Secure and reliable document delivery using routing lists
First Claim
Patent Images
1. A method for facilitating a secure delivery of a document over a network from a sender to a next stage on a routing list, the method comprising the steps of:
- receiving an indication that a sender desires to deliver a document to a next stage on a routing list for the document;
identifying a recipient from the next stage of the routing list;
sending an inquiry to a public key database to determine whether the recipient has a public key listed in the public key database;
receiving a response to said inquiry, said response selected from the group of said recipient having a public key in said database and said recipient not having a public key in said database;
if said response is said recipient having a public key in said public key database, completing the steps of;
(a) retrieving said public key from said public key database;
(b) setting a message encryption key for encrypting the document equal to said public key;
(c) encrypting the document prior to sending said document using the message encryption key; and
(d) sending the encrypted document to the recipient;
if said response is said recipient not having a public key in said public key database, completing the steps of;
(a) providing an escrow encryption key not equal to the recipient'"'"'s public key and not equal to the sender'"'"'s private key, wherein an escrow unencryption key for unlocking said escrow encryption key is not made available to said recipient or to the sender and(b) encrypting the document using the generated escrow encryption key, and storing the escrow key encrypted document in escrow;
(c) notifying the recipient of the document stored in escrow; and
(d) only in response to receiving an acknowledgement from the recipient, unencrypting the escrow encryption key encrypted document using the escrow unencryption key and re-encrypting the document using a document encryption key prior to sending said document to the recipient, wherein neither the escrow encryption key or the escrow unencryption key is provided to the recipient.
1 Assignment
0 Petitions
Accused Products
Abstract
An operations center (OC) (200) acts as an intermediary for securely and reliably transmitting a document (3) from a sender (100) to a next recipient (300) on a routing list. The OC (200) identifies (464) a recipient (300) from the next stage of the routing list and provides either the recipient'"'"'s public key (404) or an escrow encryption key (406). The OC (200) optionally can authenticate the sender (100) and/or the recipient (300), thus increasing security.
57 Citations
19 Claims
-
1. A method for facilitating a secure delivery of a document over a network from a sender to a next stage on a routing list, the method comprising the steps of:
-
receiving an indication that a sender desires to deliver a document to a next stage on a routing list for the document; identifying a recipient from the next stage of the routing list; sending an inquiry to a public key database to determine whether the recipient has a public key listed in the public key database; receiving a response to said inquiry, said response selected from the group of said recipient having a public key in said database and said recipient not having a public key in said database; if said response is said recipient having a public key in said public key database, completing the steps of; (a) retrieving said public key from said public key database; (b) setting a message encryption key for encrypting the document equal to said public key; (c) encrypting the document prior to sending said document using the message encryption key; and (d) sending the encrypted document to the recipient; if said response is said recipient not having a public key in said public key database, completing the steps of; (a) providing an escrow encryption key not equal to the recipient'"'"'s public key and not equal to the sender'"'"'s private key, wherein an escrow unencryption key for unlocking said escrow encryption key is not made available to said recipient or to the sender and (b) encrypting the document using the generated escrow encryption key, and storing the escrow key encrypted document in escrow; (c) notifying the recipient of the document stored in escrow; and (d) only in response to receiving an acknowledgement from the recipient, unencrypting the escrow encryption key encrypted document using the escrow unencryption key and re-encrypting the document using a document encryption key prior to sending said document to the recipient, wherein neither the escrow encryption key or the escrow unencryption key is provided to the recipient. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for facilitating a secure delivery of a document over a network from a sender to a recipient, the method comprising the steps of:
-
receiving an indication that the sender desires to deliver a document to the recipient for the document; sending an inquiry to a public key database to determine whether the recipient has a public key listed in the public key database; receiving a response to said inquiry, said response selected from the group of said recipient having a public key in said database and said recipient not having a public key in said database; if said response is said recipient having a public key in said public key database, completing the steps of; (a) retrieving said public key from said public key database; (b) setting a message encryption key for encrypting the document equal to said public key; (c) encrypting the document prior to sending said document using the message encryption key; and (d) sending the encrypted document to the recipient; if said response is said recipient not having a public key in said public key database, completing the steps of; (a) providing an escrow encryption key not equal to the recipient'"'"'s public key and not equal to the sender'"'"'s private key, wherein a respective escrow unencryption key for unlocking said escrow encryption key is not made available to said recipient or to the sender; (b) encrypting the document using the generated escrow encryption key and storing the escrow key encrypted document in escrow; (c) notifying the recipient of the document stored in escrow; and (d) only in response to receiving an acknowledgement from the recipient, unencrypting the escrow encryption key encrypted document using the escrow unencryption key prior to sending said document; and (e) re-encrypting the escrow unencryption key unencrypted document using an encryption not equal to the escrow encryption key or a public or private encryption key of recipient; and wherein the escrow encryption key is not provided to the recipient. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A method for facilitating a secure delivery of a document over a network from a sender to a recipient, the method comprising the steps of:
-
receiving an indication that a sender desires to deliver a document to a recipient for the document; sending an inquiry to a public key database to determine whether the recipient has a public key listed in the public key database; receiving a response to said inquiry, said response selected from the group of said recipient having a public key in said database and said recipient not having a public key in said database; if said response is said recipient having a public key in said public key database, completing the steps of; (a) retrieving said public key from said public key database; (b) setting a message encryption key for encrypting the document equal to said public key; (c) encrypting the document prior to sending said document using the message encryption key; and (d) sending the message encryption key encrypted document to the recipient; if said response is said recipient not having a public key in said public key database, completing the steps of; (a) providing an escrow encryption key not equal to the recipient'"'"'s public key and not equal to the sender'"'"'s private key, wherein an escrow unencryption key for unlocking said escrow encryption key is not made available to said recipient and (b) encrypting the document using the generated escrow encryption key, and storing the escrow key encrypted document in escrow; (c) notifying the recipient of the document stored in escrow; and (d) only in response to receiving an acknowledgement from the recipient, unencrypting the escrow encryption key encrypted document using the escrow unencryption key prior to sending said document to the recipient; and (e) sending the document to the recipient in a secured state by encrypting the document or by sending the document over one of the group of a secure channel, a secure socket layer or a virtual private network. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification