Claims
- 1. A computer program product for use in conjunction with a computer system having a server and a client, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism, comprising: a program module that directs the computer system and/or components thereof including at least one or the client or server, to function in a specified manner to provide message communications, the message communications occurring in a computer system hardware architecture neutral and operating system neutral and network transport protocol neutral manner for secure unidirectional messaging, the program module including instructions for:
A. extracting, by the sender, an appropriate public key and matching destination address of a Recipient from a storage means that is trusted and has been verified; B. extracting, by the sender, the senders own private signing key and certificate chain from a trusted storage means; C. passing, by the sender, that extracted public key and matching destination address and private signing key and certificate chain information, and the data of the message along with the Recipient's public enveloping key, and a fresh random data encryption key and fresh random OAEP padding seed to the Signed-Inside-Enveloped-Data cryptographic primitive to construct a secure unidirectional message; D. sending, by the sender, the constructed secure unidirectional message; E. receiving, by the Recipient, the message; F. extracting, by the Recipient, its own private key from a secure storage means and decrypting the public key encryption; G. extracting, by the Recipient, the data encryption key, and decrypting the data which is digitally signed; and H. verifying the signature of the data and the certificate chain of the Sender; I. wherein this is done using the same cryptographic primitive that is the same as the cryptographic primitive used with at least a secure session protocol.
- 2. A hardware architecture neutral and operating system neutral and network transport neutral method for secure unidirectional messaging using less software code and network bandwidth than conventional systems, said method comprising:
A. extracting, by the sender, an appropriate public key and matching destination address of a Recipient from a storage means that is trusted and has been verified; B. extracting, by the sender, the sender's own private signing key and certificate chain from a trusted storage means; C. passing, by the sender, that extracted public key and matching destination address and private signing key and certificate chain information, and the data of the message along with the Recipient's public enveloping key, and a fresh random data encryption key and fresh random OAEP padding seed to the Signed-Inside-Enveloped-Data cryptographic primitive to construct a secure unidirectional message; D. sending, by the sender, the constructed secure unidirectional message; E. receiving, by the Recipient, the message; F. extracting, by the Recipient, its own private key from a secure storage means and decrypting the public key encryption; G. extracting, by the Recipient, the data encryption key, and decrypting the data which is digitally signed; and H. verifying the signature of the data and the certificate chain of the Sender; I. wherein this is done using the same cryptographic primitive that is the same as the cryptographic primitive used with at least a secure session protocol.
- 3. The method in claim 2, wherein said appropriate public key comprises an RSA based public key.
- 4. The method in claim 2, wherein said matching destination address is selected from the set consisting of an e-mail address and a URL.
- 5. The method in claim 2, wherein said storage means is trusted and has been previously verified using a digital signature or cryptographic checksum.
- 6. The method in claim 2, wherein said digital signature provides verification with a trusted public key.
- 7. The method in claim 2, wherein said cryptographic checksum provides verification with a trusted key derived from a Master Key, a Session Key, or a Message Key.
- 8. The method in claim 2, wherein the storage means is selected from the group consisting of a Compact Certificate, a chain of Compact Certificates leading to a trusted root public key, or combinations thereof.
- 9. The method in claim 2, wherein the storage means is a previously received Storymail story enabled message that was securely received and verified by mechanisms that are trusted for that kind of message.
- 10. The method in claim 2, wherein the storage means is any conventional e-mail message or web page which the Sender trusts that has been copied into the Sender's messaging platform memory via mechanisms that the Sender trusts.
- 11. The method in claim 10, wherein the messaging platform is a messaging platform selected from the set consisting of: a computer, a server, a PDA, a telephone, an appliance, an information appliance, a pager, or any other device supporting such messaging.
- 12. The method in claim 2, wherein the OAEP padding seed and the data encryption key are different values.
- 13. The method in claim 2, wherein the OAEP padding seed and the data encryption key are the same value to avoid the overhead of generating multiple random values.
