Method and system for improving security in network applications
First Claim
1. A method of enhancing network security comprising the steps of:
- (a) initiating a communication session between a first computer and a second other computer;
(b) transmitting from the first computer to the second other computer in communication therewith a process for securing communications therebetween;
(c) characterising biometric information received at the second other computer with the process and transmitting to the first computer data in dependence upon the characterisation; and
,(d) securing communications on the first computer using a process for receiving the secured information and performing one of reversing the securing process and analysing the secured information on the first computer and associated with the transmitted process.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of enhancing network security is provided for a communication session initiated between a first computer and a second other computer. From the first computer to the second computer in communications therewith a process for securing communications therebetween is transmitted. One such process is a biometric characterisation process for characterising fingerprints. The process is for execution on the second computer and is selected to be compatible therewith. Communications from the second computer to the first computer are secured using the transmitted process on the second computer and using, on the first computer, a compatible process to the transmitted process. The host computer can modify or replace the process or data particular to the process before each session, during a session, or at intervals.
-
Citations
18 Claims
-
1. A method of enhancing network security comprising the steps of:
-
(a) initiating a communication session between a first computer and a second other computer; (b) transmitting from the first computer to the second other computer in communication therewith a process for securing communications therebetween; (c) characterising biometric information received at the second other computer with the process and transmitting to the first computer data in dependence upon the characterisation; and
,(d) securing communications on the first computer using a process for receiving the secured information and performing one of reversing the securing process and analysing the secured information on the first computer and associated with the transmitted process. - View Dependent Claims (2)
-
-
3. A method of enhancing network security comprising the steps of
(a) initiating a communication session between a first computer and a second other computer; -
(b) transmitting from the first computer to the second other computer in communication therewith a process for characterising user authorisation information comprising a non reversible transformation of the information; (c) characterising user authorisation information received at the second other computer to produce data using the process for characterising user authorisation information; (d) transmitting the data to the first computer; and (e) comparing the data received by the first computer to information on the first computer to determine a value and when the value is within predetermined limits performing one of identifying a source of the authorisation information and authorising access from the second other computer to information secured by the first computer, wherein the user authorisation information is biometric information. - View Dependent Claims (4, 5, 6, 7, 8)
-
-
9. A method of enhancing network security comprising the steps of
(a) initiating a communication session between a first computer and a second other computer; -
(b) transmitting from the first computer to the second other computer in communication therewith a process for characterising biometric information; (c) providing a biometric information sample from a biometric information source to the second other computer using a biometric input device; (d) characterising the biometric information sample provided to the second other computer according to the process transmitted from the first computer to produce data; (e) transmitting the data to the first computer; and (f) comparing the data received by the first computer during the session to information on the first computer to determine with a predetermined level of security an identification of an individual by whom the biometric information sample was provided. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method of enhancing network security comprising the steps of
(a) initiating a communication session between a first computer and a second other computer; -
(b) transmitting from the first computer to the second other computer in communication therewith a process for execution on the second other computer for characterising biometric information, the process comprising the steps of; accepting a first biometric information sample from a biometric source of the individual to a biometric input device in communication with a host processor, and using the processor of the second other computer, characterising the biometric information sample; (c) executing the process on the second other computer; (d) transmitting the characterised first biometric information to the first computer; (e) using the processor of the first computer, registering the characterised first biometric information sample with a first template to produce a first registration value; (f) when the first registration value is within predetermined limits, identifying the individual; and
,(g) when the first registration value is within other predetermined limits, transmitting a signal indicative of such to the second other computer and performing the steps of; (g1) executing the process on the second other computer with another different biometric information source, (g2) transmitting the characterised first biometric information to the first computer, (g3) using the processor of the first computer, registering the current biometric information sample with a template to produce a current registration value, (g4) when the first registration value and the current registration value are within predetermined limits, identifying the individual, and (g5) when the first registration value and the current registration value are within second other predetermined limits, repeating step (g). - View Dependent Claims (16, 17, 18)
-
Specification