Simplified addressing for private communications
First Claim
1. A computer-implemented method for securely transmitting an information package from a sender to an addressee via a network, the method comprising the steps of:
- searching at least one database to determine whether the addressee has a public key in order to determine the type of encryption to be performed on the package;
upon a determination that the addressee does have a public key, encrypting the package with the addressee'"'"'s public key and not encrypting the package with an escrow encryption key;
only upon a determination that the addressee does not have a public key, selectively encrypting the package with the escrow encryption key;
storing the escrow key encrypted package in escrow for the addressee prior to receiving a public key for the addressee;
notifying the addressee of the package stored in escrow; and
in response to receiving an acknowledgement from the addressee;
issuing new public and private keys to the addressee, where said new public key is not equal to said escrow encryption key; and
in response to subsequently verified authentication of the addressee;
transmitting the package to the addressee via the network.
6 Assignments
0 Petitions
Accused Products
Abstract
A system for securely transmitting an information package (10) to an addressee via a network (108) includes a directory interface (110) adapted to check a directory (112) to determine whether the addressee has a public key; an escrow key manager (116), coupled to the directory interface (110), adapted to provide an escrow encryption key for encrypting the package (10); a encryption module (114), coupled to the escrow key manager (116), adapted to encrypt the package (10) with the escrow encryption key; a computer-readable medium (118), coupled to the encryption module (114), adapted to store the package (10) in escrow for the addressee; a notification module (120), coupled to the computer-readable medium (118), adapted to send a notification to the addressee via the network (108); a key registration module (124), coupled to the notification module (120), adapted to issue, in response to the addressee acknowledging the notification, new public and private keys to the addressee; and a transmission module (122), coupled to the key registration module (124) and to the computer-readable medium (118), adapted to transmit the package (10) to the addressee via the network (108).
-
Citations
25 Claims
-
1. A computer-implemented method for securely transmitting an information package from a sender to an addressee via a network, the method comprising the steps of:
-
searching at least one database to determine whether the addressee has a public key in order to determine the type of encryption to be performed on the package; upon a determination that the addressee does have a public key, encrypting the package with the addressee'"'"'s public key and not encrypting the package with an escrow encryption key; only upon a determination that the addressee does not have a public key, selectively encrypting the package with the escrow encryption key; storing the escrow key encrypted package in escrow for the addressee prior to receiving a public key for the addressee; notifying the addressee of the package stored in escrow; and in response to receiving an acknowledgement from the addressee; issuing new public and private keys to the addressee, where said new public key is not equal to said escrow encryption key; and in response to subsequently verified authentication of the addressee; transmitting the package to the addressee via the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 17, 18)
-
-
11. A computer implemented method for securely transmitting an information package to an addressee via a network, the method comprising the steps of:
-
determining whether to apply escrow encryption to a file by checking at least one electronic directory to determine whether the addressee has a public key; and only in response to a determination that the addressee has a public key, encrypting the package using the addressee'"'"'s new public key and transmitting the addressee'"'"'s new public key encrypted package to the addressee via the network without storing said package in escrow; and only in response to a determination that the addressee does not have a public key; encrypting the package with an escrow encryption key, storing the escrow key encrypted package in escrow for the addressee; notifying the addressee of the package in escrow; and in response to receiving an acknowledgement from the addressee; issuing new public and private keys to the addressee; decrypting the package with an escrow decryption key; re-encrypting the package using the addressee'"'"'s new public key; and transmitting the addressee'"'"'s new public key encrypted package to the addressee via the network, wherein said addressee'"'"'s new public key is not identical to said escrow encryption key. - View Dependent Claims (12, 13, 14, 15)
-
-
16. In a computer-readable medium, a computer program product for securely transmitting an information package to an addressee via a network, the computer-readable medium comprising program code adapted to perform the steps of:
-
determining whether the addressee has a public key; only in response to a determination that the addressee does have a public key, encrypting the package with the addressee'"'"'s public key and transmitting the addressee'"'"'s public key encrypted package to the addressee; only in response to a determination that the addressee does not have a public key; encrypting the package with an escrow encryption key; transmitting the escrow key encrypted file to an escrow storage area and storing the encrypted package in escrow for the addressee; notifying the addressee of the package in escrow; and in response to receiving an acknowledgement from the addressee; transmitting a new public and private keys generation module to the addressee; issuing new public and private keys at addressee'"'"'s location, where said new public key is not identical to the escrow encryption key; contingent upon authentication of the addressee based on a message sent by addressee subsequent in time to the acknowledgement received from the addressee, transmitting the package to the addressee via the network; and wherein the package is encrypted by at least the escrow key or the addressee'"'"'s public key during each transmission of the information package across the network until the package is received by the addressee.
-
-
19. A computer-implemented method for securely transmitting an information package from a sender to an addressee via a network, the method comprising the steps of:
-
a sender on a first computer addressing an information package to an addressee; checking at least one directory to determine whether the addressee has a public key; only in response to a determination that the addressee has a public key, encrypting the package with the addressee'"'"'s public key and transmitting the addressee'"'"'s public key encrypted package to said addressee without waiting for an acknowledgement from the addressee; only in response to a determination that the addressee does not have a public key; encrypting the package with an escrow encryption key; transmitting the escrow key encrypted package through the network to an escrow storage area remote from said first computer; storing the escrow encrypted package in escrow in said escrow storage area for the addressee prior to receiving a public key for the addressee; notifying the addressee of the package stored in escrow; and in response to receiving an acknowledgement from the addressee; issuing new public and private keys to the addressee; and in response to subsequently verified authentication of the addressee; transmitting the encrypted information package to the addressee via the network.
-
-
20. A computer-implemented method for securely transmitting an information package from a sender to an addressee via a network, the method comprising the steps of:
-
a sender on a first computer addressing an information package to an addressee; checking at least one electronic directory to determine whether the addressee has a public key; in response to a determination that the addressee has a public key, encrypting the package with the addressee'"'"'s public key and transmitting the addressee'"'"'s public key encrypted package to said addressee; only in response to a determination that the addressee does not have a public key; encrypting the package with an escrow encryption key and subsequently transmitting the escrow key encrypted package through the network to an escrow storage area on a network computer remote from said first computer; storing the escrow encrypted package in escrow in said escrow storage area for the addressee prior to receiving a public key for the addressee; notifying the addressee of the package stored in escrow; and in response to receiving an acknowledgement from the addressee; issuing new public and private keys to the addressee; and in response to subsequently verified authentication of the addressee; transmitting the encrypted information package to the addressee via the network. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification