System and method for establishing secure internet communication between a remote computer and a host computer via an intermediate internet computer
First Claim
1. A method of initiating communication between a host computer system and a remote computer system comprising:
- transmitting from the remote computer system request data over an Internet;
receiving at an intermediary computer system said request data from the Internet;
transmitting from the intermediary computer system said request data outside of the Internet;
receiving at the host computer system said request data from outside of the Internet;
first authenticating an identity of the remote computer system at the host computer system;
connecting the host computer system to the Internet in response to said request data when said identity of the remote computer system is first authenticated;
communicating over the Internet between the host computer system and the remote computer system;
second authenticating said identity of the remote computer system at the host computer system in response to data received in said communicating over the Internet, and continuing said communicating over the Internet when said identity of the remote computer system is second verified;
third authenticating said identity of the remote computer system at the intermediary computer system; and
wherein said transmitting from the intermediary computer system said request data outside of the Internet comprises transmitting from the intermediary computer system said request data outside of the Internet when said identity of the remote computer system is third authenticated.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method is provided for initiating an activation script of commands that create a connection between the host system and the Internet. A user at a remote computer system initiates a request over the Internet to a intermediary computer system associated with a host system for a remote connection thereto. The intermediary computer system is geographically located in the local telephone calling area of the host computer system and has a continuous connection to the Internet. The intermediary computer system initiates an asynchronous call to the host computer system via modem to transmit the request. The host computer system receives this request to connect to the Internet from the intermediary computer system. This request contains the remote requestor'"'"'s identity for the purposes of feedback. Authentication of the remote requestor is performed and the host computer system acknowledges the request. The host computer system then disconnects from the intermediary computer system connects to the Internet. If the remote requestor is not authenticated then the host computer system disconnects from the intermediary system and does not connect to the Internet. The host computer system communicates over the Internet with the remote computer system to establish the identity feedback. If identity feedback is verified, then the remote computer system can begin normal TCPIP based communications with the host computer system.
-
Citations
24 Claims
-
1. A method of initiating communication between a host computer system and a remote computer system comprising:
-
transmitting from the remote computer system request data over an Internet;
receiving at an intermediary computer system said request data from the Internet;
transmitting from the intermediary computer system said request data outside of the Internet;
receiving at the host computer system said request data from outside of the Internet;
first authenticating an identity of the remote computer system at the host computer system;
connecting the host computer system to the Internet in response to said request data when said identity of the remote computer system is first authenticated;
communicating over the Internet between the host computer system and the remote computer system;
second authenticating said identity of the remote computer system at the host computer system in response to data received in said communicating over the Internet, and continuing said communicating over the Internet when said identity of the remote computer system is second verified;
third authenticating said identity of the remote computer system at the intermediary computer system; and
wherein said transmitting from the intermediary computer system said request data outside of the Internet comprises transmitting from the intermediary computer system said request data outside of the Internet when said identity of the remote computer system is third authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a remote computer system for transmitting request data over an Internet;
an intermediary computer system receptive to said request data from the Internet and configured for transmitting said request data outside of the Internet in response to said request data;
a host computer system receptive to said request data from outside of the Internet, said host computer system configured for first authenticating an identity of said remote computer system and connecting said host computer system to the Internet in response to said request data when said identity of the remote computer system is first authenticated, said host computer system configured for communicating over the Internet between the host computer system and the remote computer system, said host computer system configured for second authenticating said identity of said remote computer system in response to data received in communications over the Internet and continuing communications with said remote computer system over the Internet when said identity of said remote computer system is second verified;
wherein said intermediary computer system is further configured for third authenticating said identity of said remote computer system, and wherein said intermediary computer system configured for transmitting said request data outside of the Internet comprises transmitting said request data outside of the Internet when said identity of the remote computer system is third authenticated. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of initiating communication between a host computer system and a remote computer system, comprising:
-
transmitting from the remote computer system request data over an Internet;
receiving at an intermediary computer system said request data from the Internet;
transmitting from the intermediary computer system a signal to determine if the host computer system is connected to the Internet;
transmitting from the intermediary computer system said request data (1) over the Internet when the host computer system is connected to the Internet and (2) outside of the Internet otherwise;
receiving at the host computer system said request data;
first authenticating an identity of the remote computer system at the host computer system;
communicating over the Internet between the host computer system and the remote computer system when said identity of the remote computer system is first authenticated;
second authenticating said identity of the remote computer system at the host computer system in response to data received in said communicating over the Internet, and continuing said communicating over the Internet when said identity of the remote computer system is second verified;
third authenticating said identity of the remote computer system at the intermediary computer system;
wherein said transmitting from the intermediary computer system said request data outside of the Internet comprises transmitting from the intermediary computer system said request data outside of the Internet when said identity of the remote computer system is third authenticated. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A system comprising:
-
a remote computer system for transmitting request data over an Internet;
an intermediary computer system receptive to said request data from the Internet, said intermediary computer system configured for transmitting a signal to determine if a host computer system is connected to the Internet and for transmitting said request data (1) over the Internet when said host computer system is connected to the Internet and (2) outside of the Internet otherwise;
a host computer system receptive to said request data, said host computer system configured for first authenticating an identity of said remote computer system, said host computer system further configured for communicating over the Internet between said host computer system and said remote computer system when said identity of said remote computer system is first authenticated, said host computer system configured for second authenticating said identity of said remote computer system in response to data received in communications over the Internet and continuing communications with said remote computer system over the Internet when said identity of said remote computer system is second verified;
wherein said intermediary computer system is further configured for third authenticating said identity of said remote computer system and wherein said intermediary computer system configured for transmitting said request data outside of the Internet comprises transmitting said request data outside of the Internet when said identity of the remote computer system is third authenticated. - View Dependent Claims (21, 22, 23, 24)
-
Specification