System and method for preventing identity theft using a secure computing device
First Claim
1. A method for effecting secure transactions over a computer network in a manner designed to foil identity theft perpetrated from an untrusted computer, comprising:
- connecting a client computer to the network wherein the client computer provides a user interface to interact with a user;
connecting a server computer to the network;
connecting a portable secure computing device to the network;
operating the secure computing device to communicate a list of available services to the client computer;
responsive to receiving the list of available services using the user interface to display the list of available services to a user;
responsive to a selection of one available service by the user, establishing a secure connection from the secure computing device to the server;
securely communicating private information from the secure computing device to the server over the secure connection.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for effecting secure transactions over a computer network in a manner designed to foil identity theft perpetrated from an untrusted computer. A connection from a client computer to the network wherein the client computer provides a user interface for a user, a connection from a server computer to the network, and a connection from a portable secure computing device to the network provides for secure transmission of private confidential user information from the user to a server. The private information is transmitted directly from the secure computing device to the server over the secure connection without possibility of capture on the computer with which the user is interacting.
-
Citations
20 Claims
-
1. A method for effecting secure transactions over a computer network in a manner designed to foil identity theft perpetrated from an untrusted computer, comprising:
-
connecting a client computer to the network wherein the client computer provides a user interface to interact with a user;
connecting a server computer to the network;
connecting a portable secure computing device to the network;
operating the secure computing device to communicate a list of available services to the client computer;
responsive to receiving the list of available services using the user interface to display the list of available services to a user;
responsive to a selection of one available service by the user, establishing a secure connection from the secure computing device to the server;
securely communicating private information from the secure computing device to the server over the secure connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for secure transactions over a computer network in a manner designed to foil identity theft perpetrated from an untrusted computer, comprising:
-
connecting a client computer to the network wherein the client computer provides a user interface to interact with a user;
connecting a server computer to the network;
connecting a secure computing device to the network;
establishing a secure connection from the secure computing device to the server;
securely communicating private information from the secure computing device to the server over the secure connection;
authenticating a user using the private information; and
in response to successfully authenticating the user, conducting a transaction between the client and the server. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A system for effecting secure transactions over a computer network in a manner designed to foil identity theft through keystroke logging, comprising:
-
a server computer connected to a computer network and operable to provide some form of online transactions;
a client computer connected to the computer network and operable to interface with a user;
a secure computing device connected to the computer network and capable of establishing a secure connection with the server computer and the client computer;
wherein the secure computing device has logic operable to store private user information; and
wherein the secure computing device has logic, in response to the initiation of a transaction between a user operating the client computer and the server computer, operable to securely transmit the private user information to the server computer in a manner such that only the server can interpret the private user information. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification