Sign In to Follow Application
View All Documents & Correspondence

Method And System For Authentication And Affirmation Of E Communications

Abstract: The present invention is related to an electronically designed system to substantiate validity, authenticity and existence on a specified time instance of an electronic communication. The presented invention describes an effective and efficient method of validating, authenticating, time stamping and finally digitally signing and delivering them to the generating user with a certificate, as the service provider and trusted third party which provides guarantee that the data message and its content have been delivered to the receiver of all electronic forms of communication apart from storing the certificate in secured repository against any tampering.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
12 July 2018
Publication Number
03/2020
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
mail@ideas2ipr.com
Parent Application
Patent Number
Legal Status
Grant Date
2024-06-14
Renewal Date

Applicants

MACHYNWORKS SOFTWARE SOLUTIONS LLP
Machynworks Software Solutions LLP, Plot No: 297, 12th Street, Viduthalai Nagar, S. Kolathur, Chennai- 600117. India.

Inventors

1. B.Harikumar
B.Harikumar, Plot No: 297, 12th Street, Viduthalai Nagar,S. Kolathur, Chennai- 600117. India.

Specification

METHOD AND SYSTEM FOR AUTHENTICATION AND AFFIRMATION OF E-COMMUNICATIONS FIELD OF INVENTION ____ The current invention is related to the field of electronic communication and more specifically to a method and system for authentication and affirmation that an electronic message was sent to the intended recipient. Further, the system and method of the current invention also provides the original sender of the electronic communication with a digitally signed certificate holding time stamp of transactional and original contents of user data that the electronic communication was sent. BACKGROUND OF INVENTION Various methods of electronic communication are used for all types of movements, generation of calls, messages, etc., from a source to a destination and various methods of delivering the electronic communication have been in use. Such electronic communications are managed by mail service providers and telecommunications operators who provide the infrastructure to manage, direct and store large part of this traffic. These telecommunications operators are subjected to regulation, among others, for the use of the radio spectrum which is limited, or for the use of telephone numbering resources that are also finite. Equally email service providers are subjected to regulations. In general, the email verification systems comprise electronic mail processing systems that tracks the path of such messages. One of the major drawbacks in the conventional and the existing systems is that a lack of method, system or process that is designed electronically to substantiate validity, authenticity and existence on a specified time instance of an electronic form of communication. One such example for the problems associated with the currently available methods, systems or processes is the request made by judicial authorities from these service providers, the recorded data of electronic transactions that were carried out, as they consider them trusted third parties for the purpose of providing these data, as well as any data that can help to determine the physical or legal persons who have carried out the act in question. However, the search for the requested data to the service providers is usually complicated by the fact that it is performed on records of activities with great volume, usually designed for billing, rather than for the follow-up of the traceability of the data. Therefore, the above-mentioned search of the requested data can consume an enormous amount of resources for the telecommunications operator. The existence of mail service providers is of multi nationals, although they are governed by regulations, the logistics involved in tracking the traceability of transaction of user data is cumbersome in terms of resource and time consuming. Similarly, another problem with currently available methods, systems or processes is that the lack of an automatic notification process to enable the sender of such message about tracking the actual time on which the message was sent to the intended recipient. Among the users, there is also a same need to have the capability of requesting information to the service providers in order to know and to certify the transaction data themselves, for example, the data transmitted inclusive of user data, the date, the receiving data or any other useful information for the user. This need can be supported well by a system, which handles the traffic and certifies the transaction data, maintained by a third party in common, to the user of the previously mentioned transactional data. Providing such capabilities to the requester can be very critical in case of electronic contract arrangements and in cases of dispute resolution. The other option available to the user is the use of postal or courier services to send documents and keep the delivery receipt given by the service provider concerned as the proof of delivery and use in the court of law, if needed. Though stand as a proof of delivery but not for the content of the letter/pocket sent. This traditional process involves human intervention in each stage, time consuming for the articles or the document to reach the destination, high cost, hard copy to be preserved for long period and non-eco-friendly. The objective of the invention is to propose an application and system that can negate the above-mentioned disadvantages through a simple method of certification which includes the user data, and transactional data. A further objective of the invention is to propose an application and system for effective and efficient method of validating, authenticating, time stamping and finally digitally signing them and deliver them to the registered user with a certificate as the service provider and trusted third party which provides guarantee that the data message and its content have been delivered to the receiver of all electronic forms of a EN T HP F.T f. F f.HFMNAT . Q 3 / QVS / 9.0 1 9 1 2 '■ 3 3 communication ma secure environment against any tampering. SUMMARY OF THE INVENTION The current invention describes a method, system or process for effective and efficient method of validating, authenticating, time stamping and finally digitally signing them and deliver them to the generating user with a certificate as the service provider and trusted third party which provides guarantee that the data message and its content