WO2000062472A1 - System and method for transmission of encrypted files from a central server computer to a remote computer - Google Patents

System and method for transmission of encrypted files from a central server computer to a remote computer Download PDF

Info

Publication number
WO2000062472A1
WO2000062472A1 PCT/US2000/005135 US0005135W WO0062472A1 WO 2000062472 A1 WO2000062472 A1 WO 2000062472A1 US 0005135 W US0005135 W US 0005135W WO 0062472 A1 WO0062472 A1 WO 0062472A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
protocol
server
handler
data
Prior art date
Application number
PCT/US2000/005135
Other languages
French (fr)
Inventor
James M. Blum
Original Assignee
Blum James M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Blum James M filed Critical Blum James M
Priority to AU33848/00A priority Critical patent/AU3384800A/en
Publication of WO2000062472A1 publication Critical patent/WO2000062472A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Definitions

  • the present invention relates generally to data encryption systems and techniques and, more particularly, to a system for providing secure transmission of encrypted files from a central server computer to a remote computer and method for practicing the same and which utilizes existing protocols, servers and clients.
  • data is uploaded to a central file server in unencrypted form and prior to subsequent encryption and transmission over a network to a remote server.
  • a protocol handler at the remote client location or server requests a file over the network from the central server.
  • the file is requested from the server and the server responds with the file and a MIME type.
  • the protocol handler Upon receiving the encrypted file, the protocol handler forwards the data within the file to a content handler unit.
  • the content handler typically employs one or more decryption programs for algorithmically decrypting the specific types of transferred file, such as the graphic, text and audio components for subsequent display by another program.
  • the content handler may further be built into the network browser or function as a stand alone unit. A number of different MIME types are defined to execute the appropriate content handler.
  • a further drawback includes having to integrate data from several sources or different types of data onto one screen. As an example, if a World Wide Web browser needs to display a encrypted graphic, some text, and a video clip, current technology would not enable this to occur. The only solution would then be to define specific MIME types for the encrypted version of each media type and write decrypting content handlers for each type. This results in a doubling of the number of content handlers required and attendant amount of extra code that needs to be developed to facilitate such functionality.
  • the present invention provides a system for providing secure transmission of an encrypted file over a computer network and which is a marked improvement over the above-described prior art.
  • a data encryption and input unit is operatively connected to the central file server for inputting and encrypting the files prior to them being stored in the central server. This is accomplished utilizing any conventional encrypting algorithm and enabling the central server to call up selected files.
  • a protocol handler is operatively connected to a remotely located client or server and functions to request the encrypted file or files to be transmitted from the central server.
  • the protocol handler specifically sends its request utilizing an existing network protocol and in effect "spoofs" the central server into sending data to the client which is in effect stored in the central server as if it was not encrypted and with the same type labeling as an unencrypted file.
  • the effect of "spoofing" the central server causes the protocol handler to generically modify the incoming data (the equivalent of decryption) and thus providing a key decryption function which is otherwise reserved to the prior art systems.
  • the protocol handler further is capable of modifying the data in this instance in such a way that it provides previously existing content types to tlie content-handling algorithm of the client.
  • any type of data can be encrypted and displayed if the original type of data can be displayed.
  • All existing content handlers will function normally because they are dealing with unencrypted data when they are called.
  • the result is that the protocol handler essentially substitutes for the functions of the content handler previously provided by the content handler in decrypting the files and provides for an attendant reduction in necessary software code and more efficient opening and viewing of the decrypted files. This is so because the need for specialized servers and conlenl-handlers is eliminated through the protocol spoofing function.
  • FIG. 1 is a schematic view of the system for providing secure transmission of an encrypted file over a computer network according to the present invention.
  • FIG. 1 a system for providing secure storage and transmission of an encrypted file over a computer network is illustrated at 10 according to the present invention.
  • a central file server 12 according to known construction is operably connected tluough a communication line to a remotely located client or server 14.
  • the remote client 14 can qualify as any PC computer or the like.
  • a network connection, illustrated schematically at 16, is known in the art and is capable of operably connecting the central file server
  • a data encryption and input unit 18 is operably connected to the central file server 12 and is capable of receiving and encrypting a plurality of files prior to uploading to the central server 12. As was previously discussed, it is advantageous to encrypt files prior to uploading to the central server in order to prevent unauthorized access or tampering by internal personnel at the central location.
  • the procedure for calling up and transmitting encrypted files from the central server as diagrammatically illustrated in Fig. 1 includes the step of the central server 12 first communicating along a line 20 across a network and to selected remote server 14.
  • a central server 12 could typically connect to large pluralities of remote client servers, however only a single server is illustrated for convenience sake.
  • the data is encrypted and stored on the central file server 12 in a format consistent as if it was not encrypted and with the same type labeling as an unencrypted file, particularly such as in a hyper text transmission protocol (http) or a file transfer protocol (ftp).
  • a protocol handler 22 which functions to request, through the network 16, a selected file or files from the central server 12. This is accomplished by the protocol handler 22 making a request for information using a locally defined network protocol and sending the request along a communication line defined at 24 extending from the protocol handler 22, through the network 16 and to the central file server 12.
  • the request thus invokes a new protocol-handler and in effect "spoofs" the central server 12 into sending the encrypted data, labeled in unencrypted form, to the client.
  • the protocol handler 22 once it receives the encrypted data through the remote server 14 and via line 20, algorithmically decrypts the data generically modifying the data in such a way that it provides previously existing content.
  • the trigger used to open encrypted files is the relabeling of an existing protocol handler.
  • a HTTP protocol could be relabeled as MDRP and would still connect to the server using standard HTTP protocol.
  • a FTP protocol may be employed.
  • the type of encryption if any, would be determined by the client's protocol handler.
  • a single protocol handler decrypts all possible data types and then sends the unencrypted files, via a line 26, to a content handler 28 operably connected thereto which determines the type of data utilizing one or more MIME types and then forwards the data, via a further line 30, to another software program and viewer 32 for opening the file.
  • Manifestations of the above-described system include the design of prototype health information systems which model a method to provide access to medical records over tlie Internet.
  • the technique of protocol spoofing could also be used for data conversion or any other types of systems which involve the application of a standard algorithm.
  • a compression algorithm that saves space on a file server could be implemented in a spoofing protocol handler. The data would be stored in a compressed fashion possibly using an uploading spoofing protocol handler. The data could then be retrieved using the same protocol handler with the complementary decompression algorithm.
  • a method of providing for secure transmission of an encrypted file utilizing the system according to the present invention includes the steps of loading the selected file or files into a data encryption and input unit which is operatively connected to the central file server and encrypting the file according to any conventionally known procedure. Additional steps include the protocol handler requesting transmission of the file over the network utilizing an existing protocol and decrypting the file through generically modifying the incoming data and transferring the decrypted file lo a content handler for subsequent presentation by a software viewer.

Abstract

A system, described in reference to the figure, for providing secure transmission of an encrypted file over a computer network (16) having a central file server (12) operatively connected through a communication line with a remotely located client server (14). A data encryption and input unit (18) operatively connected to the central file server (12) and capable of receiving and encrypting a plurality of files. The central file server (12) uploads selected pre-encrypted files from the encryption and input unit (18). The remote server includes a protocol handler (22) which utilizes an existing protocol to spoof the central file server (12) to transmit selected files in an encrypted form to the remote server (14). The protocol functions then to algorithmically decrypt the files by generically modifying the incoming data associated with the file and a content handler (28) connected (26) to the protocol handler (22) then forwards (30) the modified data to a pre-loaded software program for opening and presentation.

Description

SYSTEM AND METHOD FOR TRANSMISSION OF ENCRYPTED FILES FROM A CENTRAL SERVER COMPUTER TO A REMOTE COMPUTER
Background of the Invention
Field of the Invention
The present invention relates generally to data encryption systems and techniques and, more particularly, to a system for providing secure transmission of encrypted files from a central server computer to a remote computer and method for practicing the same and which utilizes existing protocols, servers and clients. Description of the Prior Art
The use of Internet technologies for delivering various types of data content has increased dramatically in the past few years. Public networks have made the electronic transfer of data between organizations relatively simple.
However, with the simplicity comes great security risks. Numerous solutions have been proposed for securing data during its transmission over a network, such as various encryption schemes, and the result of which is the existence of a burgeoning amount of Internet commerce. Additionally, much of this data delivery has spawned the creation of customized client/server combinations or content-handling programs to view data files and it has been found that the continual creation of software to provide access to new types of data, and in particular encrypted data, becomes very inefficient.
According to existing systems, data is uploaded to a central file server in unencrypted form and prior to subsequent encryption and transmission over a network to a remote server. Typically, a protocol handler at the remote client location or server requests a file over the network from the central server. The file is requested from the server and the server responds with the file and a MIME type. Upon receiving the encrypted file, the protocol handler forwards the data within the file to a content handler unit. The content handler typically employs one or more decryption programs for algorithmically decrypting the specific types of transferred file, such as the graphic, text and audio components for subsequent display by another program. The content handler may further be built into the network browser or function as a stand alone unit. A number of different MIME types are defined to execute the appropriate content handler.
The drawbacks of such conventional encryption systems include that the file must be recognized as encrypted and forwarded on to an encryption program. After decryption, the file must again be recognized to launch the proper viewing software. This type of identification is very inconsistent and often encryption programs do not maintain information about the type of data being encrypted. The user is typically then left with the burden of determining what type of data is actually encrypted and/or this then involves having to utilize a special server and a special piece of client software for decrypting a file.
A further drawback includes having to integrate data from several sources or different types of data onto one screen. As an example, if a World Wide Web browser needs to display a encrypted graphic, some text, and a video clip, current technology would not enable this to occur. The only solution would then be to define specific MIME types for the encrypted version of each media type and write decrypting content handlers for each type. This results in a doubling of the number of content handlers required and attendant amount of extra code that needs to be developed to facilitate such functionality.
A further evident shortcoming of the existing system is the danger of maintaining files in unencrypted form on the central file server and prior to subsequent encryption and transmission, such danger arising in the form of data theft from employees, contractors and other persons having access to the central server. Summary of the Present Invention
The present invention provides a system for providing secure transmission of an encrypted file over a computer network and which is a marked improvement over the above-described prior art. According to the present invention, a data encryption and input unit is operatively connected to the central file server for inputting and encrypting the files prior to them being stored in the central server. This is accomplished utilizing any conventional encrypting algorithm and enabling the central server to call up selected files. A protocol handler is operatively connected to a remotely located client or server and functions to request the encrypted file or files to be transmitted from the central server. The protocol handler specifically sends its request utilizing an existing network protocol and in effect "spoofs" the central server into sending data to the client which is in effect stored in the central server as if it was not encrypted and with the same type labeling as an unencrypted file. The effect of "spoofing" the central server causes the protocol handler to generically modify the incoming data (the equivalent of decryption) and thus providing a key decryption function which is otherwise reserved to the prior art systems. The protocol handler further is capable of modifying the data in this instance in such a way that it provides previously existing content types to tlie content-handling algorithm of the client.
