WO1991012680A1 - Apparatus and method for data communication - Google Patents

Apparatus and method for data communication Download PDF

Info

Publication number
WO1991012680A1
WO1991012680A1 PCT/GB1991/000227 GB9100227W WO9112680A1 WO 1991012680 A1 WO1991012680 A1 WO 1991012680A1 GB 9100227 W GB9100227 W GB 9100227W WO 9112680 A1 WO9112680 A1 WO 9112680A1
Authority
WO
WIPO (PCT)
Prior art keywords
station
key
algorithm
data
unique
Prior art date
Application number
PCT/GB1991/000227
Other languages
French (fr)
Inventor
William Mcmullan Hawthorne
Original Assignee
Enfranchise Sixty Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Enfranchise Sixty Limited filed Critical Enfranchise Sixty Limited
Publication of WO1991012680A1 publication Critical patent/WO1991012680A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Abstract

A method of communicating data from a first transmitting station to a selected second receiving station in a network of stations adapted for communication with one another, said method comprising: locally storing a substantially unique key at each station, all the keys being known to users at all the stations; locally storing a common key symmetric message ciphering first algorithm at each station; generating at the first station a working key as a predetermined representation of the unique key which identifies the intended recipient station; ciphering the data to be transmitted by use of said working key in said first algorithm; and transmitting said ciphered data, whereby to permit deciphering of said ciphered data by the selected second station. An apparatus, and network, for this method are also disclosed.

