Automated document distribution and transaction verification
First Claim
1. A method of verifying a transaction conducted between a first party and a second party, the method comprising:
- receiving transaction elements of the transaction;
identifying at least a portion of the received transaction elements as selected elements;
encrypting the selected elements based on a private key of the first party to generate an encrypted code;
printing at least a portion of the received transaction elements on a hard copy transaction certificate;
printing the encrypted code on the hard copy transaction certificate;
sending the transaction certificate with the encrypted code to the second party; and
instructing the second party to scan the transaction certificate to convert the encrypted code to electronic form, and to decrypt the encrypted code in electronic form based on a public key of the first party to generate decrypted selected elements, wherein the decrypted selected elements can be used by the second party to prove the transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
This invention relates to the generation and distribution of documents and verification of electronic transactions. In one embodiment, some elements of an electronically conducted transaction are attached to a certificate template. Essential elements of the transaction are encrypted by a first encryption process and attached to the certificate template. The resulting transaction certificate is optionally encrypted by a second encryption process and sent to the other party of the transaction. The other party decrypts the transaction certificate using a first decryption process to review the decrypted certificate. The other party may further decrypt the encrypted essential elements of the transaction certificate using a second decryption process in order to verify the transaction. The decrypted essential elements are used to prove the transaction. A third party can also decrypt the encrypted essential elements to authenticate the transaction.
147 Citations
23 Claims
-
1. A method of verifying a transaction conducted between a first party and a second party, the method comprising:
-
receiving transaction elements of the transaction;
identifying at least a portion of the received transaction elements as selected elements;
encrypting the selected elements based on a private key of the first party to generate an encrypted code;
printing at least a portion of the received transaction elements on a hard copy transaction certificate;
printing the encrypted code on the hard copy transaction certificate;
sending the transaction certificate with the encrypted code to the second party; and
instructing the second party to scan the transaction certificate to convert the encrypted code to electronic form, and to decrypt the encrypted code in electronic form based on a public key of the first party to generate decrypted selected elements, wherein the decrypted selected elements can be used by the second party to prove the transaction. - View Dependent Claims (2, 3)
-
-
4. A method of verifying a transaction conducted between a first party and a second party, the method comprising:
-
receiving transaction elements of the transaction;
identifying at least a portion of the received transaction elements as selected elements;
attaching at least a portion of the received transaction elements to a certificate template;
encrypting the selected elements based on a private key of the first party to generate an encrypted code;
attaching the encrypted code to the certificate template to produce a transaction certificate;
transmitting the transaction certificate with the encrypted code to the second party; and
instructing the second party to decrypt the encrypted code of the transaction certificate based on a public key of the first party to generate decrypted selected elements, wherein the decrypted selected elements can be used by the second party to prove the transaction. - View Dependent Claims (5, 6, 7, 8)
-
-
9. A method of verifying a transaction conducted between a first party and a second party, the method comprising:
-
receiving transaction elements of the transaction;
identifying at least a portion of the received transaction elements as selected elements;
attaching at least a portion of the received transaction elements to a certificate template;
encrypting the selected elements based on a private key of the first party to generate an encrypted code;
attaching the encrypted code to the certificate template to produce a transaction certificate;
retrieving a public key of the second party;
encrypting the transaction certificate based on the retrieved public key of the second party, to generate an encrypted transaction certificate;
transmitting the encrypted transaction certificate to the second party;
instructing the second party to decrypt the transmitted encrypted transaction certificate based on a private key of the second party, to produce a decrypted transaction certificate that includes the encrypted code; and
instructing the second party to decrypt the included encrypted code based on a public key of the first party to generate decrypted selected elements, wherein the decrypted selected elements can be used by the second party to prove the transaction. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of verifying a transaction conducted between a first party and a second party, the method comprising:
-
transmitting transaction elements of the transaction to the first party;
receiving a hard copy transaction certificate that includes an encrypted code;
scanning the received transaction certificate to convert the encrypted code to electronic form;
retrieving a public key of the first party; and
decrypting the converted encrypted code based on the retrieved public key of the first party to generate decrypted proof elements, wherein the decrypted proof elements are used to prove the transaction.
-
-
15. A method of verifying a transaction conducted between a first party and a second party, the method comprising:
-
transmitting transaction elements of the transaction to the first party;
receiving a transaction certificate that includes an encrypted code;
retrieving a public key of the first party; and
decrypting the included encrypted code based on the retrieved public key of the first party to generate decrypted proof elements, wherein the decrypted proof elements are used to prove the transaction.
-
-
16. A method of verifying a transaction conducted between a first party and a second party, the method comprising:
-
making a public key of the second party available to the first party;
transmitting transaction elements of the transaction to the first party;
receiving an encrypted transaction certificate;
decrypting the received encrypted transaction certificate based on a private key of the second party so as to generate a transaction certificate with an encrypted code;
retrieving a public key of the first party; and
decrypting the encrypted code based on the retrieved public key of the first party to generate decrypted proof elements, wherein the decrypted proof elements are used to prove the transaction.
-
-
17. A method of a third party authenticating a transaction conducted between a first party and a second party, the method comprising:
-
receiving a hard copy transaction certificate with an encrypted code;
scanning the received transaction certificate to convert the encrypted code into electronic form;
retrieving a public key of the first party;
decrypting the converted encrypted code based on the retrieved public key of the first party to generate decrypted proof elements; and
declaring the transaction including the decrypted proof elements as authenticated if the decrypting is successful.
-
-
18. A method of a third party authenticating a transaction conducted between a first party and a second party, the method comprising:
-
receiving a transaction certificate with an encrypted code;
retrieving a public key of the first party;
decrypting the encrypted code based on the retrieved public key of the first party to generate decrypted proof elements; and
declaring the transaction including the decrypted proof elements as authenticated if the decrypting is successful.
-
-
19. A method of a third party authenticating a transaction conducted between a first party and a second party, the method comprising:
-
receiving an encrypted transaction certificate;
decrypting the received encrypted transaction certificate based on a private key of the third party so as to generate a transaction certificate with an encrypted code;
retrieving a public key of the first party;
decrypting the encrypted code based on the retrieved public key of the first party to generate decrypted proof elements; and
declaring the transaction including the decrypted proof elements as authenticated if the decrypting is successful.
-
-
20. A computing device for verifying a transaction conducted between a first party and a second party, the device comprising:
-
a receiving module configured to receive transaction elements of the transaction from the second party;
an attachment module configured to attach at least a portion of the received transaction elements to a certificate template;
a first encryption module configured to identify at least a portion of the received transaction elements as selected elements, to encrypt the selected elements based on a private key of the first party to generate an encrypted code, and to attach the encrypted code to the certificate template to produce a transaction certificate; and
a transmission module configured to transmit the transaction certificate from the first party to the second party, wherein the encrypted code attached to the transaction certificate can be decrypted by the second party to prove the transaction.
-
-
21. A computing device for verifying a transaction conducted between a first party and a second party, the device comprising:
-
a receiving module configured to receive transaction elements of the transaction from the second party;
a first encryption module configured to identify at least a portion of the received transaction elements as selected elements, to encrypt the selected elements based on a private key of the first party to generate an encrypted code, and to attach the encrypted code and at least a portion of the received transaction elements to a transaction certificate;
a second encryption module configured to encrypt the transaction certificate based on a public key of the second party to generate an encrypted transaction certificate; and
a transmission module configured to transmit the encrypted transaction certificate from the first party to the second party, wherein the encrypted transaction certificate can be decrypted by the second party based on a private key of the second party to generate a decrypted transaction certificate with the encrypted code, wherein the encrypted code can be decrypted based on a public key of the first party to generate decrypted selected elements, and wherein the decrypted selected elements can be used to prove the transaction.
-
-
22. A computing device for verifying a transaction conducted between a first party and a second party, the device comprising:
-
a submitting module configured to submit transaction elements of the transaction from the second party to the first party;
a receiving module configured to receive a transaction certificate including an encrypted code from the first party to the second party; and
a first decryption module configured to decrypt the encrypted code to generate decrypted proof elements, based on a public key of the first party, wherein the decrypted proof elements are used to prove the transaction.
-
-
23. A computing device for verifying a transaction conducted between a first party and a second party, the device comprising:
-
a submitting module configured to submit transaction elements of the transaction from the second party to the first party;
a receiving module configured to receive an encrypted transaction certificate from the first party to the second party;
a first decryption module configured to decrypt the received encrypted transaction certificate, based on a private key of the second party, to generate an decrypted transaction certificate with an encrypted code; and
a second decryption module configured to decrypt the encrypted code based on a public key of the first party to generate decrypted proof elements, wherein the decrypted proof elements are used to prove the transaction.
-
Specification