Trusted network transfer of content using off network input code
First Claim
Patent Images
1. A method implemented in a computing system for transmitting content from a first computing device to a second computing device in a network communicatively coupling the first computing device to the second computing device, comprising:
- the first computing device generating a trust code;
the first computing device storing the generated trust code;
transporting without use of the network the generated trust code from the first computing device to the second computing device, said transporting comprising displaying, by the first computing device, the generated trust code, and receiving without use of the network, at the second computing device via a user interface, a trust code;
performing an authentication exchange between the first computing device and the second computing device across the network, comprising;
receiving from the network at the first computing device the trust code received at the second computing device via the user interface,at the first computing device comparing the received trust code to the generated trust code, the generated trust code generated by the first computing device prior to receiving the trust code from the network and previously stored on the first computing device and,upon determining the received trust code does not have a pre-defined relationship with the generated trust code, determining at the first computing device the content is not trusted for delivery to the second computing device, andupon determining the received trust code has a pre-defined relationship with the generated trust code, determining at the first computing device the content is trusted for delivery to the second computing device; and
invalidating for future use a public key and a private key associated with the public key when said trust code received at the first computing device does not have the pre-defined relationship with said generated trust code, and said content is the public key.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for use in connection with the trusted transmission and reception of content, such as encryption key information, from one computing device in a network to a second computing device are provided. In one embodiment, the invention provides a way to trust or validate the transfer of a public key using a very short code entered out of band of the network that is easy for end-users to remember, or write down.
-
Citations
20 Claims
-
1. A method implemented in a computing system for transmitting content from a first computing device to a second computing device in a network communicatively coupling the first computing device to the second computing device, comprising:
-
the first computing device generating a trust code; the first computing device storing the generated trust code; transporting without use of the network the generated trust code from the first computing device to the second computing device, said transporting comprising displaying, by the first computing device, the generated trust code, and receiving without use of the network, at the second computing device via a user interface, a trust code; performing an authentication exchange between the first computing device and the second computing device across the network, comprising; receiving from the network at the first computing device the trust code received at the second computing device via the user interface, at the first computing device comparing the received trust code to the generated trust code, the generated trust code generated by the first computing device prior to receiving the trust code from the network and previously stored on the first computing device and, upon determining the received trust code does not have a pre-defined relationship with the generated trust code, determining at the first computing device the content is not trusted for delivery to the second computing device, and upon determining the received trust code has a pre-defined relationship with the generated trust code, determining at the first computing device the content is trusted for delivery to the second computing device; and invalidating for future use a public key and a private key associated with the public key when said trust code received at the first computing device does not have the pre-defined relationship with said generated trust code, and said content is the public key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer readable storage device comprising computer executable instructions for carrying out the method comprising of:
-
a first computing device generating a trust code; the first computing device storing the generated trust code; transporting without use of a network the generated trust code from the first computing device to a second computing device, said transporting comprising displaying, by the first computing device, the generated trust code, and receiving without use of the network, at the second computing device via a user interface, a trust code; performing an authentication exchange between the first computing device and the second computing device across the network, comprising; receiving from the network at the first computing device the trust code received at the second computing device via the user interface, at the first computing device comparing the received trust code to the generated trust code, the generated trust code generated by the first computing device prior to receiving the trust code from the network and previously stored on the first computing device and, upon determining the received trust code does not have a pre-defined relationship with the generated trust code, determining at the first computing device the content is not trusted for delivery to the second computing device, and upon determining the received trust code has a pre-defined relationship with the generated trust code, determining at the first computing device the content is trusted for delivery to the second computing device; and invalidating for future use a public key and a private key associated with the public key when said trust code received at the first computing device does not have the pre-defined relationship with said generated trust code, and said content is the public key. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
a second computing device; a first computing device communicatively connected with the second computing device, the first computing device comprising; a processor; and a memory coupled to the processor, the memory having stored thereon executable instructions that when executed by the processor cause the processor to effectuate operations comprising; generating a trust code; storing the generated trust code; participating in an authentication exchange with the second computing device across a network, comprising; receiving from the network a trust code received at the second computing device via a user interface of the second computing device, wherein the trust code was received at the second computing device without the use of the network; comparing the received trust code to the generated trust code, the generated trust code generated by the first computing device prior to receiving the trust code from the network and previously stored on the first computing device; and
,upon determining the received trust code does not have a pre-defined relationship with the generated trust code, determining the content is not trusted for delivery to the second computing device, and upon determining the received trust code has a pre-defined relationship with the generated trust code, determining the content is trusted for delivery to the second computing device; and providing instructions that cause invalidation for future use a public key and a private key associated with the public key when said received trust code does not have the pre-defined relationship with said generated trust code, and said content is the public key. - View Dependent Claims (19, 20)
-
Specification