Method for authenticating and verifying SMS communications
First Claim
1. A method for facilitating the secure transfer of a message between a first computational device and a second computational device, the steps comprising:
- encrypting an initial message existing within the first computational device to create an encrypted message on the basis of a key derived from one or more codes associated with the second computational device;
transmitting the encrypted message to the second computational device;
purging the initial message within the first computational device;
purging the encrypted message from the first computational device;
inputting one or more codes into the second computational device based upon the encrypted message;
transmitting one or more codes and the encrypted message to the first computational device;
decrypting the message by the first computational device on the basis of the one or more codes sent from the second computational device; and
transmitting the decrypted message to the second computational device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for operating a first computational device to facilitate the secure transfer of a message between the first computation device and a second computational device is described. The method comprises operating the first computational device according to the following steps: forming an encrypted message from the message on the basis of a key derived from one or more codes associated with the second computational device; transmitting the encrypted message to the second computational device; purging the message and the encrypted message from the first computational device; receiving the encrypted message and said one or more codes from the second computational device; upon decrypting the message on the basis of the one or more codes transmitting the decrypted message to the second computational device.
66 Citations
20 Claims
-
1. A method for facilitating the secure transfer of a message between a first computational device and a second computational device, the steps comprising:
-
encrypting an initial message existing within the first computational device to create an encrypted message on the basis of a key derived from one or more codes associated with the second computational device; transmitting the encrypted message to the second computational device; purging the initial message within the first computational device; purging the encrypted message from the first computational device; inputting one or more codes into the second computational device based upon the encrypted message; transmitting one or more codes and the encrypted message to the first computational device; decrypting the message by the first computational device on the basis of the one or more codes sent from the second computational device; and transmitting the decrypted message to the second computational device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for secure data transfer, between a content sender and a receiver, the steps comprising:
-
generating a data packet including a message from the content sender; transmitting the data packet to a security server; assigning a message identifier to the data packet received by the security server; storing the message identifier for the data packet in the security server; generating an encryption key for the message; encrypting the message using the encryption key created by the security server; generating a data package, wherein the data package includes the encrypted message and the message identifier; transmitting the data package to the receiver; purging the message and the encrypted message from the security server; entering a plurality of codes into the receiver in response to receipt of the data package; transmitting the encrypted message and the plurality of codes to the security server by the receiver; validating the plurality of codes transmitted within the security server; decrypting the encrypted message to form the message; transmitting the message to the receiver. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification