Enabling business transactions in computer networks
First Claim
1. A system for creating a log of a conversation, comprising:
- an arbiter computer; and
a plurality of conversation computers;
the arbiter computer and the conversation computers being interconnected by a computer network;
the arbiter computer being programmed to create a public key pair comprising a new public key and a new private key, to cause the new public key to be transmitted to the conversation computers, to use the new private key to encrypt messages transmitted by at least some of the conversation computers during a conversation among the conversation computers, and to store the encrypted messages in a message log;
the conversation computers being programmed to receive the public key, to transmit messages during the conversation, and to cause messages in the message log to be decrypted using the new public key.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for creating a log of a conversation includes a convener computer and a plurality of conversation computers interconnected by a computer network. The system includes an arbiter computer and a plurality of conversation computers interconnected by a computer network. The arbiter computer creates a public key pair comprising a new public key and a new private key, and causes the new public key to be transmitted to the conversation computers. The conversation computers receive the public key and transmit messages during the conversation. The arbiter computer uses the new private key to encrypt messages transmitted by at least some of the conversation computers during a conversation among the conversation computers, and to store the encrypted messages in a message log. The conversation computers cause messages in the message log to be decrypted using the new public key.
-
Citations
13 Claims
-
1. A system for creating a log of a conversation, comprising:
-
an arbiter computer; and
a plurality of conversation computers;
the arbiter computer and the conversation computers being interconnected by a computer network;
the arbiter computer being programmed to create a public key pair comprising a new public key and a new private key, to cause the new public key to be transmitted to the conversation computers, to use the new private key to encrypt messages transmitted by at least some of the conversation computers during a conversation among the conversation computers, and to store the encrypted messages in a message log;
the conversation computers being programmed to receive the public key, to transmit messages during the conversation, and to cause messages in the message log to be decrypted using the new public key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for creating a log of a conversation in a computer network comprising an arbiter computer and a plurality of conversation computers, comprising the steps of:
-
creating, at the arbiter computer, a public key pair comprising a new public key and a new private key;
causing the new public key to be transmitted to the conversation computers;
transmitting messages during a conversation among the conversation computers;
using the new private key at the arbiter computer to encrypt messages transmitted by at least some of the conversation computers during the conversation storing the encrypted messages in a message log;
causing messages in the message log to be decrypted using the new public key transmitted to at least one of the conversation computers.
-
-
13. A system for creating a log of a conversation, comprising:
-
an arbiter computer; and
a plurality of conversation computers, programmed to transmit to the arbiter computer a public key certificate that identifies a user of the conversation computer and a public key of the user;
the arbiter computer and the conversation computers being interconnected by a computer network;
the arbiter computer being programmed to create a public key pair comprising a new public key and a new private key, to cause the new public key to be transmitted to the conversation computers, to use the new private key to encrypt messages transmitted by at least some of the conversation computers during a conversation among the conversation computers, and to store the encrypted messages in a message log;
the conversation computers being programmed to receive the public key, to transmit messages during the conversation and to cause messages in the message log to be decrypted using the new public key.
-
Specification