Abstract :
With the growing popularity of the Internet and its penetration into all aspects of life, the intensity of information exchange has increased. There are two kinds of information: (1) useful (urgent for its recipient or owner); (2) useless (for example, daily e-mail, on which recipient was not signed). Thereby, there is a problem of filtering, the division of information by its components. For this purpose, it is possible to offer a system of access codes (AC), for sending messages by e-mail, telephone etc. The access code is an encrypted information unit (including data such as priority, dates etc.), enabling identification of the owner uniquely (at decoding). The owner or user can send the AC to persons from whom he wants to receive messages. The AC can be created for one or several messages and can keep its validity until specially cancelled, or until the validity date expires. For enterprises and organizations using the AC system, it is possible to make a profit both by AC sale and resale and by increasing productivity. The formation and checks of AC purchase schemes are considered. From the standpoint of information protection, the algorithm of AC reception is "mobile", that is independent of algorithm and encryption key (it is possible to use any algorithms and keys for AC reception). The AC system can be introduced practically into all communications
Keywords :
business communication; codes; cryptography; electronic mail; electronic messaging; message authentication; Internet; access codes; e-mail; encrypted information unit; encryption key; information protection; owner identification; purchase schemes; telephone; useful information exchange; useless information exchange; Cryptography; Decoding; Electronic mail; Information filtering; Information filters; Internet; Marketing and sales; Productivity; Protection; Telephony;