System and method for secure three-party communications
DCFirst Claim
1. A system for securing information, comprising:
- (a) a first port configured to receive encrypted information associated with a first set of cryptographic keys;
(b) a second port configured to receive a portion of a set of transcryption keys from a key management system, derived at least in part from a first portion of the first set of cryptographic keys and a first portion of a set of session keys, adapted to transcrypt the encrypted information from a form associated with the first set of cryptographic keys to a form associated with a second set of cryptographic keys and the set of session keys, the received first portion of the set of transcryption keys conveying insufficient information to decrypt the encrypted information and to comprehend the transcrypted information, a second portion of the second set of cryptographic keys and a second portion of the set of session keys being required to comprehend the transcrypted information; and
(c) a processor configured to transcrypt the received encrypted information from the first port into the transcrypted information dependent on the portion of the set of transcryption keys received from the second port, without either requiring or employing information sufficient to decrypt the encrypted information or to comprehend the transcrypted information.
7 Assignments
Litigations
0 Petitions

Accused Products

Abstract
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, transmitting an identifier of the first party to the second party, and negotiating, by the intermediary, a comprehension function for obscuring at least a portion of the information communicated between the first party and the second party. The data transmission may be made secure with respect to the intermediary by providing an asymmetric key or direct key exchange for encryption of the communication between the first and second party. The data transmission may be made secure with respect to the second party by maintaining the information in encrypted format at the second party, with the decryption key held only by the intermediary, and transmitting a secure composite of the decryption key and a new encryption key to the second party for transcoding of the data record, and providing the new decryption key to the first party, so that the information transmitted to the first party can be comprehended by it.
169 Citations
21 Claims
-
1. A system for securing information, comprising:
-
(a) a first port configured to receive encrypted information associated with a first set of cryptographic keys; (b) a second port configured to receive a portion of a set of transcryption keys from a key management system, derived at least in part from a first portion of the first set of cryptographic keys and a first portion of a set of session keys, adapted to transcrypt the encrypted information from a form associated with the first set of cryptographic keys to a form associated with a second set of cryptographic keys and the set of session keys, the received first portion of the set of transcryption keys conveying insufficient information to decrypt the encrypted information and to comprehend the transcrypted information, a second portion of the second set of cryptographic keys and a second portion of the set of session keys being required to comprehend the transcrypted information; and (c) a processor configured to transcrypt the received encrypted information from the first port into the transcrypted information dependent on the portion of the set of transcryption keys received from the second port, without either requiring or employing information sufficient to decrypt the encrypted information or to comprehend the transcrypted information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A server for managing transcryption comprising:
-
(a) a memory configured to store information representing at least a portion of a first set of cryptographic keys, and to store information representing at least a portion of a second set of cryptographic keys; (b) a processor configured to produce at least a transcryption key in dependence on a portion of the second set of cryptographic keys and at least a secret portion of the first set of cryptographic keys, the transcryption key being adapted to convert information encrypted based on the first set of cryptographic keys in which a secret portion of the first set of keys is required for decryption, to transcrypted information associated with the second set of cryptographic keys, employing a transcryption algorithm which does not either require or employ sufficient information to decrypt the encrypted information or to comprehend the transcrypted information; and (c) a port, configured to transmit the information representing at least a portion of the second set of cryptographic keys to a remote system, the information representing the portion of the second set of cryptographic keys being obscured from the processor with obscuration data. - View Dependent Claims (11, 12)
-
-
13. A method for transcrypting information, comprising:
-
(a) receiving and storing in a first memory information encrypted based on a first set of cryptographic keys, a first portion of the first set of cryptographic keys having been employed to produce the encrypted information and a second portion of the first set of cryptographic keys being required to decrypt the information encrypted with the first portion of the first set of cryptographic information; (b) receiving and storing in a second memory a first portion of a second set of cryptographic keys, having a corresponding second portion of the second set of cryptographic keys being required for decryption of a message encrypted using the first portion of the second set of cryptographic keys; (c) negotiating a set of session keys through a communication port, (d) generating a transcryption key for transforming the received encrypted information to transcrypted information, in dependence on at least; (i) information representing the second portion of the first set of cryptographic keys, (ii) information representing the first portion of the second set of cryptographic keys; and (iii) a first portion of the set of session keys, and (e) transcrypting the stored encrypted information into transcrypted information using the transcryption key, wherein the generating a transcryption key step and the transcrypting the encrypted information step are performed without either requiring or employing sufficient information either to decrypt the encrypted information or to comprehend the transcrypted information. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
Specification