SYSTEMS AND METHODS FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL USING A BROWSER COMPONENT
First Claim
Patent Images
1. A method for authenticating a communication channel over a communication network, the method comprising:
- establishing a connection between a client and a secure server;
authenticating both the secure server and the client; and
providing the client access to information and/or services on the secure server upon authentication.
0 Assignments
0 Petitions
Accused Products
Abstract
A system for providing a secure channel for communication comprises a client comprising a browser, a secure server and a browser component installed on the client that enables a user to establish a connection with the secure server, the browser component configured to generate a first token. The secure server is configured to generate a second token, and wherein the client is provided with access to the secure server upon verification of the first token and the second token.
68 Citations
35 Claims
-
1. A method for authenticating a communication channel over a communication network, the method comprising:
-
establishing a connection between a client and a secure server; authenticating both the secure server and the client; and providing the client access to information and/or services on the secure server upon authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system for providing a secure channel for communication comprising:
-
a client comprising a browser; a secure server; and a browser component installed on the client that enables a user to establish a connection with the secure server, wherein the client is provided with access to the secure server upon authentication of the secure server and the client. - View Dependent Claims (24, 25, 26, 27, 28)
-
-
29. A system for providing secure communication over a communication channel, the system comprising:
-
a web browser; a browser component configured to provide a secure communication channel over a network. - View Dependent Claims (30, 31, 32, 33)
-
-
34. A computer readable storage medium having processor executable instructions that when executed, cause a computing device to perform a method, the method comprising:
-
activating a toolbar on the computing device; establishing a connection between the computing device and an external entity; generating a client token from the toolbar and receiving a secure server token from the external entity at the toolbar; verifying the secure server token; and providing the toolbar access to the external entity in response to the client token being verified by the external entity.
-
-
35. A computer readable storage medium having processor executable instructions that when executed, cause a computing device to perform a method, the method comprising:
-
establishing a connection between the computing device and an external entity comprising a toolbar; receiving a client token from the toolbar and generating a secure server token by the computing device; verifying the client token; and providing the toolbar access to the computing device in response to the secure server token being verified by the toolbar.
-
Specification