System, method and program product for anonymous transfer of messages
First Claim
1. A method for providing confidentiality of a combination of content of a message and a sender of the message, said method comprising the steps of:
- a final agent computer providing to a first agent computer, interposed between said sender and said final agent computer, a first encryption key, said first agent computer but not said final agent computer knowing an identity of said sender;
said final agent computer providing to a second agent computer, interposed between said sender and said final agent computer, a second encryption key, said second agent computer knowing an identity of said sender;
said first agent computer generating a third encryption key and providing to said sender said first encryption key and said third encryption key;
said second agent computer generating a fourth encryption key and providing to said sender said second encryption key and said fourth encryption key;
said first agent computer receiving from said sender a message encrypted with said first, second, third and fourth keys, and in response, decrypting said message based on said third key, and afterwards providing the message decrypted based on said third key to said second agent computer, and in response, said second agent computer decrypting, based on said fourth key, said message provided by said first agent computer; and
providing the message decrypted based on said third and fourth keys to said final agent computer, and in response, said final agent computer decrypting, based on said first and second keys, said message decrypted based on said third and fourth keys.
2 Assignments
0 Petitions
Accused Products
Abstract
A final agent of the message provides a first encryption key to a first agent, interposed between a message sender and the final agent. The first agent but not the final agent knows an identity of the sender. The final agent provides a second encryption key to a second agent, interposed between the sender and the final agent. The second agent knows an identity of the sender. The first agent generates a third encryption key and provides the first encryption key and the third encryption key to the sender. The second agent generates a fourth encryption key and provides the second encryption key and the fourth encryption key to the sender. The first agent receives from the sender a message encrypted with the first, second, third and fourth keys, and in response, decrypts the message based on the third key. Afterwards, the first agent provides the message decrypted based on the third key to the second agent. In response, the second agent decrypts, based on the fourth key, the message provided by the first agent. The message decrypted based on the third and fourth keys is provided to the final agent. In response, the final agent decrypts, based on the first and second keys, the message decrypted based on the third and fourth keys.
-
Citations
12 Claims
-
1. A method for providing confidentiality of a combination of content of a message and a sender of the message, said method comprising the steps of:
-
a final agent computer providing to a first agent computer, interposed between said sender and said final agent computer, a first encryption key, said first agent computer but not said final agent computer knowing an identity of said sender; said final agent computer providing to a second agent computer, interposed between said sender and said final agent computer, a second encryption key, said second agent computer knowing an identity of said sender; said first agent computer generating a third encryption key and providing to said sender said first encryption key and said third encryption key; said second agent computer generating a fourth encryption key and providing to said sender said second encryption key and said fourth encryption key; said first agent computer receiving from said sender a message encrypted with said first, second, third and fourth keys, and in response, decrypting said message based on said third key, and afterwards providing the message decrypted based on said third key to said second agent computer, and in response, said second agent computer decrypting, based on said fourth key, said message provided by said first agent computer; and providing the message decrypted based on said third and fourth keys to said final agent computer, and in response, said final agent computer decrypting, based on said first and second keys, said message decrypted based on said third and fourth keys. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A distributed computer system for providing confidentiality of a combination of content of a message and a sender of the message, said system comprising:
-
a first agent computer including a first CPU, a first memory and a first storage; a second agent computer including a second CPU, a second memory and a second storage; a final agent computer including a third CPU, a third memory and a third storage, said first agent computer interposed between said sender and said final agent computer, said second agent computer interposed between said sender and said final agent computer; program instructions, stored in said third storage of said final agent computer for execution by said third CPU via said third memory, to provide a first encryption key to said first agent computer and a second encryption key to said second agent computer, said first agent computer and said second agent computer knowing and identity of said sender, said final agent computer not knowing an identity of said sender; program instructions, stored in said first storage of said first agent computer for execution by said first CPU via said first memory, to generate a third encryption key and provide to said sender said first encryption key and said third encryption key; program instructions, stored in said second storage of said second agent computer for execution by said second CPU via said second memory, to generate a fourth encryption key and provide to said sender said second encryption key and said fourth encryption key; program instructions, stored in said first storage of said first agent computer for execution by said first CPU via said first memory, to receive from said sender a message encrypted with said first, second, third and fourth keys, and in response, decrypt said message based on said third key;
program instructions, stored in said second storage of said second agent computer for execution by said second CPU via said second memory, to receive from said first agent computer the message decrypted based on said third key and decrypt, based on said fourth key, said message received from said first agent computer; andprogram instructions, stored in said third storage of said final agent computer for execution by said third CPU via said third memory, to receive from said second agent computer the message decrypted based on said third and fourth keys and decrypt, based on said first and second keys, said message received from said second agent computer. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer program product for providing confidentiality of a combination of content of a message and a sender of the message, said computer program product comprising:
-
one or more computer readable storage media; first program instructions, for execution within a final agent computer, to provide to a first agent computer, interposed between said sender and said final agent computer, a first encryption key, said first agent computer but not said final agent computer knowing an identity of said sender; second program instructions, for execution within said final agent computer, to provide to a second agent computer, interposed between said sender and said final agent computer, a second encryption key, said second agent computer knowing an identity of said sender; third program instructions, for execution within said first agent computer, to generate a third encryption key and provide to said sender said first encryption key and said third encryption key; fourth program instructions, for execution within said second agent computer, to generate a fourth encryption key and provide to said sender said second encryption key and said fourth encryption key; fifth program instructions, for execution within said first agent computer, to receive from said sender a message encrypted with said first, second, third and fourth keys, and in response, decrypt said message based on said third key;
sixth program instructions, for execution within said second agent computer, to receive from said first agent computer said message decrypted based on said third key and decrypt, based on said fourth key, said message received from said first agent computer; andseventh program instructions, for execution within said final agent computer, to receive from said second agent computer said message decrypted based on said third and fourth keys and decrypt, based on said first and second keys, said message received from said second agent computer; and
whereinsaid first, second, third, fourth, fifth, sixth and seventh program instructions are stored on said computer readable storage media. - View Dependent Claims (12)
-
Specification