Using this system, any type of data can be encrypted and displayed if the original type of data can be displayed. All existing content handlers will function normally because they are dealing with unencrypted data when they are called. The result is that the protocol handler essentially substitutes for the functions of the content handler previously provided by the content handler in decrypting the files and provides for an attendant reduction in necessary software code and more efficient opening and viewing of the decrypted files. This is so because the need for specialized servers and conlenl-handlers is eliminated through the protocol spoofing function. Brief Description of the Drawings
Reference will now be made to the attached drawings, when read in combination with the following 'pecification, wherein like reference numerals refer to like parts throughout the several views, and in which: Fig. 1 is a schematic view of the system for providing secure transmission of an encrypted file over a computer network according to the present invention.
Detailed Description of the Preferred Embodiment
Referring now to Fig. 1, a system for providing secure storage and transmission of an encrypted file over a computer network is illustrated at 10 according to the present invention. A central file server 12 according to known construction is operably connected tluough a communication line to a remotely located client or server 14. The remote client 14 can qualify as any PC computer or the like. A network connection, illustrated schematically at 16, is known in the art and is capable of operably connecting the central file server
12 with a plurality of individually located and remote client's or servers.
A data encryption and input unit 18 is operably connected to the central file server 12 and is capable of receiving and encrypting a plurality of files prior to uploading to the central server 12. As was previously discussed, it is advantageous to encrypt files prior to uploading to the central server in order to prevent unauthorized access or tampering by internal personnel at the central location.
The procedure for calling up and transmitting encrypted files from the central server as diagrammatically illustrated in Fig. 1 includes the step of the central server 12 first communicating along a line 20 across a network and to selected remote server 14. As is known in the art, a central server 12 could typically connect to large pluralities of remote client servers, however only a single server is illustrated for convenience sake.
The data is encrypted and stored on the central file server 12 in a format consistent as if it was not encrypted and with the same type labeling as an unencrypted file, particularly such as in a hyper text transmission protocol (http) or a file transfer protocol (ftp). Forming an integral part of the client, or forming a separated and connected part, is a protocol handler 22 which functions to request, through the network 16, a selected file or files from the central server 12. This is accomplished by the protocol handler 22 making a request for information using a locally defined network protocol and sending the request along a communication line defined at 24 extending from the protocol handler 22, through the network 16 and to the central file server 12. The request thus invokes a new protocol-handler and in effect "spoofs" the central server 12 into sending the encrypted data, labeled in unencrypted form, to the client.
The protocol handler 22, once it receives the encrypted data through the remote server 14 and via line 20, algorithmically decrypts the data generically modifying the data in such a way that it provides previously existing content. The trigger used to open encrypted files is the relabeling of an existing protocol handler. As an example, a HTTP protocol could be relabeled as MDRP and would still connect to the server using standard HTTP protocol. Likewise, a FTP protocol may be employed. However, when the data is received, the type of encryption, if any, would be determined by the client's protocol handler. A single protocol handler decrypts all possible data types and then sends the unencrypted files, via a line 26, to a content handler 28 operably connected thereto which determines the type of data utilizing one or more MIME types and then forwards the data, via a further line 30, to another software program and viewer 32 for opening the file. By utilizing protocol spoofing the one protocol handler eliminates the need for many separate content handlers and
MIME types.
Manifestations of the above-described system include the design of prototype health information systems which model a method to provide access to medical records over tlie Internet. Also, the technique of protocol spoofing could also be used for data conversion or any other types of systems which involve the application of a standard algorithm. For example, a compression algorithm that saves space on a file server could be implemented in a spoofing protocol handler. The data would be stored in a compressed fashion possibly using an uploading spoofing protocol handler. The data could then be retrieved using the same protocol handler with the complementary decompression algorithm.
A method of providing for secure transmission of an encrypted file utilizing the system according to the present invention is also disclosed and includes the steps of loading the selected file or files into a data encryption and input unit which is operatively connected to the central file server and encrypting the file according to any conventionally known procedure. Additional steps include the protocol handler requesting transmission of the file over the network utilizing an existing protocol and decrypting the file through generically modifying the incoming data and transferring the decrypted file lo a content handler for subsequent presentation by a software viewer.
Having described my invention, additional preferred embodiments will become apparent to those skilled in the art to which it pertains without deviating from the scope of the appended claims. I claim:

