System and method for verifying delivery and integrity of electronic messages

a technology of electronic messages and verification methods, applied in the field of systems and methods for verifying the delivery and integrity of electronic messages, can solve the problems of cumbersome systems, slow use, and various obstacles to an

Inactive Publication Date: 2006-05-25
RPOST COMM
View PDF29 Cites 140 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Many electronic mail clients can and do support this kind of reporting; however, internet protocols do not make this mandatory.
However, this does not mean that an e-mail sent with a notification request is as effective in all respects as registered mail.
On the other hand, various hurdles exist to an e-mail receipt being admitted and relied upon as persuasive evidence in a court of law as a proof that the message was delivered.
But the circumstances in which a sender may want proof of delivery of a message are often ones in which it cannot be assumed that the intended recipient will co-operate in receiving the message.
In such cases, e.g. where acknowledging receipt of the message would place a financial or legal burden on the recipient, the recipient can simply ignore the notification that mail is available for him to receive.
Note that there is nothing in such a system to guarantee that the intended recipient has received notification of waiting mail.
In the second place, such systems are cumbersome and slow to use as compared to regular e-mail insofar as it can require the sender and / or the recipient to connect to a World Wide Web site to send, collect and verify the delivery of each message.
Moreover, transmission of documents by such methods may require both sender and receiver to upload and download files to a web site.
Finally, because these methods require the third party to retain a copy of the whole of each message until such time as they are collected or expired, the methods can require its provider to devote substantial computational resources to data storage and data tracking over an extended period of time.
The obvious disadvantage of such systems is that they require both sender and recipient to use the same e-mail client.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for verifying delivery and integrity of electronic messages
  • System and method for verifying delivery and integrity of electronic messages
  • System and method for verifying delivery and integrity of electronic messages

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0032]FIG. 1 is a system diagram of an invention disclosed and claimed in co-pending application Ser. No. 09 / 626,577, in which embodiment outgoing messages are made of record by being transmitted by a special Mail Transport Agent (MTA).

[0033]FIGS. 2-2F constitute a representative flow diagram for making an outgoing e-mail of record according to the embodiment of FIG. 1.

second embodiment

[0034]FIG. 3 is a system diagram of the invention disclosed and claimed in co-pending application Ser. No. 09 / 626,577, in which embodiment senders may direct a Mail Transport Agent to transmit selected messages through a separate Mail Transport Agent constructed to make the selected messages of record.

third embodiment

[0035]FIG. 4 is a system diagram of the invention disclosed and claimed in co-pending application Ser. No. 09 / 626,577, in which carbon copies (cc's) of outgoing messages are sent to a special server to be made of record.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A first party (e.g. educational testing service) provides through the internet to a control server information (e.g. test server) relating to a second party (e.g. a student taking tests prepared by the service). The server provides and may store a verification (e.g. an encrypted digital signature) of, but does not store, the second party information. The server transmits the information and the verification through the internet to the second party. The second party transmits to the server through the internet the information and the verification with a request to transmit the information to a designated third party (e.g. a college or university to which the student has applied for admission). The server authenticates the information through verification comparisons (or through comparison of the information with the reconstruction and decryption of the verification) and transmits the information, authenticated by the server and the testing service, to the third party.

Description

[0001] This invention relates to a method of providing information from a first party relating to a second party and for transmitting this information on a secure basis to a third party. In this way, the third party can be assured that the information relating to the second party is proper. BACKGROUND OF A PREFERRED EMBODIMENT OF THE INVENTION [0002] Each year, students interested in advancing their education take examinations to indicate their educational achievements. The tests are given by testing services. For examples, high school seniors interested in attending colleges take examinations to indicate their proficiencies in various subjects such as English and mathematics. They also take tests relating to general intelligence. The test results are provided to the students. They are then conveyed to the colleges and universities to which the students have applied for admittance. In April, the students receive indications from the colleges and universities as to whether they have ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F15/16G06Q10/10H04L29/06
CPCG06Q10/107H04L63/12
Inventor TOMKOW, TERRENCE A.KHAN, ZAFAR D.
Owner RPOST COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products