Securing Communication over a Network Using User Identity Verification
First Claim
1. A method for securing communication over a network, comprising:
- at a server system having one or more processors and memory storing one or more programs for execution by the one or more processors;
receiving a first encrypted user identifier from a trust broker system associated with the server system, the first encrypted user identifier including information identifying a user of a client system verified by the trust broker system;
receiving a connection request packet from a first client system;
receiving a second encrypted user identifier from the first client system;
determining whether first encrypted user identifier matches the second encrypted user identifier; and
in accordance with a determination that the first encrypted user identifier matches the second encrypted user identifier, establishing an encrypted connection with the first client system.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for securing communication over a network is disclosed. The method is performed on a server system having one or more processors and memory storing one or more programs for execution by the one or more processors. The server system receives a first encrypted user identifier from a trust broker system associated with the server system, the first encrypted user identifier including information identifying a user of a client system verified by the trust broker system. The server system receives a connection request packet from a first client system. The server system then receives a second encrypted user identifier from the first client system. The server system determines whether first encrypted user identifier matches the second encrypted user identifier. In accordance with a determination that the first encrypted user identifier matches the second encrypted user identifier, the server system establishes an encrypted connection with the first client system.
-
Citations
20 Claims
-
1. A method for securing communication over a network, comprising:
at a server system having one or more processors and memory storing one or more programs for execution by the one or more processors; receiving a first encrypted user identifier from a trust broker system associated with the server system, the first encrypted user identifier including information identifying a user of a client system verified by the trust broker system; receiving a connection request packet from a first client system; receiving a second encrypted user identifier from the first client system; determining whether first encrypted user identifier matches the second encrypted user identifier; and in accordance with a determination that the first encrypted user identifier matches the second encrypted user identifier, establishing an encrypted connection with the first client system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. An electronic device for securing communication over a network, comprising:
-
one or more processors; memory storing one or more programs to be executed by the one or more processors; the one or more programs comprising instructions for; receiving a first encrypted user identifier from a trust broker system associated with the server system, the first encrypted user identifier including information identifying a user of a client system verified by the trust broker system; receiving a connection request packet from a first client system; receiving a second encrypted user identifier from the first client system; determining whether first encrypted user identifier matches the second encrypted user identifier; and in accordance with a determination that the first encrypted user identifier matches the second encrypted user identifier, establishing an encrypted connection with the first client system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium storing one or more programs configured for execution by an electronic device with a camera, the one or more programs comprising instructions for:
-
receiving a first encrypted user identifier from a trust broker system associated with the server system, the first encrypted user identifier including information identifying a user of a client system verified by the trust broker system; receiving a connection request packet from a first client system; receiving a second encrypted user identifier from the first client system; determining whether first encrypted user identifier matches the second encrypted user identifier; and in accordance with a determination that the first encrypted user identifier matches the second encrypted user identifier, establishing an encrypted connection with the first client system. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification