System, method, apparatus and computer program product for facilitating digital communications
First Claim
Patent Images
1. A computer-implemented method for securely accessing a computer from a client over a network comprising:
- receiving credentials from a user, said credentials including a user identification and a password;
encrypting said credentials with an encryption process;
creating a request message for access to said computer, said request message including said encrypted credentials;
transmitting said request message over the network;
receiving a verification message that access to said computer is granted; and
accessing said computer, wherein said user identification and said user password remain encrypted when transmitted over said network.
6 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method and apparatus provides secured access to a computer. In one aspect of the present invention, credentials are received from a user, the credentials including a user identification and a password. The credentials are encrypted with an encryption algorithm. A request for access to a computer is created, the request for access to the computer including the encrypted credentials. The request for access to the computer is transmitted over a network. Verification is received that access to the computer is granted. Access to the computer is received.
108 Citations
41 Claims
-
1. A computer-implemented method for securely accessing a computer from a client over a network comprising:
-
receiving credentials from a user, said credentials including a user identification and a password;
encrypting said credentials with an encryption process;
creating a request message for access to said computer, said request message including said encrypted credentials;
transmitting said request message over the network;
receiving a verification message that access to said computer is granted; and
accessing said computer, wherein said user identification and said user password remain encrypted when transmitted over said network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for securely authenticating access to a computer from a client over a network comprising:
-
receiving a request message for access to said computer from said client, said request message transmitted over said network, said request message including encrypted credentials, said encrypted credentials including an encrypted user identification and an encrypted password;
decrypting said encrypted credentials to form decrypted credentials;
verifying that said decrypted credentials are valid;
sending a verification message to said client; and
granting said client access to said computer, wherein said user identification and said user password remain encrypted when transmitted over said network. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A computer program product including a computer storage medium and a computer program code mechanism embedded in the computer storage medium for securely accessing a computer from a client over a network, the computer code mechanism comprising:
-
a computer code device configured to receive credentials from a user, said credentials including a user identification and a password;
a computer code device configured to encrypt said credentials with an encryption process;
a computer code device configured to create a request message for access to said computer, said request message including said encrypted credentials;
a computer code device configured to transmit said request message over the network;
a computer code device configured to receive a verification message that access to said computer is granted; and
a computer code device configured to access said computer, wherein said user identification and said user password remain encrypted when transmitted over said network.
-
-
29. A computer program product including a computer storage medium and a computer program code mechanism embedded in the computer storage medium for securely authenticating access to a computer from a client over a network, the computer code mechanism comprising:
-
a computer code device configured to receive a request message for access to said computer from said client, said request message transmitted over said network, said request message including encrypted credentials, said encrypted credentials including an encrypted user identification and an encrypted password;
a computer code device configured to decrypt said encrypted credentials to form decrypted credentials;
a computer code device configured to verify that said decrypted credentials are valid;
a computer code device configured to send a verification message to said client; and
a computer code device configured to grant said client access to said computer, wherein said user identification and said user password remain encrypted when transmitted over said network.
-
-
30. An apparatus for securely accessing a computer from a client over a network comprising:
-
means for receiving credentials from a user, said credentials including a user identification and a password;
means for encrypting said credentials with an encryption process;
means for creating a request message for access to said computer, said request message including said encrypted credentials;
means for transmitting said request message over the network;
means for receiving a verification message that access to said computer is granted; and
a data access mechanism configured to access data stored on said computer, wherein said user identification and said user password remain encrypted when transmitted over said network.
-
-
31. An apparatus for securely authenticating access to a computer from a client over a network comprising:
-
means for receiving a request message for access to said computer from said client, said request message transmitted over said network, said request message including encrypted credentials, said encrypted credentials including an encrypted user identification and an encrypted password;
means for decrypting said encrypted credentials to form decrypted credentials;
means for verifying that said decrypted credentials are valid;
means for sending a verification message to said client; and
means for granting said client access to said computer, wherein said user identification and said user password remain encrypted when transmitted over said network.
-
-
32. An apparatus for securely accessing a computer from a client over a network comprising:
-
an input/output device configured to receive credentials from a user, said credentials including a user identification and a password;
an encryption mechanism configured to encrypt said credentials with an encryption process; and
a processor including a request message generation mechanism configured to create a request message for access to said computer, said request message including said encrypted credentials, wherein said input/output device is configured to transmit said request message over the network and receive a verification message that access to said computer is granted, and said user identification and said user password remain encrypted when transmitted over said network. - View Dependent Claims (33, 34, 35, 36)
-
-
37. An apparatus for securely authenticating access to a computer from a client over a network comprising:
-
an input/output device configured to receive a request message for access to said computer from said client, said request message transmitted over said network, said request message including encrypted credentials, said encrypted credentials including an encrypted user identification and an encrypted password;
a decryption mechanism configured to decrypt said encrypted credentials to form decrypted credentials; and
a processor including a verification mechanism configured to verify that said decrypted credentials are valid, wherein said input/output device configured to send a verification message to said client, said processor includes access control mechanism configured to grant said client access to said computer, and said user identification and said user password remain encrypted when transmitted over said network. - View Dependent Claims (38, 39, 40, 41)
-
Specification