Description

APPARATUS AND METHOD FOR DATA COMMUNICATIOK
Field of the Invention
This invention relates to the communication of data between stations in a network of stations adapted for communication with δ one another. The invention is applicable primarily to digital electronic communication, for example the transmission of messages between facsimile transceivers, the transmission of data between computers, electronic mail, and digital telephony. The data can be any data for example computer data, the content of a message to
10 be sent by fax (i.e facsimile) or by electronic mail, or the content of a telephone conversation.
Background to the Invention
It is often desired to transmit private or confidential data. In a network of spaced-apart stations the communication lines between lδ the stations may well be accessible to third parties, e.g hackers or tappers. With fax machines it is quite easy to send messages accidentally to the wrong destination. These problems become greater as the network becomes more extensive, for example the public telephone system. There is therefore an existing need for a
20 reliable means of enciphering data transmissions to make it difficult for hackers and other unintended recipients to extract the original data from an enciphered data transmission.
Certain solutions to this problem are currently available, but many of these existing solutions fail to meet desired criteria at one or
2δ other point. Ordinarily desired criteria are a reasonably low cost and a low level of administration coupled with a high level of difficulty for an unintended recipient to decipher a ciphered transmission. Different users attach different priorities to these criteria. For example some commercial data and electronic fund transfer transactions among banks and between banks and their customers constitute valuable and confidential data, and in that case the level of difficulty presented to an unintended recipient must be such as to make it seriously uneconomic or unrealistically time-consuming to attempt to decipher the ciphered data.
A further consideration is whether or not enciphering and deciphering are to take place on the fly, i.e the plain message is enciphered at the output of the transmitter and deciphered at the input of the receiver. An alternative is to encipher a message and hold it on file, e.g in a computer memory, prior to transmission. The enciphered message can then be sent by modem or other means without adaptation to the technology of the communication channel between the stations. The received ciphered message can be stored in the receiver's computer memory and deciphered at a later time. It is usually convenient to encipher and decipher on the fly and this is obviously a necessary criterion for digital telephony applications.
One presently used solution is to provide each station in the network with secret information concerning which cipher key is to be used for ciphering data to be transmitted between each pair of stations. This information has to be agreed and distributed in advance and kept secret, and therefore the administrative problems in a network of any size are formidable and the likelihood of loss of security is considerable. The information needs to be changed from time to time or after any leakage, adding to the administrative problems. It will be appreciated that if all the stations agree to use a common key then all users can read all the data and one security lapse opens the entire network. If each pair of transmitters and receivers in a network of N stations wish to preserve mutual secrecy, the number of keys required is N x (N-l)/2, i.e 4950 different keys for a network of 100 stations. If different keys are required for a message from A to B and a message from B to A then the number of keys required is N x (N-l ) , i.e 9900 different keys for a network of 100 stations.
Another existing proposal in the art is to replace the supposedly secret keys with public keys, and instead to require a prior separate communication from A to B to enable both A and B to generate an agreed secret key specific to the occasion of transmitting a particular enciphered data message. The separate communication poses problems both administratively and as to potential loss of security.
An object of the present invention is to provide an apparatus and method which takes into account the desired criteria and which mitigates the described disadvantages.
Summary of the Invention
According to the present invention there is provided a method of communicating data from a first transmitting station to a selected second receiving station in a network of stations adapted for communication with one another, characterised by said method comprising:
locally storing a substantially unique key at each station, all the keys being known to users at all the stations;
locally storing a common key symmetric message ciphering first algorithm at each station;
generating at the first station a working key as a predetermined representation of the unique key which identifies the intended recipient station; ciphering the data to be transmitted by use of said working key in said first algorithm; and
transmitting said ciphered data, whereby to permit deciphering of said ciphered data by the selected second station.
This method can be used for example for fax transmissions or digital telephony where the routine requirement for confidentiality is relatively low.
According to the invention in another aspect there is provided a method of communicating data according to the aforementioned method characterised by said method also comprising:
locally storing a common ciphering second algorithm at each station;
generating at the first station a transmission initiation request as a combination of the unique keys which identify respectively the first station and the selected second station intended to receive a data transmission from the first station; and
ciphering said request by use of said second algorithm, whereby the ciphered request constitutes the working key.
The invention further provides a method of gaining access to the data transmitted in enciphered form by communication method as disclosed in the immediately preceding paragraph, said method comprising:
locally generating, at a station actually receiving the transmission signal, a working key by ciphering with said second algorithm a combination of the known unique keys which identify respectively the transmitting station and the local receiving station; and applying said first algorithm using said locally generated working key to said received transmission signal, whereby said transmission is deciphered to recreate said data only if said local receiving station has the substantially unique key identifying the intended recipient station and can thereby locally generate a working key identical to the working key used at the transmitting station.
