Systems and methods for conducting transactions and communications using a trusted third party
First Claim
1. A method performed by a first computer system associated with a first party, the first computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising:
- receiving a first hash of a first message from a second computer system associated with a second party, the first hash being generated by the second computer system, the first message comprising content encrypted by a third party with a first key associated with the third party,receiving an encrypted message from the second computer system, the encrypted message being generated by the third party and comprising a second hash of the first message and the first key, the encrypted message being encrypted using a second key associated with the first party by the third party;
decrypting the encrypted message using the second key to generate a decrypted second hash and decrypted first key;
determining that the first hash and the decrypted second hash are equal; and
based on the determination, sending an indication to a third computer system associated with the third party that the content was received by the second party.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
-
Citations
18 Claims
-
1. A method performed by a first computer system associated with a first party, the first computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising:
-
receiving a first hash of a first message from a second computer system associated with a second party, the first hash being generated by the second computer system, the first message comprising content encrypted by a third party with a first key associated with the third party, receiving an encrypted message from the second computer system, the encrypted message being generated by the third party and comprising a second hash of the first message and the first key, the encrypted message being encrypted using a second key associated with the first party by the third party; decrypting the encrypted message using the second key to generate a decrypted second hash and decrypted first key; determining that the first hash and the decrypted second hash are equal; and based on the determination, sending an indication to a third computer system associated with the third party that the content was received by the second party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor included in a first computer system associated with a first party, cause the processor to perform a method comprising:
-
receiving a first hash of a first message from a second computer system associated with a second party, the first hash being generated by the second computer system, the first message comprising content encrypted by a third party with a first key associated with the third party, receiving an encrypted message from the second computer system, the encrypted message being generated by the third party and comprising a second hash of the first message and the first key, the encrypted message being encrypted using a second key associated with the first party by the third party; decrypting the encrypted message using the second key to generate a decrypted second hash and decrypted first key; determining that the first hash and the decrypted second hash are equal; and based on the determination, sending an indication to a third computer system associated with the third party that the content was received by the second party. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification