Secure and reliable document delivery using routing lists
1 Assignment
0 Petitions
Accused Products
Abstract
An operations center (OC) (200) acts as an intermediary for securely and reliably transmitting a document (3) from a sender (100) to a next recipient (300) on a routing list. The OC (200) identifies (464) a recipient (300) from the next stage of the routing list and provides either the recipient'"'"'s public key (404) or an escrow encryption key (406). The OC (200) optionally can authenticate the sender (100) and/or the recipient (300), thus increasing security.
-
Citations
62 Claims
-
1-57. -57. (canceled)
-
58. A method for facilitating a secure delivery of a document over a network from a sender to a next stage on a routing list, the method comprising the steps of:
-
receiving an indication that a sender desires to deliver a document to a next stage on a routing list for the document;
identifying a recipient from the next stage of the routing list;
sending an inquiry to a public key database to determine whether the recipient has a public key;
receiving a response to said inquiry, said response selected from the group of said recipient having a public key in said database and said recipient not having a public key in said database;
if said response is said recipient having a public key in said public key database, completing the steps of;
(a) retrieving said public key from said public key database and (b) setting a message encryption key for encrypting the document equal to said public key;
(c) encrypting the document prior to sending said document using the message encryption key;
if said response is said recipient not having a public key in said public key database, completing the steps of;
(a) providing an escrow encryption key not equal to the recipient'"'"'s public key and not equal to the sender'"'"'s private key, wherein an escrow unencryption key for unlocking said escrow encryption key is not made available to said recipient and (b) encrypting the document using the generated escrow encryption key, and storing the escrow key encrypted document;
(c) notifying the addressee of the package stored in escrow; and
(d) only in response to receiving an acknowledgement from the recipient, unencrypting the escrow encryption key encrypted document using an escrow unencryption key prior to sending said document using the escrow encryption key, wherein the escrow encryption key is not provided to the recipient - View Dependent Claims (59, 60, 61, 62)
-
Specification