 (en) 2017-06-02 2019-12-03 Apple Inc. Accessory communication control
US11132275B2 (en) 2017-06-02 2021-09-28 Apple Inc. Accessory communication control
US12124349B2 (en) 2017-06-02 2024-10-22 Apple Inc. Accessory communication control
US11698846B2 (en) 2017-06-02 2023-07-11 Apple Inc. Accessory communication control
US10595073B2 (en) 2018-06-03 2020-03-17 Apple Inc. Techniques for authorizing controller devices
US11949938B2 (en) 2018-06-03 2024-04-02 Apple Inc. Techniques for authorizing controller devices
US11805009B2 (en) 2018-06-03 2023-10-31 Apple Inc. Configuring accessory network connections
US12267206B2 (en) 2018-06-03 2025-04-01 Apple Inc. Configuring accessory network connections
US11297373B2 (en) 2018-06-03 2022-04-05 Apple Inc. Techniques for authorizing controller devices

Also Published As

Publication number Publication date
GB2339367B (en) 2002-12-04
GB9805759D0 (en) 1998-05-13

Similar Documents

Publication Publication Date Title
US6363480B1 (en) Ephemeral decryptability
US5784463A (en) Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
KR100734162B1 (en) Method and apparatus for secure distribution of public / private key pairs
Kohl et al. Safeguarding digital library contents and users
US7409545B2 (en) Ephemeral decryption utilizing binding functions
CN1981476B (en) A method of encrypting and transferring data between a sender and receiver using a network
US7277549B2 (en) System for implementing business processes using key server events
US20020016910A1 (en) Method for secure distribution of documents over electronic networks
US20060053280A1 (en) Secure e-mail messaging system
EP1322088A2 (en) Method and apparatus for centralized processing of hardware tokens for PKI solutions
EP1273125A2 (en) Systems and methods for encrypting/decrypting data using a broker agent
JP2000029973A (en) Lock box mechanism electronic bidding method, and security providing method
US7660987B2 (en) Method of establishing a secure e-mail transmission link
JPH1013401A (en) Method for establishing secured communication and related ciphering/decoding system
US20030101346A1 (en) Method for notarizing receipt of electronic communications and enabling electronic registered mail; method for verifying identity of account party
US20030145200A1 (en) System and method for authenticating data transmissions from a digital scanner
GB2339367A (en) Secure communication
JP2005502269A (en) Method and apparatus for creating a digital certificate
US7676674B2 (en) Method for authenticating electronic documents
JP3804132B2 (en) Data transmission device, data encryption device, data transmission method, and data encryption method
JPH10154977A (en) User certification system and method therefor
CA2338530A1 (en) Secure message management system
JP2006039740A (en) Communication device
US20050289060A1 (en) Secure method of consulting article delivery receipts
CN1249095A (en) Apparatus and method for preventing disclosure through user-authentication at a printing node

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20040317