×

Method and system for delivering secure e-mail

  • US 7,210,036 B2
  • Filed: 01/15/2001
  • Issued: 04/24/2007
  • Est. Priority Date: 01/16/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for increasing the privacy of an e-mail message (M), comprising the steps of:

  • providing a central Server (PS) which stores tables of decryption key (K) data and the different identifications given to them by different users;

    at the Sender'"'"'s terminal, encrypting a said message (M) using an encryption key A, and sending by e-mail the encrypted message (EM) to the Recipient;

    providing the Recipient with a Partial decryption Key (PK), which is the decryption key (K) data for said encrypted message (EM) modified by a given Operator (OP);

    sending by the Sender'"'"'s terminal to said central Server (PS) an Operator Identification (OIi) belonging to the Sender, which identifies the Operator (OP) employed by the Sender to generate the Partial decryption key (PK), and which is obtained from the Operator Table stored at the Sender'"'"'s end;

    at the Server (PS), obtaining from the Sender additional data comprising one or more of the Sender'"'"'s e-mail address, the Recipient'"'"'s e-mail address, or an identifying code for the e-mail message;

    at the Server (PS), obtaining the Operator (OP) from the Sender Operators Table (ST) stored at the Server, using the Operator Identification of the Sender (OIi) sent to the Server by the Sender'"'"'s terminal;

    at the Server (PS), obtaining the Operator Identification of the Recipient (OIo), from the Recipient Operators Table (RT) stored at the Server, using the Operator (OP);

    sending to the Recipient its Operator Identification (OIo), together with any additional data associated with the sender, or the recipient or the message;

    at the Recipient, receiving the encrypted message (EM) and the Partial decryption Key (PK) from the Sender, and the Operator Identification (OIo) from the Server;

    deriving the Operator (OP) using the Operator Table stored at the Recipient'"'"'s end, and the Operator Identification OIo) received from the Server;

    generating therewith the decryption Key from the Partial Key and said Operator (OP); and

    decrypting the encrypted e-mail message (EM) using said decryption key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×