Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
대표청구항▼
1. A method performed by a first computer system associated with a first party, the first computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving a first ha
1. A method performed by a first computer system associated with a first party, the first computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving a first hash of a first message from a second computer system associated with a second party, the first hash being generated by the second computer system, the first message comprising content encrypted by a third party with a first key associated with the third party,receiving an encrypted message from the second computer system, the encrypted message being generated by the third party and comprising a second hash of the first message and the first key, the encrypted message being encrypted using a second key associated with the first party by the third party;decrypting the encrypted message using the second key to generate a decrypted second hash and decrypted first key;determining that the first hash and the decrypted second hash are equal; andbased on the determination, sending an indication to a third computer system associated with the third party that the content was received by the second party. 2. The method of claim 1, wherein the first key comprises a key randomly selected by the third party. 3. The method of claim 1, wherein the second key comprises a public encryption key associated with the first party. 4. The method of claim 1, wherein the method further comprises sending, based on the determination, the decrypted first key to the second computer system. 5. The method of claim 4, wherein the method further comprises sending, based on the determination, an indication to the third computer system that the decrypted first key was received by the second party. 6. The method of claim 4, wherein the method further comprises receiving, from the second computer system, an indication that the decrypted first key was received by the second party. 7. The method of claim 4, wherein the method further comprises determining that an indication from the second computer system has not been received within a predefined time period indicating that the decrypted first key was received by the second party and, in response, sending an indication to the second computer system that the decrypted first key was sent. 8. The method of claim 7, wherein the method further comprises resending the decrypted first key to the second computer system in response to determining that the indication from the second computer system has not been received within a predefined time period. 9. The method of claim 1, wherein the content comprises an electronic mail message. 10. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor included in a first computer system associated with a first party, cause the processor to perform a method comprising: receiving a first hash of a first message from a second computer system associated with a second party, the first hash being generated by the second computer system, the first message comprising content encrypted by a third party with a first key associated with the third party,receiving an encrypted message from the second computer system, the encrypted message being generated by the third party and comprising a second hash of the first message and the first key, the encrypted message being encrypted using a second key associated with the first party by the third party;decrypting the encrypted message using the second key to generate a decrypted second hash and decrypted first key;determining that the first hash and the decrypted second hash are equal; andbased on the determination, sending an indication to a third computer system associated with the third party that the content was received by the second party. 11. The non-transitory computer-readable storage medium of claim 10, wherein the first key comprises a key randomly selected by the third party. 12. The non-transitory computer-readable storage medium of claim 10, wherein the second key comprises a public encryption key associated with the first party. 13. The non-transitory computer-readable storage medium of claim 10, wherein the method further comprises sending, based on the determination, the decrypted first key to the second computer system. 14. The non-transitory computer-readable storage medium of claim 13, wherein the method further comprises sending, based on the determination, an indication to the third computer system that the decrypted first key was received by the second party. 15. The non-transitory computer-readable storage medium of claim 13, wherein the method further comprises receiving, from the second computer system, an indication that the decrypted first key was received by the second party. 16. The non-transitory computer-readable storage medium of claim 13, wherein the method further comprises determining that an indication from the second computer system has not been received within a predefined time period indicating that the decrypted first key was received by the second party and, in response, sending an indication to the second computer system that the decrypted first key was sent. 17. The non-transitory computer-readable storage medium of claim 16, wherein the method further comprises resending the decrypted first key to the second computer system in response to determining that the indication from the second computer system has not been received within a predefined time period. 18. The non-transitory computer-readable storage medium of claim 10, wherein the content comprises an electronic mail message.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (52)
Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.