Message security
1 Assignment
0 Petitions
Accused Products
Abstract
To provide a secure, effective but simple message handling, a method is provided for transmitting an electrical message, from a first user having a first terminal to a second user having a second terminal. The method comprises the steps of: transmitting said email in an encrypted form by said first terminal, said encrypted e-mail being encrypted by means of a key generated by a first key generator using a seed, providing once said second user with said seed for generating a key with a second key generator provided in said second terminal, providing to and storing said seed in said second terminal, using said seed by said second terminal for generating a key each time an encrypted email from said first user to said second user is received, synchronising a counting value in each terminal; and generating said key on the basis of said seed and a counting value in each terminal, independently of other terminal.
-
Citations
58 Claims
-
1-25. -25. (canceled)
-
26. A method of marketing an instruction set for transmitting and receiving electrical messages, in particular a secure e-mail from a first user having a first terminal to a second user having a second terminal, the method comprising:
-
transmitting said secure email in an encrypted form by said first terminal, said encrypted e-mail being encrypted by means of a key generated by a first key generator using a seed, providing said secure email with an accessible message referring to a vendor place, obtaining from said vendor place a second instruction set for decrypting said email, and debiting said second user for using said second instruction set for encrypting a new email. - View Dependent Claims (27, 28, 29)
-
- 30. A method of filtering emails to recipient, from a first user having a first terminal to the recipient being a second user having a second terminal, said email being transmitted in an encrypted form by said first terminal, said encrypted e-mail being encrypted by means of a key generated by a first key generator using a seed, providing once said second user with said seed for generating a key with a second key generator provided in said second terminal, generating a list of trusted senders by said second terminal based on a sender-receiver relation generated by said seed, and acting upon reception of an email, based on said list.
-
32. A method of transmitting data from a first user having a first terminal to a second user having a second terminal over a network, the method comprising the steps of:
-
encrypting said data in said first terminal by means of a key generated by a first key generator using a seed, providing once said second user with said seed for generating a key with a second key generator provided in said second terminal, using said seed by said second terminal for generating a key each time a an encrypted data from said first user to said second user is received;
generating said key on the basis of said seed and a counting value in each terminal, independently of other terminal.
-
-
33. A system for transmitting a data from a first user using a first terminal to a second user using a second terminal, the system further comprising:
-
means for securing said data in form of an encrypted data set in said first terminal, said encrypted data set being encrypted by means of a key generated by a first key generator using a seed, means for providing said second user said seed for generating a key with a second key generator one time, means for generating a key each time an encrypted data set from said first user to said second user is received in said second terminal using said seed;
a key-generating unit in each terminal, said key-generating unit communicating with a memory, in which identical seeds are stored, a counter to periodically change a counting value, and a calculating arrangement adapted to generate in each terminal and independently of other terminal, a key on the basis of an original value and accounting value issued from the counter; and
means for terminals are arranged to sense when they are not synchronized and then to reset synchronization. - View Dependent Claims (34, 35)
-
-
36. A method of transmitting an e-mail from a first electronic terminal of a network including a plurality of electronic terminals to a second electronic terminal of the network, comprising:
-
(a) storing a seed in said first and second electronic terminals;
(b) synchronizing a first count value held in said first electronic terminal with a second count value held in said second electronic terminal;
(c) generating a first key from said seed stored in said first electronic terminal and said first count value;
(d) encrypting an e-mail at said first electronic terminal with said first key;
(e) transmitting said encrypted e-mail from said first electronic terminal to said second electronic terminal;
(f) generating a second key at said second electronic terminal from said seed stored in said second electronic terminal and said second count value; and
(g) decrypting said encrypted e-mail at said second electronic terminal using said second key. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. A network, comprising:
-
a first electronic terminal; and
a second electronic terminal, said first electronic terminal including a memory operable to store a seed and a first counter operable to hold a first count value, said second electronic terminal including a memory operable to store said seed and a second counter operable to hold a second count value, said first and second electronic terminals being operable to synchronize said first and second count values held by said first and second counters, respectively, said first electronic terminal further being operable to generate a first key using said seed stored in said memory and said first count value, encrypt an e-mail using said first key and transmit said encrypted e-mail to said second electronic terminal, said second electronic terminal being operable to receive said encrypted e-mail from said first terminal, generate a second key using said seed stored in said second terminal and said second count value, and decrypt said encrypted e-mail using said second key. - View Dependent Claims (53, 54, 55)
-
-
56. A computer-readable program product including a plurality of instructions, the plurality of instructions being executable by a processor to perform a method of transmitting an e-mail from a first electronic terminal of a network including a plurality of electronic terminals to a second electronic terminal of the network, the method comprising:
-
(a) storing a seed in said first and second electronic terminals;
(b) synchronizing a first count value held in said first electronic terminal with a second count value held in said second electronic terminal;
(c) generating a first key from said seed stored in said first electronic terminal and said first count value;
(d) encrypting an e-mail at said first electronic terminal with said first key; and
(e) transmitting said encrypted e-mail from said first electronic terminal to said second electronic terminal, wherein said second electronic terminal is operable to generate a second key from said seed stored in said second electronic terminal and said second count value and to decrypting said encrypted e-mail at said second electronic terminal using said second key.
-
-
57. A computer-readable recording medium having instructions recorded thereon, the instructions being executable by a processor to perform a method of transmitting an e-mail from a first electronic terminal of a network including a plurality of electronic terminals to a second electronic terminal of the network, the method comprising:
-
(a) storing a seed in said first and second electronic terminals;
(b) synchronizing a first count value held in said first electronic terminal with a second count value held in said second electronic terminal;
(c) generating a first key from said seed stored in said first electronic terminal and said first count value;
(d) encrypting an e-mail at said first electronic terminal with said first key; and
(e) transmitting said encrypted e-mail from said first electronic terminal to said second electronic terminal, wherein said second electronic terminal is operable to generate a second key from said seed stored in said second electronic terminal and said second count value and to decrypting said encrypted e-mail at said second electronic terminal using said second key.
-
-
58. An electronically propagatable signal including a plurality of instructions, the plurality of instructions being executable by a processor to perform a method of transmitting an e-mail from a first electronic terminal of a network including a plurality of electronic terminals to a second electronic terminal of the network, the method comprising:
-
(a) storing a seed in said first and second electronic terminals;
(b) synchronizing a first count value held in said first electronic terminal with a second count value held in said second electronic terminal;
(c) generating a first key from said seed stored in said first electronic terminal and said first count value;
(d) encrypting an e-mail at said first electronic terminal with said first key; and
(e) transmitting said encrypted e-mail from said first electronic terminal to said second electronic terminal, wherein said second electronic terminal is operable to generate a second key from said seed stored in said second electronic terminal and said second count value and to decrypting said encrypted e-mail at said second electronic terminal using said second key.
-
Specification