METHOD AND SYSTEM FOR PROTECTING REAL ESTATE FROM FRADULENT TITLE CHANGES
First Claim
1. A method of effecting secure communication over a network, comprising:
- interfacing a hardware token with a computer host, the hardware token comprising security software and communication software stored thereon, the security software being stored in a memory of the hardware token, the computer host comprising a memory distinct from the hardware token memory;
on the hardware token, determining an authenticity of the security software;
upon successful validation of the authenticity of the security software on the hardware token, determining an authenticity of the communication software by loading the security software from the hardware token memory into the computer host memory and executing the loaded security software from the computer host memory; and
after successful validation of the authenticity of the communication software, facilitating communication, via the computer host, between the hardware token and a remote computer remote from the computer host, by executing the communication software from the computer host memory.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of effecting secure communication over a network begins by interfacing a hardware token with a computer host. The hardware token includes security software and communication software stored thereon. The security software is stored in a memory of the hardware token. The computer host has a memory distinct from the hardware token memory. The authenticity of the security software is determined on the hardware token. Upon successful validation of the authenticity of the security software on the hardware token, the authenticity of the communication software is determined by loading the security software from the hardware token memory into the computer host memory and executing the loaded security software from the computer host memory. After successful validation of the authenticity of the communication software, the computer host facilitates communication between the hardware token and a remote computer by executing the communication software from the computer host memory.
-
Citations
26 Claims
-
1. A method of effecting secure communication over a network, comprising:
-
interfacing a hardware token with a computer host, the hardware token comprising security software and communication software stored thereon, the security software being stored in a memory of the hardware token, the computer host comprising a memory distinct from the hardware token memory; on the hardware token, determining an authenticity of the security software; upon successful validation of the authenticity of the security software on the hardware token, determining an authenticity of the communication software by loading the security software from the hardware token memory into the computer host memory and executing the loaded security software from the computer host memory; and after successful validation of the authenticity of the communication software, facilitating communication, via the computer host, between the hardware token and a remote computer remote from the computer host, by executing the communication software from the computer host memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A hardware token comprising:
-
an interface configured for interfacing the hardware token with a computer host; and a memory coupled to the interface and storing communication software and security software, the communication software being configured to facilitate communication between the hardware token and a computer server via the computer host, the security software being configured to determine an authenticity of the security software and an authenticity of the communication software and to load the communication software into the computer host for execution thereon after successful validation of the authenticity of the security software and the communication software. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method of effecting a transaction over a network, comprising:
-
interfacing a hardware token with a computer host, and interfacing a Smartcard with the hardware token, the computer host being in communication with a computer server over the network, the hardware token, the Smartcard and the computer server all being participants to the transaction; at each transaction participant verifying an identity of each other participant by receiving at each transaction participant digital signatures each purporting to be signed by a respective one of the other transaction participants, and determining whether each digital signature received at each transaction participant was signed by the respective other participant; and proceeding with the transaction in accordance with an outcome of the identity verifications. - View Dependent Claims (24, 25, 26)
-
Specification