SYSTEM AND METHOD FOR PROVIDING SECURE RECEPTION AND VIEWING OF TRANSMITTED DATA OVER A NETWORK
First Claim
1. A method for securely opening an e-mail attachment in a computing system having a trusted node connected to at least one operational node, comprising the steps of:
- sending the e-mail attachment to the operational node;
transcoding the e-mail attachment from a first digital format to a second digital format comprising a visual image format in the operational node;
loading pre-boot data and operating system software onto the operational node from a data store on the trusted node; and
causing the operational node to reboot to remove the pre-boot data and the operating system software from the operational node such that no rewrite functions are performed on the operational node.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for securely opening an e-mail attachment in a computer processing environment having a trusted node daughterboard connected to at least one operational node motherboard with an e-mail processing system operatively coupled to the trusted node daughterboard. The method includes the steps of when an e-mail attachment is to be opened, sending a power on signal from the trusted node daughterboard to the operational node motherboard when it is desired to utilize the operational node motherboard for opening an e-mail attachment. Pre-boot data is then requested from the operational node motherboard and is sent from the trusted node daughterboard to the operational node motherboard to enable operation of the operational node motherboard for securely opening an e-mail attachment.
275 Citations
24 Claims
-
1. A method for securely opening an e-mail attachment in a computing system having a trusted node connected to at least one operational node, comprising the steps of:
-
sending the e-mail attachment to the operational node; transcoding the e-mail attachment from a first digital format to a second digital format comprising a visual image format in the operational node; loading pre-boot data and operating system software onto the operational node from a data store on the trusted node; and causing the operational node to reboot to remove the pre-boot data and the operating system software from the operational node such that no rewrite functions are performed on the operational node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 18)
-
-
11. A system for securely opening an e-mail attachment, the system comprising:
-
an operational node configured to process e-mail messages; a trusted node daughterboard coupled to the operational node wherein the trusted daughterboard is operative to reset the operational motherboard into a trusted state and the trusted daughterboard is coupled to an e-mail processing system operative to direct an e-mail attachment from the e-mail processing system to the operational motherboard for opening thereof, wherein the at least a portion of the e-mail attachment is transcoded into a visual image of the data file in the operational node and aggregated in the trusted node into a document image format file. - View Dependent Claims (12, 13, 14, 15, 16, 17, 19, 20)
-
-
21. A method for securely opening a data file intended for a recipient in a computing system remote from the recipient, the method comprising the steps of:
-
providing a trusted node connected to at least one operational node; loading pre-boot data and operating system software onto the operational node from a data store on the trusted node; sending the data file to the operational node; transcoding the data file to a visual image of the data file in the operational node; aggregating the data files in the trusted node into a document image format file; and causing the operational node to reboot to remove the pre-boot data and the operating system software from the operational node such that no rewrite functions are performed on the operational node.
-
-
22. A method for securely opening a data file intended for a recipient in a computing system remote from the recipient, the method comprising the steps of:
-
providing at least one operational node in selective data connectivity with a source for the data file; sending the data file from the source to a node system; transcoding the data file to a visual image of the data file in the node system; loading pre-boot data and operating system software onto the operational node; causing the operational node to reboot to remove the pre-boot data and the operating system software from the operational node such that no rewrite functions are performed on the operational node; and providing user visual access to the visual image of the data file on the node system. - View Dependent Claims (23, 24)
-
Specification