Skip to main content

Secure messaging

Process Secure Messaging
  1. The sender writes an eMail online and sends it over a secure SSL-connection to the secure messaging server.
  2. The recipient is notified through a normal eMail that a secure message is waiting for delivery on the secure server. The recipient is invited to download the message through a link.
  3. The sender provides the recipient with a message unlock code. The code is required in order to access the pending message. If the recipient has already been in contact with the sender through secure messaging server and has registered, this step is not required.
  4. The secure message and confidential documents such as contracts, business plans, resumes or loan documents can then be accessed with the message unlock code and downloaded.
MUC (Message Unlock Code)
A MUC is a message password and protects a message sent to a new communication partner from being seen by erroneous recipients and is used to initiate trust. If a message is sent to a new recipient, the system generates a random MUC. The sender communicates the MUC to the recipient by using another communication channel than email, e.g. personally, by phone or SMS for security reasons (Out-of-band). With the MUC the recipient gets access to the secure message and confidential documents and can download them. If the recipient has already been in contact with the sender through secure messaging and is enrolled, a MUC is no longer required.

Trust management


Secure Messaging relies on the method of the dynamic personal web of trust. This method synthesizes the authentication approach of web of trust, known from PGP, with the advantages of hierarchical structures, known from centralized PKI systems. Those combined with certificates provide high quality of electronic identities. This approach focuses on the user and allows for immediate and personal bootstrapping of trust, respectively revocation.

Comments

Popular posts from this blog

Web synchronization option for merge replication

http://msdn2.microsoft.com/en-us/library/ms151319.aspx SQL Server 2005 Books Online Implementing Replication over the Internet Replicating data over the Internet allows remote, disconnected users to access data when they need it using a connection to the Internet. Replicate data over the Internet using: A Virtual Private Network (VPN). For more information, see Publishing Data over the Internet Using VPN . The Web synchronization option for merge replication. For more information, see Web Synchronization for Merge Replication . All types of Microsoft SQL Server replication can replicate data over a VPN, but you should consider Web synchronization if you are using merge replication.

Request Signatures in Blackberry

Request Signatures in Blackberry need copy sigtool.db, sigtool.csk to SDK/component/Bin folder for example V 4.2.1 ../eclipse\plugins\net.rim.eide.componentpack4.2.1_4.2.1.17\components\bin