System and method for verifying delivery and integrity of electronic messages
First Claim
1. A method of providing to a third party information provided by a first party relating to a second party, the steps at a control server of:
- receiving through the internet from the first party the information relating to the second party, transmitting to the second party through the internet the information relating to the second party and a verification of the e-mailing, receiving through the internet from the second party the information relating to the second party and the verification of the information and a request for the control server to send the information to the third party, authenticating at the control server the information received from the second party, and transmitting to the third party the authenticated second party information received from the second party.
2 Assignments
0 Petitions
Accused Products
Abstract
A first party (e.g. educational testing service) provides through the internet to a control server information (e.g. test server) relating to a second party (e.g. a student taking tests prepared by the service). The server provides and may store a verification (e.g. an encrypted digital signature) of, but does not store, the second party information. The server transmits the information and the verification through the internet to the second party. The second party transmits to the server through the internet the information and the verification with a request to transmit the information to a designated third party (e.g. a college or university to which the student has applied for admission). The server authenticates the information through verification comparisons (or through comparison of the information with the reconstruction and decryption of the verification) and transmits the information, authenticated by the server and the testing service, to the third party.
167 Citations
33 Claims
-
1. A method of providing to a third party information provided by a first party relating to a second party, the steps at a control server of:
-
receiving through the internet from the first party the information relating to the second party, transmitting to the second party through the internet the information relating to the second party and a verification of the e-mailing, receiving through the internet from the second party the information relating to the second party and the verification of the information and a request for the control server to send the information to the third party, authenticating at the control server the information received from the second party, and transmitting to the third party the authenticated second party information received from the second party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 10, 14, 15)
-
-
9. A method of providing to a third party information from a first party relating to a second party, the steps at a control server of:
-
receiving through the internet from the first party the information relating to the second party, transmitting to the second party through the internet the information relating to the second party and a verification of the information and of the sending of the information, receiving from the second party the information relating to the second party and the verification of the information and a request to transmit the information to the third party, and authenticating the information received from the second party, and transmitting to the third party the information relating to the second party after the information has been authenticated by the second party. - View Dependent Claims (11, 12, 13, 16, 17)
-
-
18. A method of providing to a third party information from a first party relating to a second party, the steps of:
-
providing information of the first party relating to the second party, transmitting from the first party to the control server the information relating to the second party, transmitting from the control server to the second party the information relating to the second party and a verification of the information and the sending of the information, transmitting the second party information, and a verification of the second party information, from the control server to the second party, transmitting from the second party to the control server the verification and the information relating to the second party and a request to submit the second party information to the third party, authenticating at the control server the information requested by the second party to be transmitted to the third party, and transmitting the second party information from the control server to the third party. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 32)
-
-
28. A method of providing to a third party information from a first party relating to a second party, including the steps of:
-
transmitting the second party information from the first party to a control server, transmitting the second party information, and a verification of the second party information, from the control server to the second party, receiving at the control server from the second party the second party information and the verification and a request for the control server to send the second party information to the third party, authenticating at the control server the second party information sent by the control server to the second party and the verification transmitted by the second party to the control server, and thereafter sending the second party information from the control server to the third party. - View Dependent Claims (29, 30, 31)
-
-
33. A method of providing to a third party information provided by a first party relating to a second party, the steps at a control server of:
-
receiving through the internet from the first party the information relating to the second party, providing through the internet to the second party the information relating to the second party and a verification of the information to the second party, storing at the control server the verification transmitted by the control server to the second party, receiving from the second party through the internet the information relating to the second party and the verification of the information and a request from the second party to send to the first party the information relating to the second party, and authenticating the request of the second party to send to the first party the information relating to the second party by operating the verification stored by the control server and the verification transmitted by the second party to the control server.
-
Specification