WO2002067535A2 - Procede de messagerie securisee - Google Patents
Procede de messagerie securisee Download PDFInfo
- Publication number
- WO2002067535A2 WO2002067535A2 PCT/FR2002/000654 FR0200654W WO02067535A2 WO 2002067535 A2 WO2002067535 A2 WO 2002067535A2 FR 0200654 W FR0200654 W FR 0200654W WO 02067535 A2 WO02067535 A2 WO 02067535A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- server
- key
- message
- channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Definitions
- the present invention relates to a secure messaging method.
- Secure messaging solutions guarantee confidentiality and optionally the integrity and identity of the message sender.
- such methods make it possible to reduce the risks in terms of security, in particular the interception by an attacker of an electronic message to read the content, the impersonation of a correspondent or even the alteration content by an attacker during the message transport phase.
- US patent US 6154543 The closest state of the art is described in US patent US 6154543.
- This patent relates to a public key cryptosystem allowing a roaming user access to a network to establish secure communications between system users, client machines, and encryption servers.
- the client machine generates and stores an encrypted private key in a server 'encryption.
- a user can then access this encrypted private key from any client machine located on the network and decrypt it using a passphrase, thereby enjoying cross-system access.
- the private key can be used to decrypt and encrypt received messages.
- a user can generate a digital message, encrypt it with the public key of a client's recipient, and transmit it to the encryption server from any client machine on the server.
- the invention relates, in its most general sense, to a secure messaging method, comprising a first step of registering a user, consisting in generating a key pair on the client workstation of said user, using a key generation algorithm [RSA for example], to encrypt the private key by a symmetric algorithm executed on the client computer, the key of this symmetric algorithm being derived by a hash function [SHAl function] of a chain of secret characters [pass phrase] entered by means of a peripheral [keyboard for example], to transmit to the server a file comprising said encrypted value of the private key encrypted with the symmetric key, the public key to a server comprising a database data for recording said information and a unique identifier of said user [for example his email address], and the hash value of the symmetric key [derived from the pass phrase],
- the registration step further comprising an operation of signing said user key pair with the server private key [certification key or key signature], the method comprising an operating step comprising an operation authentication of the user by transmission to the server from any client station of his identifier and said secret character string [his “pass phrase”], and validation of the authenticity of the user by comparison between the value derived from said secret character string transmitted by the user, and the derived value stored in said database, in relation to the identifier of the user considered, and an operation of transmission by the server to the user station of said bi-key, then encrypt and / or sign the message prepared on the client computer with the private keys of the recipients of the message, and / or the public key respectively c of said user, and an operation of transmitting said message between the user's workstation and the server, said operation of transmitting the message being carried out by establishing virtual channels [VPN] for encryption and / or signature, characterized in that the compression and the transmission of the message are carried out "in continuous flow" [streaming] without temporary storage in memory on the client station
- the operation of transmitting that is to say sending-receiving, the message consists in opening a plurality of nested virtual channels, the first channel being a communication channel, encompassed a signature channel, encompassed itself a compression channel, included in an encryption channel, allowing the transmission of messages without size limitation; reception encompassing the channels in reverse (decryption included in decompression, included in verification).
- said virtual channels are in series and include an encryption channel and a signature channel in series.
- the plurality of virtual channels further comprises an input-output (I / O) channel on the peripherals of the client station.
- the message transmission step consists in preparing a
- the method according to the invention comprises an encryption operation distinct from each of the hashes of the message of said stream with the private key of said user, in order to create a digital signature, to allow subsequent verification of the signature of each of said components. separately.
- the invention also relates to an architecture for processing secure messages, comprising a server comprising a memory for the encrypted and signed recording of information relating to the registered users, means of sending and receiving messages and means of connection to a public network, and client workstations comprising a navigation application and means of connection to said network, characterized in that the server comprises means of secure connection with the network and means of verifying files transmitted by a user and signed with a server public key, and for recording, after positive verification, in a memory for recording a table comprising, for each user: the encrypted value ["hash"] of the private key encrypted with the symmetric key, the public key to a server comprising a database for recording said information and a unique identifier of said user [for example his email address], and the hash value of the symmetric key [derived from the pass phrase], the architecture comprising furthermore means for establishing virtual channels [VPN] for encryption and / or signing, compression and transmission of the "streaming" message without temporary storage in memory on the client workstation or on the server, nor on a
- FIG. 1 represents the diagram of a secure messaging architecture according to the invention
- FIG. 2 shows the block diagram of the messaging process.
- the secure messaging system implements a server (1) connected to a telecommunications network, in particular the Internet network.
- the user of the messaging service according to the invention has a workstation (2) also connected to the same telecommunications network.