In another aspect of the communication method, each station also locally stores a substantially unique membership key, all the membership keys being known to users at all the stations; and
said transmission initiation request is generated as a combination of the unique station key and the unique membership key of the first station together with the unique station key and the unique membership key of the intended recipient station.
In this embodiment a station actually receiving a transmission signal can decipher the transmission to recreate the data only if said receiving station has both the unique station key and the unique membership key identifying the intended recipient station.
In yet another aspect of the communication method, a common key symmetric ciphering third algorithm is locally stored at each station; a substantially random key is enciphered by used of said working key and said third algorithm; said data to be transmitted is ciphered by use of said random key in said first algorithm; and said ciphered random key is transmitted together with the ciphered data as said transmission signal, whereby to permit local deciphering of the enciphered random key and consequently of the ciphered data substantially only by an intended recipient station.
The third algorithm may be identical to the first algorithm. The methods disclosed in the above paragraphs within this section permit the enforcement of successively higher levels of security and can be used for example for transmission of valuable or confidential data between main frame computers.
The invention also provides, separately, the transmission and reception methods embodied in the communication methods disclosed above.
The invention further provides a communication network for carrying out the communication methods described above as well as, separately, transmission and reception apparatus embodied in the communication network, and transceiver apparatus selectively operable in transmission or reception modes embodied in the communication network.
The invention further provides apparatus for use with any such communication apparatus to enable the communication apparatus to carry out the disclosed methods.
Yet further, the invention provides a method, and separately an apparatus, for communicating data substantially as described herein; and in certain embodiments with reference to, and as illustrated in, the accompanying drawings.
Embodiments of the invention will now be described, by way of example, with reference to the drawings that follow; in which:
Brief Description of the Drawings
Figure 1 is a flow chart summarising the operation of the third and fourth embodiments of the present invention in the transmission mode; and Figure 2 is a flow chart summarising operation of the third and fourth embodiments of the present invention in the reception mode.
Description of the Preferred Fτnhr»riiτnents
The first embodiment is applicable e.g to fax transmissions, and also to electronic mail and digital telephony, where the routine requirement for confidentiality is relatively low. For fax, the ordinary requirement is to ensure that if the destination telephone number for a fax message is incorrectly dialled and the transmission is therefore received at the wrong receiver, the message is unintelligible at that wrong receiver. The first embodiment can solve this problem of protection from dialling errors.
Each fax transceiver in the network is provided with a tamper- proof control means such as a sealed box, board or integrated circuit connected to or embedded within the transceiver. The control means is selectively operable in transmission and reception modes and comprises a memory for storing a key and an algorithm, processing means for running the algorithm, means for reading a fax number and means, such as a keypad, allowing entry of a key such as a number or number and letter combination. If this embodiment is utilised by an original equipment manufacturer, the control means can be incorporated into the design of the fax transceiver, in which case the telephone/fax dialling keys can themselves serve the additional function of allowing entry of the key number.
The memory in each control means stores a key which is unique to that control means and which is suitably read from the transceiver as its own public telephone/fax number. This unique key is thus a public key and is known to users at all the stations. The memory in e ch control ϊoeans also stores a common key symmetric message ciphering first algorithm. A key symmetric algorithm is a cipher which, in response to activation by a key, converts an intelligible stream of letters and numbers, i.e the message, into an unintelligible stream, and which also operates in reverse to convert the unintelligible stream back to the intelligible stream upon activation by an identical key.
When a user at a first fax transceiver wishes to send a message he dials or keys in the public fax number of the intended recipient to make a line connection. The control means also reads this number and takes the last four digits as a working key. When the two stations are connected and have completed their introduction protocol and checked the line quality, the message is transmitted via the processor in the control means. The processor operates to cipher the data on the fly by use of the working key in the first algorithm. The recipient station can similarly use its control means to decipher the received data on the fly by use of the identical working key in its own stored first algorithm. The recipient's working key is identical because it is the last four digits of the recipient's own public fax number and is available in the control means in reception mode.
Generalise in order to protect transmissions more strictly against dialling errors or interception, each station in the network which subscribes to an organised message ciphering facility is preferably also provided with a substantially unique membership key. The key may be valid for an indefinite term or for a fixed period against a charge, and then changed. The working key is then formed as the last four digits of the intended recipient's fax number together with the four digits of the intended recipient's membership key. The keypad allows entry of the intended recipient's membership key into the memory of the control means. The processor operates as before to encipher the data on the fly by use of the 8-digit working key in the first algorithm. Any dialling error will then result in the message being enciphered by use of a working key created from a combination of fax number and membership key number which does not exist and therefore no recipient can decipher the ciphered transmission.
The second embodiment is similar in principle to the first embodiment and is applicable to digital telephony. Each telephone handset is provided with a similar control means to the first embodiment except that, for telephony, the control means is adapted to operate simultaneously in send and receive modes and is adapted to switch from an inactive to an active state upon reception of data to be received and data to be transmitted. The control means is preferably embodied in an integrated circuit contained within the telephone handset, and the telephone keypad then also serves to enter the keys required to initiate enciphering of a telephone conversation.
The working key is formed as a combination of the call originator's unique public key (e.g the last portion of his telephone number) and bis unique membership key together with the unique key and the unique membership key of the intended recipient. The unique keys and the unique membership keys are all known to all subscribers to the telephone ciphering facility, and it will be appreciated that each unique key is associated with a specific unique membership key. The working key may then be used as described above in the stored first algorithm to encipher the call originator's conversation, or other data he may wish to transmit over the telephone channel, on the fly. The correct intended recipient station can likewise decipher the transmitted enciphered conversation on the fly and can respond. It will be appreciated that the working key formed at the responding station for use in creating a responding enciphered conversation is different from the call originator's working key because the four keys used to create the working key are combined in a different succession. Thus the working key used for transmissions from A to B differs from the working key used for transmissions from B to A. The third and fourth embodiments will now be described with reference to Figures 1 and 2; these Figures may be understood using the identification table that follows:
T ENTTFTΠATTOTJ TABLE
Figure 1
1 Input receiver's station public key.
2 Input receiver's membership key.
3 Input any additional agreed key.
4 Generate transmission initiation request.
5 Use second algorithm and transmission initiation request to generate working key.
6 Generate random key (if used).
7 Use third algorithm and working key to encipher the random key.
8 Transmit enciphered random key.
9 Use first . (message) algorithm and either the working key or the random key to encipher the message.
10 Transmit the enciphered message.
Figure 2
11 Input transmitter's station public key. 12 Input transmitter's membership key.
13 Input any additional agreed key.
14 Generate the transmission initiation request.
15 Use the second algorithm and the transmission initiation request to generate the working key.
16 Input the received enciphered random key (if used).
17 Use the third algorithm and the working key to decipher the random key.
18 Use the first (message) algorithm and either the working key or the random key to decipher the received message.
The third embodiment is applicable e.g to digital telephony electronic mail or data transmission between computers, for example, where a higher level of security is required. In this embodiment the working key is not simply a combination of the keys as described above, but is an enciphered version thereof. Each control means of each telephone or station in the network is further provided with a locally stored common ciphering second algorithm.
When a conversation, or other data transmission (see Figure 1), is required the call originator generates a transmission initiation request comprising a combination of the unique keys which identify respectively the call originator's telephone and the intended recipient's telephone and preferably also together with unique membership keys of the call originator and of the intended recipient. The transmission initiation request is then enciphered by use of the second algorithm whereby the enciphered request constitutes the working key. The working key is then used in the first algorithm to encipher the data on the fly as before.
It will be appreciated that yet a further key can be added to the combination used in forming the working key in any of the above described embodiments. The further key may be regarded as an addition to the membership key. The further key would be for example a number known only to a selected group of persons from among those who might be users of the receiving fax or telephone apparatus. The receiving station (see Figure 2) would then only operate to decipher the incoming enciphered message if a person from the selected group had previously attended and keyed in the further key. The further key must have been agreed between transmitter and receiver in a previous communication of any kind. In the case of a fax message the received enciphered message can be held in computer memory in ciphered form until the authorised person with the further agreed key is available.
The fourth embodiment is applicable to communication between main frame digital computers, for example, where a very high level of security is required. In this embodiment a working key is formed as described in relation to the third embodiment. A random number generator is operated to provide a random number. The random number is then itself enciphered by using the working key in a third algorithm to produce a ciphered random key. The third algorithm is a common key symmetric algorithm and is locally stored at each station. The . third algorithm may be the same as the first algorithm. The data to be transmitted is then enciphered by use of the random key in the first algorithm and the ciphered random key is itself transmitted together with the transmitted ciphered data (see Figure 1).
The intended recipient station locally generates its own working key and deciphers the transmitted ciphered random key by use of the working key in the locally stored third algorithm. The random key is then available for use in deciphering the transmitted ciphered data (see Figure 2).
In all the described embodiments the data to be transmitted is enciphered by use of a key in the first algorithm. The key is of sufficient length as to be capable of producing a large number of variants, preferably greater than 1 x lO1^.
The working key is, in the .higher security embodiments, produced by enciphering a combination of inputted keys by means of a second algorithm. The second algorithm is preferably a fixed key transformation algorithm, the fixed key being chosen from a very large number of possible variants, preferably greater than 1 x 103". The second algorithm is not a key symmetric algorithm since reversibility is not required. Each station has the available information to produce the necessary working key when required and when called by a station desiring to transmit data thereto.
The second algorithm thus requires a one-way transformation only and can accordingly be selected by those skilled in the art to be sufficiently difficult as to make it seriously uneconomic or unrealistically time-consuming to attempt to decipher the captured data.

