Systems and methods for conducting transactions and communications using a trusted third party
First Claim
1. A non-transitory computer-readable medium storing program instructions that, when executed by a processor included in a computer system associated with a first party, cause the first party computer system to perform a method for decrypting data content, the method comprising:
- receiving encrypted data content from a second party;
computing a first hash of at least a portion of the encrypted data content;
sending the first hash to the second party, wherein the second party is configured to compare at least a portion of the first hash to at least a portion of a second hash;
receiving a decryption key from the second party; and
decrypting at least the portion of the received encrypted data content with the decryption key,wherein computing the first hash of a portion of the encrypted data content comprises the first party computer system computing multiple hashes of the encrypted data content, where each of the multiple hashes is computed using a different portion of the encrypted data content.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
75 Citations
19 Claims
-
1. A non-transitory computer-readable medium storing program instructions that, when executed by a processor included in a computer system associated with a first party, cause the first party computer system to perform a method for decrypting data content, the method comprising:
-
receiving encrypted data content from a second party; computing a first hash of at least a portion of the encrypted data content; sending the first hash to the second party, wherein the second party is configured to compare at least a portion of the first hash to at least a portion of a second hash; receiving a decryption key from the second party; and decrypting at least the portion of the received encrypted data content with the decryption key, wherein computing the first hash of a portion of the encrypted data content comprises the first party computer system computing multiple hashes of the encrypted data content, where each of the multiple hashes is computed using a different portion of the encrypted data content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium storing program instructions that, when executed by a processor included in a computer system associated with a first party, cause the first party computer system to perform a method for decrypting data content, the method comprising:
-
receiving encrypted data content from a second party; computing a first hash of at least a portion of the encrypted data content; sending the first hash to the second party, wherein the second party is configured to compare at least a portion of the first hash to at least a portion of a second hash; receiving a decryption key from the second party; and decrypting at least the portion of the received encrypted data content with the decryption key, wherein receiving the encrypted data content from the second party further comprises the first party computer system receiving the encrypted data content in multiple encrypted data blocks, each of the multiple encrypted data blocks further including a message authentication code. - View Dependent Claims (16, 17, 18, 19)
-
Specification