- the server (1) has a memory space for
- the server also includes an application (4) providing the interface between user requests, sent in the form of HTML forms, and access to the data recorded in the database (3).
- the client station (2) establishes an HTTP link with the server (1).
- the consultation request opens a TCP / IP (HTTP) link which will open a first technical channel (5) encapsulated by two technical channels in series respectively for decryption (6) and for checking the signature (7), these two channels (6, 7) being themselves encapsulated by a technical decompression channel (8), for example in ZIP format.
- HTTP TCP / IP
- the client station (2) opens a series of channels (5 to 8) for the continuous transmission of an encrypted, signed and compressed stream from the file from the client computer to the database (3) of the server (1).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP02706886A EP1362461A2 (fr) | 2001-02-21 | 2002-02-21 | Procede de messagerie securisee |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0102351A FR2821220B1 (fr) | 2001-02-21 | 2001-02-21 | Procede de messagerie securisee |
| FR01/02351 | 2001-02-21 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2002067535A2 true WO2002067535A2 (fr) | 2002-08-29 |
| WO2002067535A3 WO2002067535A3 (fr) | 2002-12-12 |
Family
ID=8860273
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/FR2002/000654 Ceased WO2002067535A2 (fr) | 2001-02-21 | 2002-02-21 | Procede de messagerie securisee |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP1362461A2 (fr) |
| FR (1) | FR2821220B1 (fr) |
| WO (1) | WO2002067535A2 (fr) |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6154543A (en) * | 1998-11-25 | 2000-11-28 | Hush Communications Anguilla, Inc. | Public key cryptosystem with roaming user capability |
-
2001
- 2001-02-21 FR FR0102351A patent/FR2821220B1/fr not_active Expired - Fee Related
-
2002
- 2002-02-21 WO PCT/FR2002/000654 patent/WO2002067535A2/fr not_active Ceased
- 2002-02-21 EP EP02706886A patent/EP1362461A2/fr not_active Withdrawn
Also Published As
| Publication number | Publication date |
|---|---|
| FR2821220B1 (fr) | 2004-10-01 |
| EP1362461A2 (fr) | 2003-11-19 |
| FR2821220A1 (fr) | 2002-08-23 |
| WO2002067535A3 (fr) | 2002-12-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7680281B2 (en) | Method and apparatus for intercepting events in a communication system | |
| US7653815B2 (en) | System and method for processing encoded messages for exchange with a mobile data communication device | |
| US9059840B2 (en) | Recipient blind cryptographic access control for publicly hosted message and data streams | |
| US6904521B1 (en) | Non-repudiation of e-mail messages | |
| US20110154036A1 (en) | Method For Implementing Encryption And Transmission of Information and System Thereof | |
| CN114244508B (zh) | 数据加密方法、装置、设备及存储介质 | |
| JP2005107935A (ja) | 電子メール処理装置用プログラム及び電子メール処理装置 | |
| US12101304B2 (en) | On-demand secure email transformation | |
| CN112637230B (zh) | 一种即时通信方法及系统 | |
| EP3568964B1 (fr) | Procédé de transmission d'une information numérique chiffrée de bout en bout et système mettant en oeuvre ce procédé | |
| CN107276996A (zh) | 一种日志文件的传输方法及系统 | |
| CN115001871A (zh) | 基于区块链技术的文件加密共享的方法和系统 | |
| CN114398688A (zh) | 一种基于量子加密盒子的通信系统 | |
| WO2015104567A1 (fr) | Procédé de communication sécurisé entre un serveur et un navigateur web client | |
| WO2025082030A1 (fr) | Procédé de transmission de données, appareil, support de stockage et dispositif | |
| US11968188B2 (en) | Secure email transmission via treasury portal | |
| EP1362461A2 (fr) | Procede de messagerie securisee | |
| CN108243198B (zh) | 一种数据分发、转发方法及装置 | |
| EP1300980A1 (fr) | Procès pour garantir la non-répudiation de la réception d'un message dans le contexte d'une transaction électronique | |
| WO2025193157A1 (fr) | Système et procédé de vérification sécurisée de message | |
| CN116886690A (zh) | 一种支持多人同时进行的端到端消息文件安全传输的方法 | |
| CN116980170A (zh) | 一种端对端加密的聊天记录找回机制 | |
| CN116319031A (zh) | 一种接口报文加解密方法及装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 2002706886 Country of ref document: EP |
|
| WWP | Wipo information: published in national office |
Ref document number: 2002706886 Country of ref document: EP |
|
| REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
| NENP | Non-entry into the national phase |
Ref country code: JP |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |
|
| WWW | Wipo information: withdrawn in national office |
Ref document number: 2002706886 Country of ref document: EP |