CONFIDENTIAL MAIL WITH TRACKING AND AUTHENTICATION
First Claim
1. A method of verifying that an electronic communication has been received by an intended recipient comprising:
- (a) creating an message envelope including at least an encrypted message and a confidential mail token;
(b) transmitting the message envelope from a sender to an intended recipient;
(c) processing of at least a portion of the data within the message envelope by the intended recipient, resulting in generating a verification return receipt;
(d) transmitting the verification return receipt from the intended recipient to the sender; and
(e) processing of the verification return receipt by the sender to verify that the message envelope reached the intended recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for confidential electronic communication between a sender workstation and a receiver workstation is provided, whereby privacy is guaranteed for the electronic communications transmitted over the public Internet. The method of confidential communication is equipped with message tracking and message receipt verification. The system for implementing the method includes a sender server that creates a session content encryption key along with a message envelope that includes a content encryption key encrypted message and a confidential mail token. The content encryption key is stored securely inside the sender organization'"'"'s system which transmits the message envelope to an intended recipient. The intended recipient processes the message envelope in order to generate a message receipt verification, which is transmitted to the sender. The message receipt verification is processed by the sender server to verify that the message envelope reached the intended recipient. The message receipt verification, which is comprised of the confidential mail token and unique verification data generated by the intended recipient allows the sender server to verify that the message envelope reached the intended receiver and that the message envelope identified as received is authentic. Following verification that the message transmitted by the sender reached the intended receiver and is authorized, the sender transmits the content encryption key to the intended receiver.
69 Citations
20 Claims
-
1. A method of verifying that an electronic communication has been received by an intended recipient comprising:
-
(a) creating an message envelope including at least an encrypted message and a confidential mail token; (b) transmitting the message envelope from a sender to an intended recipient; (c) processing of at least a portion of the data within the message envelope by the intended recipient, resulting in generating a verification return receipt; (d) transmitting the verification return receipt from the intended recipient to the sender; and (e) processing of the verification return receipt by the sender to verify that the message envelope reached the intended recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for authenticating confidential email communications transmitted from a sender to a receiver, the system comprising:
-
(a) a sender server configured to create and transmit an electronic message envelope including at least an encrypted message and a confidential mail token; (b) a client server configured to process data within the electronic message envelope received and generate a secret identifier that can only be generated if the client server is in possession of the message envelope, the client server being further configured to transmit the secret identifier to the sender server following generation of the secret identifier; wherein the sender server processes the secret identifier transmitted by the client server to verify that the message envelope reached its intended receiver. - View Dependent Claims (16, 17, 20)
-
-
18. A computer-readable medium which stores a set of instructions which when executed performs a method for providing confidential electronic communication with tracking and authentication, the method executed by the set of instructions comprising:
-
(a) creating an message envelope including at least an encrypted message and a confidential mail token; (b) transmitting the message envelope from a sender to an intended receiver, (c) processing of data extracted from the message envelope by the intended receiver and generating a verification return receipt; and (d) transmitting the verification return receipt from the intended receiver to the sender; and (d) processing of the verification return receipt by the sender to verify that the message envelope reached the intended receiver. - View Dependent Claims (19)
-
Specification