×

Method and apparatus providing registered mail features in an electronic communication system

  • US 4,458,109 A
  • Filed: 02/05/1982
  • Issued: 07/03/1984
  • Est. Priority Date: 02/05/1982
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for providing a security feature in an electronic communication system, wherein said communication system contains a first and a second terminal and a conmmunication network, wherein said first terminal is provided for sending a message to said second terminal, wherein said second terminal is provided for receiving said message, and wherein a security service station is provided to communicate with said first and second terminal via said communication network, comprising the steps of:

  • (a) in said first terminal (A), generating a key (K) at random;

    (b) in said first terminal (A), encrypting said message (MSG) with said random key (K), thereby obtaining a first encrypted message;

    
    
    space="preserve" listing-type="equation"><

    MSG>

    .sub.K ;

    (c) in said first terminal (A), deriving a first quantity of data (CS.A=<

    MSG>

    K in FIG.

         1) defining said first encrypted message (<

    MSG>

    K) and composing from said first quantity of data (CS.A) and from said key (K) a composed data quantity;

    (K, CS.A)(d) in said first terminal (A), encrypting said composed data quantity with a first secret key (SK.A) which is specifically assigned to said first terminal (A), thereby obtaining a first encrypted composed quantity of data;

    
    
    space="preserve" listing-type="equation">{K,CS.A}SK.A(e) sending said first encrypted compound quantity of data ({K,CS.A}SK.A) from said first terminal (A) to said security service station (SSS);

    (f) sending said first encrypted message (<

    MSG>

    K) from said first terminal (A) to said second terminal (B);

    (g) in said second terminal (B), deriving a second quantity of data (CS.B=<

    MSG>

    K in FIG.

         1) defining said first encrypted message (<

    MSG>

    K) received from said first terminal (A) and encrypting said second quantity of data with a second secret key (SK.B) which is specifically assigned to said second terminal (B), thereby obtaining a second encrypted quantity of data;

    
    
    space="preserve" listing-type="equation">CR.3={<

    MSG>

    .sub.K }SK.B;

    (h) sending said second encrypted quantity of data (CR.3) from said second terminal (B) to said security service station (SSS);

    (i) in said security service station (SSS), decrypting said first encrypted composed quantity of data ({K,CS.A}SK.A) received from said first terminal (A) with a first predetermined key (PK.A) which is specifically assigned to said first terminal (A), thereby obtaining said first quantity of data (CS.A) and said random key (K);

    (j) in said security service station (SSS), decrypting said second encrypted quantity of data (CR.3) received from said second terminal (B) with a second predetermined key (PK.B) which is specifically assigned to said second terminal (B), thereby obtaining said second quantity of data (CS.B);

    (k) in said security service station (SSS), determining if said first quantity of data (CS.A) is equal to said second quantity of data (CS.B);

    (l) if so (CS.A =CS.B),in said security service station (SSS), composing a receipt information (RC in FIG.

         1) comprising said random key (K) and said first quantity of data (CS.A);

    
    
    space="preserve" listing-type="equation">RC=K,CS.A;

    (m) in said security service station (SSS), encrypting said information (RC) with a secret network key (SK.N) specifically assigned to said security service station (SSS),thereby obtaining a receipt (RCPT);

    
    
    space="preserve" listing-type="equation">RCPT(K)={RC}SK.N;

    (n) sending said receipt (RCPT) from said security service station (SSS) to said first terminal (A);

    (o) sending said receipt (RCPT) and random key information (K) from said security service station (SSS) to said second terminal (B);

    (p) in said second terminal (B), extracting said random key (K) from said random key information; and

    (q) in said second terminal (B), decrypting said first encrypted message (<

    MSG>

    K) with said random key (K), thereby obtaining said message (MSG) in clear text. (FIG.

         1).

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×