Simultaneous electronic transactions with visible trusted parties
DCFirst Claim
1. A method of transmitting a message using a trusted party, comprising the steps of:
- (a) a sender causing the trusted party to be provided with a version of the message that is encrypted in a key that is not available to the trusted party, and causing the trusted party to receive information identifying the sender and information identifying a recipient;
(b) the trusted party using the information identifying the recipient to cause information to be provided to the recipient that allows the recipient to retrieve the message and identify the sender; and
(c) the trusted party causing a receipt for the message to be provided to the sender.
7 Assignments
Litigations
0 Petitions
Reexamination
Accused Products
Abstract
A number of electronic communications methods are described involving a first and a second party (i.e., sender and recipient), with assistance from at least a trusted party, enabling electronic transactions in which the first party has a message for the second party. The first party, the second party and the trusted party undertake an exchange of transmissions, such that if all transmissions reach their destinations the second party only receives the message if the first party receives at least one receipt. Preferably, the identity of the first party is temporarily withheld from the second party during the transaction. At least one receipt received to the first party enables the first party to prove the content of the message received by the second party.
-
Citations
35 Claims
-
1. A method of transmitting a message using a trusted party, comprising the steps of:
-
(a) a sender causing the trusted party to be provided with a version of the message that is encrypted in a key that is not available to the trusted party, and causing the trusted party to receive information identifying the sender and information identifying a recipient; (b) the trusted party using the information identifying the recipient to cause information to be provided to the recipient that allows the recipient to retrieve the message and identify the sender; and (c) the trusted party causing a receipt for the message to be provided to the sender. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of transmitting a message using a trusted party, comprising the steps of:
-
(a) a sender causing the trusted party to be provided with an encrypted version of the message, information identifying the sender, and information identifying a recipient; (b) the trusted party using the information identifying the recipient to cause information to be provided to the recipient that allows the recipient to retrieve the message and identify the sender even if the recipient does not receive the message, or any version thereof, directly from the sender; and (c) the trusted party causing a receipt for the message to be provided to the sender. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of transmitting a message using a trusted party, comprising the steps of:
-
(a) a sender causing the trusted party to be provided with a first encrypted version of the message; (b) the trusted party causing a second encrypted version of the message to be provided to the recipient, wherein the second encrypted version of the message commits the contents of the message but is unintelligible to the recipient; and (c) in response to the recipient providing an acknowledgement for receiving the second encrypted version of the message, the trusted party causing information to be provided to the recipient that allows the recipient to retrieve the message and identify the sender and the trusted party causing the sender to receive a receipt for the message. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 35)
-
-
34. A method according to clam 31, wherein the receipt includes the alternative receipt.
Specification