- 14. The method in claim 2, wherein the Sender's private key and certificate chain comprise fixed values shared among a plurality of Senders.
- 15. The method in claim 2, wherein the Sender's private key and certificate chain fixed values are widely known.
- 16. The method in claim 2, wherein the Sender's private key and certificate chain fixed values are not widely known and the Sender's software employs mechanisms to make it difficult to discover these values through a process of reverse engineering.
- 17. A method for secure unidirectional messaging from a sender to a recipient, said method comprising:
obtaining, by the sender, a public key and destination address of a message recipient and the senders own private signing key and certificate chain from one or more trusted source; passing, by the sender, the extracted public key and matching destination address and private signing key and certificate chain information, and the data of an intended message along with the recipient's public enveloping key and a random data encryption key and random padding seed to a cryptographic primitive; and constructing, by the sender, a secure unidirectional message there from.
- 18. The method of claim 17, further comprising: sending, by the sender, the constructed secure unidirectional message to the recipient.
- 19. The method of claim 18, further comprising:
receiving the secure unidirectional message by the recipient; extracting, by the Recipient, the recipient's own private key from a secure source and decrypting the public key encryption, and the data encryption key and decrypting the data which is digitally signed; and verifying the signature of the data and the certificate chain of the sender.
- 20. The method of claim 18, wherein said message is an e-mail message.
- 21. The method of claim 18, wherein said message is a Storymail story message.
- 22. The method of claim 18, wherein the trusted source or storage means comprises a Compact Certificate as explained earlier, or chain of Compact Certificates leading to a trusted root public key.
RELATED APPLICATIONS
[0001] This application claims the benefit of priority under 35 U.S.C. Sections 119(e) and/or 120 and incorporates by reference each of the following U.S. Patent Applications:
[0002] U.S. Provisional Application Serial No. 60/271,455 (Attorney Docket No. P-70322/RMA) filed Feb. 25, 2001, entitled Hardware Architecture, Operating System And Network Transport Neutral System, Method And Computer Program Product For Secure Communications And Messaging;
[0003] U.S. Utility application Ser. No. ______ (Attorney Docket No. A-70553/RMA) filed ______, entitled Hardware Architecture, Operating System And Network Transport Neutral System, Method And Computer Program Product For Secure Communications And Messaging;
[0004] U.S. Utility application Ser. No. ______ (Attorney Docket No. A-70554/RMA) filed ______, entitled System and Method for Authorization of Access to a Resource;
[0005] U.S. Utility application Ser. No. ______ (Attorney Docket No. A-70555/RMA) filed ______, entitled System, Method, and Structure for Generating and Using A Compressed Digital Certificate;
[0006] U.S. Utility application Ser. No. ______ (Attorney Docket No. A-70556/RMA) filed ______, entitled Common Security Protocol Structure and Mechanism and System and Method for Using;
[0007] U.S. Utility application Ser. No. ______ (Attorney Docket No. A-70557/RMA) filed ______, entitled System and Method for Conducting A Secure Interactive Communication Session;
[0008] U.S. Utility application Ser. No. ______ (Attorney Docket No. A-70558/RMA) filed ______, entitled System and Method for Secure Unidirectional Messaging;
[0009] U.S. Utility application Ser. No. ______ (Attorney Docket No. A-70559/RMA) filed ______, entitled Secure Certificate and System and Method for Issuing and Using Same;
[0010] U.S. Utility application Ser. No. ______ (Attorney Docket No. A-70560/RMA) filed ______, entitled System and Method for Conducting a Secure Response Communication Session;
[0011] U.S. Utility application Ser. No. ______ (Attorney Docket No. A-70561/RMA) filed ______, entitled System and Method for Communicating A Secure Unidirectional Response Message;
[0012] U.S. Utility application Ser. No. ______ (Attorney Docket No. A-70562/RMA) filed ______, entitled System, Method And Computer Program Product For Device, Operating System, And Network Transport Neutral Secure Interactive Multi-Media Messaging; each of which is hereby incorporated by reference.
