Communication verification system
First Claim
Patent Images
1. A communication system comprising:
- a) a first link between a sending computer and an authorizing computer, said first link containing a request for a PIN associated with a receiving computer;
b) a second link between the authorizing computer and the sending computer, said second link containing a first PIN associated with the receiving computer; and
,c) a third link between the sending computer and the receiving computer containing an encrypted file formed using the first PIN from the second link.
1 Assignment
0 Petitions
Accused Products
Abstract
A communication system verifying the source of a file. The system uses a first link between a sending computer and an authorizing computer which contains a request for a PIN associated with the intended receiving computer. This PIN is returned to the first computer via a second link which permits the sending computer to properly communicate in an encrypted manner with the receiving computer. An alert or notice is sent to the receiving computer by the authorizing computer to further verify the authenticity of the file being sent to the receiving computer from the sending computer.
5 Citations
20 Claims
-
1. A communication system comprising:
-
a) a first link between a sending computer and an authorizing computer, said first link containing a request for a PIN associated with a receiving computer; b) a second link between the authorizing computer and the sending computer, said second link containing a first PIN associated with the receiving computer; and
,c) a third link between the sending computer and the receiving computer containing an encrypted file formed using the first PIN from the second link. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A secure communication system comprising:
-
a) a first, second, and third computer; and
,b) a network providing communication between the first, second, and third computer; and
,wherein; 1) the first computer communicates, via the network, a request to the second computer for a PIN associated with the third computer; 2) the second computer establishes a selected PIN associated with the third computer, creates a message containing the selected PIN, and communicates the message to the first computer via the network; 3) the first computer extracts the selected PIN from the message, and, using the selected PIN, encrypts a selected file from the second computer and communicates the encrypted file to the third computer; and
,4) the third computer decrypts the encrypted file using the selected PIN to obtain the selected file. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A verification system for electronic communications via a network having a first, second, and third computers, said verification system comprising:
-
a) a request from the first computer to the second computer for a PIN associated with the third computer; b) a message containing a selected PIN from the second computer to the first computer; c) an encrypted file from the first computer to the third computer using the selected PIN in the encryption process. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification