System and method for secure three-party communications
DCFirst Claim
1. A method for processing information, comprising the steps of:
- receiving information to be processed;
defining a cryptographic comprehension function for the information, adapted for making at least a portion of the information incomprehensible;
receiving asymmetric cryptographic key information, comprising at least asymmetric encryption key information and asymmetric decryption key information;
negotiating a new cryptographic comprehension function between two parties to a communication using an intermediary;
processing the information to invert the cryptographic comprehension function and impose the new cryptographic comprehension function in an integral process, in dependence on at least the asymmetric cryptographic key information, without providing the intermediary with sufficient asymmetric cryptographic key information to decrypt the processed information; and
outputting processed information,wherein the ability of the asymmetric decryption key information to decrypt the processed information changes dynamically.
7 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system and method for communicating information between a first party and a second party, comprising identifying desired information, negotiating, through an intermediary, a comprehension function for obscuring at least a portion of the information communicated between the first party and the second party, communicating the encrypted information to the second party, and decrypting the encrypted information using the negotiated comprehension function. Preferably, the intermediary does not itself possess sufficient information to decrypt the encrypted information, thus allowing use of an “untrusted” intermediary. The comprehension function may be dynamic with respect to its response to the negotiated comprehension function, and thus permit limitations on the use of the information by the second party. For example, the decryption of the encrypted information may be time limited.
-
Citations
25 Claims
-
1. A method for processing information, comprising the steps of:
receiving information to be processed; defining a cryptographic comprehension function for the information, adapted for making at least a portion of the information incomprehensible; receiving asymmetric cryptographic key information, comprising at least asymmetric encryption key information and asymmetric decryption key information; negotiating a new cryptographic comprehension function between two parties to a communication using an intermediary; processing the information to invert the cryptographic comprehension function and impose the new cryptographic comprehension function in an integral process, in dependence on at least the asymmetric cryptographic key information, without providing the intermediary with sufficient asymmetric cryptographic key information to decrypt the processed information; and outputting processed information, wherein the ability of the asymmetric decryption key information to decrypt the processed information changes dynamically. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
16. A method for communicating information between a first party and a second party, comprising the steps of:
-
receiving, by an intermediary, an identifier of desired information, an authentication of the first party, and accounting information for a transaction involving the information, from the first party; generating, by the intermediary, a transcoding key for converting an encrypted file at the second party to a new encryption formation, having as components a decryption key for the encrypted file and a new encryption key; receiving, by the first party, the encrypted file having the new encryption format; and decrypting the encrypted file having the new encryption format with a decryption key associated with the transcoding key, wherein at least one of; an ability to decrypt the encrypted file having the new encryption format with the decryption key is sensitive to a dynamic parameter; and the encrypted content does not pass through the intermediary, and the intermediary does not possess sufficient information for decrypting the encrypted file having the new encryption format. - View Dependent Claims (17, 18, 19)
-
-
20. A method for processing information, comprising the steps of:
-
storing a record in a first encrypted format; receiving a transaction request for the record from a requestor; financially accounting for a transaction involving the record; securely negotiating between the requestor and an intermediary, a decryption key for the record, said decryption key being different than an associated decryption key for said record in said first encrypted format; converting the record to a second encrypted format, without being represented in an unencrypted state during transition from the first encrypted format to the second encrypted format, and without providing sufficient information at the site of conversion to enable decryption of the record from the first or second encrypted format before, during or after conversion, such that the negotiated decryption key is selectively operative to decrypt the record in the second encrypted format; communicating the record encrypted in the second encrypted format to the requestor, without passing the record through the intermediary; and decrypting the record in the second encrypted format by the requester based on the negotiated decryption key. - View Dependent Claims (21)
-
-
22. A method for processing information, comprising the steps of:
-
defining a cryptographic comprehension function adapted for making at least a portion of an information record incomprehensible, said cryptographic comprehension function having associated asymmetric cryptographic keys; generating, by an intermediary, a transcoding key for converting information encrypted with said cryptographic comprehension function to information encrypted with a new cryptographic comprehension function, having as components a decryption key for the encrypted information and a new encryption key; processing the information encrypted with said cryptographic comprehension function with the transcoding key to invert the cryptographic comprehension function and impose the new cryptographic comprehension function, without revealing the portion of the information record in an intermediate step; providing a first communications channel between a first and second party; providing a second communications channel between each of the first and second parties and the intermediary; communicating, by the intermediary through the second communications channel, with at least one of the first and second parties, information necessary for comprehension of the incomprehensible portion of the information record communicated over the first communications channel, wherein at least one of either;
(a) the intermediary is neither provided with the portion of the information in a comprehensible or incomprehensible form, nor sufficient decryption information for the comprehension of the incomprehensible portion of the information record or (b) the ability of the information necessary for comprehension of the incomprehensible portion of the record changes dynamically; andcommunicating the processed information over the first communications channel between the first and second parties. - View Dependent Claims (23, 24, 25)
-
Specification