IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0390363
(1999-09-07)
|
발명자
/ 주소 |
- Leonard,Jon N.
- Seaman,Charles H.
- Anderer,Michael
- Ritz,Peter B.
- Bernstein,Michael
- Schena,Robert J.
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
182 인용 특허 :
26 |
초록
▼
An electronic mail system and method enables the originator of a message sent by electronic mail to select a date, time, or event at which the message and all incarnations of the message to self-destruct, regardless of the number and types of computers or software systems that may have interacted wi
An electronic mail system and method enables the originator of a message sent by electronic mail to select a date, time, or event at which the message and all incarnations of the message to self-destruct, regardless of the number and types of computers or software systems that may have interacted with the message. The system and message also permits the originator to include processing and handling limitations. The necessary control over the message is achieved by encrypting the message and enabling viewing only through a viewer applet arranged to facilitate destruction of the message upon the occurrence of the selected expiration time, date, or event, and to implemented the handling and processing limitations. A central server can be used to exercise additional control over the message by serving as a proxy destination, and by streaming the encrypted message to the viewer applet. The viewer applet can be transmitted to new recipients with the message so that the system and method can direct mail to any electronic mail user.
대표청구항
▼
We claim: 1. An electronic mail system, comprising: a first computer on which is installed message origination software and which is connected to a network capable of carrying an electronic mail message; at least one recipient computer also connected to said network; and a viewer applet, wherein sa
We claim: 1. An electronic mail system, comprising: a first computer on which is installed message origination software and which is connected to a network capable of carrying an electronic mail message; at least one recipient computer also connected to said network; and a viewer applet, wherein said message origination software is arranged to permit an originator of the electronic mail message to select a date, time, or event, the occurrence of which will cause said electronic mail message and all designated incarnations thereof to expire, wherein said date, time, or event is attached to the electronic mail message by the message origination software prior to transmission over said network, wherein said electronic mail message is encrypted so that it may only be viewed by a recipient using said viewer applet upon installation of said viewer applet on said at least one recipient computer, and wherein said viewer applet is arranged to decrypt said electronic mail message to permit viewing of said electronic mail message before the occurrence of the date, time, or event selected by said originator of the electronic mail message, and to prevent decryption and viewing of said encrypted electronic mail message by said recipient after the occurrence of the date, time, or event selected by said originator of the electronic mail message, and wherein: since said electronic mail message can only be viewed using the viewer applet because only the viewer applet can decrypt said electronic mail message, and since the viewer applet prevents decryption and viewing of the electronic mail message after the occurrence of the date, time, or event, said electronic mail system positively prevents all designated incarnations of the electronic mail message from being viewed after the occurrence of the date, time, or event. 2. An electronic mail system as claimed in claim 1, further comprising a central electronic mail server connected to said network, said message origination software being arranged to send said electronic mail message to said electronic mail server, said electronic mail server being arranged to store said electronic mail message and, upon request by the recipient, encrypt said electronic mail message and stream it to said viewer applet, and said viewer applet being arranged to decrypt said message as it is streamed, so as to display said message. 3. An electronic mail system as claimed in claim 2, wherein said message is encrypted by said central mail server using a public key generated by the viewer applet, said viewer applet being arranged to generate said public key and also a corresponding private key used to decrypt said message. 4. An electronic mail system as claimed in claim 2, wherein said viewer applet is further arranged to permit a user to request forwarding of said electronic mail message stored on said central mail server to a second recipient computer, said central mail server being arranged to encrypt and stream said message to a copy of the viewer applet installed on said second recipient computer and, prior to streaming said message to said second recipient computer, download said viewer applet to said second recipient computer if the viewer applet is not already installed on the second recipient computer. 5. An electronic mail system as claimed in claim 4, wherein said message is encrypted by said central mail server using respective public keys generated by the viewer applet installed on the recipient computer and the copy of the viewer applet installed on the second recipient computer, said viewer applet and said copy of the viewer applet being arranged to generate said respective public keys and also corresponding private keys used to decrypt said message. 6. An electronic mail system as claimed in claim 4, wherein upon the occurrence of said date, time, or event, said central electronic mail server erases said electronic mail message and, because said electronic mail message is stored only on the central electronic mail server, terminates the existence of the electronic mail message anywhere in this universe. 7. An electronic mail system as claimed in claim 2, wherein upon the occurrence of said date, time, or event, said central electronic mail server erases said electronic mail message and, because said electronic mail message is stored only on the central electronic mail server, terminates the existence of the electronic mail message anywhere in this universe. 8. An electronic mail system as claimed in claim 2, wherein said message origination software is arranged to permit entry of processing and handling limitations, and wherein said processing and handling limitations are attached to said electronic mail message before transmission over said network. 9. An electronic mail system as claimed in claim 8, wherein said processing and handling limitations are implemented by said central server in cooperation with said viewer applet. 10. An electronic mail system as claimed in claim 1, wherein said message is encrypted by a central mail server before transmission to said recipient computer. 11. An electronic mail system as claimed in claim 10, wherein said message is encrypted by said central mail server using a public key generated by the viewer applet, said viewer applet being arranged to generate said public key and also a corresponding private key used to decrypt said message. 12. An electronic mail system as claimed in claim 1, wherein said message is encrypted by said message origination software using a public key generated by the viewer applet, said viewer applet being arranged to generate said public key and also a corresponding private key used to decrypt said message. 13. An electronic mail system as claimed in claim 1, wherein said viewer applet stores said electronic mail message in encrypted form on said recipient computer and, upon the occurrence of said date, time, or event, erases said electronic mail message. 14. An electronic mail system as claimed in claim 13, wherein said viewer applet is arranged to forward said electronic mail message in encrypted form to a second recipient computer, wherein a copy of said viewer applet is installed on said second recipient computer, and wherein upon the occurrence of said time, date, or event, said copy of the viewer applet erases said electronic mail message. 15. An electronic mail system as claimed in claim 14, wherein said viewer applet is forwarded to said second recipient computer as an attachment to said electronic mail message, thereby causing said system to be self-propagating. 16. An electronic mail system as claimed in claim 1, wherein said message origination software is arranged to permit entry of processing and handling limitations, and wherein said processing and handling limitations are attached to said electronic mail message before transmission over said network. 17. An electronic mail system as claimed in claim 16, wherein said processing and handling limitations are implemented by said viewer applet. 18. A method of controlling an electronic mail message transmitted over a network, comprising the steps of: before transmission of the electronic mail message over the network, attaching to the message a date, time, or event, the occurrence of which will cause said electronic mail message and all designated incarnations thereof to expire; encrypting said electronic mail message so that it can only be viewed by using a viewer applet capable of decrypting the message and installed on a recipient computer, said viewer applet preventing decryption of said electronic mail message unless controls set by a sender of the electronic mail message are implemented, said viewer applet thereby preventing viewing of said message after the occurrence of said time, date, or event; initially transmitting said electronic mail message over said network to a central electronic mail server; storing said electronic mail message at said electronic mail server; and, upon request by the recipient, encrypting said electronic mail message, streaming the encrypted electronic mail message to said viewer applet, and decrypting said electronic mail message as it is received by the viewer applet so as to display said message without storing it at said recipient computer. 19. A method of controlling an electronic mail message as claimed in claim 18, wherein said step of encrypting said electronic mail message is carried out by said central electronic mail server using a public key generated by the viewer applet, said viewer applet being arranged to generate said public key and also a corresponding private key used to decrypt said message. 20. A method of controlling an electronic mail message as claimed in claim 19, further comprising the steps of causing said viewer applet to request forwarding of said electronic mail message stored on said central mail server to a second recipient computer, encrypting said electronic mail message using a public key of a copy of said viewer applet installed on said second recipient computer, and streaming said electronic message to said second recipient computer. 21. A method of controlling an electronic mail message as claimed in claim 20, wherein upon the occurrence of said date, time, or event, said central electronic mail server erases said electronic mail message and, because said electronic mail message is stored only on the central electronic mail server, terminates the existence of the electronic mail message anywhere in this universe. 22. A method of controlling an electronic mail message as claimed in claim 18, wherein upon the occurrence of said date, time, or event, said central electronic mail server erases said electronic mail message and, because said electronic mail message is stored only on the central electronic mail server, terminates the existence of the electronic mail message anywhere in this universe. 23. A method of controlling an electronic mail message as claimed in claim 18, further comprising the step of attaching processing and handling limitations to said electronic mail message before transmission over said network. 24. A method of controlling an electronic mail message as claimed in claim 23, further comprising the step of causing said central electronic mail server and viewer applet to implement said processing and handling limitations. 25. A method of controlling an electronic mail message as claimed in claim 18, wherein the step of transmitting said electronic mail message over said network comprises the step of transmitting said message to a central electronic mail server and causing said central electronic mail server to encrypt said message before transmitting it to said recipient computer. 26. A method of controlling an electronic mail message as claimed in claim 25, further comprising the steps of causing said viewer applet to generate a public key and a corresponding private key and transmitting said public key to said central server for use in encrypting said message. 27. A method of controlling an electronic mail message transmitted over a network, comprising the steps of: before transmission of the electronic mail message over the network, attaching to the message a date, time, or event, the occurrence of which will cause said electronic mail message and all designated incarnations thereof to expire; encrypting said electronic mail message using a public key associated with a private key held by the viewer applet to decrypt said message so that the electronic mail message can only be viewed by using a viewer applet capable of decrypting the message and installed on a recipient computer, said viewer applet preventing decryption of said electronic mail message unless controls set by a sender of the electronic mail message are implemented, said viewer applet thereby preventing viewing of said message after the occurrence of said time, date, or event; causing said viewer applet to store said electronic mail message in encrypted form on said recipient computer and, upon the occurrence of said date, time, or event, erase said electronic mail message; causing said viewer applet to forward said electronic mail message in encrypted form to a second recipient computer; and upon the occurrence of said time, date, or event, causing a copy of said viewer applet installed on said second recipient computer to erase said electronic mail message. 28. A method of controlling an electronic mail message as claimed in claim 27, further comprising the step of forwarding said copy of the viewer applet to said second recipient computer as an attachment to said electronic mail message, thereby causing said system to be self-propagating. 29. A method of controlling an electronic mail message as claimed in claim 18, further comprising the step of attaching flags indicating processing and handling limitations to said electronic mail message before transmission over said network. 30. A method of controlling an electronic mail message as claimed in claim 29, further comprising the step of causing said viewer applet to implement said processing and handling limitations. 31. An electronic mail system, comprising: a first computer on which is installed message origination software and which is connected to a network capable of carrying an electronic mail message, said message origination software being arranged to enable an originator of the message to attach message processing limitations to the message before it is sent; at least one recipient computer also connected to said network; a viewer applet arranged to cooperate with said central server to implement said processing limitations; and a central electronic mail server connected to said network, said message origination software being arranged to send said electronic mail message to said electronic mail server, said electronic mail server being arranged to store said electronic mail message and, upon request by the recipient, encrypt said electronic mail message and stream it to said viewer applet, and said viewer applet being arranged to decrypt said viewer applet as it is streamed so as to display said message, wherein said viewer applet and central electronic mail server cooperate to prevent decryption and viewing of said encrypted electronic mail message by said recipient unless said processing limitations are implemented, and wherein: because said message can only be viewed by having said viewer applet decrypt said message as it streamed to the viewer applet by the central electronic mail server, so that a recipient must use said viewer applet to view said message, and because said viewer applet implements said processing limitations, said message cannot be viewed without said processing limitations. 32. An electronic mail system as claimed in claim 31, wherein said message is encrypted by said central mail server using a public key generated by the viewer applet, said viewer applet being arranged to generate said public key and also a corresponding private key used to decrypt said message. 33. An electronic mail system as claimed in claim 31, wherein said viewer applet is further arranged to permit a user to request forwarding of said electronic mail message stored on said central mail server to a second recipient computer, said central mail server being arranged to encrypt and stream said message to a copy of the viewer applet installed on said second recipient computer and, prior to streaming said message to said second recipient computer, download said viewer applet to said second recipient computer if the viewer applet is not already installed on the second recipient computer. 34. An electronic mail system as claimed in claim 33, wherein said message is encrypted by said central mail server using respective public keys generated by the viewer applet installed on the recipient computer and the copy of the viewer applet installed on the second recipient computer, said viewer applet and said copy of the viewer applet being arranged to generate said respective public keys and also corresponding private keys used to decrypt said message. 