System to identify whether a text message is from a trusted source
First Claim
1. A system comprising:
- a first handset having a first module configured to send a text message over a wireless network in response to one or more user keystrokes, wherein said first module generates a body of said text message and a security key to be transmitted and displayed along with said body of said text message; and
a second handset having a second module configured to receive said body of said text message and said security key over said wireless network, wherein (A) said second module compares said transmitted security key to a set of known security keys previously stored in said second module to determine a match, (B) said match indicates whether said text message was generated from a known sender, and (C) said second handset is configured to display a prompt indicating said text message has been authenticated if said match occurs.
4 Assignments
0 Petitions
Accused Products
Abstract
The present invention concerns an apparatus comprising a first module and a second module. The first module may be configured to send a text message over a wireless network in response to one or more user keystrokes. The first module may generate a body of the text message and a security key to be transmitted along with the body of the text message. The second module may be configured to receive the body of the text message and the security key over the wireless network. The second module compares the security key to a set of known security keys to determine a match. A match indicates whether the text message was generated from a known sender. The first and second modules may be implemented as part of a portable device.
-
Citations
20 Claims
-
1. A system comprising:
-
a first handset having a first module configured to send a text message over a wireless network in response to one or more user keystrokes, wherein said first module generates a body of said text message and a security key to be transmitted and displayed along with said body of said text message; and a second handset having a second module configured to receive said body of said text message and said security key over said wireless network, wherein (A) said second module compares said transmitted security key to a set of known security keys previously stored in said second module to determine a match, (B) said match indicates whether said text message was generated from a known sender, and (C) said second handset is configured to display a prompt indicating said text message has been authenticated if said match occurs. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
means for sending a text message over a wireless network in response to one or more user keystrokes having a first module, wherein said first module generates (i) a body of said text message and (ii) a security key to be transmitted and displayed along with said body of said text message; and means for receiving said body of said text message and said security key over said wireless network by a second module, wherein (A) said second module compares said transmitted security key to a set of known security keys previously stored in said second module to determine a match, (B) said match indicates whether said text message was generated from a known sender and (C) said means for sending and said means for receiving are part of a portable device, and (D) said means for receiving is configured to display a prompt indicating said text message has been authenticated if said match occurs. - View Dependent Claims (19, 20)
-
-
18. A method for authenticating a source of a text message, comprising the steps of:
-
(A) sending a text message over a wireless network in response to one or more user keystrokes, wherein a module in a first handset generates a body of said text message and a security key to be transmitted and displayed along with said body of said text message; (B) receiving said body of said text message and said security key over said wireless network by a second handset; (C) comparing said received security key to a set of known security keys previously stored in said second handset to determine a match; (D) indicating whether said text message was generated from a known sender; and (E) displaying a prompt indicating said text message has been authenticated if said match occurs.
-
Specification