Verification system for information transfers over a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S278000, C380S283000

Reexamination Certificate

active

06405319

ABSTRACT:

BACKGROUND OF THE INVENTION
This invention relates in general to computer networks and, more specifically, to a system for verifying, and assuring, a proper recipient for information transfers over computer networks.
As computer networks such as the world wide Internet, corporate intranets, local area networks (LANs), etc., grow in popularity, it becomes important to provide for secure transfer of information over such networks.
For example, the use of electronic mail, or “e-mail,” is a very common and quick way to transfer information from a sender to a receiver over a network. As the use of e-mail becomes more common, much of traditional correspondence is being handled electronically over networks.
However, a problem arises where sensitive information needs to be transferred via e-mail over a network. This is because e-mail is notoriously unsecured. Part of the reason for this is that e-mail information is relayed among several, or many, computers, before it reaches its intended destination. Another reason that e-mail is not a secure form of transmission is that individual e-mail accounts are sometimes accessible to other than the intended recipient. This can be due to either to carelessness on the intended recipient's part, illegal or dishonest acts on the part of a third party, etc. The nature of electronic media and communication often makes it relatively easy for a third party to view, appropriate, or otherwise obtain another person's information.
A further problem with e-mail communication is that one does not know the actual source of a received bit of information. In many of today's business dealings, a person needs to know, with a good degree of reliability, that they are dealing with the right person. E-mail transmissions are not confined to any one computer or any one place. An e-mail sender, or someone who is replying to another e-mail message, can originate their transmission, or response, from anywhere in the world. Note that these problems are not as likely with traditional forms of communication, such as regular mail, facsimile transmission, telephone communication, telegrams, etc.
Despite the potential problems with e-mail transmissions, it is desirable to be able to use electronic communication over a network because of the speed of communication, cost, ability to integrate communications with other computer applications, etc.
Thus, it is desirable to provide a system that overcomes some or all of the problems discussed above.
SUMMARY OF THE INVENTION
The present invention provides verification mechanisms to be used in network communication, such as e-mail. A person sending information to a previously unverified recipient first enters “Address Book” information about the unverified recipient into the sender's e-mail system. Part of this initial information includes the recipient's e-mail address and a way of communicating with the intended recipient other than by using the e-mail address. For example, regular mail, fax, or other means can be specified.
When the sender sends the information to the intended recipient, the recipient is not able to receive the information until an identification code is entered by the intended recipient. The identification code is transferred via a different method that does not use the intended recipient's e-mail address.
In a preferred embodiment, a fax is sent to the intended recipient that includes the identification code, referred to as a “Quick-Access Number” (QAN). The intended recipient then logs on to the e-mail system and enters their user name and QAN.
When the recipient logs on for the first time and enters the QAN, the recipient's e-mail account is associated with the sender's entry for that intended user in the sender's private address book. Provision is also made for a representative of the recipient, as opposed to the actual recipient, to perform the logon and receive the information. As part of the logon process, the person logging in is asked to attest that they are the intended recipient or a representative of the intended recipient. The initial logging on of the intended recipient, or the intended recipient's representative, generates an automatic fax to the intended recipient's fax number. This is the same fax number as used to convey the QAN to the intended recipient. This fax upon login acts to defeat any attempt by an outside party to intercept and use the QAN to log on and impersonate the intended recipient. The fax verification upon login is repeated for the first 5 documents sent by e-mail to recipients who are new users of the system.
In a preferred embodiment, the system of the present invention is designed to handle various aspects of building, or contractor, bidding. The system automatically tracks correspondence between senders and recipients. Multiple senders may make individual entries into their private address books for the same recipient. In each case, the new sender creates an entry that sends a fax with a new QAN to the intended recipient. The intended recipient must then log on and enter the new QAN before the entry in the new sender's personal address book is associated with the recipient's logon account. The sender is given a chance to synchronize information that the recipient has typed in such as company name, physical address, etc. This allows the sender to keep an updated address book entry. Addresses can also be made public so that any senders may use the public address associated with a recipient's.
In one embodiment, the invention provides a method for validating communications between a sending system and a human recipient over a computer network. The method includes steps of associating a network contact address with the human recipient; causing an initial send of information from the sending system to the human recipient over the computer network; in response to the step of initiating a send, providing an identification code to the human recipient by a method that does not use the network contact address; and detecting the submission of the identification code in association with the network contact address before completing the send of information from the sending system to the human recipient over the computer network.


REFERENCES:
patent: 4654718 (1987-03-01), Sueyoshi
patent: 5003405 (1991-03-01), Wulforst
patent: 5604803 (1997-02-01), Aziz
patent: 5629982 (1997-05-01), Micali
patent: 5633909 (1997-05-01), Fitch
patent: 5666420 (1997-09-01), Micali
patent: 5689642 (1997-11-01), Harkins et al.
patent: 5715402 (1998-02-01), Popolo
patent: 5748738 (1998-05-01), Bisbee et al.
patent: 5754306 (1998-05-01), Taylor et al.
patent: 5805298 (1998-09-01), Ho et al.
patent: 5859967 (1999-01-01), Kaufeld et al.
patent: 6012144 (2000-01-01), Pickett
patent: 6025931 (2000-02-01), Bloomfield
patent: 6044471 (2000-03-01), Colvin
patent: 6098173 (2000-08-01), Elgressy et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Verification system for information transfers over a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Verification system for information transfers over a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Verification system for information transfers over a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2951651

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.