Method for transmitting data and implementing server

  • US 6,895,394 B1
  • Filed: 11/03/1998
  • Issued: 05/17/2005
  • Est. Priority Date: 11/04/1997
  • Status: Expired due to Term
  • ×
    • Pin
First Claim
Patent Images

1. A method for transmission of a secured electronic message, comprising the steps of:

  • receiving by an information processing system, from a user, via a communication network, the message to be transmitted, an identification of the user, and an identification of a destination for said message;

    opening a communication session between a remote communication device corresponding to the identification of the destination of said message, and the information processing system;

    generating, by said information processing system, a first confidential information for single use that cannot be used except during said communication session;

    and, during said communication session;

    transmitting, by the information processing system, of the first confidential information via a first transmission support, receiving, by the information processing system, said first confidential information from a second transmission support different from the first transmission support, verifying the first confidential information by said information processing system, and if the first confidential information is verified, supplying the secured message, by the information processing system, to the remote communication device corresponding to the identification of the destination of said message, the method further comprising the step of authenticating said user, wherein the authentication step comprises the steps of;

    generating, by said information processing system, a second confidential information for single use;

    supplying to said user, by said information processing system, of the second confidential information, on a third transmission support, receiving, by the information processing system, of the second confidential information, on a fourth transmission support different from the third transmission support, and verifying the second confidential information by said information processing system.

View all claims
    ×
    ×

    Thank you for your feedback

    ×
    ×