Computer implemented system and method for authenticating a sender of electronic data to a recipient
First Claim
Patent Images
1. A computer implemented method for authenticating a sender of electronic data to a recipient, said method comprising the following computer implemented steps:
- receiving from the sender, at a server remote from the sender, electronic data including at least an email address of the sender;
transmitting a message from the server to the sender'"'"'s email address, the message requesting proof of the sender'"'"'s identity and ownership of the transmitted electronic data, the messageprompting the sender to visit a website associated with the server to provide indications of identity and confirmation of authorship of the transmitted electronic data, andprompting the sender to draw a signature in a web-interface of the website as the indication of the sender'"'"'s identity and ownership of the transmitted electronic data;
receiving at the server a copy of the signature as a proof of the sender'"'"'s identity and ownership of the transmitted electronic data, the proof being sent in response to the message sent from the server to the sender'"'"'s email address;
recording the copy of the signature at the server as a confirmation of the sender'"'"'s identity and ownership of the transmitted data;
embedding the proof of the sender'"'"'s identity and ownership of the transmitted electronic data, into the electronic data; and
transmitting a copy of the electronic data generated by the sender with the proof of the sender'"'"'s identity and ownership embedded, from the server to a recipient.
1 Assignment
0 Petitions
Accused Products
Abstract
A sever receives data from a sender to be dispatched to a recipient. Before dispatching the data to the recipient the server sends a message to the sender'"'"'s email address requesting a response which will confirm the sender'"'"'s authorship of the data. Upon receiving the confirmation about sender'"'"'s authorship of the data, the server transmits the data together with an identification of the sender to the recipient.
-
Citations
16 Claims
-
1. A computer implemented method for authenticating a sender of electronic data to a recipient, said method comprising the following computer implemented steps:
-
receiving from the sender, at a server remote from the sender, electronic data including at least an email address of the sender; transmitting a message from the server to the sender'"'"'s email address, the message requesting proof of the sender'"'"'s identity and ownership of the transmitted electronic data, the message prompting the sender to visit a website associated with the server to provide indications of identity and confirmation of authorship of the transmitted electronic data, and prompting the sender to draw a signature in a web-interface of the website as the indication of the sender'"'"'s identity and ownership of the transmitted electronic data; receiving at the server a copy of the signature as a proof of the sender'"'"'s identity and ownership of the transmitted electronic data, the proof being sent in response to the message sent from the server to the sender'"'"'s email address; recording the copy of the signature at the server as a confirmation of the sender'"'"'s identity and ownership of the transmitted data; embedding the proof of the sender'"'"'s identity and ownership of the transmitted electronic data, into the electronic data; and transmitting a copy of the electronic data generated by the sender with the proof of the sender'"'"'s identity and ownership embedded, from the server to a recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for authenticating a sender of electronic data to a recipient, comprising:
-
a server computer having a processor programmed by software commands to receive electronic information from a sender, transmit a message to the sender asking the sender for proof of identity and ownership of the received electronic information, the message requesting proof of the sender'"'"'s identity and ownership of the transmitted electronic data, the message prompt the sender to visit a website associated with the server to provide indications of identity and confirmation of authorship of the transmitted electronic data, and prompt the sender to draw a signature in a web-interface of the website as the indication of the sender'"'"'s identity and ownership of the transmitted electronic data, receive a copy of the signatures as a proof of the sender'"'"'s identity and ownership of the received electronic information from the sender authenticating the sender to the email, record the copy of the signature as a combination of the sender'"'"'s identity and ownership of the transmitted data; embed the proof of the sender'"'"'s identity and ownership of the transmitted electronic information, into the electronic information; and transmit the electronic information with the proof of sender'"'"'s identity and ownership embedded to a recipient. - View Dependent Claims (14, 15, 16)
-
Specification