Secure electronic transactions using a trusted intermediary with archive and verification request services
First Claim
1. A system for use with a communication network to securely transmit a message thereover from a sender to a recipient, via an intermediary, comprising:
- the sender having first logic, responsive to a message transmit request from a user, to form an encrypted version of the message, including an inner envelope, containing the message and decryptable by the recipient, and an outer envelope, containing the encrypted inner envelope and a unique ID, the outer envelope being decryptable by the intermediary;
second logic, responsive to a verification request from a user, to form a verification request package containing information identifying a desired transaction and to transmit the verification request package to the intermediary;
the intermediary having third logic to receive the encrypted version of the message and to create and to transmit to the recipient a new version of the encrypted version of the message;
fourth logic to receive confirmation results from the recipient;
an archive including a collection of state records, including one for each ID, the state records including data indicative of the status of a transaction associated with the ID;
logic for updating the state records in response to confirmation results;
logic for retrieving state records in response to information identifying a transaction;
fifth logic, responsive to verification request packages and cooperating with the archive, to retrieve state records associated with the desired transaction and to form and send a verification response package to the sender;
the recipient having sixth logic to receive the new version of the encrypted version of the message; and
seventh logic to send a confirmation message, including confirmation results, to the intermediary, the confirmation results indicative of the level of success in decrypting the message.
2 Assignments
0 Petitions
Accused Products
Abstract
Secure electronic transactions using a trusted intermediary with non-repudiation of receipt and contents of message. A system of, and method for, securely transmitting a package from a sender to a recipient, via an intermediary, are described, as is a novel data arrangement, stored in a computer-readable medium. A sender encrypts the message to form an encrypted inner envelope. A waybill is formed that among other things identifies the recipient as the destination and includes information indicating various levels of services desired, e.g., electronic notarization. The waybill and inner envelope are used to form an encrypted outer envelope that is addressed to a trusted intermediary. The intermediary receives the package and decrypts the outer envelope. It is unable to decrypt the inner envelope, due to the keys employed during encryption. The service information is processed, and the package is used to form a second package addressed to the recipient. The recipient decrypts the package and confirms receipt thereof, using a digest of the message. In this way, receipt and opening of the message cannot be properly repudiated by the recipient. An extra level of encryption to form an outer envelope from the intermediary to the recipient may be included, and the various envelopes and confirmation digests may be signed so that the contents and identities may be authenticated.
461 Citations
13 Claims
-
1. A system for use with a communication network to securely transmit a message thereover from a sender to a recipient, via an intermediary, comprising:
-
the sender having first logic, responsive to a message transmit request from a user, to form an encrypted version of the message, including an inner envelope, containing the message and decryptable by the recipient, and an outer envelope, containing the encrypted inner envelope and a unique ID, the outer envelope being decryptable by the intermediary;
second logic, responsive to a verification request from a user, to form a verification request package containing information identifying a desired transaction and to transmit the verification request package to the intermediary;
the intermediary having third logic to receive the encrypted version of the message and to create and to transmit to the recipient a new version of the encrypted version of the message;
fourth logic to receive confirmation results from the recipient;
an archive including a collection of state records, including one for each ID, the state records including data indicative of the status of a transaction associated with the ID;
logic for updating the state records in response to confirmation results;
logic for retrieving state records in response to information identifying a transaction;
fifth logic, responsive to verification request packages and cooperating with the archive, to retrieve state records associated with the desired transaction and to form and send a verification response package to the sender;
the recipient having sixth logic to receive the new version of the encrypted version of the message; and
seventh logic to send a confirmation message, including confirmation results, to the intermediary, the confirmation results indicative of the level of success in decrypting the message. - View Dependent Claims (2, 4, 5)
-
-
3. A system for use with a communication network to securely transmit a message thereover from a sender to a recipient, via an intermediary, comprising:
-
the sender having first logic, responsive to a message transmit request from a user, to form an encrypted version of the message, including an inner envelope, containing the message and decryptable by the recipient, and an outer envelope, containing the encrypted inner envelope and a unique ID, the outer envelope being decryptable by the intermediary; and
second logic, responsive to a verification request from a user, to form a verification request package containing information;
(a) identifying a desired transaction, (b) identifying the identity of the user issuing the verification request, and (c) identifying an account number associated with the user; and
to transmit the verification request package to the intermediary;
the intermediary having third logic to receive the encrypted version of the message and to create and to transmit to the recipient a new version of the encrypted version of the message;
fourth logic to receive confirmation results from the recipient;
an archive including a collection of state records, including one for each ID, the state records including data indicative of the status of a transaction associated with the ID;
logic for updating the state records in response to confirmation results;
logic for retrieving state records in response to information identifying a transaction;
logic to receive user registration requests and to maintain a status for each registered user, the status including states of active and inactive;
logic to receive account number registration requests and to maintain a status for each registered account number, the status including states of active and inactive, and to receive agent registration requests to associate user identities with an account number to act as a registered agent for the account;
fifth logic, responsive to verification request packages and cooperating with the archive, to retrieve state records associated with the desired transaction and to form and send a verification response package to the sender; and
seventh logic to determine whether the user is authorized to receive the verification response package and if not authorized to prevent the sending of the response package;
and wherein the seventh logic determines that the user is authorized if the following are true;
the user is registered as active in the archive;
the account number is registered and active;
the user is one of (i) the user who initiated the message transmit request of the desired transaction, (ii) a recipient of the desired transaction, and (iii) a registered agent for the account number to which the desired transaction was charged;
the recipient having sixth logic to receive the new version of the encrypted version of the message; and
eighth logic to send a confirmation message, including confirmation results, to the intermediary, the confirmation results indicative of the level of success in decrypting the message.
-
-
6. A method of using a communication network to securely transmit a message thereover from a sender to a recipient, via an intermediary, the method comprising the steps of:
-
(a) the sender receiving a message transmit request from a user and forming therefrom an encrypted version of the message, including an inner envelope, containing the message and decryptable by the recipient, and an outer envelope, containing the encrypted inner envelope and a unique ID, the outer envelope being decryptable by the intermediary;
(b) the intermediary receiving the encrypted version of the message and creating therefrom and transmitting to the recipient a new version of the encrypted version of the message;
(c) the recipient receiving the new version of the encrypted version of the message;
(d) the recipient sending a confirmation message, including confirmation results, to the intermediary, the confirmation results indicative of the level of success in decrypting the message;
(e) the intermediary receiving confirmation results from the recipient;
(f) the intermediary maintaining an archive including a collection of state records, including one for each ID, the state records including data indicative of the status of a transaction associated with the ID by updating the state records in response to confirmation results;
(g) the sender receiving a verification request from a user and forming therefrom and transmitting to the intermediary a verification request package containing information identifying a desired transaction;
(h) the intermediary retrieving state records in response to verification request packages and forming from the retrieved state records a verification response package; and
(i) the intermediary transmitting the verification response package to the sender. - View Dependent Claims (7, 9, 10)
(j) the intermediary determining whether the user is authorized to receive the verification response package and if not authorized to prevent step (g) from sending the response package.
-
-
9. The method of claim 6 wherein step (g) forms the verification request package to include an inner envelope, containing the information identifying the desired transaction, and decryptable by the intermediary, and an outer envelope, containing the encrypted inner envelope and information identifying the package as a verification request package, the outer envelope being decryptable by the intermediary.
-
10. The method of claim 6 wherein step (h) forms the verification response package to include an inner envelope, containing information indicating the status of the desired transaction, and decryptable by the sender, and an outer envelope, containing the encrypted inner envelope and information identifying the package as a verification response package, the outer envelope being decryptable by the sender.
