Method for secure distribution of documents over electronic networks
First Claim
Patent Images
1. A method of secure data transmission over an unsecured network, comprising:
- (a) linking a first local terminal to a server via the network;
(b) signaling to the server from the first local terminal that a secure transmission of a data document resident on the first local terminal is desired;
(c) downloading an encryption applet resident on the server into random access memory on the first local terminal;
(d) encrypting the data document using the encryption applet to create an encrypted data document on the first local terminal;
(e) uploading the encrypted data document from the first local terminal to the server via the network;
(f) linking a second local terminal to the server via the network;
(g) signaling to the server from the second local terminal that a secure transmission of the encrypted data document on the server is desired;
(h) downloading the encrypted data document from the server to the second local terminal;
(i) downloading a decryption applet resident on the server into random access memory on the second local terminal; and
(j) decrypting the encrypted data document using the decryption applet to recreate the data document on the second local terminal.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to methods for secure distribution of documents over electronic networks. The method may be implemented over public private and/or semi-private electronic networks, including computer networks, intranets, the Internet or combinations thereof. The method includes novel clueing and encryption mechanisms for secure transmission of documents and other electronic data. The method may further include steps for recording the transmitted document in a tangible medium and secure delivery of the document to an intended recipient.
218 Citations
13 Claims
-
1. A method of secure data transmission over an unsecured network, comprising:
-
(a) linking a first local terminal to a server via the network;
(b) signaling to the server from the first local terminal that a secure transmission of a data document resident on the first local terminal is desired;
(c) downloading an encryption applet resident on the server into random access memory on the first local terminal;
(d) encrypting the data document using the encryption applet to create an encrypted data document on the first local terminal;
(e) uploading the encrypted data document from the first local terminal to the server via the network;
(f) linking a second local terminal to the server via the network;
(g) signaling to the server from the second local terminal that a secure transmission of the encrypted data document on the server is desired;
(h) downloading the encrypted data document from the server to the second local terminal;
(i) downloading a decryption applet resident on the server into random access memory on the second local terminal; and
(j) decrypting the encrypted data document using the decryption applet to recreate the data document on the second local terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification