System and method for verifying users' identity in a network using e-mail communication
First Claim
1. A method of maintaining a user identification database that indicates when users are in communication with a network, the method comprising the acts of:
- associating in a computer accessible storage medium electronic mail addresses, processor-embedded identifiers and status information;
receiving a first electronic message from a first computer, the first electronic message containing an electronic mail address and a copy of the processor embedded identifier existing in the first computer;
using the first electronic mail address to access the corresponding processor-embedded identifier stored in the storage medium;
comparing the processor-embedded identifier from the first computer with the processor-embedded identifiers of the storage medium;
modifying the status information in the storage medium to indicate that the first electronic mail address is authentic when the processor-embedded identifier from the first computer matches a processor-embedded identifier of storage medium;
receiving a second electronic message from a second computer, the second electronic message requesting authentication of the first electronic mail address;
comparing the first electronic mail address with the electronic mail addresses stored in the storage medium; and
sending a third message to the second computer that indicates whether the first electronic mail address is authentic.
1 Assignment
0 Petitions
Accused Products
Abstract
A communications network includes several computers connected to a communications medium. In one embodiment, a client computer has a unique identification number that is embedded within a processor. The client computer includes a client module which generates a message that includes the identification number and sends the message over the communications medium. Another computer receives the message and retrieves the identification number from the message. In addition, the computer processes the identification number and updates an identification database. The processing of the identification number and the updating of the identification database is triggered when the message is received.
184 Citations
11 Claims
-
1. A method of maintaining a user identification database that indicates when users are in communication with a network, the method comprising the acts of:
-
associating in a computer accessible storage medium electronic mail addresses, processor-embedded identifiers and status information;
receiving a first electronic message from a first computer, the first electronic message containing an electronic mail address and a copy of the processor embedded identifier existing in the first computer;
using the first electronic mail address to access the corresponding processor-embedded identifier stored in the storage medium;
comparing the processor-embedded identifier from the first computer with the processor-embedded identifiers of the storage medium;
modifying the status information in the storage medium to indicate that the first electronic mail address is authentic when the processor-embedded identifier from the first computer matches a processor-embedded identifier of storage medium;
receiving a second electronic message from a second computer, the second electronic message requesting authentication of the first electronic mail address;
comparing the first electronic mail address with the electronic mail addresses stored in the storage medium; and
sending a third message to the second computer that indicates whether the first electronic mail address is authentic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
obtaining the status information that corresponds to the first electronic mail address; and
including the status information to the third message.
-
-
3. The method of claim 1, further comprising the act of using the authenticated first electronic mail address to establish a communications link between the first and second computers.
-
4. The method of claim 1, wherein the act of modifying the status information includes indicating the first computer as active.
-
5. The method of claim 1, wherein the act of receiving the second electronic mail includes indicating the second computer as active in the storage medium.
-
6. The method of claim;
- 1, wherein the act of associating electronic mail addresses includes registering the first and second computers in a computer accessible database.
-
7. The method of claim 6, wherein the act of registering includes storing each processor-embedded identifier in the database together with the electronic mail address of the registering computer.
-
8. The method of claim 1, further comprising the act of altering the processor-embodded identifier in the first computer.
-
9. The method of claim 8, wherein the act of altering includes encoding the processor-embedded identifier.
-
10. The method of claim 8, wherein the act of altering includes hashing the processor-embedded identifier.
-
11. The method of claim 1, further comprising the act of using the communications link to initiate sending an order from the first computer to the second computer as part of a sales transaction.
Specification