Claims

Claims 1. A system for providing secure transmission of an encrypted file over a computer network, said system comprising: a central file server; said central file server operably connecting through a communication line with a remotely located server; a data encryption and input unit operably connected to said central file server and capable of receiving and encrypting a plurality of files; said central file server uploading selected pre-encrypted files from said encryption and input unit; said remote server further including a protocol handler operably connected thereto, said protocol handler requesting at least one of said plurality of encrypted files using a standardized protocol to be transmitted from said central file server; said protocol handler decrypting said at least one file by generically modifying incoming data associated with said file; and a content handler operably connected to said protocol handler and receiving said decrypted file, said content handler forwarding said modified data to a pre-loaded software program for subsequent display.
2. The system as described in claim 1, further comprising said data being stored in said central file server utilizing an identical type labeling as a corresponding unencrypted file.
3. The system as described in claim 1, further comprising said content handler determining the type of data sent by said protocol handler utilizing one or more MIME types.
4. The system as described in claim 1, further comprising said protocol handler being capable of decrypting all data types.
5. The system as described in claim 4, said standardized protocol further comprising an HTTP protocol.
6. The system as described in claim 4, said standardized protocol further comprising a FTP protocol.
7. The system as described in claim 1 , further comprising said protocol handler algorithmically decrypting said at least one file through the use of one or more keys.
8. A method for providing secure transmission of an encrypted file over a computer network, comprising tlie steps of: loading a selected file ii.to a data encryption and input unit which is operatively connected to a central file server; encrypting said selected file within said encryption and input unit and uploading said file into said central file server; requesting said encrypted file for transmission over the network from a protocol handler operatively communicating with said remote server and utilizing an existing protocol to obtain said encrypted files; decrypting said file through said protocol handler utilizing a private key and by generically modifying the incoming data associated with said file; and transferring said decrypted file to a content handler operatively connected to the protocol handler for forwarding to a software viewer for opening and presentation.
PCT/US2000/005135 1999-04-08 2000-02-29 System and method for transmission of encrypted files from a central server computer to a remote computer WO2000062472A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU33848/00A AU3384800A (en) 1999-04-08 2000-02-29 System and method for transmission of encrypted files from central server computer to a remote computer