-
8. A method of using a communication network to securely transmit a message thereover from a sender to a recipient, via an intermediary the method comprising the steps of:
-
(a) the sender receiving a message transmit request from a user and forming therefrom an encrypted version of the message including an inner envelope, containing the message and decryptable by the recipient, and an outer envelope, containing the encrypted inner envelope and a unique ID, the outer envelope being decryptable by the intermediary;
(b) the intermediary receiving the encrypted version of the message and creating therefrom and transmitting to the recipient a new version of the encrypted version of the message;
(c) the recipient receiving the new version of the encrypted version of the message;
(d) the recipient sending a confirmation message, including confirmation results, to the intermediary, the confirmation results indicative of the level of success in decrypting the message;
(e) the intermediary receiving confirmation results from the recipient;
(f) the intermediary maintaining an archive including a collection of state records, including one for each ID, the state records including data indicative of the status of a transaction associated with the ID by updating the state records in response to confirmation results;
receiving user registration requests and maintaining a status for each registered user, the status including states of active and inactive;
receiving account number registration requests and maintaining a status for each registered account number, the status including states of active and inactive;
receiving agent registration requests to associate user identities with an account number to act as a registered agent for the account;
(g) the sender receiving a verification request from a user and forming therefrom and transmitting to the intermediary a verification request package containing information identifying a desired transaction and including in the verification request package information identifying an identity of a user issuing the verification request and information identifying an account number associated with the user;
(h) the intermediary retrieving state records in response to verification request packages and forming from the retrieved state records a verification response package;
(i) the intermediary transmitting the verification response package to the sender; and
(j) the intermediary determining whether the user is authorized to receive the verification response package and if not authorized to prevent step (g) from sending the response package;
wherein the user is authorized if the following are true;
the user is registered as active in the archive;
the account number is registered and active;
the user is one of (1) the user who initiated the message transmit request of the desired transaction, (2) a recipient of the desired transaction, and (3) a registered agent for the account number to which the desired transaction was charged.
-
-
11. A computer program for use by a sender in a communication network to securely transmit a message thereover from the sender to a recipient, via an intermediary,
first logic, responsive to a message transmit request from a user, to form an encrypted version of the message, including an inner envelope, containing the message and decryptable by the recipient, and an outer envelope, containing the encrypted inner envelope and a unique ID, the outer envelope being decryptable by the intermediary; - and
second logic, responsive to a verification request from a user, to transmit the verification request package to the intermediary, and to form a verification request package containing information (a) identifying a desired transaction (b) identifying the identity of the user issuing the verification request, and (c) identifying an account number associated with the user;
wherein the computer program is contained on a computer-readable medium.
- and
-
12. A computer program for use by an intermediary in a communication network to securely transmit a message thereover from a sender to a recipient, via the intermediary, comprising:
-
first logic to receive an encrypted version of the message and to create and to transmit to the recipient a new version of the encrypted version of the message;
second logic to receive confirmation results from the recipient;
an archive including;
a collection of state records, including one for each ID, the state records including data indicative of the status of a transaction associated with the ID;
logic for updating the state records in response to confirmation results;
logic for retrieving state records in response to information identifying a transaction;
logic to receive user registration requests to maintain a status for each registered user, the status including states of active and inactive, logic to receive account number registration requests and to maintain a status for each registered account number, the status including states of active and inactive, and to receive agent registration requests to associate user identifies with an account number to act as a registered agent for the account;
third logic, responsive to verification request packages and cooperating with the archive, to retrieve state records associated with the desired transaction and to form and send a verification response package to the sender;
fourth logic to determine whether the user is authorized to receive the verification response package and if not authorized to prevent the sending of the response package;
wherein the computer program is contained on a computer-readable medium.
-
-
13. A computer program for use by a recipient in a communication network to securely transmit a message thereover from a sender to the recipient, via an intermediary, comprising:
-
first logic to receive a new version of the encrypted version of the message; and
second logic to send a confirmation message, including confirmation results, to the intermediary, the confirmation results indicative of the level of success in decrypting the message, and to determine that the user is authorized if the following are true;
the user is registered as active in the archive;
the account number is registered and active; and
the user is one of;
(i) the user who initiated the message transmit request of the desired transaction, (ii) a recipient of the desired transaction, and (iii) a registered agent for the account number to which the desired transaction was charged;
wherein the computer pro gram is contained on a computer-readable medium.
-
Specification