Storage and authentication of data transactions
First Claim
Patent Images
1. A computer implemented method of transmitting data between a first user and a second user via an information technology communications network, the computer implemented method comprising the steps of:
- generating a first hash value for a selected data item;
digitally signing and encrypting said first hash value with a secret identifier associated with the first user;
transmitting to a second user said encrypted first hash value;
receiving and storing said transmitted encrypted first hash value for audit purposes and generating a second hash value for said received encrypted first hash value;
encrypting the second hash value with a private identifier associated with a second user and a public identifier associated with the first user;
returning the encrypted second hash value to be received by the first user;
decrypting said received encrypted second hash value with the private identifier associated with said second user and the public identifier associated with said first user to derive a further hash value therefrom;
comparing the further hash value with the second hash value generated for said received encrypted first hash value to confirm digital identity of the second user;
and in response to the comparing of the further hash value to confirm digital identity of the second user, encrypting the secret identifier associated with the first user and transmitting to the second user the encrypted secret identifier associated with the first user for decryption and subsequent use in decrypting said encrypted first hash value, wherein the steps of the computer implemented method are performed by at least one computer.
1 Assignment
0 Petitions
Accused Products
Abstract
Data is transmitted between a first user and a second user via an information technology communications network, in a method comprising the steps of:
- generating a first hash value for a selected one of the data items;
- digitally signing and encrypting the first hash value with a secret identifier associated with the first user;
- transmitting to a second user the encrypted first hash value;
- receiving and storing the transmitted encrypted first hash value for audit purposes and generating a second hash value for the received encrypted first hash value;
- encrypting the second hash value with a private identifier associated with a second user and a public identifier associated with the first user; and
- returning the encrypted second hash value to the first user.
18 Citations
7 Claims
-
1. A computer implemented method of transmitting data between a first user and a second user via an information technology communications network, the computer implemented method comprising the steps of:
-
generating a first hash value for a selected data item; digitally signing and encrypting said first hash value with a secret identifier associated with the first user; transmitting to a second user said encrypted first hash value; receiving and storing said transmitted encrypted first hash value for audit purposes and generating a second hash value for said received encrypted first hash value; encrypting the second hash value with a private identifier associated with a second user and a public identifier associated with the first user; returning the encrypted second hash value to be received by the first user; decrypting said received encrypted second hash value with the private identifier associated with said second user and the public identifier associated with said first user to derive a further hash value therefrom; comparing the further hash value with the second hash value generated for said received encrypted first hash value to confirm digital identity of the second user; and in response to the comparing of the further hash value to confirm digital identity of the second user, encrypting the secret identifier associated with the first user and transmitting to the second user the encrypted secret identifier associated with the first user for decryption and subsequent use in decrypting said encrypted first hash value, wherein the steps of the computer implemented method are performed by at least one computer. - View Dependent Claims (2, 3)
-
-
4. A computer implemented method of transmitting data between a first user and a second user via an information technology communications network, comprising the steps of:
-
generating a first hash value for a selected data item; digitally signing and encrypting said first hash value with a secret identifier associated with the first user; transmitting to a second user said encrypted first hash value; receiving and storing said transmitted encrypted first hash value for audit purposes and generating a second hash value for said received encrypted first hash value; encrypting the second hash value with a private identifier associated with a second user and a public identifier associated with the first user; returning the encrypted second hash value to be received by the first user; decrypting said received encrypted second hash value with the private identifier associated with said second user and the public identifier associated with said first user to derive a further hash value therefrom; comparing the further hash value with the second hash value generated for said received encrypted first hash value to confirm digital identity of the second user; and in response to a failure to confirm digital identity of the second user, denying the second user access to the encrypted first hash value by omission of transmitting to the second user the encrypted secret identifier associated with the first user, wherein the steps of the computer implemented method are performed by at least one computer. - View Dependent Claims (5, 6, 7)
-
Specification