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US28841299A 1999-04-08 1999-04-08
US09/288,412 1999-04-08

Publications (1)

Publication Number Publication Date
WO2000062472A1 true WO2000062472A1 (en) 2000-10-19

Family

ID=23106986

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/005135 WO2000062472A1 (en) 1999-04-08 2000-02-29 System and method for transmission of encrypted files from a central server computer to a remote computer

Country Status (2)

Country Link
AU (1) AU3384800A (en)
WO (1) WO2000062472A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004077794A2 (en) * 2003-02-25 2004-09-10 Creative Solutions Unlimited Web site management system and method
US7653602B2 (en) 2003-11-06 2010-01-26 Visa U.S.A. Inc. Centralized electronic commerce card transactions
US7725369B2 (en) 2003-05-02 2010-05-25 Visa U.S.A. Inc. Method and server for management of electronic receipts
US7857215B2 (en) 2003-09-12 2010-12-28 Visa U.S.A. Inc. Method and system including phone with rewards image
US8005763B2 (en) 2003-09-30 2011-08-23 Visa U.S.A. Inc. Method and system for providing a distributed adaptive rules based dynamic pricing system
US8010405B1 (en) 2002-07-26 2011-08-30 Visa Usa Inc. Multi-application smart card device software solution for smart cardholder reward selection and redemption
US8015060B2 (en) 2002-09-13 2011-09-06 Visa Usa, Inc. Method and system for managing limited use coupon and coupon prioritization
US8119282B2 (en) 2005-06-16 2012-02-21 Exide Technologies Gmbh Pole bridge for a battery
US8407083B2 (en) 2003-09-30 2013-03-26 Visa U.S.A., Inc. Method and system for managing reward reversal after posting
US8429048B2 (en) 2009-12-28 2013-04-23 Visa International Service Association System and method for processing payment transaction receipts
US8554610B1 (en) 2003-08-29 2013-10-08 Visa U.S.A. Inc. Method and system for providing reward status
US8626577B2 (en) 2002-09-13 2014-01-07 Visa U.S.A Network centric loyalty system
US9852437B2 (en) 2002-09-13 2017-12-26 Visa U.S.A. Inc. Opt-in/opt-out in loyalty system
US11132691B2 (en) 2009-12-16 2021-09-28 Visa International Service Association Merchant alerts incorporating receipt data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5719938A (en) * 1994-08-01 1998-02-17 Lucent Technologies Inc. Methods for providing secure access to shared information
US5881287A (en) * 1994-08-12 1999-03-09 Mast; Michael B. Method and apparatus for copy protection of images in a computer system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5719938A (en) * 1994-08-01 1998-02-17 Lucent Technologies Inc. Methods for providing secure access to shared information
US5881287A (en) * 1994-08-12 1999-03-09 Mast; Michael B. Method and apparatus for copy protection of images in a computer system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
TANENBAUM A.S.: "COMPUTER NETWORKS", 1 January 1996, PRENTICE-HALL INTERNATIONAL, LONDON ; GB, ISBN: 978-0-13-394248-4, article TANENBAUM A S: "COMPUTER NETWORKS PASSAGE", pages: 01 - 07 + 16, XP002929437, 023596 *

