TRUSTED NETWORK TRANSFER OF CONTENT USING OF NETWORK INPUT CODE
First Claim
Patent Images
1. A method implemented in a computing system for transmitting content from a first computing device to a second computing device in a network, comprising:
- generating, by the first computing device without receiving user input, a trust code;
transporting the generated trust code from the first computing device to the second computing device, said transporting comprising displaying, by the first computing device, the generated trust code, and receiving, at the second computing device via a user interface, a trust code; and
performing an authentication exchange between the first computing device and the second computing device across the network, comprising;
receiving from the network at the first computing device the trust code received at the second computing device,at the first computing device comparing the received trust code to the generated trust code,when the received trust code does not have a pre-defined relationship with the generated trust code, determining at the first computing device the content is not trusted for delivery to the second computing device, andwhen the received trust code has a pre-defined relationship with the generated trust code, determining at the first computing device the content is trusted for delivery to the second computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for use in connection with the trusted transmission and reception of content, such as encryption key information, from one computing device in a network to a second computing device are provided. In one embodiment, the invention provides a way to trust or validate the transfer of a public key using a very short code entered out of band of the network that is easy for end-users to remember, or write down.
-
Citations
20 Claims
-
1. A method implemented in a computing system for transmitting content from a first computing device to a second computing device in a network, comprising:
-
generating, by the first computing device without receiving user input, a trust code; transporting the generated trust code from the first computing device to the second computing device, said transporting comprising displaying, by the first computing device, the generated trust code, and receiving, at the second computing device via a user interface, a trust code; and performing an authentication exchange between the first computing device and the second computing device across the network, comprising; receiving from the network at the first computing device the trust code received at the second computing device, at the first computing device comparing the received trust code to the generated trust code, when the received trust code does not have a pre-defined relationship with the generated trust code, determining at the first computing device the content is not trusted for delivery to the second computing device, and when the received trust code has a pre-defined relationship with the generated trust code, determining at the first computing device the content is trusted for delivery to the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method implemented in a computing system for transmitting content from a first computing device to a second computing device in a network, comprising:
-
generating, by the first computing device without receiving user input, a trust code; outputting from the first computing device the generated trust code for transport to the second computing device; receiving at the first computing device from the network, affirmation that the second device has received a trust code; generating, by the first computing device, a hash value using a hashing algorithm based on at least the generated trust code and content to be transmitted from the first computing device to the second computing device; transmitting, by the first computing device, the hash value on the network to the second computing device; receiving, by the first computing device from the network, a trust code inputted into the second computing device; determining, by the first computing device, whether the received trust code has a pre-defined relationship to the generated trust code; at the first computing device upon determining the received trust code does not have a pre-defined relationship with the generated trust code, transmitting an error message to the second computing device; and at the first computing device, upon determining the received trust code has a pre-defined relationship with the generated trust code, transmitting the content for delivery to the second computing device. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method implemented on a computing system for receiving content from a first computing device by a second computing device in a network, comprising:
-
receiving a physical input at the second computing device, the physical input identifying an inputted trust code, the physical input being received after a generated trust code has been randomly generated and output by the first computing device without user input; at the second computing device transmitting via the network notification to the first computing device of receipt of the inputted trust code at the second computing device; receiving from the network at the second computing device a hash value generated by the first device with a hashing algorithm based on at least the generated trust code and the content to be transmitted from the first computing device to the second computing device; at the second computing device, storing the hash value; at the second computing device transmitting via the network the inputted trust code to the first computing device; at the second computing device, receiving content via the network; at the second computing device, computing a hash value based on the received content and the inputted trust code; at the second computing device, determining if the computed hash value has a predefined relationship to the stored hash value; and at the second computing device, trusting the received content upon determining the computed hash value has a predefined relationship to the stored hash value. - View Dependent Claims (19, 20)
-
Specification