System and apparatus for providing authenticable electronic communication
First Claim
1. A system for providing authenticable communication, wherein the system comprises:
- one or more processors;
one or more memory resources comprising;
an authentication mechanism database;
an indicated source database; and
wherein the one or more memory resources are connectable to one or more external device through a communications network, wherein at least one of the one or more external devices comprises an authenticable communication transmittal mechanism and at least one of the one or more external devices comprises an authenticable communication receiving mechanism, wherein the one or more memory resources are executable by the one or more processors to perform the steps of;
receiving an electronic communication comprising at least an indicated source comprising an apparent source, at least one recipient, and content;
converting the electronic communication to an authenticable communication, wherein converting comprises embedding at least one source authentication mechanism into the electronic communication, wherein the at least one source authentication mechanism allows the at least one recipient to authenticate the indicated source as an actual source, wherein the actual source comprises a true source;
transmitting the authenticable communication to the at least one recipient, wherein authentication of the authenticable communication is requestable by each of the at least one recipient, wherein authentication comprises a comparison of the indicated source to the actual source, and wherein a requested authentication transmits a secondary authentication request to one or both the indicated source or the indicated source database.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure provides generally for system and method of authenticating a source of electronic communication. According to the present disclosure, authenticable communications may allow for authentication of a source of the electronic communication, which may limit potential damage caused by fraudulent communications. In some aspects, an authenticable communication may allow the recipient to confirm that the indicated source is the actual source of the authenticable communication. In some embodiments, the authentication may not require an exchange of encrypted communications or an exchange of communications solely within the same communication system. Authenticable communications may provide a separate layer of security that may allow a recipient to review the contents with confidence that the communication is not fraudulent. Further, authenticable communications may provide the additional security without requiring specialized software.
-
Citations
18 Claims
-
1. A system for providing authenticable communication, wherein the system comprises:
-
one or more processors; one or more memory resources comprising; an authentication mechanism database; an indicated source database; and wherein the one or more memory resources are connectable to one or more external device through a communications network, wherein at least one of the one or more external devices comprises an authenticable communication transmittal mechanism and at least one of the one or more external devices comprises an authenticable communication receiving mechanism, wherein the one or more memory resources are executable by the one or more processors to perform the steps of; receiving an electronic communication comprising at least an indicated source comprising an apparent source, at least one recipient, and content; converting the electronic communication to an authenticable communication, wherein converting comprises embedding at least one source authentication mechanism into the electronic communication, wherein the at least one source authentication mechanism allows the at least one recipient to authenticate the indicated source as an actual source, wherein the actual source comprises a true source; transmitting the authenticable communication to the at least one recipient, wherein authentication of the authenticable communication is requestable by each of the at least one recipient, wherein authentication comprises a comparison of the indicated source to the actual source, and wherein a requested authentication transmits a secondary authentication request to one or both the indicated source or the indicated source database. - View Dependent Claims (2, 3, 4, 5, 12)
-
-
6. A system for providing source authentication for authenticable communication, wherein the system comprises:
-
one or more processors; one or more memory resources comprising; an authentication mechanism database; an indicated source database; wherein the one or more memory resources are connectable to external devices through a communications network, wherein at least one external device comprises an authenticable communication transmittal mechanism and at least one external device comprises an authenticable communication receiving mechanism, wherein the one or more memory resources are executable by the one or more processors to perform the steps of; receiving a primary authentication request for an authenticable communication, wherein the authenticable communication comprises an indicated source, one or more recipient, and content; accessing the authenticable communication; identifying an indicated source of the authenticable communication, wherein the indicated source comprises an apparent source; transmitting a secondary authentication request to one or both the indicated source or the indicated source database; receiving a response from one or both the indicated source or the indicated source database; identifying an actual source of the authenticable communication based on the response, wherein the actual source comprises a true source; authenticating the authenticable communication by comparing the indicated source to the actual source, wherein comparing produces an authentication result that confirms whether the indicated source and the actual source are the same; and transmitting the authentication result. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
13. A computer-implemented method for authenticating a source of an authenticable communication, the computer-implemented method comprising method steps of:
-
receiving a primary authentication request for an authenticable communication, wherein the authenticable communication comprises an indicated source, one or more recipient, and content; accessing the authenticable communication; identifying an indicated source of the authenticable communication, wherein the indicated source comprises an apparent source; transmitting a secondary authentication request to one or both the indicated source or an indicated source database; receiving a response from one or both the indicated source or the indicated source database; identifying an actual source of the authenticable communication based on the response, wherein the actual source comprises a true source; authenticating the authenticable communication by comparing the indicated source to the actual source, wherein comparing produces an authentication result that confirms whether the indicated source and the actual source are the same; and transmitting the authentication result. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification