Certified Transmission System
First Claim
1. A computer-implemented method for certifying receipt of a message, the message being sent from a sender to an intended recipient and being encrypted by a symmetric key, and the method executing at a third party distinct from the sender and the intended recipient, the method comprising:
- receiving a signed receipt and an encrypted symmetric key from the intended recipient, the signed receipt memorializing receipt of the encrypted message by the intended recipient;
verifying the signed receipt;
transferring the verified receipt to the sender; and
providing the symmetric key to the intended recipient.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a method and apparatus for transmitting a message from a sender to an intended recipient. The method includes encrypting a message using a symmetric key, sending the encrypted message to an intended recipient without the symmetric key and providing the symmetric key to a third party. If the intended recipient signs and returns to the third party a receipt for the message, the method includes transferring, by the third party, the receipt to the sender and providing the symmetric key to the intended recipient.
49 Citations
7 Claims
-
1. A computer-implemented method for certifying receipt of a message, the message being sent from a sender to an intended recipient and being encrypted by a symmetric key, and the method executing at a third party distinct from the sender and the intended recipient, the method comprising:
-
receiving a signed receipt and an encrypted symmetric key from the intended recipient, the signed receipt memorializing receipt of the encrypted message by the intended recipient; verifying the signed receipt; transferring the verified receipt to the sender; and providing the symmetric key to the intended recipient.
-
-
2. A computer-implemented method, comprising:
-
encrypting a message using a symmetric key; sending the encrypted message to an intended recipient without the symmetric key; forwarding the encrypted symmetric key to a third party; and receiving from the third party a certified receipt verified by the third party indicating receipt of the message by the intended recipient.
-
-
3. A computer-implemented method for time-stamping a message without exposing the content of the message to a time stamping authority, comprising:
-
encrypting the message using a symmetric key; computing a hash of the symmetric key; generating a representation of the hash of the symmetric key and the message encrypted by the symmetric key; and time-stamping the representation. - View Dependent Claims (4, 5)
-
-
6. A computer-implemented method for computing a message identifier associated with a message comprising:
-
encrypting a message using a symmetric key to generate an encrypted message; computing a hash of the symmetric key; and generating a representation of the hash of the symmetric key and the encrypted message. - View Dependent Claims (7)
-
Specification