Document transfer systems
First Claim
1. A cryptographic method of enabling a consumer to obtain a document from an owner upon a payment, the method comprising the use of a protocol involving the consumer, the owner and a document source, wherein the source requires knowledge of a key in which a said document is encrypted in order to provide the said document, the protocol comprising the following sequential steps:
- (a) the consumer requests a specified document;
(b) the owner provides the source with a first portion of the key;
(c) the consumer provides the owner with the payment; and
(d) the owner provides the source with a second portion of the key, which can combine with said first portion to generate the complete key.
6 Assignments
0 Petitions
Accused Products
Abstract
A document transfer system enabling a consumer to obtain a document from an owner upon payment uses a cryptographic protocol involving the consumer, the owner, a document source, such as a printer, and a mediator, the protocol comprising the following steps:
(a) the consumer requests a document;
(b) the owner provides the source with first and third portions of the key and provides the mediator with a fourth portion of the key, which can combine with said first portion to generate the complete key;
(c) the consumer provides the owner with the payment; and
(d) the owner provides the source with a second portion of the key, which can combine with said first portion to generate the complete key.
A printer 1 for use in the above system comprises a document memory 2 for storing a received encrypted document, a key memory 3 for storing a first cryptographic key portion, a processor 4 for receiving a second cryptographic key portion and combining it with the first key portion to form a complete cryptographic key which is supplied to a decrypting module 5. The encrypted document is supplied to the decrypting module 5 whereupon the document is decrypted and supplied to the consumer.
85 Citations
16 Claims
-
1. A cryptographic method of enabling a consumer to obtain a document from an owner upon a payment, the method comprising the use of a protocol involving the consumer, the owner and a document source, wherein the source requires knowledge of a key in which a said document is encrypted in order to provide the said document, the protocol comprising the following sequential steps:
-
(a) the consumer requests a specified document;
(b) the owner provides the source with a first portion of the key;
(c) the consumer provides the owner with the payment; and
(d) the owner provides the source with a second portion of the key, which can combine with said first portion to generate the complete key. - View Dependent Claims (6, 7, 9, 10, 11, 12, 13)
-
-
2. A cryptographic method of enabling a consumer to obtain a document from an owner upon a payment, the method comprising the use of a protocol involving the consumer, the owner, a document source and a mediator, wherein the source requires knowledge of a key in which a said document is encrypted in order to provide the said document, the protocol comprising the following sequential steps:
-
(a) the consumer requests a specified document;
(b) the owner provides the source with first and third portions of the key and provides the mediator with a fourth portion of the key, which can combine with said third portion to generate the complete key;
(c) the consumer provides the owner with the payment; and
(d) the owner provides the source with a second portion of the key, which can combine with said first portion to generate the complete key. - View Dependent Claims (3, 4, 5)
-
-
8. A document source comprising a memory for storing a first cryptographic key portion, means for receiving a second cryptographic key portion and means for decrypting an encrypted document transmitted thereto in accordance with the encryption key defined by said first and said second key portions.
-
14. A fair exchange method of enabling a consumer to obtain a document from an owner upon a payment, the method comprising the use of a protocol involving the consumer, the owner and a printer, wherein the owner transfers a document to the printer and the consumer transfers a payment to the owner, the printer interacting with the owner and the consumer to ensure that the consumer receives the document only when the payment has been made.
-
15. A cryptographic method of enabling a first party to obtain an item of value from a second party upon receipt by said second party of a second item of value, the method comprising the use of a protocol involving the first party, the second party and a source of said first item of value, wherein the source requires knowledge of a key in order to provide the said first item of value, the protocol comprising the following sequential steps:
-
(a) the first party requests a specified first item of value;
(b) the second party provides the source with a first portion of the key;
(c) the first party provides the second party with the second item of value; and
(d) the second party provides the source with a second portion of the key, which can combine with said first portion to generate the complete key.
-
-
16. A fair exchange method of enabling a contract between a buyer and a seller of a commodity comprising the use of a cryptographic protocol involving the buyer, the seller and a source of said commodity, the source interacting with the buyer and the seller to ensure that the buyer receives the commodity only when a payment has been made by the buyer to the seller.
Specification