METHOD AND APPARATUS FOR ENHANCING SECURITY IN NETWORK-BASED DATA COMMUNICATION
First Claim
1. A method of enhancing security in a network-based data communication, the method including:
- a) maintaining at least access to data which a transmitting user may selectively transmit;
b) providing a submit control associated with a recipient user to which the data may be selectively transmitted;
c) in response to the transmitting user activating the submit control, presenting information to the transmitting user that identifies the recipient user to which the data is about to be sent; and
d) in response to the transmitting user activating a verification control, transmitting the data to the recipient user.
3 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of a method and associated equipment for enhancing security in a network-based data communication are provided. In one embodiment, the method includes: a) maintaining at least access to data which a transmitting user may selectively transmit, b) providing a submit control associated with a recipient user to which the data may be selectively transmitted, c) in response to the transmitting user activating the submit control, presenting information to the transmitting user that identifies the recipient user to which the data is about to be sent, and d) in response to the transmitting user activating a verification control, transmitting the data to the recipient user. In one embodiment, the associated equipment includes a first computing device associated with a transmitting user, a second computing device associated with a recipient user; and a communication network through which the first computing device can operatively communicate with the second computing device.
30 Citations
20 Claims
-
1. A method of enhancing security in a network-based data communication, the method including:
-
a) maintaining at least access to data which a transmitting user may selectively transmit; b) providing a submit control associated with a recipient user to which the data may be selectively transmitted; c) in response to the transmitting user activating the submit control, presenting information to the transmitting user that identifies the recipient user to which the data is about to be sent; and d) in response to the transmitting user activating a verification control, transmitting the data to the recipient user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for enhancing security in a network-based data communication, the apparatus including:
-
a first computing device associated with a transmitting user, the first computing device including a submit control, a display device, and a verification control; a second computing device associated with a recipient user; and a communication network through which the first computing device can operatively communicate with the second computing device; wherein the first computing device maintains at least access to data which the transmitting user may selectively transmit, the submit control is associated with the recipient user to which the data may be selectively transmitted, the display device displays information to the transmitting user that identifies the recipient user to which the data is about to be sent in response to the transmitting user activating the submit control, and the first computing device transmits the data to the recipient user in response to the transmitting user activating the verification control. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method of enhancing security in a network-based data communication, the method including:
-
a) maintaining data which a transmitting user may selectively transmit in one or more text fields of a web page; b) providing a submit control in the web page associated with a recipient user to which the data may be selectively transmitted; c) in response to the transmitting user activating the submit control, presenting at least one of a registered name, a domain name, a uniform resource locater (URL), and an internet protocol (IP) address in a dialog box to the transmitting user that identifies the recipient user to which the data is about to be sent; and d) in response to the transmitting user activating a verification control associated with the dialog box, transmitting the data to the recipient user. - View Dependent Claims (17, 18, 19, 20)
-
Specification