System and method for constraint resolution
First Claim
1. A method of determining a compatibility of at least a first party and a second party, each of said parties comprising at least one computer processor, the method comprising:
- sending, with the first party, encrypted constraints enforced by the first party to the second party, each said constraint enforced by the first party having been separately encrypted under a first-phase procedure personalized to the first party;
sending, with the second party, encrypted constraints enforced by the second party, each said constraint enforced by the second party having been separately encrypted under a first-phase procedure personalized to the second party;
separately encrypting, with the second party, each of the encrypted constraints enforced by the first party under a second-phase procedure personalized to the second party to produce a first set of double-encrypted constraints;
separately encrypting, with the first party, each of the encrypted constraints enforced by the second party under a second-phase procedure personalized to the first party to produce a second set of double-encrypted constraints; and
determining whether said first party may establish a communication link with said second party based on a comparison of the first set of double-encrypted constraints with the second set of double-encrypted constraints.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of determining the compatibility of respective information associated with at least two parties is described. The method comprises: a first and second party each expressing their respective information in an agreed format; processing the information according to a two-phase double-encryption process, in which the first party encrypts their information under a personalized first-phase procedure and sends the results to the second party and the second party encrypts their information under a personalized first-phase procedure and sends the results to the first party, the second party encrypting the encrypted information received from the first party under a personalized second-phase procedure to produce a double-encrypted result and the first party encrypting the encrypted information received from the second party under a personalized second-phase procedure to produce a double-encrypted result, the first- and second-phase procedures being chosen such that a given element of information will always yield the same unique double-encrypted result regardless of which party it originates from; and comparing each party'"'"'s double-encrypted information to determine the compatibility of the information of each party.
-
Citations
27 Claims
-
1. A method of determining a compatibility of at least a first party and a second party, each of said parties comprising at least one computer processor, the method comprising:
-
sending, with the first party, encrypted constraints enforced by the first party to the second party, each said constraint enforced by the first party having been separately encrypted under a first-phase procedure personalized to the first party; sending, with the second party, encrypted constraints enforced by the second party, each said constraint enforced by the second party having been separately encrypted under a first-phase procedure personalized to the second party; separately encrypting, with the second party, each of the encrypted constraints enforced by the first party under a second-phase procedure personalized to the second party to produce a first set of double-encrypted constraints; separately encrypting, with the first party, each of the encrypted constraints enforced by the second party under a second-phase procedure personalized to the first party to produce a second set of double-encrypted constraints; and determining whether said first party may establish a communication link with said second party based on a comparison of the first set of double-encrypted constraints with the second set of double-encrypted constraints. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of securely comparing constraints enforced by at least a first party and a second party, each of said parties comprising at least one computer processor, the method comprising:
-
sending, with the first party, encrypted constraints enforced by the first party to the second party, each said constraint enforced by the first party having been separately encrypted under a first-phase procedure personalized to the first party; sending, with the second party, encrypted constraints enforced by the second party, each said constraint enforced by the second party having been separately encrypted under a first-phase procedure personalized to the second party; separately encrypting, with the second party, each of the encrypted constraints enforced by the first party under a second-phase procedure personalized to the second party to produce a first set of double-encrypted constraints; separately encrypting, with the first party, each of the encrypted constraints enforced by the second party under a second-phase procedure personalized to the first party to produce a second set of double-encrypted constraints; and the first-phase and second-phase procedures being chosen such that a given element of information will always yield the same unique double-encrypted result regardless of which party it originates from; and determining whether said constraints enforced by each of said first and second parties allow said first party to establish a communication link with said second party according to a degree to which said first set of double-encrypted constraints is similar to said second set of double-encrypted constraints. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of establishing communication between a first computing device and a second computing device in accordance with first and second sets of constraints enforced by said first and second computing devices, respectively, said method comprising:
-
said first computing device providing an encrypted version of said first set of constraints to said second computing device together with an unencrypted set of constraint titles associated with said first set of constraints; said second computing device providing an encrypted version of said second set of constraints to said first computing device together with an unencrypted set of constraint titles associated with said second set of constraints; said first computing device encrypting said encrypted version of said second set of constraints to produce a double-encrypted version of said second set of constraints; said second computing device encrypting said encrypted version of said first set of constraints to produce a double-encrypted version of said first set of constraints; and generating in each of said first and second computing devices a governing set of constraints for a link between said first and second computing devices based on identified matches between said double-encrypted versions of said first and second sets of constraints and said unencrypted sets of titles associated with said first and second sets of constraints. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
- 19. The method of 18, in which said first computing device uses an encryption key separate from said encryption key used by said second computing device.
Specification