This invention relates generally to the field of information handling and more specifically to a method and system for data encryption and transmission. Even the best encryption system can't protect data if it is too difficult and or time consuming for the end user to use. This invention focuses on making secure data transmission drag and drop simple by adopting the paradigm of a pre-paid self addressed express envelope or courier.
The security of information poses challenges for businesses and other organizations that transmit and store information. Data encryption is intended to transform data into a form readable only by authorized users. However a large majority of information is not encrypted due to the difficulty or inconvenience of using most encryption software. In light of this the need has arisen to develop encryption into a “software appliance”. This software knows the identity of the sender and the receiver and the encryption key that is to be used; all it needs from the user is the information which is to be securely transported. By adopting the paradigm of a pre-paid, self addressed express envelope end users will interact with this invention in much the same way they interact with traditional delivery systems that simply provide for the delivery and take place without any further user intervention.
This invention is primarily a process to make using strong encryption (such as described in U.S. patent application Ser. Nos. 09/797,272 09/797,066 09/797,107 09/797,068 09/797,079 09/796,694) easier for end users. In doing so it leverages the wide-spread availability of public information networks to rapidly deliver private content to a predetermined recipient. This software encryption appliance is designed around the look and feel of a pre-paid pre-addressed express delivery envelope similar to those used every day in such industries as accounting, legal and financial. When an accountant, lawyer, broker or other professional needs to get high-value, confidential correspondence from a client, it is accepted practice to provide the client with pre-addressed pre-paid express envelopes from some commercial overnight or express delivery service. This invention seeks to translate this process into the digital world. A client would be provided with a computer program whose graphical user interface (GUI) resembles an addressed envelope. In order to send a secure communication to the providing professional service “PPS”, the client merely has to “drag and drop” the intended document into the appropriate desktop Icon. This process is far easier and more streamlined than email programs that use the so called public key infrastructure. After dropping a file on the icon, a confirm box pops up. After confirming the intention to send, there is no other intervention needed on the user's part. This eliminates the hassle of public key management, prevents misdirected communications and assures that the delivery will take place without the confidentiality of the message being compromised.
For a more complete understanding of the present invention and for further features and advantages, reference is now made to the following description, taken in conjunction with the accompanying drawings, in which:
This invention is primarily a process to make using strong encryption (such as described in co-pending commonly assigned U.S. patent applications identified as Ser. Nos. 60/226,400 09/797,272 09/797,066 09/797,107 09/797,068 09/797,079 09/796,694) easier for end-users, the teachings of which are incorporated herein by reference. This software encryption appliance is designed around the look and feel of a pre-paid pre-addressed express delivery envelope similar to those used every day in such industries as accounting, legal and financial. When an accountant, lawyer, broker or other professional needs to get high-value, confidential correspondence from a client, it is accepted practice to provide the client with pre-addressed pre-paid, express envelopes from some commercial overnight or express delivery service. This invention seeks to translate this process into the digital world.
This process has two main components. The first component is the creation and distribution of a pre-addressed digital envelope. The second portion is the digital envelope itself. This envelope allows drag and drop encryption and transmission back to the distributing party. This digital envelope also has the ability to decrypt and display return correspondence or files.
Envelope creation is handled by an administration program that allows the creation and assignment of encryption such as disclosed in the cross referenced patent application Ser. Nos. 09/797,079 and 09/796,694, keys and the management of distribution lists or groups. To facilitate ease of use, the user interface for envelope creation contains elements that simulate the look and feel of a traditional mailing envelope. In one commercial implementation model the administration program assigns a number of uses to the digital envelope that counts down. This information appears in the area where stamps would be placed on a traditional envelope. The “TO” and “FROM” fields of the envelope are filled out prior to distribution. Typically, the envelope provider puts their own information in the “TO” field and their client's information in the “FROM” field. A key is assigned to the envelope and the creation time along with all other relevant information is logged for auditing purposes. The envelope is generated and distributed by some suitable trusted means generally to the party listed in the “FROM” field.
An end user is provided with a computer program from some party who wishes to receive confidential communications. The program sets itself up as a desktop icon that resembles an envelope. Any file dragged over and dropped on the envelope is copied, encrypted and sent to whatever address was embedded in the envelope at the time of creation. After confirming the intention to send, there is no other intervention needed on the user's part. This eliminates the need for public key management and prevents misdirected communications. Since the communications are secured with the strong encryption technology, such as disclosed in the cross referenced patent application Ser. Nos. 60/226,400 09/797,272 09/797,066 09/797,107 09/797,068 09/797,079 09/796,694, there is assurance that the delivery will take place without the confidentiality of the message being compromised.
In the current operational mode of the present invention, referred to as Asier Digital Courier, there consists of two different pieces of software. The first is an administrative tool that has the ability to create secure communication channels. This application is referred to as an “Envelope Administrator” or server.
As illustrated in
The envelope (client) creation process is detailed in
The client envelope software detailed in
There is little difference between how a server sends a client envelope and how either a client or a server sends a secure message. As shown in
The creation of digital courier client envelopes is designed to be very simple for the user, as shown in
There are a variety of ways to invoke digital courier to send a message as
Advantageously, reading encrypted messages is no more difficult with Asier Digital Courier than reading normal email. As shown in
It is important to note that Digital Courier has a host of additional security features that are not obvious. All Digital Courier databases (address, key, envelope, message and attachments) are stored encrypted on the hard drive. Strong password access is available for application launch. When a client user is attempting to install a client envelope a search of the registry is made. If the email address and name provided by the server are not present in the client's registry the installation is aborted and the envelope will not deploy. The digital courier reader application will not support scripts, DHTML or Java code, and this is to prevent a possible infected file from gaining a foothold. All attachments are stored in an encrypted “inert state.” mail cannot be misdirected.
Though the invention has been described with respect to a specific preferred embodiment, many variations and modifications will become apparent to those skilled in the art upon reading the present application. It is therefore the intention that the appended claims be interpreted as broadly as possible in view of the prior art to include all such variations and modifications.
This application claims priority of Provisional Application Ser. No. 60/305,216 entitled METHOD, SYSTEM AND PROCESS FOR DATA ENCRYPTION AND TRANSMISSION, filed Jul. 13, 2001.
Number | Name | Date | Kind |
---|---|---|---|
5245658 | Bush et al. | Sep 1993 | A |
5577125 | Salahshour et al. | Nov 1996 | A |
5606507 | Kara | Feb 1997 | A |
5630059 | Brady et al. | May 1997 | A |
5666284 | Kara | Sep 1997 | A |
5717597 | Kara | Feb 1998 | A |
5754306 | Taylor et al. | May 1998 | A |
D395044 | Morioka et al. | Jun 1998 | S |
5801944 | Kara | Sep 1998 | A |
5805811 | Pratt et al. | Sep 1998 | A |
5819240 | Kara | Oct 1998 | A |
5825893 | Kara | Oct 1998 | A |
5859967 | Kaufeld et al. | Jan 1999 | A |
5924080 | Johnson | Jul 1999 | A |
6023506 | Ote et al. | Feb 2000 | A |
6023510 | Epstein | Feb 2000 | A |
6035402 | Vaeth et al. | Mar 2000 | A |
6199054 | Khan et al. | Mar 2001 | B1 |
6208980 | Kara | Mar 2001 | B1 |
6239798 | Ludolph et al. | May 2001 | B1 |
6256668 | Slivka et al. | Jul 2001 | B1 |
6304897 | Venkatraman et al. | Oct 2001 | B1 |
6308277 | Vaeth et al. | Oct 2001 | B1 |
6427140 | Ginter et al. | Jul 2002 | B1 |
6477647 | Venkatraman et al. | Nov 2002 | B1 |
6584564 | Olkin et al. | Jun 2003 | B2 |
6615349 | Hair | Sep 2003 | B1 |
6636970 | Akiyama et al. | Oct 2003 | B2 |
6640301 | Ng | Oct 2003 | B1 |
6751670 | Patterson | Jun 2004 | B1 |
6862576 | Turner et al. | Mar 2005 | B1 |
6868498 | Katsikas | Mar 2005 | B1 |
6873966 | Babbitt et al. | Mar 2005 | B2 |
6873977 | Aggarwal et al. | Mar 2005 | B1 |
6931551 | Weng et al. | Aug 2005 | B2 |
6965926 | Shapiro et al. | Nov 2005 | B1 |
6968458 | Ruddle | Nov 2005 | B1 |
6990504 | Powell et al. | Jan 2006 | B2 |
7117370 | Khan et al. | Oct 2006 | B2 |
7266504 | Kara | Sep 2007 | B1 |
7343357 | Kara | Mar 2008 | B1 |
7363495 | Felt et al. | Apr 2008 | B2 |
7418737 | Grupe | Aug 2008 | B2 |
20010020228 | Cantu et al. | Sep 2001 | A1 |
20010037315 | Saliba et al. | Nov 2001 | A1 |
20020007453 | Nemovicher | Jan 2002 | A1 |
20020019937 | Edstrom et al. | Feb 2002 | A1 |
20020035533 | Mache et al. | Mar 2002 | A1 |
20020053030 | Weng et al. | May 2002 | A1 |
20020059144 | Meffert et al. | May 2002 | A1 |
20020116276 | Ottley | Aug 2002 | A1 |
20020116508 | Khan et al. | Aug 2002 | A1 |
20020138735 | Felt et al. | Sep 2002 | A1 |
20020150240 | Henson et al. | Oct 2002 | A1 |
20020178353 | Graham | Nov 2002 | A1 |
20020194356 | Chan et al. | Dec 2002 | A1 |
20030126463 | Sistla | Jul 2003 | A1 |
20030154383 | Wiley et al. | Aug 2003 | A9 |
20040024635 | McClure et al. | Feb 2004 | A1 |
20050171715 | Saitoh et al. | Aug 2005 | A1 |
20080021849 | Kara | Jan 2008 | A1 |
20080140578 | Felt et al. | Jun 2008 | A1 |
Number | Date | Country |
---|---|---|
WO 0223799 | Mar 2002 | WO |
Number | Date | Country | |
---|---|---|---|
20030014671 A1 | Jan 2003 | US |
Number | Date | Country | |
---|---|---|---|
60305216 | Jul 2001 | US |