have been delivered to the receiver of all electronic forms of communication including but not limited to electronic email, short messaging service messages, telephonic voice conversations, audio-video communications and electronic chat messages apart from storing the certificate in secured repository against any tampering for future verification. The other objectives and advantages of the method and the systems of the present disclosure will be further appreciated and understood when considered in combination with the following description and accompanying drawings. While the following description may contain specific details describing particular embodiments of the method and the systems of the present disclosure, this should not be construed as limitations to the scope of the of the method and the systems of the present disclosure but rather as an exemplification of preferable embodiments. For each aspect of the method and the systems of the present disclosure, many variations are possible as suggested herein that are known to those of ordinary skill in the art. A variety of changes and modifications may be made within the scope of the present disclosure without departing from the spirit thereof. BRIEF DESCRIPTION OF THE DRAWING FIG. 1 is the graphical representation of the system set-up and high-level architecture for the method and system for authentication and affirmation of e-Communication. FIG. 2 is the graphical representation for the data flow of the application of the invention for electronic mails. FIG. 3 is the graphical representation for the data flow of the application of the invention for short messaging services. FIG. 4 is the graphical representation of the high-level network and hardware architecture DETAILED DESCRIPTION OF THE INVENTION The invention aims to solve the technical problem of substantiating validity, authenticity and existence on a specified time instance of an electronic form communication. The presented invention describes an effective and efficient method of validating, authenticating, time stamping and finally digitally signing them and deliver them to the generating user with a certificate as the service provider and trusted third party which provides guarantee that the data message and its content have been delivered to the receiver of all electronic forms of communication in a secured repository against any tampering for future verification. For achieving the above-identified objectives, a system is designed comprising of an application box with a web application, a database for data storage and retrieval and a processing application which controls and co-ordinates the process. The user can use a local client machine or any other means to send electronic message which will be directly routed to intended receiver and marked copy of the electronic message for the application to validate, process, time stamp and digitally sign the electronic communication and share the required information to the user as a digitally signed certificate. The same information is also stored in the application securely for future reference and retrieval. In this context, few embodiments of the invention are described in detail and it is to be understood that the invention is not limited in its application to the details of construction, arrangements of the components or the steps by which a particular communication is performed as set forth in the following description or illustrated in the drawings. It is entirely possible that the invention is capable of other embodiments and of being practiced and carried out in various other ways. Also, the phrases and terminologies as used herein are for the purpose of the description and should not be regarded as limiting. The process of one such embodiment of the invention is described in the following steps. The process starts with registration by the client. The client can access the said application through a client system and click on the new user creation hyper link. The user would enter all the necessary fields which includes but not limited to User Name, Electronic Mail Address, Phone Number, Password and Password recovery option which includes but not limited to Secret Challenge. After filling all the necessary information, the user,clicks on the submit ,button,Jthe,said.application checks for \TENT OFFICE CHhNNAI U y / % b ' l '0 1 y li! JJ user duplication. If the user is unique, the user is created in the said system and the information is stored securely in encrypted form or else the user is informed of the error. The user has the option to recover or change their password by using their preferred password recovery method which includes but not limited to a secret challenge. The user would be provided with form to fill in their new password and re-enter them to make sure they match. In the event of both the passwords being a match, the user record is updated. The user can update all aspects of their profile in the user profile form except mail id being used to check uniqueness. Further, the user must select their billing method which includes but not limited to Consumer to Consumer billing, Business to Business billing, Business to Consumer billing, Credit/points-based system etc. The payment for the same is processed through appropriate payment gateway. One such embodiment is the instance, wherein a normal user who uses their own mail client: A normal user or a corporate user who uses their own mail client mails as usual and adds Application mail id in copy and sends the desired communication. The said application receives a copy of the original mail as indicated in Fig 2, and the application checks for Spam. Besides Mail Origination validation is done against sender domain's MX, SPF and DKIM records. On failure, such a mail communication would be dropped. The system stores unique transaction id, date and time of mail received by the said application, Originator mail Id, name, recipient mail ids other than Application mail Id, mail subject, content of mail and attachments if any in the database. The number of mails to be sent is counted and cost to the user is worked out. If the balance available to the particular user is insufficient, the system sends that information to originator to top-up balance. Once sufficient credit balance is achieved to process the traffic, the system checks the customer profile. If the customer profile indicates OTP verification, the user logs in and request OTP, the said application sends OTP to registered mobile number of the user. User enters OTP against pending transaction/s and submits as indicated in Figure 2 (6,7), If the OTP does not match AT E^r'The (tran$ac|iq;n gt dfpps^the^ransactioig with£k5g

