Methods and systems for secure transmission of information using a mobile device
First Claim
1. A method for secure transmission of information, comprising the steps of:
- (a) sending, from a client to a server, a request, at least one unique identifier and an encryption key;
(b) generating, at the server, a reply to the request;
(c) encrypting the reply, at the server, using the encryption key sent from the client to the server, to thereby produce an encrypted reply;
(d) identifying, at the server, a mobile device to which to send the encrypted reply, based on the at least one unique identifier;
(e) sending the encrypted reply from the server to the mobile device, wherein the mobile device does not have the encryption key sent from the client to the server; and
(f) decrypting the encrypted reply, at the client, in response to the encrypted reply being transferred from the mobile device to the client.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for secure transmission of information are provided. In accordance with a method of the present invention, a client sends to a server, a request, at least one unique identifier and an encryption key. The server generates a reply to the request and identifies a mobile device (based on the at least one unique identifier) to which to send the reply. The server also encrypts the reply, using the encryption key, to thereby produce an encrypted reply. The encrypted reply is then sent from the server to the mobile device (e.g., a mobile phone). Once received by the mobile device, the encrypted reply is available for transfer (automatically or manually) from the mobile device to the client. Once provided to the client, the client can decrypt the encrypted reply using the encryption key. The decrypted reply is then available for use at (e.g., by) the client.
-
Citations
48 Claims
-
1. A method for secure transmission of information, comprising the steps of:
-
(a) sending, from a client to a server, a request, at least one unique identifier and an encryption key;
(b) generating, at the server, a reply to the request;
(c) encrypting the reply, at the server, using the encryption key sent from the client to the server, to thereby produce an encrypted reply;
(d) identifying, at the server, a mobile device to which to send the encrypted reply, based on the at least one unique identifier;
(e) sending the encrypted reply from the server to the mobile device, wherein the mobile device does not have the encryption key sent from the client to the server; and
(f) decrypting the encrypted reply, at the client, in response to the encrypted reply being transferred from the mobile device to the client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for secure transmissions of one-time passwords (OTP) using mobile devices, comprising the steps of:
-
(a) sending, from a client to a server, a request for a OTP, at least one unique identifier and an encryption key;
(b) generating, at the server, the OTP;
(c) encrypting the OTP, at the server, using the encryption key sent from the client to the server, to thereby produce an encrypted OTP;
(d) identifying, at the server, a mobile device to which to send the encrypted OTP, based on the at least one unique identifier;
(e) sending the encrypted OTP from the server to the mobile device, wherein the mobile device does not have the encryption key sent from the client to the server; and
(f) decrypting the encrypted OTP, at the client, in response to the encrypted reply being transferred from the mobile device to the client. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method for secure transmission of information with a client that has or can generate an encryption key, the method comprising the steps of:
-
(a) receiving, from the client, a request, at least one unique identifier and an encryption key;
(b) generating a reply to the request;
(c) encrypting the reply using the encryption key that was received from the client, to thereby produce an encrypted reply;
(d) identifying a mobile device to which to send the encrypted reply, based on the at least one unique identifier; and
(e) sending the encrypted reply to the mobile device, which does not have the encryption key;
wherein the encrypted reply, once received by the mobile device, is available for transfer from the mobile device to the client, where the encrypted reply can be decrypted using the encryption key.
