![]() The method of claim 5, wherein encrypting the contents of the response message includes retrieving the encryption key from a database of encryption keys, wherein the encryption key is not exposed to the server or to the client device purporting to be that of the individual.ĩ. The method of claim 5, wherein the client device purporting to be that of the individual is not the client device of the individual, and is therefore incapable of decrypting the encrypted message.Ĩ. The method of claim 5, wherein the client device purporting to be that of the individual is the client device of the individual, and is therefore capable of decrypting the encrypted message.ħ. A method of facilitating secure data communication from a server to a client of an individual over a data communications channel, the method comprising: receiving a message, created by the server in response to a request by a client device purporting to be that of the individual encrypting the message to form an encrypted message that only the client device of the individual is capable of decrypting, wherein encrypting provides to the contents of the response message a layer of encryption in addition to any layer of encryption present in the request by the client device purporting to be that of the individual and transmitting the encrypted message to the data communications channel for delivery to the client device purporting to be that of the individual.Ħ. The system of claim 1, wherein the encryption keys are exposed only to the processor.ĥ. The system of claim 1, wherein the client device purporting to be that of the individual is not the client device of the individual, and is therefore incapable of decrypting the encrypted message.Ĥ. The system of claim 1, wherein the client device purporting to be that of the individual is the client device of the individual, and is therefore capable of decrypting the encrypted message.ģ. ![]() A system for facilitating secure data communication from a server to a client device of an individual using a data communications channel, the system comprising: a database that stores a plurality of encryption keys in a storage arrangement, wherein at least one stored encryption key is uniquely and privately associated with the individual a processor, in data communication with the database, configured (i) to receive a message, created by the server in response to a request by a client device purporting to be that of the individual, (ii) to retrieve from the database the encryption key that is uniquely and privately associated with the individual, and (iii) to encrypt the message using the retrieved encryption key to form an encrypted message that only the client device of the individual is capable of decrypting and a communications gateway, in data communication with the data communications channel, the processor, and the server, the gateway configured (i) to transmit, to the server, messages that are received from the data communications channel for delivery to the server, (ii) to transmit, to the processor, the message created by the server in response to the request by the client device purporting to be that of the individual, and (iii) to transmit the encrypted message to the data communications channel for delivery to the client device purporting to be that of the individual.Ģ. Method and system of secret communicationġ. Method and system for establishing a secure connection based on an attribute certificate having user credentialsĮlectronic Vapor Device With Power Obtained From An Electronic Device Audio Port METHOD AND APPARATUS FOR AUTHENTICATION UTILIZING LOCATION USB HOST CONTROLLER, INFORMATION PROCESSOR, CONTROL METHOD OF USB HOST CONTROLLER, AND STORAGE MEDIUM ![]() ![]() Smartcard with cryptographic functionality and method and system for using such cardsĪutomated multi-user package retrieval and storage system SERVER, SYSTEM, AND METHOD FOR ISSUING MOBILE CERTIFICATE Communication networks and methods and computer program products for preventing tracking of network activity thereon through use of identity pseudonym domains ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |