The present invention relates to the field of e-mail systems. More specifically, one embodiment of the present invention provides a facility for easily controlling e-mail communications.
E-mail is an increasingly popular form of communication. One reason for this is that a sender can simply type in a message and press a button to have the email message sent to the recipient. Typically, the recipient receives the message, reads it and deletes it. E-mail drafters often assume, given the ease at which e-mail can be created, sent and read, that e-mail is a disposable, “off-the-record” communication. However, as currently practiced, e-mail messages are “on-the-record” communication since copies of e-mail messages may remain in the computer system used to convey the e-mail messages, and form a possibly permanent record subject to later scrutiny. In contrast, nearly all telephone conversations and face to face conversations are off-the-record. With the conversation being off-the-record, the participants can speak freely and informally, without worrying about their statements later being taken as polished, well thought out statements that can be later questioned. This on-the-record nature of e-mail and the continued existence of a copy of a message permits its examination under subpoena and risks its accidental exposure to unauthorized persons, either of which might embarrass the writer. Even when the writer believes that the message has been deleted, various system copies might still exist which may cause the same problems.
From the above it is seen that an improved e-mail handling system is needed.
An e-mail handling system, wherein e-mail messages are entered, transported and stored, comprises a central key repository, means for encrypting a message using a key associated with the message, means for adding the key to the central.
A further understanding of the nature and advantages of the inventions herein may be realized by reference to the remaining portions of the specification and the attached drawings.
a) is a flowchart of a process for creating a message in one embodiment of a mail system according to the present invention.
b) is a flowchart of a process for reading a message in one embodiment of a mail system according to the present invention.
Storage 28 is shown with areas allocated to a message table 30, a key table 32 and other data 34. The structure of key table 32 and message table 30 is shown in greater detail in
a) illustrates a process of creating a message that is to be an off-the-record message. A mail client accepts input of the message (by a human user or a computer) and creates a data structure in the format desired by the mail client (step S1). The mail client then requests a mail ID and a key from the mail server (S2). The key is stored in the key table and a corresponding message entry is created in the message table (S3). The contents of the mail are encrypted and the clear text of the message is discarded (S4), and those steps can be done at the mail client or the mail server, taking into account the computing capabilities of each and the security available to prevent snooping of the clear text. Any suitable encryption could be used, such as triple-DES, to encrypt the messages. Once the message is encrypted, it can be sent (S5) and/or stored at the mail server.
b) illustrates a process of reading a mail message. Once a user makes a request to read a message, the mail reader determines the mail ID of the message to be displayed (S11). The mail reader then checks the message table to determine if the OTR flag is set (S12). If the OTR flag is not set, then the message is stored in unencrypted form and it is presented to the user (S13). That completes the reading process for non-OTR mail.
For OTR mail, the mail reader requests a key from the server for that ID (S14). The key server can be part of the mail server or a separate computer. If the key is not available (S15), the server reports the unavailability to the mail client, which displays an error (S17). If the key is available, the mail reader uses the key to decrypt the message and present it to the user (S16).
The key handling can be entirely transparent to the sender of a message and to the recipient or reader of the message. When a sender decides that a message is no longer needed, or when an expiration time is reached, the key for that message is deleted from the key table, rendering all the various copies of the message unreadable, wherever they happen to be stored. Because of this, senders can use e-mail messaging for off-the-record comments, knowing that each encrypted copy of the message would be, effectively, shredded wherever the message happens to be.
The key table can be used in a simple message purge process. In that purge process, the processor or program responsible for message storage examines the key table and each place an OTR message has a deleted key, the encrypted message associated with that deleted key is removed from the system. Preferably, the keys are not backed up with the messages. If the keys are backed up at all, preferably the backups are reviewed so that a key deleted from the mail server is also removed from the backups.
In a higher security environment, special controls can be placed on the machine that manages the key table to prevent compromise of the key table. However, not as much control need be placed on the machines that are maintaining copies of messages and making copies of messages, because those messages are encrypted.
The above description is illustrative and not restrictive. Many variations of the invention will become apparent to those of skill in the art upon review of this disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents.
Number | Name | Date | Kind |
---|---|---|---|
5265159 | Kung | Nov 1993 | A |
5410602 | Finkelstein et al. | Apr 1995 | A |
5775995 | Okamoto | Jul 1998 | A |
5786817 | Sakano et al. | Jul 1998 | A |
5794253 | Norin et al. | Aug 1998 | A |
5870548 | Nielsen | Feb 1999 | A |
5903723 | Beck et al. | May 1999 | A |
5958005 | Thorne et al. | Sep 1999 | A |
6134660 | Boneh et al. | Oct 2000 | A |
6215887 | Matsumoto | Apr 2001 | B1 |
6324650 | Ogilvie | Nov 2001 | B1 |
6442600 | Anderson | Aug 2002 | B1 |
6584564 | Olkin et al. | Jun 2003 | B1 |
6625734 | Marvit et al. | Sep 2003 | B1 |
6721784 | Leonard et al. | Apr 2004 | B1 |
Number | Date | Country |
---|---|---|
11-340965 | Dec 1999 | JP |
WO 0108346 | Jul 2000 | WO |