Method and apparatus for securing e-mail attachments
DC CAFCFirst Claim
1. A method for exchanging data between a plurality of microprocessor based devices over a computer network so as to frustrate unauthorized access to said data, said method comprising:
- providing a plurality of security devices each being associated with at least one of said plurality of microprocessor based devices;
establishing a point-to-point electronic communications session between a first of said security devices being associated with a first of said microprocessor based devices and a second of said security devices being associated with a second of said microprocessor based devices;
exchanging security data between said first and second security devices using said point-to-point communications session;
encrypting data to be transmitted using said first security device and said security data; and
, transmitting said encrypted data from said first microprocessor based device to said second microprocessor based device over said computer network.
3 Assignments
Litigations
0 Petitions
Accused Products
Abstract
In accordance with a first aspect, a method for operating an electronic device adapted to be electronically coupled to at least one microprocessor based device and prevent unauthorized access to data exchanged between the at least one microprocessor based device and other microprocessor based devices, the method including: in a first mode, establishing a secure point-to-point communications session with another like device and receiving security data from the other like device, the security data being associated with an intended recipient microprocessor based device; and, in a second mode, receiving the data from an originating one of the at least one microprocessor based devices, encrypting the data using at least the received security data and sending the encrypted data to the originating microprocessor based device.
In accordance with a second aspect, a method for exchanging data between a plurality of suitable microprocessor based devices over a computer network so as to frustrate unauthorized access to the data, the method including: identifying at least first and second recipients for the data to be exchanged; identifying first security data associated with the first recipient and second security data associated with the second recipient; and, encrypting the data using the first and second security data.
32 Citations
28 Claims
-
1. A method for exchanging data between a plurality of microprocessor based devices over a computer network so as to frustrate unauthorized access to said data, said method comprising:
-
providing a plurality of security devices each being associated with at least one of said plurality of microprocessor based devices;
establishing a point-to-point electronic communications session between a first of said security devices being associated with a first of said microprocessor based devices and a second of said security devices being associated with a second of said microprocessor based devices;
exchanging security data between said first and second security devices using said point-to-point communications session;
encrypting data to be transmitted using said first security device and said security data; and
,transmitting said encrypted data from said first microprocessor based device to said second microprocessor based device over said computer network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for exchanging data between a plurality of electronic devices over a computer network so as to frustrate unauthorized access to said data, said method comprising:
-
providing a plurality of security devices each being associated with at least one of said plurality of electronic devices;
identifying an intended recipient having one of said electronic devices using an originating one of said electronic devices;
determining whether security data associated with said recipient electronic device is available to said originating electronic device, and if not;
establishing a point-to-point electronic communications session between a first of said security devices being associated with said originating electronic device and a second of said plurality of security devices being associated with said recipient electronic device, exchanging said security data between said first and second security devices using said point-to-point communications session, and storing said security data so as to be available to said first electronic device;
encrypting data residing on said first electronic device using said first security device and said security data; and
,transmitting said encrypted data from said first electronic device to said second electronic device over said computer network. - View Dependent Claims (14, 15, 16)
-
-
17. A method for operating an electronic device adapted to be electronically coupled to at least one microprocessor based device and prevent unauthorized access to data exchanged between said at least one microprocessor based device and other microprocessor based devices, said method comprising:
-
in a first mode, establishing a secure point-to-point communications session with another like device and receiving security data from said other like device, said security data being associated with an intended recipient microprocessor based device; and
,in a second mode, receiving said data from an originating one of said at least one microprocessor based devices, encrypting said data using at least said received security data and sending said encrypted data to said originating microprocessor based device. - View Dependent Claims (18, 19, 20)
-
-
21. A method for exchanging data between a plurality of suitable microprocessor based devices over a computer network so as to frustrate unauthorized access to said data, said method comprising:
-
identifying at least first and second recipients for said data to be exchanged;
identifying first security data associated with said first recipient and second security data associated with said second recipient; and
,encrypting said data using said first and second security data. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
Specification