Secure communication of information via a communication network
First Claim
Patent Images
1. A method for securely communicating information, said method comprising:
- communicating an address to a first network device via the Internet such that the first network device provides information corresponding to the address for use by a second network device;
receiving encrypted information from the first network device via the Internet;
enabling the encrypted information to be posted at the address; and
enabling the second network device to access the address and retrieve the encrypted information posted at the address.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods for securely communicating information are provided. A representative method includes: communicating an address to a first network device via the Internet; receiving encrypted information from the first network device via the Internet; enabling the encrypted information to be posted at the address; and enabling a second network device to access and retrieve the encrypted information from the address via the Internet while the encrypted information is posted. Systems and other methods also are provided.
-
Citations
20 Claims
-
1. A method for securely communicating information, said method comprising:
-
communicating an address to a first network device via the Internet such that the first network device provides information corresponding to the address for use by a second network device;
receiving encrypted information from the first network device via the Internet;
enabling the encrypted information to be posted at the address; and
enabling the second network device to access the address and retrieve the encrypted information posted at the address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for enabling secure communication of information between a first network device and a second network device via the Internet, said system comprising:
-
a secure tunnel system communicating with the Internet;
the secure tunnel system being configured to;
provide address information to a first network device via the Internet;
receive encrypted information from the first network device via the Internet, post the encrypted information at an address associated with the address information; and
enable a second network device to access and retrieve the encrypted information from the address via the Internet while the encrypted information is posted. - View Dependent Claims (13, 14, 15)
-
-
16. A method for securely communicating information, said method comprising:
-
providing a first network device;
receiving, at the first network device, an address via the Internet;
providing a decryption key and the address to a mobile appliance via a secure communication link; and
providing encrypted information to the address via the Internet, such that a second network device is enabled to access and retrieve the encrypted information from the address via the Internet while the encrypted information is posted and decrypt the information using the decryption key provided from the mobile appliance. - View Dependent Claims (17, 18)
-
-
19. A system for enabling secure communication of information between a first network device and a second network device, said system comprising:
-
an information request system configured to communicate with the first and second network devices, the information request system being configured to receive an input from a user, the input corresponding to the user'"'"'s intent to have encrypted information communicated to the second network device, the information request system being further configured to receive a decryption key and information corresponding to an address from the first network device in a secure format, the information request system providing the decryption key and the information corresponding to the address to the second network device in the secure format, thereby enabling the second network device to access and retrieve encrypted information posted on the Internet at the address and decrypt the information using the decryption key. - View Dependent Claims (20)
-
Specification