System and method for constraint resolution
First Claim
1. A method of determining the compatibility of respective information associated with at least two parties, the method comprising:
- a first and second party each expressing their respective information in an agreed format;
processing the information according to a two-phase double-encryption process, in which the first party encrypts their information under a personalised first-phase procedure and sends the results to the second party and the second party encrypts their information under a personalised first-phase procedure and sends the results to the first party, the second party encrypting the encrypted information received from the first party under a personalised second-phase procedure to produce a double-encrypted result and the first party encrypting the encrypted information received from the second party under a personalised second-phase procedure to produce a double-encrypted result, the first-phase and second-phase procedures being chosen such that a given element of information will always yield the same unique double-encrypted result regardless of which party it originates from; and
comparing each party'"'"'s double-encrypted information to determine the compatibility of the information of each party.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of determining the compatibility of respective information associated with at least two parties is described. The method comprises: a first and second party each expressing their respective information in an agreed format; processing the information according to a two-phase double-encryption process, in which the first party encrypts their information under a personalised first-phase procedure and sends the results to the second party and the second party encrypts their information under a personalised first-phase procedure and sends the results to the first party, the second party encrypting the encrypted information received from the first party under a personalised second-phase procedure to produce a double-encrypted result and the first party encrypting the encrypted information received from the second party under a personalised second-phase procedure to produce a double-encrypted result, the first- and second-phase procedures being chosen such that a given element of information will always yield the same unique double-encrypted result regardless of which party it originates from; and comparing each party'"'"'s double-encrypted information to determine the compatibility of the information of each party.
11 Citations
29 Claims
-
1. A method of determining the compatibility of respective information associated with at least two parties, the method comprising:
-
a first and second party each expressing their respective information in an agreed format;
processing the information according to a two-phase double-encryption process, in which the first party encrypts their information under a personalised first-phase procedure and sends the results to the second party and the second party encrypts their information under a personalised first-phase procedure and sends the results to the first party, the second party encrypting the encrypted information received from the first party under a personalised second-phase procedure to produce a double-encrypted result and the first party encrypting the encrypted information received from the second party under a personalised second-phase procedure to produce a double-encrypted result, the first-phase and second-phase procedures being chosen such that a given element of information will always yield the same unique double-encrypted result regardless of which party it originates from; and
comparing each party'"'"'s double-encrypted information to determine the compatibility of the information of each party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 28)
-
-
14. A method of providing information of at least two parties suitable for comparison in a secure way, the method comprising:
-
a first and second party each expressing their respective information in an agreed format;
processing the information according to a two-phase double-encryption process, in which the first party encrypts their information under a personalised first-phase procedure and sends the results to the second party and the second party encrypts their information under a personalised first-phase procedure and sends the results to the first party, the second party encrypting the encrypted information received from the first party under a personalised second-phase procedure to produce a double-encrypted result and the first party encrypting the encrypted information received from the second party under a personalised second-phase procedure to produce a double-encrypted result, the first-phase and second-phase procedures being chosen such that a given element of information will always yield the same unique double-encrypted result regardless of which party it originates from.
-
-
15. A method of processing information into a form suitable for establishing the compatibility of the information with respect to at least two parties, the method comprising:
-
a first party expressing its information in a format agreed with a second party;
the first party processing information according to a two-step double-encryption process comprising;
encrypting its information under a personalised first-step procedure and sending the results to the second party for encryption by a second-step encryption process personalised to the second party and complementary to the first-step encryption process of the first party, to yield a double encrypted result;
receiving encrypted information from the second party;
encrypting the received encrypted information under a personalised second-step procedure to produce a double-encrypted result, wherein the received encrypted information has been encrypted using a first-step encryption process personal to the second party and complementary to the second-step encryption process of the first party;
the first-step and second-step encryption procedures being chosen such that a given element of information will always yield the same unique double-encrypted result regardless of whether it is processed using the first-step or second-step encryption process of the first party. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
29. A system or method substantially as described herein with reference to any of the accompanying drawings.
Specification