ELECTRONIC MAIL METADATA GENERATION AND MANAGEMENT
    1.
    发明申请
    ELECTRONIC MAIL METADATA GENERATION AND MANAGEMENT 审中-公开
    电子邮件元数据生成与管理

    公开(公告)号:WO2006029134A2

    公开(公告)日:2006-03-16

    申请号:PCT/US2005/031662

    申请日:2005-09-07

    CPC classification number: H04L67/2842 H04L51/14 H04L51/22

    Abstract: Electronic mail is archived and retrieved based on metadata generated by the client sending the electronic mail. The metadata is generated based on variable metadata generation policies distributed to each client. The metadata generation policies are executed in each client in conjunction with each electronic mail sent from the client. The electronic mail is received in a mail server on route to at least one addressee of the electronic mail. The received electronic mail is processed based on the metadata attached to the received electronic mail.

    Abstract translation: 电子邮件根据发送电子邮件的客户端生成的元数据进行存档和检索。 元数据是基于分配给每个客户端的可变元数据生成策略生成的。 元数据生成策略在每个客户端中与从客户端发送的每个电子邮件一起执行。 电子邮件在通往电子邮件的至少一个收件人的路线上的邮件服务器中被接收。 所接收的电子邮件是根据附于所接收的电子邮件的元数据进行处理的。

    METHOD AND SYSTEM FOR SECURE CREDIT CARD TRANSACTIONS
    2.
    发明申请
    METHOD AND SYSTEM FOR SECURE CREDIT CARD TRANSACTIONS 审中-公开
    用于安全信用卡交易的方法和系统

    公开(公告)号:WO2002103642A2

    公开(公告)日:2002-12-27

    申请号:PCT/US2001/019513

    申请日:2001-06-19

    Abstract: A customer making a credit card transaction inserts their smart card into a card reader attached to the merchant's system. The card reader activates the customer's card and passes certain merchant information. The merchant's system then requests a "billing digest" from the customer's card. The billing digest is returned to the merchant's card reader that forwards it (and the transaction information which includes customer information and merchant information) to the corresponding credit card issuer, which maintains the customer's credit card account. In one embodiment, the customer information and the merchant information are encrypted. Upon receiving the billing digest, transaction information is decrypted if necessary and the credit card issuer looks up the customer's master key using the customer's account number. The credit card issuer then uses the transaction information to re-compute the billing digest (an authentication billing digest) and compares this new value with the billing digest submitted by the merchant. If authentic, the billing digest and authentication billing digest values are equivalent, then funds are transferred and an acceptance notification is returned to the merchant. If not authentic, a denial notification is returned to the merchant. Security is further enhanced by utilizing a unique reference for each transaction in the unique customer information used for creating the billing digest.

    Abstract translation: 进行信用卡交易的客户将他们的智能卡插入连接到商家系统的读卡器。 读卡器激活客户卡并传递某些商家信息。 商家的系统然后从客户的卡请求“结算摘要”。 结算摘要返回给将客户信用卡账户转发的商家的读卡器(以及包含客户信息和商家信息的交易信息)发送给相应的信用卡发卡机构。 在一个实施例中,客户信息和商家信息被加密。 收到结算摘要后,必要时对交易信息进行解密,信用卡发卡机构使用客户的帐号查询客户的主密钥。 然后,信用卡发行商使用交易信息来重新计算记帐摘要(认证记帐摘要),并将该新值与商家提交的记帐摘要进行比较。 如果是真实的,则计费摘要和认证计费摘要值是相等的,那么资金被转移,接收通知被返回给商家。 如果不可靠,则向商家返回拒绝通知。 通过为用于创建记帐摘要的唯一客户信息中的每个交易使用唯一的引用来进一步增强安全性。

    INFORMATION ENCRYPTION SYSTEM AND METHOD
    3.
    发明公开
    INFORMATION ENCRYPTION SYSTEM AND METHOD 审中-公开
    方法和设备的加密信息的

    公开(公告)号:EP1183817A2

    公开(公告)日:2002-03-06

    申请号:EP00939317.4

    申请日:2000-05-19

    CPC classification number: H04L9/083 H04L9/0825

    Abstract: An encryption system permits end-to-end encryption of information over an untrusted interconnection network. The information encryption system includes at least one client for processing information. The system also includes at least one storage device for holding the information. At least one key server provides a data key for encrypting and decrypting the information. An encryption module is associated with each client. Each encryption module has a first processor accessing a first memory and a second processor accessing a second memory different from the first memory. The first processor communicates with the associated client. The second processor communicates with the storage device. The first processor communicates with the second processor through a dedicated channel. The second processor obtains the data key from the key server. Information is received from the first processor over the dedicated channel and encrypted using the data key. The encrypted information is then stored on the storage device. The second processor also reads the encrypted information from the storage device, decrypts the information using the data key, and sends the decrypted information to the first processor over the dedicated channel.

Patent Agency Ranking