Systems and methods for conducting transactions and communications using a trusted third party
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver'"'"'s possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party. In other embodiments, the sender encrypts this hash using a key associated with the third party and sends the encrypted hash to the receiver, who then forwards it to the third party.
85 Citations
41 Claims
-
1-21. -21. (canceled)
-
22. A method for providing a first party with data content, the method comprising:
-
receiving the data content from a second party, wherein the data content has been encrypted by a third party;
computing a first hash of at least a portion of the received encrypted data content;
sending the first hash to a fourth party, wherein the fourth party is operable to compare at least a portion of the first hash to at least a portion of a second hash;
receiving a decryption key from the fourth party; and
decrypting at least the portion of the received encrypted data content with the decryption key. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification