Method for a secure information transfer
First Claim
1. Method for secure transmission of information between a user device (C) and a central computing device (S-D) located in a self-contained network, characterized in that originating from the user device (C) a request to connect with the central computing device (S-D) is sent to a second computing device (S-Q) not located in the self-contained network, that the second network device (S-Q) transmits a message (TAN1) containing a unique identification (SessionID) to a third computing device (S-Z) located in the self-contained network, that in cases in which the identification (SessionID) is recognized as valid, the third computing device (S-Z) stores the identification (SessionID) in a database (DB) and returns a confirmation message TAN (TAN2) to the second computing device (S-Q), that the user device (C) uses information contained in the confirmation message (TAN2) to initialize a connection with the central computing device (S-D), whereby the connection through the central computing device (S-D) is only accepted in cases in which access by the user device (C) is recognized from the stored identification (SessionID) as authorized.
2 Assignments
0 Petitions
Accused Products
Abstract
The method serves for a secure information transfer between a user device (C) and a central computer (S-D), arranged in a closed network. A connection request is signalled to a second computer (R-Q), not arranged in the closed network, from the user device (C), using the central computer (S-D). The second computer (S-Q) then transmits a message (TAN1)—containing an identification (SessionID) to a third computer (S-Z), arranged in the private network. The third computer (S-Z) stores the identification (Session ID) and transmits a verification report (TAN2) containing an access address (URL) for the central computer (S-D) to the second computer (S-Q), which forwards the verification report (TAN2) to the user device (C). The user device (C) then initialises a connection to the central computer (S-D), using the access address (URL), whereby the connection is only accepted by the central computer (S-D) n those cases where the access can be authorised by the stored identification (SessionID).
17 Citations
14 Claims
-
1. Method for secure transmission of information between a user device (C) and a central computing device (S-D) located in a self-contained network,
characterized in that originating from the user device (C) a request to connect with the central computing device (S-D) is sent to a second computing device (S-Q) not located in the self-contained network, that the second network device (S-Q) transmits a message (TAN1) containing a unique identification (SessionID) to a third computing device (S-Z) located in the self-contained network, that in cases in which the identification (SessionID) is recognized as valid, the third computing device (S-Z) stores the identification (SessionID) in a database (DB) and returns a confirmation message TAN (TAN2) to the second computing device (S-Q), that the user device (C) uses information contained in the confirmation message (TAN2) to initialize a connection with the central computing device (S-D), whereby the connection through the central computing device (S-D) is only accepted in cases in which access by the user device (C) is recognized from the stored identification (SessionID) as authorized.
Specification