System and method for secure communications involving an intermediary
DCFirst Claim
1. A method for communicating information which is encrypted from a first party to a second party, involving an intermediary which selectively authorizes the second party to comprehend the information, without the intermediary itself being enabled to comprehend the information, comprising the steps of:
- identifying information to be communicated, the information being encrypted with an associated cryptographic comprehension function;
negotiating between the second party and the intermediary, an asymmetric delivery comprehension function of the information which is encrypted, different from the associated cryptographic comprehension function, wherein the asymmetric delivery comprehension function comprises a function of at least three asymmetric key components of at least three distinct respective asymmetric delivery comprehension functions, wherein the second party possesses an ability to decrypt the information which is encrypted with the asymmetric delivery comprehension function, and the intermediary possesses a portion of the asymmetric delivery comprehension function which does not impart an ability to decrypt the information which is encrypted;
transforming a comprehension function of the information which is encrypted to be communicated from the associated cryptographic comprehension function to the asymmetric delivery cryptographic comprehension function, said transforming comprising using the negotiated asymmetric delivery comprehension function of the at least three key asymmetric key components of the at least three distinct respective asymmetric delivery comprehension functions in an integral process which does not have as an intermediate state a decrypted representation of the information and does not itself require at any time during the transformation, knowledge sufficient for decrypting the information which is encrypted; and
communicating the information which is encrypted with the asymmetric delivery cryptographic comprehension function to the second party.
7 Assignments
Litigations
0 Petitions

Accused Products

Abstract
A system and method for communicating information or a cryptographic key therefore between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, transmitting an identifier of the first party to the second party, and negotiating, by the intermediary, a comprehension function for obscuring at least a portion of the information communicated between the first party and the second party. The data transmission may be made secure with respect to the intermediary by providing an asymmetric key or direct key exchange for encryption of the communication between the first and second party. The data transmission may be made secure with respect to the second party by maintaining the information in encrypted format at the second party, with the decryption key held only by the intermediary, and transmitting a secure composite of the decryption key and a new encryption key to the second party for transcoding of the data record, and providing the new decryption key to the first party, so that the information transmitted to the first party can be comprehended by it. According to the present invention, asymmetric key encryption may be employed to provide the establishment of secure communications channels involving an intermediary, without making the intermediary privy to the decryption key or the message.
142 Citations
20 Claims
-
1. A method for communicating information which is encrypted from a first party to a second party, involving an intermediary which selectively authorizes the second party to comprehend the information, without the intermediary itself being enabled to comprehend the information, comprising the steps of:
-
identifying information to be communicated, the information being encrypted with an associated cryptographic comprehension function; negotiating between the second party and the intermediary, an asymmetric delivery comprehension function of the information which is encrypted, different from the associated cryptographic comprehension function, wherein the asymmetric delivery comprehension function comprises a function of at least three asymmetric key components of at least three distinct respective asymmetric delivery comprehension functions, wherein the second party possesses an ability to decrypt the information which is encrypted with the asymmetric delivery comprehension function, and the intermediary possesses a portion of the asymmetric delivery comprehension function which does not impart an ability to decrypt the information which is encrypted; transforming a comprehension function of the information which is encrypted to be communicated from the associated cryptographic comprehension function to the asymmetric delivery cryptographic comprehension function, said transforming comprising using the negotiated asymmetric delivery comprehension function of the at least three key asymmetric key components of the at least three distinct respective asymmetric delivery comprehension functions in an integral process which does not have as an intermediate state a decrypted representation of the information and does not itself require at any time during the transformation, knowledge sufficient for decrypting the information which is encrypted; and communicating the information which is encrypted with the asymmetric delivery cryptographic comprehension function to the second party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for communicating information which is encrypted from a first party to a second party, involving an intermediary that selectively authorizes the second party to comprehend the information, without the intermediary itself being enabled to comprehend the information, comprising:
-
a communication port which receives information which is encrypted to be communicated or an identification thereof, the information being encrypted with an associated cryptographic comprehension function; at least one automated processor which conducts a negotiation between the second party and the intermediary through the communication port of an asymmetric delivery comprehension function of the information which is encrypted, different from the associated cryptographic comprehension function, wherein the asymmetric delivery comprehension function comprises a function of at least three asymmetric key components of at least three distinct respective asymmetric delivery comprehension functions, wherein the second party possesses an ability to decrypt the information which is encrypted with the asymmetric delivery comprehension function, and the intermediary possesses a portion of the asymmetric delivery comprehension function which does not impart an ability to decrypt the information which is encrypted; the at least one automated processor further transforms a comprehension function of the information which is encrypted to be communicated from the associated cryptographic comprehension function to the asymmetric delivery cryptographic comprehension function, comprising using the negotiated asymmetric delivery comprehension function of the at least three key asymmetric key components of the at least three distinct respective asymmetric delivery comprehension functions in an integral process which does not have as an intermediate state a decrypted representation of the information and does not itself require at any time during the transformation, knowledge sufficient for decrypting the information which is encrypted; and said communication port communicating the information which is encrypted with the asymmetric delivery cryptographic comprehension function to the second party. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer readable storage medium, having stored therein instructions for communicating information which is encrypted from a first party to a second party, involving an intermediary which selectively authorizes the second party to comprehend the information, without the intermediary itself being enabled to comprehend the information, which, when executed, cause the processor to perform a method comprising the steps of:
-
receiving communicated information which is encrypted, the information being encrypted with an associated cryptographic comprehension function; negotiating between the second party and the intermediary, an asymmetric delivery comprehension function of the information which is encrypted, different from the associated cryptographic comprehension function, wherein the asymmetric delivery comprehension function comprises a function of at least three asymmetric key components of at least three distinct respective asymmetric delivery comprehension functions, wherein the second party possesses an ability to decrypt the information which is encrypted with the asymmetric delivery comprehension function, and the intermediary possesses a portion of the asymmetric delivery comprehension function which does not impart an ability to decrypt the information which is encrypted; transforming a comprehension function of the information which is encrypted to be communicated from the associated cryptographic comprehension function to the asymmetric delivery cryptographic comprehension function, said transforming comprising using the negotiated asymmetric delivery comprehension function of the at least three key asymmetric key components of the at least three distinct respective asymmetric delivery comprehension functions in an integral process which does not have as an intermediate state during the transformation a decrypted representation of the information and does not itself require at any time during the transformation, knowledge sufficient for decrypting the information which is encrypted; and communicating the information which is encrypted with the asymmetric delivery cryptographic comprehension function to the second party. - View Dependent Claims (20)
-
Specification