System for, and method of, authenticating an electronic message to a recipient
First Claim
1. A method of transmitting a message from a sender to a recipient through a server displaced from the recipient, including the steps at the server of:
- receiving the message at the server from the sender, transmitting from the server to the recipient the message and an attachment including the identity and address of the recipient and the identity of the sender and the time of the transmittal, receiving the message and the attachment at the server from the recipient, providing digital signatures of the message and the attachment at the server, and authenticating to the recipient the message and the attachment at the server on the basis of the information received by the recipient from the server and on the basis of the digital signatures provided by the server
4 Assignments
0 Petitions
Accused Products
Abstract
A server provides a message from a sender to a recipient and an attachment including the sender'"'"'s identity, the recipient'"'"'s identity and address, and the time of transmission from the server to the recipient.
Upon reception, the recipient transmits to the server the information sent to the recipient from the server. To authenticate the message and the transmission to the recipient, the server produces digital signatures (hashed encryption) of the message and the attachment. The server then produces digital fingerprints of the digital signatures and digital fingerprints (hashed) of the message and the attachment. The server provides the authentication when the two (2) digital fingerprints relating to the message are identical and when the two (2) digital fingerprints relating to the attachment are identical. The authentication may be provided in a similar manner for third parties associated with the recipient. The recipient replies to the message through the server and the server authenticates the reply.
-
Citations
47 Claims
-
1. A method of transmitting a message from a sender to a recipient through a server displaced from the recipient, including the steps at the server of:
-
receiving the message at the server from the sender, transmitting from the server to the recipient the message and an attachment including the identity and address of the recipient and the identity of the sender and the time of the transmittal, receiving the message and the attachment at the server from the recipient, providing digital signatures of the message and the attachment at the server, and authenticating to the recipient the message and the attachment at the server on the basis of the information received by the recipient from the server and on the basis of the digital signatures provided by the server - View Dependent Claims (2, 3, 4, 5, 6, 7, 10, 11, 12, 13, 19, 20)
-
-
8. In a method of transmitting a message from a sender to a recipient through a server displaced from the recipient, the steps at the server of:
-
receiving the message from the sender, transmitting the message from the server to the recipient, receiving the message at the server from the recipient, providing at the server a digital signature of the message, providing digital fingerprints of the message and the digital signature of the message, and comparing the digital fingerprints at the server to determine the authenticity of the message, - View Dependent Claims (9, 21, 22)
-
-
14. A method of transmitting a message from a sender to a recipient through a server displaced from the recipient, the steps at the server of:
-
receiving the message at the server from the sender, providing at the server, at the same time as the reception of the message at the server, an attachment including the identity of the sender and the identity and address of the recipient and the time of transmission of the message, providing digital signatures of the message and the attachment at the server, sending the message and the attachment to the recipient, receiving from the recipient the message and the attachment, and determining the authenticity of the message and the attachment at the server from the message and the attachment at the server and the digital signatures at the server of the message and the attachment, - View Dependent Claims (15, 16, 17, 18, 23)
-
-
24. In a method of transmitting a message from a sender to a recipient through a server displaced from the recipient, the steps at the server of:
-
receiving the message from the recipient at a web site providing at the server for an indication of the authenticity of the message, providing a compressed encrypted version of the message where the compression is a particular compression and the encryption is a particular encryption, decompressing the message in accordance with the particular compression to provide a first digital fingerprint of the message, decrypting the compressed encrypted version of the message in accordance with the particular encryption to provide a second digital fingerprint of the message, and comparing the first and second digital fingerprints of the message to determine the authenticity of the message.
-
-
26. In a method as set forth in claim 25, the steps at the server of:
-
receiving the message through the internet from the recipient, and transmitting the results of the comparison of the first and second digital fingerprints to the recipient through the internet.
-
-
27. In a method of transmitting a message from a sender to a recipient through a server displaced from the recipient, the steps at the server of:
-
receiving the message from the recipient at a website providing in the server for an indication of the authenticity of the message, providing a compressed encrypted version of the message where the compression is a particular compression and the encryption is a particular encryption, receiving an attachment from the recipient at the website where the reception of the attachment is at the same time as the reception of the message, providing a compressed encrypted version of the message where the compression is the particular compression and the encryption is the particular encryption, decompressing the message and the attachment in accordance with the particular compression to provide first digital fingerprints of the message and the attachment, decrypting the compressed encrypted versions of the message and the attachment in accordance with the particular encryption to provide second digital fingerprints of the message and the attachment, and comparing the first and second digital fingerprints of the message, and the first and second digital fingerprints of the attachment, to determine the authenticity of the message and of the attachment. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. In a method of transmitting a message from a sender through a server displaced from the recipient, the steps at the server of:
-
receiving the message and an attachment from the recipient at a website providing at the server for an indication of the authenticity of the message, providing at the server for a compressed encrypted version of the combination of the message and the attachment where the compression is a particular compression and the encryption is a particular compression, decompressing the compressed encrypted version of the combination of the message and the attachment in accordance with the particular compression to provide a first digital fingerprint of the combination of the message and the attachment, decrypting the compressed encrypted version of the combination of the message and the attachment in accordance with the particular encryption to provide a second digital fingerprint of the combination of the message and the attachment, and comparing the first and second digital fingerprints to determine the authenticity of the message and the attachment. - View Dependent Claims (34, 35, 36, 37)
-
-
38. In a method of transmitting a message and an attachment from a sender to a recipient through a server displaced from the recipient, including the steps at the server of
identifying the sender, hashing the attachments, stripping the message of the attachments, hashing the identification of the sender, the hashed attachments and the message to form a hashed string, hashing the hashed string, encrypting the hashed string after the hashing of the hashed string, and digitally sealing the encrypted hash of the hashed string.
-
40. In a method of transmitting a message and an attachment from a sender through a server displaced from the recipient, the steps at the server of:
-
identifying the sender, providing the attachment and the message stripped of the attachment, providing a string formed from the identification of the sender, the attachment and the message stripped of the attachment, and hashing the strip. - View Dependent Claims (41, 42)
-
-
43. In a method of authenticating at a recipient a message and an attachment transmitted from a sender to the recipient through a server displaced from the recipient, the steps of:
-
providing at the recipient a string comprising a compressed and encrypted embedded hash of a string including an identification of the sender, the message and a hash of the attachment, decompressing the string, decrypting the decompressed string, decrypting the decompressed string, hashing the string less the hash of the string, comparing the hash produced in the string and the embedded hash, and using the results of the comparison to indicate to the recipient the authenticity of the message and the attachment. - View Dependent Claims (44, 45)
-
-
46. In a method of authenticating at a recipient a message and an attachment transmitted from a sender to the recipient,
providing an attachment, providing at the recipient on encryptment of a hashed string including information relating to the identification of the sender, the attachment and the message stripped of the attachment, decrypting the encrypted hash of the hashed string, decompressing the hash from the hashed string, separating the hash from the string, forming a hash from the information relating to the identification of the sender, the attachment and the message stripped of the attachment, comparing the hash separated from the string and the hash formed from the information in the string, and using the results of the comparison to indicate to the recipient the authenticity of the message and the attachment.
Specification