Method for securing communication by selecting an encoding process using a first computer based upon ability of a second computer and deleting the process thereafter
First Claim
1. A method of enhancing network security comprising the steps of:
- (a) initiating a communication session between a first computer and a second other computer;
(a1) providing from the second computer to the first computer data indicative of processing ability of the second computer;
(a2) selecting the process based on the provided data (b) transmitting from the first computer to the second other computer in communication therewith a process selected from a plurality of processes for securing communications therebetween;
(c) securing communications on the second other computer using said process;
(d) securing communications on the first computer using a process associated with the transmitted process; and
, (e) erasing the process from the second other computer approximately when the communication session is ended.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of enhancing network security is provided for a communication session initiated between a first computer and a second other computer. From the first computer to the second computer in communications therewith a process for securing communications therebetween is transmitted. One such process is a biometric characterisation process for characterising fingerprints. The process is for execution on the second computer and is selected to be compatible therewith. Communications from the second computer to the first computer are secured using the transmitted process on the second computer and using, on the first computer, a compatible process to the transmitted process. The host computer can modify or replace the process or data particular to the process before each session, during a session, or at intervals.
208 Citations
10 Claims
-
1. A method of enhancing network security comprising the steps of:
-
(a) initiating a communication session between a first computer and a second other computer;
(a1) providing from the second computer to the first computer data indicative of processing ability of the second computer;
(a2) selecting the process based on the provided data (b) transmitting from the first computer to the second other computer in communication therewith a process selected from a plurality of processes for securing communications therebetween;
(c) securing communications on the second other computer using said process;
(d) securing communications on the first computer using a process associated with the transmitted process; and
,(e) erasing the process from the second other computer approximately when the communication session is ended. - View Dependent Claims (2)
-
-
3. A method of enhancing network security comprising the steps of
(a) initiating a communication session between a first computer and a second other computer; -
(b) transmitting from the first computer to the second other computer in communication therewith a process for characterising user authorisation information;
(c) characterising user authorisation information received at the second other computer to produce data using the process for characterising user authorisation information;
(d) transmitting the data to the first computer; and
(e) comparing the data received by the first computer to information on the first computer to determine a value indicative of a quality of user identification and when the quality is within predetermined limits for an acceptable quality, performing one of identifying a source of the authorisation information and authorising access from the second other computer to information secured by the first computer. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10)
providing data indicative of a user identity to the second other computer; - and,
transmitting the data indicative of a user identity to the first computer wherein the user authorisation information is biometric information, wherein the process is selected by the first computer in dependence upon data indicative of a user identity, and wherein the process for characterising user authorisation information transmitted t the t second other computer comprises the step of extracting features from the biometric information.
-
-
8. A method of enhancing network security as defined in claim 3 wherein the user authorisation information is biometric information comprising the steps of
providing a biometric information sample to a biometric input device in communication with the second other computer; -
providing data indicative of a biometric information source of the biometric information sample;
providing data indicative of a user identity;
transmitting to the first computer the data indicative of a user identity and the biometric information source;
selecting a process from a plurality of processes associated with one of a plurality of templates associated with the identified biometric information source of the identified individual;
and wherein the step of (e) performing one of identifying a source of the biometric information and authorising access from the second other computer to information secured by the first computer comprises the step of determining within predetermined level of security whether the biometric information provided is from a same individual as that identified.
-
-
9. A method of enhancing network security as defined in claim 3 wherein the user authorisation information is biometric information comprising the steps of
providing data indicative of a user identity; -
wherein the process comprises one of a plurality of processes associated with the data indicative of a user identity and wherein the process comprises the step of;
prompting the user to provide a biometric information sample from a predetermined biometric information source to a biometric input device in communication with the second other computer;
and wherein the step of (e) performing one of identifying a source of the biometric information and authorising access from the second other computer to information secured by the first computer comprises the step of determining within predetermined level of security whether the biometric information provided is from a same individual as the user identity.
-
-
10. A method of enhancing network security as defined in claim 9 comprising the steps of:
when the determination is not with a predetermined level of security, repeating steps (b), (c), (d) and (e).
Specification