Encryption to BCC recipients with S/MIME
First Claim
1. A method for protecting the identity of one or more hidden recipients of an email message, the email message comprising an email header and an email body, the method comprising:
- creating a first encrypted email body by encrypting the email body using a first encryption key;
creating a second encrypted email body by encrypting the email body using a second encryption key;
creating a first encrypted email message, said first encrypted email message comprising a first email header referencing one or more revealed recipients, said first encrypted email message further comprising the first encrypted email body and, for each of the one or more revealed recipients, an encrypted version of the first encryption key;
creating a second encrypted email message, said second encrypted email message comprising a second email header referencing one or more hidden recipients, said second encrypted email message further comprising the second encrypted email body and, for each of the one or more hidden recipients, an encrypted version of the second encryption key;
transmitting the first encrypted email message to the one or more revealed recipients referenced by the first email header; and
transmitting the second encrypted email message to the one or more hidden recipients referenced by the first email header.
2 Assignments
0 Petitions
Accused Products
Abstract
Encrypted email message structures can contain recipient information that can reveal, to any recipient, all of the other recipients of an email message. Because some recipients, such as recipients to whom the message was “blind carbon-copied”, should remain hidden from the other recipients, individual encrypted messages can be created. One encrypted message can be created for all of the recipients who are intended to be revealed, such as the recipients listed in the TO and CC fields of an email header. A second encrypted message can be created for all of the recipients of the message who are intended to be hidden, such as the recipient listed in the BCC field of an email header. Alternatively, multiple encrypted messages can be created individually for each recipient in the BCC field, if the BCC recipients are to be hidden even from other BCC recipients.
49 Citations
19 Claims
-
1. A method for protecting the identity of one or more hidden recipients of an email message, the email message comprising an email header and an email body, the method comprising:
-
creating a first encrypted email body by encrypting the email body using a first encryption key; creating a second encrypted email body by encrypting the email body using a second encryption key; creating a first encrypted email message, said first encrypted email message comprising a first email header referencing one or more revealed recipients, said first encrypted email message further comprising the first encrypted email body and, for each of the one or more revealed recipients, an encrypted version of the first encryption key; creating a second encrypted email message, said second encrypted email message comprising a second email header referencing one or more hidden recipients, said second encrypted email message further comprising the second encrypted email body and, for each of the one or more hidden recipients, an encrypted version of the second encryption key; transmitting the first encrypted email message to the one or more revealed recipients referenced by the first email header; and transmitting the second encrypted email message to the one or more hidden recipients referenced by the first email header. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable medium having computer-executable instructions for protecting the identity of one or more hidden recipients of an email message, the email message comprising an email header and an email body, the computer-readable instructions performing steps comprising:
-
creating a first encrypted email body by encrypting the email body using a first encryption key; creating a second encrypted email body by encrypting the email body using a second encryption key; creating a first encrypted email message, said first encrypted email message comprising a first email header referencing one or more revealed recipients, said first encrypted email message further comprising the first encrypted email body and, for each of the one or more revealed recipients, an encrypted version of the first encryption key; creating a second encrypted email message, said second encrypted email message comprising a second email header referencing one or more hidden recipients, said second encrypted email message further comprising the second encrypted email body and, for each of the one or more hidden recipients, an encrypted version of the second encryption key; transmitting the first encrypted email message to the one or more revealed recipients referenced by the first email header; and transmitting the second encrypted email message to the one or more hidden recipients referenced by the second email header. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium having computer-executable instructions for protecting the identity of one or more hidden recipients of an email message, the email message comprising an email header and an email body, the computer-readable instructions performing steps comprising:
-
determining one or more revealed recipients of the email message; determining the one or more hidden recipients of the email message; and selecting a hidden recipients concealment option; wherein the one or more revealed recipients will receive a first encrypted email message comprising, for each of one or more revealed recipients, an encrypted version of a first encryption keys, a first encrypted email body created by encrypting the email body using the first encryption key, and the first email header of revealed recipients; and wherein further each of the one or more hidden recipients will receive, depending on the selected hidden recipients concealment option, either a second encrypted email message comprising, for each of one or more hidden recipients, an encrypted version of a second encryption key, a second encrypted email body created by encrypting the email body using the second encryption key, and the second email header of hidden recipients, or a corresponding one or more encrypted email messages corresponding to the one or more hidden recipients, wherein each encrypted email message of the corresponding one or more encrypted email messages comprises the second encryption key encrypted for a corresponding hidden recipient, a second encrypted email body created by encrypting the email body using the second encryption key, and the second email header of the corresponding hidden recipient. - View Dependent Claims (16, 17, 18, 19)
and wherein the encrypting the second encryption key comprises; locating one or more hidden recipient certificates corresponding to the one or more hidden recipients; encrypting, for each of one or more hidden recipients, the second encryption key using the one or more hidden recipient public keys.
-
Specification