-
-
19. A subsystem for providing secure transmission of information with a client that has or can generate an encryption key, the subsystem comprising:
-
means for generating a reply to a request received from the client;
means for encrypting the reply using an encryption key received from the client, to thereby produce an encrypted reply; and
means for identifying a mobile device to which to send the encrypted reply, based on at least one unique identifier received from the client;
wherein the mobile device does not have the encryption key; and
wherein the encrypted reply, once received by the mobile device, is available for transfer from the mobile device to the client, where the encrypted reply can be decrypted using the encryption key. - View Dependent Claims (20)
-
-
21. A subsystem for providing secure transmission of information with a client that has or can generate an encryption key, the subsystem comprising:
-
a receive communications interface to receive a request, at least one unique identifier and an encryption key from the client;
a processor to produce a reply to the request, encrypt the reply using an encryption key received from the client, to thereby produce an encrypted reply, and identify a mobile device to which to send the encrypted reply, based on the at least one unique identifier; and
a transmit communications interface to send the encrypted reply to the identified mobile device;
wherein the identified mobile device does not have the encryption key; and
wherein the encrypted reply, once received by the identified mobile device, is available for transfer from the mobile device to the client, where the encrypted reply can be decrypted using the encryption key. - View Dependent Claims (22)
-
-
23. A system for secure transmission of information, comprising:
-
a client;
a server; and
a plurality of mobile devices;
wherein the client is configured to send a request, at least one unique identifier and an encryption key to the server; and
wherein the server is configured to generate a reply to the request, encrypt the reply using the encryption key sent from the client, to thereby produce an encrypted reply, identify a specific mobile device, of the plurality of mobile devices, to which to send the encrypted reply, and send the encrypted reply to the specific mobile device;
wherein none of the mobile devices have the encryption key;
wherein the encrypted reply, once received by the specific mobile device, is available for transfer from the specific mobile device to the client; and
wherein the client is further configured to decrypt the encrypted reply, using the encryption key, once the encrypted reply is transferred from the specific mobile device to the client. - View Dependent Claims (24, 25, 26)
-
-
27. A method for secure transmission of information, comprising the steps of:
-
(a) sending, from a client to an information server, a request for information;
(b) sending, from the client to an authentication server, an authentication request, at least one unique identifier and an encryption key;
(c) generating, at the authentication server, an authentication reply;
(d) encrypting the authentication reply, at the server, using the encryption key sent from the client to the authentication server to thereby produce an encrypted authentication reply;
(e) identifying, at the authentication server, a mobile device to which to send the encrypted authentication reply, based on the at least one unique identifier; and
(f) sending the encrypted authentication reply from the authentication server to the mobile device, wherein the mobile device does not have the encryption key sent from the client to the authentication server; and
(g) decrypting the encrypted authentication reply, at the client, in response to the encrypted authentication reply being transferred from the mobile device to the client. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34)
-
-
35. A system for secure transmission of information, comprising
a client; -
an information server;
an authentication server; and
a plurality of mobile devices;
wherein the client is configured to send a request for information to the information server, and send an authentication request, at least one unique identifier and an encryption key to the authentication server;
wherein the authentication server is configured to generate an authentication reply to the authentication request, encrypt the authentication reply using the encryption key received from the client to thereby produce an encrypted authentication reply, identify a specific mobile device, of the plurality of mobile devices, to which to send the encrypted authentication reply, based on the at least one unique identifier, and send the encrypted authentication reply to the specific mobile device;
wherein none of the mobile devices have the encryption key; and
wherein the client is further configured to decrypt the encrypted authentication reply in response to the encrypted authentication reply being transferred from the mobile device to the client. - View Dependent Claims (36, 37, 38, 39, 40, 41)
-
-
42. A method for secure transmission of information, comprising the steps of:
-
(a) a client sending a request, at least one unique identifier and an encryption key to a server, where a reply is generated and encrypted using the encryption key to thereby produce an encrypted reply that is sent to a mobile device identifiable based on the at least one unique identifier;
(b) receiving at the client the encrypted reply that was sent, in response to the request, from the server to the mobile device that was identified based on the at least one unique identifier and that does not have the encryption key that was sent to the server; and
(c) the client, in response to receiving the encrypted reply that was sent from the server to the mobile device, decrypting the encrypted reply using the encryption key that was sent with the request to the server, thereby producing a decrypted reply. - View Dependent Claims (43, 44, 45, 46)
-
-
47. A computer program product for execution by a server, useful for providing secure transmission of information between the server and a client that has or can generate an encryption key, the computer program product comprising:
-
computer code to generate a reply to a request received from the client;
computer code to encrypt the reply using an encryption key, received from the client, to thereby produce an encrypted reply; and
computer code to identify a mobile device to which to send the encrypted reply, based on at least one unique identifier received from the client;
wherein the identified mobile device does not have the encryption key; and
wherein the encrypted reply, once received by the identified mobile device, is available for transfer from the mobile device to the client, where the encrypted reply can be decrypted using the encryption key.
-
-
48. A processor readable storage media comprising a processor readable program code embodied on the processor readable storage medium, the processor readable program code for programming a processor to perform a method, the method comprising:
-
generating a reply to a request received from a client;
encrypting the reply using an encryption key, received from the client, to thereby produce an encrypted reply;
indentifying a mobile device to which to send the encrypted reply, based on at least one unique identifier received from the client; and
causing the encrypted reply to be sent to the identified mobile device;
wherein the identified mobile device does not have the encryption key; and
wherein the encrypted reply, once received by the identified mobile device, is available for transfer from the mobile device to the client, where the encrypted reply can be decrypted using the encryption key.
-
Specification