×

System and method for secure communications involving an intermediary

DC
  • US 8,566,247 B1
  • Filed: 02/15/2008
  • Issued: 10/22/2013
  • Est. Priority Date: 02/19/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for communicating information which is encrypted from a first party to a second party, involving an intermediary which selectively authorizes the second party to comprehend the information, without the intermediary itself being enabled to comprehend the information, comprising the steps of:

  • identifying information to be communicated, the information being encrypted with an associated cryptographic comprehension function;

    negotiating between the second party and the intermediary, an asymmetric delivery comprehension function of the information which is encrypted, different from the associated cryptographic comprehension function, wherein the asymmetric delivery comprehension function comprises a function of at least three asymmetric key components of at least three distinct respective asymmetric delivery comprehension functions, wherein the second party possesses an ability to decrypt the information which is encrypted with the asymmetric delivery comprehension function, and the intermediary possesses a portion of the asymmetric delivery comprehension function which does not impart an ability to decrypt the information which is encrypted;

    transforming a comprehension function of the information which is encrypted to be communicated from the associated cryptographic comprehension function to the asymmetric delivery cryptographic comprehension function, said transforming comprising using the negotiated asymmetric delivery comprehension function of the at least three key asymmetric key components of the at least three distinct respective asymmetric delivery comprehension functions in an integral process which does not have as an intermediate state a decrypted representation of the information and does not itself require at any time during the transformation, knowledge sufficient for decrypting the information which is encrypted; and

    communicating the information which is encrypted with the asymmetric delivery cryptographic comprehension function to the second party.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×