35. A method of controlling an electronic mail message transmitted over a network, comprising the steps of: before transmission of the electronic mail message over the network, attaching limitations on processing and handling of the electronic mail message by a recipient; initially transmitting said electronic mail message over said network to a central electronic mail server; storing said electronic mail message at said electronic mail server; upon request by the recipient, encrypting said electronic mail message, streaming the encrypted electronic mail message to a viewer applet installed on said recipient computer, and decrypting said electronic mail message as it is received by the viewer applet so as to display said message without storing it at said recipient computer; and preventing said decrypting of the electronic mail message and viewing of the message by the recipient unless said processing limitations attached to the message before transmission of the message are implemented, wherein: because said message can only be viewed by having said viewer applet decrypt said message as it streamed to the viewer applet by the central electronic mail server, so that a recipient must use said viewer applet to view said message, and because said viewer applet implements said processing limitations, said message cannot be viewed without said processing limitations. 36. A method of controlling an electronic mail message as claimed in claim 35, further comprising the steps of encrypting said electronic mail message is carried out by said central electronic mail server using a public key generated by the viewer applet, said viewer applet being arranged to generate said public key and also a corresponding private key used to decrypt said message. 37. A method of controlling an electronic mail message as claimed in claim 35, further comprising the steps of causing said viewer applet to request forwarding of said electronic mail message stored on said central mail server to a second recipient computer, encrypting said electronic mail message using a public key of a copy of said viewer applet installed on said second recipient computer, and streaming said electronic message to said second recipient computer. 38. A computer program for handling electronic mail, comprising: a mail origination portion arranged to permit the originator to select a date, time, or event, the occurrence of which will cause said message to expire, said computer program being arranged to attach said date, time, or event to said electronic mail message before sending of the electronic mail message; and a viewer applet portion arranged to decrypt said electronic mail message to permit viewing of said electronic mail message before the occurrence of the date, time, or event selected by said originator of the electronic mail message, and to decrypt a received electronic mail message and to permit viewing of the received electronic mail message before a date, time, or event specified by a sender of the received message, wherein said viewer applet is arranged to prevent decryption and viewing of said encrypted electronic mail message by a recipient after the occurrence of the date, time, or event specified by the sender of the electronic mail message, and wherein: since said electronic mail message can only be viewed using the viewer applet because only the viewer applet can decrypt said electronic mail message, and since the viewer applet prevents decryption and viewing of the electronic mail message after the occurrence of the date, time, or event, said electronic mail system positively prevents all designated incarnations of the electronic mail message from being viewed after the occurrence of the date, time, or event. 39. A computer program as claimed in claim 38, wherein said received electronic mail message is encrypted by a central server and streamed to said viewer applet portion, and wherein said viewer applet portion is arranged to decrypt said message as it is streamed from said central server. 40. A computer program as claimed in claim 38, wherein upon the occurrence of said date, time, or event, said viewer applet portion causes said electronic mail message to be erased. 41. A computer program as claimed in claim 38, wherein said message origination program is arranged to attach a copy of said viewer applet portion to each electronic mail message having a specified expiration date, time, or event. 42. A computer program as claimed in claim 38, wherein said message origination program is further arranged to permit the originator to set handling and processing controls, and wherein said viewer applet portion is arranged to implement handling and processing controls on a received message. 43. A method of distributing applets for viewing electronic files, comprising the steps of: encrypting the electronic files so that they can only be viewed by the viewer applet; transmitting the encrypted electronic file from a computer of an originator of the file to a computer of a recipient designated by the originator; if the computer of the recipient does not have said viewer applet installed thereon, transmitting said viewer applet to the computer of the recipient either before or simultaneously with the transmission of the electronic file, wherein said viewer applet prevents decryption and viewing of said encrypted electronic mail message by said recipient unless message processing limitations specified by the originator of said message are implemented, and wherein: since said electronic mail message can only be viewed using the viewer applet because only the viewer applet can decrypt said electronic mail message, and since the viewer applet prevents decryption and viewing of the electronic mail message after the occurrence of the date, time, or event, said electronic mail system positively prevents all incarnations of the electronic mail message from being viewed unless said processing limitations are implemented. 44. A method as claimed in claim 43, further comprising the step of notifying the recipient that an encrypted electronic file has been received and that the electronic file can only be viewed upon installation of said viewer applet on the computer of the recipient. 45. A method as claimed in claim 44, wherein the step of notifying the recipient is carried out by a central server, said central server also supplying said viewer applet to said computer of the recipient. 46. A method as claimed in claim 43, wherein the viewer applet is transmitted simultaneously with the electronic file from the computer of the originator to the computer of the recipient. 47. A method as claimed in claim 43, wherein the electronic file is an electronic mail message, and the viewer applet is transmitted as an attachment to the electronic mail message.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.