Claims

CT.ATMS:
1. A method of communicating data from a first transmitting station to a selected second receiving station in a network of stations adapted for communication with one another, said method comprising:
locally storing a substantially unique key at each station, all the keys being known to users at all the stations;
locally storing a common key symmetric message ciphering first algorithm at each station;
generating at the first station a working key as a predetermined representation of the unique key which identifies the intended recipient station;
ciphering the data to be transmitted by use of said working key in said first algorithm; and
transmitting said ciphered data, whereby to permit deciphering of said ciphered data by the selected second station.
2. A method of communicating data according to Claim 1, characterised by said method also comprising:
locally storing a common ciphering second algorithm at each station;
generating at the first station a transmission initiation request as a combination of the unique keys which identify respectively the first station and the selected second station intended to receive a data transmission from the first station;
ciphering said request by use of said second algorithm, whereby the ciphered request constitutes the working key.
3. A method of communicating data according to Claim 2, characterised in that each station also locally stores a substantially unique membership key, all the membership keys being known to users at all the stations; and
said transmission initiation request is generated as a combination of the unique station key and the unique membership key of the first station together with the unique station key and the unique membership key of the intended recipient station.
4. A method of communicating data according to Claim 2 or Claim 3, characterised in that a common key symmetric ciphering third algorithm is locally stored at each station; a substantial^- random key is enciphered by use of said working key and said third algorithm; said data to be transmitted is ciphered by use of said random key in said first algorithm; and said ciphered random key is transmitted together with the ciphered data as said transmission signal, whereby to permit local deciphering of the enciphered random key and consequently of the ciphered data substantially only by an intended recipient station.
5. A method of communicating data according to Claim 4, characterised in that the third algorithm is identical to the first algorithm.
6. A method of gaining access to the data transmitted in enciphered form by communication method according to Claim 2, characterised by said method comprising:
locally generating, at a station actually receiving the transmission signal, a working key by ciphering with said second algorithm a combination of the known unique keys which identify respectively the transmitting station and the local receiving station; and applying said first algorithm using said locally generated working key to said received transmission signal, whereby said transmission is deciphered to recreate said data only if said local receiving station has the substantially unique key identifying the intended recipient station and can thereby locally generate a working key identical to the working key used at the transmitting station.
7. A method of gaining access to the data transmitted in enciphered form by a communication method according to Claim 3, characterised by said method comprising:
locally generating, at a station actually receiving the transmission signal, a working key by ciphering with said second algorithm a combination of the known unique keys, which identify respectively the transmitting station and the local receiving station, and the known unique membership keys identifying respectively the transmitting station and the local receiving station; and
applying said first algorithm using said locally generated working key to said received transmission signal, whereby said transmission is deciphered to recreate said data only if said local receiving station has the substantially unique key identifying the intended recipient station and the substantially unique membership key of the intended recipient station, and can thereby locally generate a working key identical to the working key used at the transmitting station.
8. A data transmission apparatus, characterised in that the apparatus is suitable for carrying out the communication methods according to any one of Claims 1 to 5.
9. A data reception apparatus, characterised in that the apparatus is suitable for carrying out the communication methods according to any one of Claims 1 to 5.
10. A communication network characterised in that the network is suitable for carrying out the communication methods according to any one of Claims 1 to 5.
PCT/GB1991/000227 1990-02-14 1991-02-14 Apparatus and method for data communication WO1991012680A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9003326.7 1990-02-14
GB9003326A GB9003326D0 (en) 1990-02-14 1990-02-14 Apparatus and method for data communication

Publications (1)

Publication Number Publication Date
WO1991012680A1 true WO1991012680A1 (en) 1991-08-22

Family

ID=10670967

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1991/000227 WO1991012680A1 (en) 1990-02-14 1991-02-14 Apparatus and method for data communication

Country Status (3)

Country Link
AU (1) AU7238991A (en)
GB (2) GB9003326D0 (en)
WO (1) WO1991012680A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0576224A2 (en) * 1992-06-22 1993-12-29 NCR International, Inc. Cryptographic key management apparatus and method
WO1995008232A1 (en) * 1993-09-14 1995-03-23 Chantilley Corporation Limited Apparatus for key distribution in an encryption system
US6636833B1 (en) 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US7433845B1 (en) 1999-04-13 2008-10-07 Orbis Patents Limited Data structure, method and system for generating person-to-person, person-to-business, business-to-person, and business-to-business financial transactions
US10592901B2 (en) 2001-06-04 2020-03-17 Orbis Patents, Ltd. Business-to-business commerce using financial transaction numbers

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NZ332952A (en) * 1996-05-24 2000-04-28 Christopher John Stanford System with and method of cryptographically protecting communications
GB9624127D0 (en) * 1996-11-20 1997-01-08 British Telecomm Transaction system
WO1999037052A1 (en) * 1998-01-19 1999-07-22 Terence Edward Sumner Method and apparatus for conveying a private message to selected members

