×

Secure Communication Method

  • US 9,078,127 B2
  • Filed: 02/10/2014
  • Issued: 07/07/2015
  • Est. Priority Date: 11/13/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing secure communication, the method comprising:

  • a first computing device to receive, over a network from a second computing device, a verification message generated by the second computing device in association with initiating a communication to the first computing device over the network, wherein the verification message is encrypted by the second computing device using a first cryptographic key;

    the first computing device transmitting to a wireless device via a wireless channel between the first computing device and the wireless device, the encrypted verification message, wherein the first computing device is located within a geographical area that is fixed by a location of the wireless device and defined by a signaling range of the wireless device;

    the first computing device receiving, from the wireless device over the wireless channel, a decrypted verification message decrypted from the encrypted verification message by the wireless device using a second cryptographic key associated with the first cryptographic key; and

    the first computing device transmitting over the network to the second computing device, the decrypted verification message, wherein if the second computing device determines that the decrypted verification message matches the verification message, the second computing device allows the communication to the first computing device to proceed,wherein the wireless device is a wireless router, the wireless channel between the first computing device and the wireless router is established as part of a wireless local area network (WLAN) created by the wireless router, and wherein the first computing device receives the decrypted verification message over the WLAN further comprises the first computing device receiving the decrypted verification message over the WLAN in accordance with a User Datagram Protocol (UDP) over a specified port.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×