Trusted network transfer of content using off network input code
First Claim
Patent Images
1. A method for transmitting content from a first computing device to a second computing device in a network, comprising:
- generating a trust code on the first computing device;
transporting the trust code, off the network, from the first computing device to the second computing device, the trust code once delivered off the network being a comparison code; and
performing an authentication exchange between the first computing device and the second computing device on the network, including comparing the comparison code to the trust code, wherein if the comparison code does not have a pre-defined relationship with the trust code, the content is not trusted for delivery to the second computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for use in connection with the trusted transmission and reception of content, such as encryption key information, from one computing device in a network to a second computing device are provided. In one embodiment, the invention provides a way to trust or validate the transfer of a public key using a very short code entered out of band of the network that is easy for end-users to remember, or write down.
-
Citations
51 Claims
-
1. A method for transmitting content from a first computing device to a second computing device in a network, comprising:
-
generating a trust code on the first computing device;
transporting the trust code, off the network, from the first computing device to the second computing device, the trust code once delivered off the network being a comparison code; and
performing an authentication exchange between the first computing device and the second computing device on the network, including comparing the comparison code to the trust code, wherein if the comparison code does not have a pre-defined relationship with the trust code, the content is not trusted for delivery to the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for transmitting content from a first computing device to a second computing device in a network, comprising:
-
generating a trust code on the second computing device;
transporting the trust code, off the network, from the second computing device to the first computing device, the trust code delivered off the network being a comparison code; and
performing an authentication exchange between the second computing device and the first computing device on the network, including comparing the comparison code to the trust code, wherein if the comparison code does not have the pre-defined relationship with the trust code, the content is not trusted for receipt by the second computing device. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method for transmitting content from a first computing device to a second computing device in a network, comprising:
-
generating a trust code on the first computing device;
transporting the trust code, off the network, from the first computing device to the second computing device, the trust code once delivered off the network being a comparison code;
receiving affirmation on the network that the second device has received a comparison code;
generating a hash value with a hashing algorithm based on at least the trust code;
transmitting the hash value on the network to the second computing device;
receiving the comparison code on the network by the first computing device;
comparing the comparison code to the trust code, wherein if the comparison code has a pre-defined relationship with the trust code, the content is trusted for delivery to the second computing device. - View Dependent Claims (29, 30)
-
-
31. A method for receiving content from a first computing device by a second computing device in a network, comprising:
-
receiving a comparison code off the network by the second computing device after a trust code has been output by the first computing device;
notifying the first device of the receipt of the comparison code off the network;
receiving a hash value generated by the first device with a hashing algorithm based on at least the trust code;
transmitting the comparison code to the first computing device on the network; and
if the comparison code has a pre-defined relationship with the trust code as compared by said first computing device, trusting and receiving the content by the second computing device. - View Dependent Claims (32, 33)
-
-
34. User interface components for use in connection with establishing trust for the delivery of content from a first computing device to a second computing device over a network, comprising:
-
a first component for generating and outputting a trust code to a user on the first computing device via a display of the first computing device; and
a second component for receiving the trust code, off the network, via at least one input device of the second computing device, the trust code once delivered off the network being a comparison code;
wherein, in response to said second component receiving the comparison code, said first and second components perform an authentication exchange between the first computing device and the second computing device on the network, including comparing the comparison code to the trust code, wherein if the comparison code does not have a pre-defined relationship with the trust code, the content is not trusted for delivery to the second computing device. - View Dependent Claims (35)
-
-
36. An interface component for use in connection with establishing trust for the delivery of content from a first computing device to a second computing device over a network, comprising:
-
an input for receiving a trust code from a first computing device in response to being inserted in the first computing device; and
an output for outputting the trust code, off the network, in response to being inserted in the second computing device, the trust code once delivered off the network being a comparison code;
wherein, in response to said second computing device receiving the comparison ode, an authentication exchange occurs between the first computing device and the second computing device on the network, including comparing the comparison code to the trust code, wherein if the comparison code does not have a pre-defined relationship with the trust code, the content is not trusted for delivery to the second computing device. - View Dependent Claims (37)
-
-
38. A computer readable medium comprising computer executable modules having computer executable instructions for transmitting content between a first device and a second device in a trusted manner in a network, comprising:
-
means for generating a trust code on the first computing device;
means for transporting the trust code, off the network, from the first computing device to the second computing device, the trust code once delivered off the network being a comparison code; and
means for performing an authentication exchange between the first computing device and the second computing device on the network, including means for comparing the comparison code to the trust code, wherein if the comparison code does not have the pre-defined relationship with the trust code, the content is not trusted for delivery to the second computing device. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. A computer readable medium comprising computer executable modules having computer executable instructions for transmitting content between a first device and a second device in a trusted manner in a network, comprising:
-
means for generating a trust code on the second computing device;
means for transporting the trust code, off the network, from the second computing device to the first computing device, the trust code delivered off the network being a comparison code; and
means for performing an authentication exchange between the second computing device and the first computing device on the network, including means for comparing the comparison code to the trust code, wherein if the comparison code does not have the pre-defined relationship with the trust code, the content is not trusted for receipt by the second computing device. - View Dependent Claims (49, 50, 51)
-
Specification