×

Storage and authentication of data transactions

  • US 8,656,166 B2
  • Filed: 06/12/2012
  • Issued: 02/18/2014
  • Est. Priority Date: 07/02/2002
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer implemented method of transmitting data between a first user and a second user via an information technology communications network, the computer implemented method comprising the steps of:

  • generating a first hash value for a selected data item;

    digitally signing and encrypting said first hash value with a secret identifier associated with the first user;

    transmitting to a second user said encrypted first hash value;

    receiving and storing said transmitted encrypted first hash value for audit purposes and generating a second hash value for said received encrypted first hash value;

    encrypting the second hash value with a private identifier associated with a second user and a public identifier associated with the first user;

    returning the encrypted second hash value to be received by the first user;

    decrypting said received encrypted second hash value with the private identifier associated with said second user and the public identifier associated with said first user to derive a further hash value therefrom;

    comparing the further hash value with the second hash value generated for said received encrypted first hash value to confirm digital identity of the second user;

    and in response to the comparing of the further hash value to confirm digital identity of the second user, encrypting the secret identifier associated with the first user and transmitting to the second user the encrypted secret identifier associated with the first user for decryption and subsequent use in decrypting said encrypted first hash value, wherein the steps of the computer implemented method are performed by at least one computer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×