Documents

Application Documents

# Name Date
1 Form3_As Filed_12-07-2018.pdf 2018-07-12
2 Form28_Small Entity_12-07-2018.pdf 2018-07-12
3 Form2 Title Page_Provisional_12-07-2018.pdf 2018-07-12
4 Form1_As Filed_12-07-2018.pdf 2018-07-12
5 Description Provisional_As Filed_12-07-2018.pdf 2018-07-12
6 Form 5_Complete After Provisional_08-05-2019.pdf 2019-05-08
7 Form 2 Title Page_Complete_08-05-2019.pdf 2019-05-08
8 Drawings_Complete After Provisional_08-05-2019.pdf 2019-05-08
9 Description Complete_After Provisional_08-05-2019.pdf 2019-05-08
10 Correspondence by Applicant_Complete After Provisional_08-05-2019.pdf 2019-05-08
11 Claims_Complete After Provisional_08-05-2019.pdf 2019-05-08
12 Abstract_Complete After Provisional_08-05-2019.pdf 2019-05-08
13 Form18_Normal Request_02-07-2019.pdf 2019-07-02
14 Correspondence by Applicant_Form 18_02-07-2019.pdf 2019-07-02
15 201841026019-Correspondence_EMAIL ID-Form1-Form2_17-11-2020.pdf 2020-11-17
16 201841026019-FORM-26 [26-07-2021(online)].pdf 2021-07-26
17 201841026019-OTHERS [06-10-2021(online)].pdf 2021-10-06
18 201841026019-FER_SER_REPLY [06-10-2021(online)].pdf 2021-10-06
19 201841026019-DRAWING [06-10-2021(online)].pdf 2021-10-06
20 201841026019-COMPLETE SPECIFICATION [06-10-2021(online)].pdf 2021-10-06
21 201841026019-CLAIMS [06-10-2021(online)].pdf 2021-10-06
22 201841026019-ABSTRACT [06-10-2021(online)].pdf 2021-10-06
23 201841026019-RELEVANT DOCUMENTS [11-10-2021(online)].pdf 2021-10-11
24 201841026019-FORM-26 [11-10-2021(online)].pdf 2021-10-11
25 201841026019-FORM 13 [11-10-2021(online)].pdf 2021-10-11
26 201841026019-FER.pdf 2021-10-17
27 201841026019-US(14)-HearingNotice-(HearingDate-10-01-2024).pdf 2023-12-08
28 201841026019-Correspondence to notify the Controller [15-12-2023(online)].pdf 2023-12-15
29 201841026019-FORM-26 [06-01-2024(online)].pdf 2024-01-06
30 201841026019-Written submissions and relevant documents [25-01-2024(online)].pdf 2024-01-25
31 201841026019-US(14)-ExtendedHearingNotice-(HearingDate-05-03-2024).pdf 2024-02-06
32 201841026019-Correspondence to notify the Controller [08-02-2024(online)].pdf 2024-02-08
33 201841026019-Written submissions and relevant documents [20-03-2024(online)].pdf 2024-03-20
34 201841026019-PatentCertificate14-06-2024.pdf 2024-06-14
35 201841026019-IntimationOfGrant14-06-2024.pdf 2024-06-14

Search Strategy

1 2021-05-2911-25-30E_29-05-2021.pdf

ERegister / Renewals

3rd: 22 Aug 2024

From 12/07/2020 - To 12/07/2021

4th: 22 Aug 2024

From 12/07/2021 - To 12/07/2022

5th: 22 Aug 2024

From 12/07/2022 - To 12/07/2023

6th: 22 Aug 2024

From 12/07/2023 - To 12/07/2024

7th: 22 Aug 2024

From 12/07/2024 - To 12/07/2025

8th: 09 Jul 2025

From 12/07/2025 - To 12/07/2026