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0123360A1 (en) * 1983-04-26 1984-10-31 Koninklijke Philips Electronics N.V. Method of distributing and utilizing enciphering keys
EP0127381A1 (en) * 1983-05-27 1984-12-05 M/A-Com Government Systems, Inc. Key signal encryption and distribution system for controlling scrambling and selective, remote descrambling of television signals
EP0287720A1 (en) * 1987-04-22 1988-10-26 International Business Machines Corporation Management of cryptographic keys
US4853962A (en) * 1987-12-07 1989-08-01 Universal Computer Consulting, Inc. Encryption system
US4887296A (en) * 1984-10-26 1989-12-12 Ricoh Co., Ltd. Cryptographic system for direct broadcast satellite system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0123360A1 (en) * 1983-04-26 1984-10-31 Koninklijke Philips Electronics N.V. Method of distributing and utilizing enciphering keys
EP0127381A1 (en) * 1983-05-27 1984-12-05 M/A-Com Government Systems, Inc. Key signal encryption and distribution system for controlling scrambling and selective, remote descrambling of television signals
US4887296A (en) * 1984-10-26 1989-12-12 Ricoh Co., Ltd. Cryptographic system for direct broadcast satellite system
EP0287720A1 (en) * 1987-04-22 1988-10-26 International Business Machines Corporation Management of cryptographic keys
US4853962A (en) * 1987-12-07 1989-08-01 Universal Computer Consulting, Inc. Encryption system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Informationstechnik It, vol. 28, no. 3, 1986, Oldenbourg Verlag, DE, H. Sedlak "Ein Public-Key-Code Kryptogra- phie-Prozessor", pa *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0576224A2 (en) * 1992-06-22 1993-12-29 NCR International, Inc. Cryptographic key management apparatus and method
EP0576224A3 (en) * 1992-06-22 1994-10-12 Ncr Int Inc Cryptographic key management apparatus and method.
WO1995008232A1 (en) * 1993-09-14 1995-03-23 Chantilley Corporation Limited Apparatus for key distribution in an encryption system
GB2296639A (en) * 1993-09-14 1996-07-03 Chantilley Corp Ltd Apparatus for key distribution in an encryption system
GB2296639B (en) * 1993-09-14 1998-01-21 Chantilley Corp Ltd Apparatus for key distribution in an encryption system
US5768381A (en) * 1993-09-14 1998-06-16 Chantilley Corporation Limited Apparatus for key distribution in an encryption system
US6636833B1 (en) 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US7571142B1 (en) 1998-03-25 2009-08-04 Orbis Patents Limited Credit card system and method
US8676707B2 (en) 1998-03-25 2014-03-18 Orbis Patents Ltd. Credit cards system and method having additional features
US8756150B2 (en) 1998-03-25 2014-06-17 Orbis Patents Limited Credit card system and method
US9881298B2 (en) 1998-03-25 2018-01-30 Orbis Patents Limited Credit card system and method
US9898730B2 (en) 1998-03-25 2018-02-20 Orbit Patents Limited Credit card system and method
US7433845B1 (en) 1999-04-13 2008-10-07 Orbis Patents Limited Data structure, method and system for generating person-to-person, person-to-business, business-to-person, and business-to-business financial transactions
US7895122B2 (en) 1999-04-13 2011-02-22 Orbis Patents Limited Person-to-person, person-to business and business-to-business financial transaction system
US10592901B2 (en) 2001-06-04 2020-03-17 Orbis Patents, Ltd. Business-to-business commerce using financial transaction numbers

Also Published As

Publication number Publication date
GB2241414A (en) 1991-08-28
GB9103139D0 (en) 1991-04-03
AU7238991A (en) 1991-09-03
GB9003326D0 (en) 1990-04-11

Similar Documents

Publication Publication Date Title
US6266418B1 (en) Encryption and authentication methods and apparatus for securing telephone communications
US5475757A (en) Secure data transmission method
Jerichow et al. Real-time mixes: A bandwidth-efficient anonymity protocol
US4797672A (en) Voice network security system
US5450493A (en) Secure communication method and apparatus
CN1197023C (en) Method and system for securely transferring data set in a data communications system
US5392355A (en) Secure communication system
JPH05227152A (en) Method and device for establishing privacy communication link
US7284123B2 (en) Secure communication system and method for integrated mobile communication terminals comprising a short-distance communication module
RU2495532C2 (en) Method and apparatus for end-to-end encrypted communication
JPH07245605A (en) Ciphering information repeater, subscriber terminal equipment connecting thereto and ciphering communication method
EP0925664A2 (en) Secure telecommunications data transmission
WO1991012680A1 (en) Apparatus and method for data communication
EP0018129B1 (en) Method of providing security of data on a communication path
KR100287674B1 (en) Communication method
CN111541603B (en) Independent intelligent safety mail terminal and encryption method
JP2753564B2 (en) Encryption key management method
WO1998027517A1 (en) A method and a system for the encryption of codes
JPH07303104A (en) Storage type communication system with ciphering function
JPH05122217A (en) Ciphering communication method
JP2541307B2 (en) Cryptographic key communication method and apparatus thereof
JP2005051368A (en) Communication apparatus, base station apparatus and communication system
JPH08223152A (en) Ciphering method and cipher information converter
JPH05244153A (en) Digital communication equipment
JPH09181716A (en) Secret key generating method in radio network and radio terminal equipment

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AT AU BB BG BR CA CH DE DK ES FI GB HU JP KP KR LK LU MC MG MW NL NO PL RO SD SE SU US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE BF BJ CF CG CH CM DE DK ES FR GA GB GR IT LU ML MR NL SE SN TD TG

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: CA