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8010405B1 (en) 2002-07-26 2011-08-30 Visa Usa Inc. Multi-application smart card device software solution for smart cardholder reward selection and redemption
US8626577B2 (en) 2002-09-13 2014-01-07 Visa U.S.A Network centric loyalty system
US10460338B2 (en) 2002-09-13 2019-10-29 Visa U.S.A. Inc. Network centric loyalty system
US9852437B2 (en) 2002-09-13 2017-12-26 Visa U.S.A. Inc. Opt-in/opt-out in loyalty system
US8015060B2 (en) 2002-09-13 2011-09-06 Visa Usa, Inc. Method and system for managing limited use coupon and coupon prioritization
US8239261B2 (en) 2002-09-13 2012-08-07 Liane Redford Method and system for managing limited use coupon and coupon prioritization
WO2004077794A2 (en) * 2003-02-25 2004-09-10 Creative Solutions Unlimited Web site management system and method
WO2004077794A3 (en) * 2003-02-25 2004-12-02 Creative Solutions Unltd Web site management system and method
US7725369B2 (en) 2003-05-02 2010-05-25 Visa U.S.A. Inc. Method and server for management of electronic receipts
US8386343B2 (en) 2003-05-02 2013-02-26 Visa U.S.A. Inc. Method and user device for management of electronic receipts
US9087426B2 (en) 2003-05-02 2015-07-21 Visa U.S.A. Inc. Method and administration system for management of electronic receipts
US7987120B2 (en) 2003-05-02 2011-07-26 Visa U.S.A. Inc. Method and portable device for management of electronic receipts
US7827077B2 (en) 2003-05-02 2010-11-02 Visa U.S.A. Inc. Method and apparatus for management of electronic receipts on portable devices
US8793156B2 (en) 2003-08-29 2014-07-29 Visa U.S.A. Inc. Method and system for providing reward status
US8554610B1 (en) 2003-08-29 2013-10-08 Visa U.S.A. Inc. Method and system for providing reward status
US7857216B2 (en) 2003-09-12 2010-12-28 Visa U.S.A. Inc. Method and system for providing interactive cardholder rewards image replacement
US7857215B2 (en) 2003-09-12 2010-12-28 Visa U.S.A. Inc. Method and system including phone with rewards image
US8244648B2 (en) 2003-09-30 2012-08-14 Visa U.S.A. Inc. Method and system for providing a distributed adaptive rules based dynamic pricing system
US8407083B2 (en) 2003-09-30 2013-03-26 Visa U.S.A., Inc. Method and system for managing reward reversal after posting
US8005763B2 (en) 2003-09-30 2011-08-23 Visa U.S.A. Inc. Method and system for providing a distributed adaptive rules based dynamic pricing system
US9141967B2 (en) 2003-09-30 2015-09-22 Visa U.S.A. Inc. Method and system for managing reward reversal after posting
US7653602B2 (en) 2003-11-06 2010-01-26 Visa U.S.A. Inc. Centralized electronic commerce card transactions
US9710811B2 (en) 2003-11-06 2017-07-18 Visa U.S.A. Inc. Centralized electronic commerce card transactions
US8119282B2 (en) 2005-06-16 2012-02-21 Exide Technologies Gmbh Pole bridge for a battery
US11132691B2 (en) 2009-12-16 2021-09-28 Visa International Service Association Merchant alerts incorporating receipt data
US8650124B2 (en) 2009-12-28 2014-02-11 Visa International Service Association System and method for processing payment transaction receipts
US8429048B2 (en) 2009-12-28 2013-04-23 Visa International Service Association System and method for processing payment transaction receipts

Also Published As

Publication number Publication date
AU3384800A (en) 2000-11-14

Similar Documents

Publication Publication Date Title
US6374402B1 (en) Method and apparatus for installation abstraction in a secure content delivery system
USRE45348E1 (en) Method and apparatus for intercepting events in a communication system
US6763370B1 (en) Method and apparatus for content protection in a secure content delivery system
US7328345B2 (en) Method and system for end to end securing of content for video on demand
US7017188B1 (en) Method and apparatus for secure content delivery over broadband access networks
US7080260B2 (en) System and computer based method to automatically archive and retrieve encrypted remote client data files
JP4169797B2 (en) Digital authentication center for medical image authentication
US20020077986A1 (en) Controlling and managing digital assets
US8233627B2 (en) Method and system for managing a key for encryption or decryption of data
CN101919202B (en) Information distribution system and program for the same
CA2351078C (en) Methods and apparatus for secure content delivery over broadband access networks
CN111343202B (en) Internet of things data security storage system based on private cloud
WO2000062472A1 (en) System and method for transmission of encrypted files from a central server computer to a remote computer
US7379605B1 (en) Method for the integration of medical imaging data and content for wireless transmission and remote viewing
WO2019232622A1 (en) Electronic evidence transfer
JPH11175475A (en) Access control method and record medium for recording access control program
CN102196304A (en) Method, system and equipment for generating secrete key in video monitoring
US20040066456A1 (en) Visual imaging network systems and methods
EP1410629A1 (en) System and method for receiving and storing a transport stream
JP4734941B2 (en) Encapsulation server
JP3674772B2 (en) Multiple server login cooperation system, client device, login management device, server device, and storage medium
CN108243198B (en) A kind of data distribution, retransmission method and device
CN102857507B (en) Samba Disk Mapping method and samba Disk Mapping system
JP2002152188A (en) Information acquisition system
JP6125196B2 (en) Network system, electronic data management method for network system, program therefor, and program recording medium

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase