Communication with non-repudiation
First Claim
Patent Images
1. A method comprising:
- comparing, at a trusted third party, a first hashed value of at least a first decryption key, the first decryption key received from a sender, to a second hashed value of at least a second decryption key that has been received as a signed value from a receiver, the receiver having signed a hashed value of an encrypted message to provide the signed hashed value of the encrypted message, and to serve as an indication that the encrypted message has been received by the receiver, and the sender having displayed proof of encrypted message receipt by displaying information confirming receipt of the signed hashed value of an encrypted message; and
sending the first decryption key to the receiver and sending the signed value from the trusted third party to the sender as an indication that the first description key has been received by the receiver, upon determining that the first hashed value matches the second hashed value to verify that the first decryption key is the same as the second decryption key, the receiver displaying proof of decryption key receipt by displaying information confirming receipt of the signed version.
14 Assignments
0 Petitions
Accused Products
Abstract
Apparatus, systems, and methods may operate to compare a first hashed value of at least a first decryption key, the first decryption key received from a sender, to a second hashed value of at least a second decryption key that has been received as a signed value from a receiver. Further operations may include sending the first decryption key to the receiver and sending the signed value to the sender upon determining that the first hashed value matches the second hashed value. Additional apparatus, systems, and methods are disclosed.
-
Citations
25 Claims
-
1. A method comprising:
-
comparing, at a trusted third party, a first hashed value of at least a first decryption key, the first decryption key received from a sender, to a second hashed value of at least a second decryption key that has been received as a signed value from a receiver, the receiver having signed a hashed value of an encrypted message to provide the signed hashed value of the encrypted message, and to serve as an indication that the encrypted message has been received by the receiver, and the sender having displayed proof of encrypted message receipt by displaying information confirming receipt of the signed hashed value of an encrypted message; and sending the first decryption key to the receiver and sending the signed value from the trusted third party to the sender as an indication that the first description key has been received by the receiver, upon determining that the first hashed value matches the second hashed value to verify that the first decryption key is the same as the second decryption key, the receiver displaying proof of decryption key receipt by displaying information confirming receipt of the signed version. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
sending a signed hashed value of an encrypted message from a receiver to a sender; receiving, at the receiver, a hashed value of a decryption key; signing the hashed value of the decryption key to provide a signed version of the hashed value of the decryption key; sending the signed version to a trusted third party, the signed version to be transmitted from the trusted third party to the sender as an indication that the description key has been received by the receiver signing a hashed value of the encrypted message to provide the signed hashed value of the encrypted message, and to serve as an indication that the encrypted message has been received by the receiver; displaying proof of encrypted message receipt by displaying information confirming receipt of the signed hashed value of the encrypted message; and displaying proof of decryption key receipt by displaying information confirming receipt of the signed version. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus comprising:
-
one or more processors; a memory to store an encrypted message and instructions which, when executed by the one or more processors, results in the one or more processors operating to; send a signed hashed value of the encrypted message to a sender; receive a hashed value of a decryption key; sign the hashed value of the decryption key to provide a signed version of the hashed value of the decryption key; and send the signed version to a trusted third party, the signed version to be transmitted from the trusted third party to the sender as an indication that the description key has been received by the apparatus; sign a hashed value of the encrypted message to provide the signed hashed value of the encrypted message, and to serve as an indication that the encrypted message has been received by the receiver; and a display device to; display a decrypted form of the encrypted message in human-perceptible format display proof of encrypted message receipt by displaying information confirming receipt of the signed hashed value of the encrypted message; and display proof of decryption key receipt by displaying information confirming receipt of the signed version. - View Dependent Claims (20, 21, 22)
-
-
23. A non-transitory machine-readable storage medium storing instructions that, when executed by a machine, cause the machine to perform operations comprising:
-
comparing, at a trusted third party, a first hashed value of at least a first decryption key, the first decryption key received from a sender, to a second hashed value of at least a second decryption key that has been received as a signed value from a receiver, the receiver having signed a hashed value of an encrypted message to provide the signed hashed value of the encrypted message, and to serve as an indication that the encrypted message has been received by the receiver, and the sender having displayed proof of encrypted message receipt by displaying information confirming receipt of the signed hashed value of an encrypted message; and sending the first decryption key to the receiver and sending the signed value from the trusted third party to the sender as an indication that the first description key has been received by the receiver, upon determining that the first hashed value matches the second hashed value to verify that the first decryption key is the same as the second decryption key, the receiver displaying proof of decryption key receipt by displaying information confirming receipt of the signed version. - View Dependent Claims (24, 25)
-
Specification