SYSTEM AND METHOD FOR TRUSTED COMMUNICATION
First Claim
1. A method of ensuring trusted communication between a plurality of clients on a computer network, the method comprising the steps of:
- receiving from a first client over the computer network a first token identifying a first portable memory device with which the first client is configured to operate;
receiving from the first client over the computer network a second token identifying a second portable memory device with which a second client is configured to operate; and
associating the first token with the second token in a database.
1 Assignment
0 Petitions
Accused Products
Abstract
A trusted communication system and methods of ensuring trusted communications are provided. A portable memory device is configured to resemble a character, and a client is configurable to operate specifically with that portable memory device. The client may allow a user to access network resources related to other clients belonging to other users having portable memory devices. Each portable memory device may have stored therein a unique token. A token from one portable memory device may be associated with a token of another portable memory device, e.g., by operating the first portable memory device with a client configured to operate with the second portable memory device. When two tokens are associated, the client configured to operate with a portable memory device having one of those tokens may access network resources related to another of those tokens.
73 Citations
20 Claims
-
1. A method of ensuring trusted communication between a plurality of clients on a computer network, the method comprising the steps of:
-
receiving from a first client over the computer network a first token identifying a first portable memory device with which the first client is configured to operate; receiving from the first client over the computer network a second token identifying a second portable memory device with which a second client is configured to operate; and associating the first token with the second token in a database. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A storage medium, readable by a first processor of a first computer system configured to operate with a first portable memory device identified by a first token, the medium having embodied therein a program of commands executable by the first processor, the program being adapted to be executed to:
-
receive a second token from a second portable memory device with which a second processor of a second computer system is configured to operate; determine whether the second token matches the first token; and upon determining that the second token does not match the first token, store the second token in association with the first token; store the first token in the second portable memory device; provide access to a network resource related to the second processor.
-
-
9. A method of ensuring trusted communications between a plurality of clients over a computer network, the method comprising the steps of:
-
receiving from a first client configured to operate with a first portable memory device a request to access a network resource related to a second client configured to operate with a second portable memory device; receiving from the first client a first token identifying the first portable memory device; querying a database to determine whether the first token is associated with a second token identifying the second portable memory device, the database containing a plurality of tokens and associations therebetween; and upon determining that the first token is associated with the second token, permitting the first client access to the network resource related to the second client. - View Dependent Claims (10, 11, 12)
-
-
13. A trusted communication system residing on a computer network and comprising:
-
a first portable memory device identified by a first token; a first client configured to operate with the first portable memory device; a first network resource related to the first client; a second portable memory device identified by a second token; a second client configured to operate with the second portable memory device; a database configured to store tokens and associations therebetween; and a trusted communication server configured to receive a request from the second client to access the first network resource, the request including the second token, and query the database to determine whether there is an association between the second token and the first token; wherein upon a determination that the database server contains an association between second token and the first token, the trusted communication server permits the second client access to the first network resource. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification