System and method for secure three-party communications
DCFirst Claim
1. A transcription device, comprising:
- an automated communication port configured to receive a first message representing an encrypted communication associated with a first set of asymmetric keys, to receive a transcription key, and to transmit a second message representing the encrypted communication associated with a second set of asymmetric keys, the first and second sets of encryption keys being distinct;
a memory; and
an automated processor, configured to communicate through the automated communication port and with the memory, to receive the first message, receive the transcription key, automatically transcript the first message into the second message, and to transmit the second message, wherein the automated processor does not store as a part of the transcription any decrypted representation of the encrypted communication, and the transcription key is employed without revealing any secret cryptographic information usable for decrypting the first message or the second message.
8 Assignments
Litigations
0 Petitions

Accused Products

Abstract
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, transmitting an identifier of the first party to the second party, and negotiating, by the intermediary, a comprehension function for obscuring at least a portion of the information communicated between the first party and the second party. The data transmission may be made secure with respect to the intermediary by providing an asymmetric key or direct key exchange for encryption of the communication between the first and second party. The data transmission may be made secure with respect to the second party by maintaining the information in encrypted format at the second party, with the decryption key held only by the intermediary, and transmitting a secure composite of the decryption key and a new encryption key to the second party for transcoding of the data record, and providing the new decryption key to the first party, so that the information transmitted to the first party can be comprehended by it.
1076 Citations
20 Claims
-
1. A transcription device, comprising:
-
an automated communication port configured to receive a first message representing an encrypted communication associated with a first set of asymmetric keys, to receive a transcription key, and to transmit a second message representing the encrypted communication associated with a second set of asymmetric keys, the first and second sets of encryption keys being distinct; a memory; and an automated processor, configured to communicate through the automated communication port and with the memory, to receive the first message, receive the transcription key, automatically transcript the first message into the second message, and to transmit the second message, wherein the automated processor does not store as a part of the transcription any decrypted representation of the encrypted communication, and the transcription key is employed without revealing any secret cryptographic information usable for decrypting the first message or the second message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A secure distributed information access control system, comprising:
-
a communication interface device configured to communicate with a plurality of independently operating servers, each communicating server encrypted information, wherein the server encrypted information is in an encrypted form negotiated between a respective server and an intermediary; the intermediary having an automated processor configured to communicate with a network using network encrypted information, wherein the network encrypted information is in a form negotiated between a network endpoint and the intermediary, wherein for respective information, the automated processor transcripts between the server encrypted information and the network encrypted information, substantially without an intermediate representation of the information in a decrypted form; and an audit database configured to log usage of at least one of the plurality of independently operating servers and the activity of the intermediary.
-
-
19. A method of secure distributed information access control, comprising:
-
communicating with a plurality of independently operating servers using server encrypted information, wherein the server encrypted information is in an encrypted form negotiated between a respective server and an intermediary; communicating with a network using network encrypted information, wherein the network encrypted information is in a form negotiated between a network endpoint and the intermediary; transcripting between the server encrypted information and the network encrypted information with an automated processor, substantially without an intermediate representation of the information in a decrypted form; and logging usage of at least one of the plurality of independently operating servers and the activity of the intermediary in a database. - View Dependent Claims (20)
-
Specification