[0013] U.S. patent application Ser. No. 09/627,357, filed Jul. 28, 2000, entitled Method for Cooperatively Executing a Plurality of Code Threads in a Processor Using Instruction Retry upon Resource Constraints;
[0014] U.S. patent application Ser. No. 09/627,645, filed Jul. 28, 2000, entitled Business Method to Generate and Electronically Distribute Rich Media E-mail Messages to People with Physical Disabilities;
[0015] U.S. patent application Ser. No. 09/627,358, filed Jul. 28, 2000, entitled Business Method for Generating and Electronically Distributing Targeted Author-Once Architecture Independent Rich Media Content;
[0016] U.S. patent application Ser. No. 09/628,205, filed Jul. 28, 2000, entitled Method to Generate and Electronically Distribute Highly Targeted Rich Media E-mail Messages;
[0017] U.S. patent application Ser. No. 09/706,661 filed Nov. 4, 2000, entitled Hardware Architecture Neutral Computer Program Language And Structure And Method For Execution;
[0018] U.S. patent application Ser. No. 09/706,621 filed Nov. 4, 2000, entitled System and Method for Autonomous Generation of Customized File Having Procedural and Data Elements from Non-procedural Flat-File Descriptors;
[0019] U.S. patent application Ser. No. 09/706,664, filed Nov. 4, 2000, entitled System and Method for Intelligently Scaling Procedure/Data Sets to Adapt the Procedure/data Sets to Receiver Attributes and Maintain Message Intent;
[0020] U.S. patent application Ser. No. 09/706,609 filed Nov. 4, 2000, entitled Intent Preserving Message Adaptation and Conversion System and Method for Communicating with Sensory And/or Physically Challenged Persons;
[0021] U.S. patent application Ser. No. 09/706,612 filed Nov. 4, 2000, entitled System and Method for Searching and Selecting Data and Control Elements in Message Procedural/data Set for Automatic and Complete Portrayal of Message to Maintain Message Intent;
[0022] U.S. patent application Ser. No. 09/706,617 filed Nov. 4, 2000, entitled System and Method for Adapting Content for Sensory and Physically Challenged Persons Using Embedded Semantic Elements in a Procedurally Based Message File;
[0023] U.S. patent application Ser. No. 09/706,615 filed Nov. 4, 2000, entitled System and Method for Forward and Backward Content Based Version Control for Automated Autonomous Playback on Client Devices Having Diverse Hardware and Software;
[0024] U.S. patent application Ser. No. 09/706,611 filed Nov. 4, 2000, entitled System and Method for Reducing Unauthorized Access by Procedural Messages Executing in a Computer System to Computer System or Memory or Programs or Data Stored Therein;
[0025] U.S. patent application Ser. No. 09/706,614 filed Nov. 4, 2000, entitled System and Method for Self-directed Loading of an Input Buffer with Procedural Messages from a Stream of Sub-files Containing Sets of Logical Files;
[0026] U.S. patent application Ser. No. 09/706,610 filed Nov. 4, 2000, entitled System and Method for Device-Neutral Procedurally-Based Content Display Layout and Content Playback;
[0027] U.S. patent application Ser. No. 09/706,616 filed Nov. 4, 2000, entitled System and Method for Thin Procedural Multi-Media Player Run-Time Engine Having Application Program Level Cooperative Multi-threading and Constrained Resource Retry with Anti-Stall Features;
[0028] U.S. patent application Ser. No. 09/706,613 filed Nov. 4, 2000, entitled System and Method for Streaming Multimedia-Rich Interactive Experiences Over a Communications Channel; and
[0029] U.S. patent application Ser. No. 09/706,606 filed Nov. 4, 2000, entitled System and Method for Cooperative Application-Level Multi-Thread Execution Including Instruction Retry Feature Upon Identifying Constrained System Resource; each of which is hereby incorporated by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60271455 |
Feb 2001 |
US |