Email access control scheme for communication network using identification concealment mechanism
First Claim
1. A method of email access control, comprising the steps of:
- receiving a personalized access ticket containing a sender'"'"'s identification and a recipient'"'"'s identification in correspondence and a sender'"'"'s identification presented by a sender from the sender who wishes to send an email to a recipient so as to specify the recipient as an intended destination of the email, the personalized access ticket further containing a validity period indicating a period for which the personalized access ticket is valid, at a secure communication service for connecting communications between the sender and the recipient;
controlling accesses between the sender and the recipient by verifying an access right of the sender with respect to the recipient according to the personalized access ticket at the secure communication service;
checking whether the sender'"'"'s identification presented by the sender is contained as the sender'"'"'s identification in the personalized access ticket presented by the sender, and refusing delivery of the email when the sender'"'"'s identification presented by the sender is not contained in the personalized access ticket presented by the sender; and
checking the validity period contained in the personalized access ticket presented by the sender, and refusing delivery of the email when the validity period has expired.
1 Assignment
0 Petitions
Accused Products
Abstract
An email access control scheme capable of resolving problems of the real email address and enabling a unique identification of the identity of the user while concealing the user identification is disclosed. A personalized access ticket containing a sender'"'"'s identification and a recipient'"'"'s identification in correspondence is to be presented by a sender who wishes to send an email to a recipient so as to specify the recipient as an intended destination of the email. Then, accesses between the sender and the recipient by verifying an access right of the sender with respect to the recipient according to the personalized access ticket at a secure communication service. Also, an official identification of each user by which each user is uniquely identifiable by a certification authority, and an anonymous identification of each user containing at least one fragment of the official identification are defined, and each user is identified by the anonymous identification of each user in communications for emails on a communication network.
115 Citations
85 Claims
-
1. A method of email access control, comprising the steps of:
-
receiving a personalized access ticket containing a sender'"'"'s identification and a recipient'"'"'s identification in correspondence and a sender'"'"'s identification presented by a sender from the sender who wishes to send an email to a recipient so as to specify the recipient as an intended destination of the email, the personalized access ticket further containing a validity period indicating a period for which the personalized access ticket is valid, at a secure communication service for connecting communications between the sender and the recipient; controlling accesses between the sender and the recipient by verifying an access right of the sender with respect to the recipient according to the personalized access ticket at the secure communication service; checking whether the sender'"'"'s identification presented by the sender is contained as the sender'"'"'s identification in the personalized access ticket presented by the sender, and refusing delivery of the email when the sender'"'"'s identification presented by the sender is not contained in the personalized access ticket presented by the sender; and checking the validity period contained in the personalized access ticket presented by the sender, and refusing delivery of the email when the validity period has expired. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of email access control, comprising the steps of:
-
defining an official identification of each user by which each user is uniquely identifiable by a certification authority, and an anonymous identification of each user containing at least one fragment of the official identification; identifying each user by the anonymous identification of each user in communications for emails on a communication network, wherein the anonymous identification of each user is an information containing the at least one fragment of the official identification of each user which is signed by the certification authority using a secret key of the certification authority; receiving a personalized access ticket containing a sender'"'"'s anonymous identification and a recipient'"'"'s anonymous identification in correspondence, which is presented by a sender who wishes to send an email to a recipient so as to specify the recipient as an intended destination of the email, at a secure communication service for connecting communications between the sender and the receiver; and controlling accesses between the sender and the recipient by verifying an access right of the sender with respect to the recipient according to the personalized access ticket at the secure communication service. - View Dependent Claims (28, 29, 30, 31, 32, 33)
-
-
34. A communication system realizing email access control, comprising:
-
a communication network to which a plurality of user terminals are connected; a secure communication service device for connecting communications between a sender and a receiver on the communication network, by receiving a personalized access ticket containing a sender'"'"'s identification and a recipient'"'"'s identification in correspondence, which is presented by a sender who wishes to send an email to a recipient so as to specify the recipient as an intended destination of the email, the personalized access ticket further containing a validity period indicating a period for which the personalized access ticket is valid, authenticating and controlling accesses between the sender and the recipient by verifying an access right of the sender with respect to the recipient according to the personalized access ticket and by checking the validity period contained in the personalized access ticket presented by the sender, and refusing delivery of the email when the validity period has expired; and a secure processing device for issuing the personalized access ticket which is signed by a secret key of the secure processing device; wherein the secure communication service device authenticates the personalized access ticket by verifying a signature of the secure processing device in the personalized access ticket using a public key of the secure processing device. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
-
61. A secure communication service device for use in a communication system realizing email access control, comprising:
-
computer hardware; and computer software for causing the computer hardware to connect communications between a sender and a receiver by receiving a personalized access ticket containing a sender'"'"'s identification and a recipient'"'"'s identification in correspondence, which is presented by the sender who wishes to send an email to the recipient so as to specify the recipient as an intended destination of the email, the personalized access ticket further containing a validity period indicating a period for which the personalized access ticket is valid, and controlling accesses between the sender and the recipient by verifying an access right of the sender with respect to the recipient according to the personalized access ticket; wherein the computer software causes the computer hardware to also receive the sender'"'"'s identification presented by the sender along with the personalized access ticket, check whether the sender'"'"'s identification presented by the sender is contained in the personalized access ticket presented by the sender and whether the validity period contained in the personalized access ticket presented by the sender has expired, and refuse a delivery of the email when the sender'"'"'s identification presented by the sender is not contained in the personalized access ticket presented by the sender or when the validity period has expired. - View Dependent Claims (62, 63, 64, 65, 66, 67, 68)
-
-
69. A communication system realizing email access control, comprising:
-
a certification authority device for defining an official identification of each user by which each user is uniquely identifiable by the certification authority device, and an anonymous identification of each user which contains at least one fragment of the official identification wherein the anonymous identification of each user contains the at least one fragment of the official identification of each user which is signed by the certification authority device using a secret key of the certification authority device; an access control device for controlling email accesses to a communication network on which each user is identified by the anonymous identification of each user in communications for emails on the communication network; and a secure communication service device for connecting communications between users on the communication network by receiving a personalized access ticket containing a sender'"'"'s anonymous identification and a recipient'"'"'s anonymous identification in correspondence, which is presented by a sender who wishes to send an email to a recipient so as to specify the recipient as an intended destination of the email, and controlling accesses between the sender and the recipient by verifying an access right of the sender with respect to the recipient according to the personalized access ticket. - View Dependent Claims (70, 71, 72, 73, 74, 75)
-
-
76. A computer usable medium having computer readable program code means embodied therein for causing a computer to function as a secure communication service device for use in a communication system realizing email access control, the computer readable program code means includes:
-
first computer readable program code means for causing said computer to receive a personalized access ticket containing a sender'"'"'s identification and a recipient'"'"'s identification in correspondence, which is presented by a sender who wishes to send an email to a recipient so as to specify the recipient as an intended destination of the email, the personalized access ticket further containing a validity period indicating a period for which the personalized access ticket is valid; and second computer readable program code means for causing said computer to control accesses between the sender and the recipient by verifying an access right of the sender with respect to the recipient according to the personalized access ticket, so as to connect communications between the sender and the receiver on the communication network;
wherein the second computer readable program code means causes said computer to authenticate the personalized access ticket presented by the sender, check whether the validity period contained in the personalized access ticket presented by the sender has expired, and refuse delivery of the email when the personalized access ticket presented by the sender has been altered or when the validity period has expired. - View Dependent Claims (77, 78, 79, 80, 81, 82, 83, 84, 85)
-
Specification