Method and system for encrypted message transmission
First Claim
1. A method for the secure transmission of an electronic message from a sender to a recipient, the method comprisinga) receiving an encrypted sender transmission file transmitted from a sender computer station at a management server, wherein the sender transmission file comprises one or more signed hash values, a sender identifier and one or more recipient identifiers;
- wherein the one or more signature values are created from one or more message components associated with the electronic message composed at the sender computer station;
b) decrypting the encrypted sender transmission file;
c) comparing the one or more signed hash values accessible to the management server with one or more second hash values accessible to the recipient computer station;
d) retrieving for each of one or more recipient identifiers, one or more recipient public keys;
e) transmitting to the sender computer station a second transmission file, wherein the second transmission file contains the one or more recipient public keys, the sender identifiers, and the one or more recipient identifiers;
wherein at the sender computer station a first container file is created, and is transmitted to the recipient computer station.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for the secure transmission of an electronic message from a sender to a recipient. The method comprises receiving an encrypted sender transmission file transmitted from a sender computer station at a management server, wherein the sender transmission file comprises one or more signed hash values, a sender identifier and one or more recipient identifiers. The signature values are created from one or more message components associated with the electronic message composed at the sender computer station. The encrypted sender transmission file is decrypted; and a comparision is made with of the one or more signed hash values. For each of the one or more recipient identifiers, one or more recipient public keys; is retrieved.
-
Citations
23 Claims
-
1. A method for the secure transmission of an electronic message from a sender to a recipient, the method comprising
a) receiving an encrypted sender transmission file transmitted from a sender computer station at a management server, wherein the sender transmission file comprises one or more signed hash values, a sender identifier and one or more recipient identifiers; - wherein the one or more signature values are created from one or more message components associated with the electronic message composed at the sender computer station;
b) decrypting the encrypted sender transmission file; c) comparing the one or more signed hash values accessible to the management server with one or more second hash values accessible to the recipient computer station; d) retrieving for each of one or more recipient identifiers, one or more recipient public keys; e) transmitting to the sender computer station a second transmission file, wherein the second transmission file contains the one or more recipient public keys, the sender identifiers, and the one or more recipient identifiers;
wherein at the sender computer station a first container file is created, and is transmitted to the recipient computer station. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
- wherein the one or more signature values are created from one or more message components associated with the electronic message composed at the sender computer station;
-
17. A key management server system for processing encrypted electronic messages originating from a sender computer station destined for a recipient computer station;
- the system comprising;
a memory means comprising a transmission database and subscriber database, wherein the transmission datastore records transmission events, and the subscriber datastore records subscriber information a processor means connected to the memory means, the processor operable to allow the key management server to; i) receive an encrypted sender transmission file transmitted from the sender computer station wherein the sender transmission file comprises one or more first signed hash values, a sender identifier and one or more recipient identifiers;
wherein the one or more hash values are created from one or more message components associated with an electronic message composed at the sender computer station;ii) decrypt the encrypted sender transmission file; iii) retrieve for each of one or more recipient identifiers, one or more recipient public keys stored in the subscriber datastore; and iv) transmit to the sender computer station a second transmission file, wherein the second transmission file contains the one or more recipient public keys, the sender identifier, and the one or more recipient identifiers;
wherein at the sender computer station a first container file is created, and is transmitted to the recipient computer station. - View Dependent Claims (18, 19, 20, 21, 22, 23)
- the system comprising;
Specification