Claims
- 1. A method for providing a first party with access to a file, the method comprising:
receiving a message from a second party, the message including an encrypted version of the file; sending a message to a third party, the message including a first hash of at least part of the encrypted file, the third party being operable to compare the first hash with a second hash; receiving a decryption key from the third party; decrypting at least part of the file with the decryption key.
- 2. A method as in claim 1, further comprising:
receiving an encrypted version of the second hash and an encrypted version of at least part of the key from the second party.
- 3. A method as in claim 2, further comprising:
sending the encrypted version of the second hash and the encrypted version of at least part of the key to the third party.
- 4. A method as in claim 3, in which the step of sending the encrypted version of the second hash and the encrypted version of at least part of the key to the third party occurs before the step of receiving the decryption key from the third party.
- 5. A method as in claim 4, wherein the file comprises an electronic mail message.
- 6. A method as in claim 3, in which the second hash and the key are encrypted together into a single, encrypted data block to form said encrypted version of the second hash and the encrypted version of the key, the encrypted data block being encrypted using a key associated with the third party.
- 7. A method as in claim 6, in which the key associated with the third party comprises a public key of the third party.
- 8. A method as in claim 1, in which the second hash comprises a hash of the encrypted file, the second hash being sent to the third party by said second party.
- 9. A method as in claim 1, wherein said message to the third party further comprises a description of the file.
- 10. A method as in claim 1, further comprising:
in response to said sending step, receiving an indication from the third party that the encrypted file is valid.
- 11. A method as in claim 10, further comprising:
in response to receiving the indication from the third party that the encrypted file is valid, submitting payment information to the third party, the payment information being sufficient to enable the third party to cause the first party to be charged for the file.
- 12. A method as in claim 1, in which the encrypted file is selected from the group consisting of: digitally encoded audio content; digitally encoded video content; digitally encoded text; and software.
- 13. A method as in claim 1, wherein the steps are performed in the order recited.
- 14. A method for facilitating the secure transfer of a file from a first party to a second party, the method comprising the following steps:
receiving a first hash of at least part of an encrypted version of the file; receiving a second hash of at least part of an encrypted version of the file from the second party; comparing the first hash with the second hash; if the comparison is successful:
sending a decryption key to the second party, the decryption key being operable to decrypt at least part of the encrypted file; if the comparison is not successful:
sending an indication to the second party that the comparison was not successful.
- 15. A method as in claim 14, further comprising:
if the comparison is successful:
sending an indication to the second party that the comparison was successful; receiving payment-related information from the second party; verifying the validity of the payment-related information; processing the payment-related information such that the second party is charged for access to or use of the file; wherein the step of sending the decryption key to the second party is performed in response to the step of verifying the validity of the payment-related information from the second party.
- 16. A method as in claim 15, in which the payment-related information is processed such that the first party is compensated for transferring the file to the second party.
- 17. A method as in claim 16, in which the payment-related information is processed such that an owner of rights to the file's contents is compensated for the second party's acquisition of access to or use of the file.
- 18. A method as in claim 14, in which the first hash is received in encrypted form from the second party, the method further comprising:
decrypting the first hash.
- 19. A method as in claim 18, further comprising:
if the comparison is successful:
sending an indication to the first party that the key was sent to the second party.
- 20. A computer program package for managing the transfer of electronic files, the computer program package providing instructions, which, if executed by a computer system, cause the system to perform operations comprising:
receiving a first hash of at least part of an encrypted version of an electronic file; receiving, from a first party, a second hash of at least part of an encrypted version of the electronic file; comparing the first hash with the second hash;
if the comparison is successful:
sending a decryption key to the first party, the decryption key being operable to decrypt at least part of the encrypted version of the electronic file; if the comparison is not successful:
sending an indication to the first party that the comparison was not successful.
- 21. A computer program package as in claim 20, the computer program package providing instructions, which, if executed by a computer system, cause the system to perform operations further comprising:
decrypting an encrypted version of the first hash received from the first party; if said comparison of the first hash with the second hash is successful:
sending an indication to a second party that the key was sent to the first party.
RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Application No. 60/285,120 entitled “Trusted Systems and Methods for Conducting Transactions and Communications Using a Trusted Third Party,” filed Apr. 20, 2001, which is hereby incorporated by reference in its entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60285120 |
Apr 2001 |
US |