The object of the invention is a method so that a telecommunications operator can received, reroute, and deliver e-mail from any transmitting user that is not a client of the operator to one or several client recipients of the operator, generating proof of all the operation transactions to, finally, sign it digitally and deliver a certificate to the non-client issuer users as operator and trusted third party, also generating an incoming register of the e-mails received.
It is known that current electronic communications have become a vital and essential tool for any operations, both legal and illegal. The communications are used for all kind of movements, generating calls, e-mails, etc. from a source to a destination.
Telecommunications operators provide the infrastructures that manage, direct and store a large part of this traffic. These telecommunications operators are subject to regulation, among others, for the use of the radio spectrum, which is limited, or for the use of telephone number resources, which are also finite.
Telecommunications operators also make recordings of the operations that the users make with the objectives, among others, of pricing, recording the numbers associated thereto, billing references, as well as the recording of any transactional detail used in the billing of the user. These recordings are kept for later verifications of pricing and/or monitoring of the traffic by the user.
On occasions, the legal authorities request the telecommunications operators for recorded data of the electronic transactions carried out, since they are considered as trusted third parties for the purposes of providing these data, as well as any other detail that may help to determine the individuals or corporate bodies who have performed the action of interest.
However, the search for the data requested from the telecommunications operator is normally complicated, since it is performed in recordings of activities with a large volume, normally designed for billing rather than monitoring data traceability. Therefore, the previous search for the data requested may take up a huge amount of the telecommunications operator's resources.
Once the data have been located by the legal authorities, the operator issues a certificate wherein it explicitly states the transactional data requested, the frequency, the destinations, as well as any information the appropriate legal authority may have requested.
Likewise, in the users or bodies that receive e-mails there is the need to generate a certified register of all the transactions or e-mails received, and in turn, issue a legally valid certificate to the issuers of the original e-mail and certify the transaction data, for example, the data transmitted, the date, the attachments, the reception date or any other detail useful for the user. This need may be due to a third party request to the generating user of the previous transactional data.
Various methods and systems are known in the state of the art to verify the transmission as well as the integrity of the data contained in an e-mail. These known methods normally provide proof and contents of the sending and reception of e-mails based on a technological solution that enables verifying the transmission.
However, the methods known in the state of the art have the disadvantage that they need the e-mail content and attachments to follow a template or scheme predetermined in a previous document, preventing versions, modifications or simply a free template in the document to be received.
The methods known in the state of the art for recording the entry of documentation by users or bodies have several drawbacks, such as the non-automation of the process and the need for human intervention, which leads to a high consumption time and they also have a high labour cost.
The invention object of this application provides a solution to the previously commented disadvantages by a simple certification method that includes the transmission data, the data transmitted, the attachments, a unique register number and the data of the final status of the transmission.
The present invention resolves the previous drawbacks by a method whereby a telecommunications operator can create a record of e-mails received by a client of the operator and in turn certify the reception of the text delivered with all its attachments to the issuer of that e-mail, so that the issuer obtains proof of the delivery of an e-mail together with the transmission data, the data transmitted, the attachments, a unique register number and the final status of the transmission.
The method for recording and certifying the reception of e-mail from an transmitting user to a recipient user object of the invention comprises the following steps that are performed in an e-mail reception and certification system comprising at least one incoming mail server, at least one outgoing mail server, at least one database, a time stamp server, a data processing unit and a certification server which are interconnected:
According to the above, the method object of the invention has the advantage that any content which can be sent by e-mail can be delivered, generating proof of reception of the content.
To complement the description being made and in order to aid towards a better understanding of the characteristics of the invention, according to a preferred example of practical embodiment thereof, a set of drawings is attached as an integral part of said description wherein, with illustrative and non-limiting nature, the following has been represented:
FIGS. 1 and 2.—Show a flow diagram of an example of embodiment of the method object of the invention and of the creation of the digital certificate.
FIG. 3.—Shows a flow diagram of an example of embodiment of the authentication method of a recipient user.
The transmitting user (1), which is not a client of the operator, sends the e-mail to a destination address, this address being the address of a recipient user (11), who is client of the certifying operator, where the recipient user (11) would like to certify the incoming e-mails to a specific address.
When the e-mail reaches the incoming mail server (2), this verifies if it is an e-mail address to be certified and if it is found in a certification window. If it does not correspond to an address to be certified, the e-mail is ignored. If it corresponds to a correct address, it passes to a filter which determines if it is junk mail or the transmitting user belongs to the blacklist. If the filter determines that it is junk mail, it is discarded; otherwise, it is then verified if the recipient user (2) has credit for the certification of the incoming e-mail.
If there is no balance or credit, a lack of credit alert is generated, which is sent to a first outgoing mail server (9). This server processes the e-mail and delivers it to a first mail server (10) of the recipient user (11), which is responsible for the accounts management so that it makes effective the credit availability that can allow the certification.
If the recipient user (11) has balance, the system starts the certification process of the incoming mail, first passing to a data processing unit (15) which will disintegrate the e-mail in all its components, it will generate a unique numbering and will insert it in a database (17) present in the operator in addition to in a remote database (16) of the recipient user (11), this (11) being able to work with its own copy in a separate server. Likewise, a copy of the original e-mail without modifications is sent to the destination, i.e. to the recipient user (11), specifically to a second mail server (20) of the recipient user (11) through a second outgoing mail server (19).
Once these steps have been verified, the certification server is notified (13), which creates a file (14) with the traceability data of the e-mail, sources, servers it has passed through, the non-printable attachments, the printable attachments and it signs said file (14) with the digital signature of the operator.
Later, the digital addition is performed of the content of the file (14) through a time stamp server (32) to later create the certificate (25), preferably in .pdf format with all the details of the operations performed.
Once the certificate (25) has been created an e-mail is attached to be delivered to the transmitting user (1), it discounts the amount of the certificate (25) from the content balance in the file of the recipient user (11) and passes the mail to a server of outgoing certified mails (28) of the operator.
This e-mail contains the certificate (25) which is sent to the mail server (30) of the transmitting user (1) so that on its reception, it (1) has a certificate (25) which proves that its address one day sent an e-mail with data and attachments to a certain destination and with specific contents.
This recipient user (11) starts the connection with different access systems, for example, a PC, an electronic tablet (34), a Smartphone (35) or any device which allows you to navigate through Internet.
In the example of embodiment shown, each recipient user (11) accesses an access control web system (36). This system has access to a database containing the files of the recipient users (11) with certification capacity and the number of certifications they have available as well as of its operating capacity.
The recipient user (11) enters his username and password to carry out his authentication. If this is not correct, he is redirected to a system help with explanation of how to register to again perform his authentication.
If the recipient user (11) is correctly authenticated, he can access a menu (39) where it is possible to specify the characteristics of how he wants the certificate (25) to be issued or from what addresses it is permitted to carry out the certification of the e-mails. Once these parameters have been defined, the recipient user (11) can request a certification process window and adjust its timetable. In other words, from a certain time it gives authorization to the certification system so that e-mails enter and start the certification process.
Finally, if when the certification process starts, the recipient user (11) is in the mail delivery window, the certification process will continue. Otherwise, the e-mail is returned with a message indicating that it is outside the window or it is from an unknown transmitting user (1).
As an alternative, the recipient user (11) may request an encrypted token to perform the certification requests without the need for opening a window via the web.
Number | Date | Country | Kind |
---|---|---|---|
EP12382407 | Oct 2012 | EP | regional |