US20160197921A1 - Secure Data Transmission System - Google Patents
Secure Data Transmission System Download PDFInfo
- Publication number
- US20160197921A1 US20160197921A1 US14/870,740 US201514870740A US2016197921A1 US 20160197921 A1 US20160197921 A1 US 20160197921A1 US 201514870740 A US201514870740 A US 201514870740A US 2016197921 A1 US2016197921 A1 US 2016197921A1
- Authority
- US
- United States
- Prior art keywords
- message
- pairing
- mac addresses
- mac address
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Definitions
- the present invention relates to data transmission systems and, more particularly, to a system that provides identity and data theft protection.
- Messaging over the internet and mobile cellular networks has been growing at an astonishing rate over the last decade, and includes the transmission of additional date, such as sound, video, and picture files.
- a primary concern in the use of messaging systems is the security and integrity of such data transmission. While some solutions exist that perform encryption on transmitted data or require encryption keys, there is no way to know whether the receiving party is the intended target or whether a third party with unauthorized access has intercepted or broken the encryption. In addition, there is typically no way to ensure that the receiving party deletes sensitive messages or data as promised. Accordingly, there is a need in the art for a data transmission system that can verify the receiving party is authorized to receive the transmission and is actually the authorized party prior to data transmission, and that can ensure the appropriate deletion of received data after transmission.
- the present invention comprises a secure messaging system that provides identity and data theft protection by requiring that devices participating in the transmission of data be paired via an exchange of media access control addresses (MAC addresses). By requiring the pairing of devices via exchanged MAC addresses before data can be transferred between devices, data transmission security is enhanced.
- sent data may also be deleted from a receiving device after it has been reviewed, such as by a remote sender, thereby further ensuring data security and protecting against identity theft.
- a request to transmit data such as encrypted text, an image, sound, video, or music file
- a check is first made to determine whether the sending and receiving devices have been paired. For example, a check may be made via a host server.
- a sending device may transmit a delete instruction that deletes a received data file regardless of whether the file was reviewed, viewed or used.
- FIG. 1 is a schematic of a secure messaging system according to the present invention implemented into two smart phones;
- FIG. 2 is a schematic of a user device management module according to the present invention.
- FIG. 3 is a schematic of data flow in a secure messaging system according to the present invention.
- FIG. 4 is a schematic of message sending and receiving according to the present invention.
- FIG. 5 is a schematic of the hierarchy of servers according to the present invention.
- FIG. 1 a schematic of the secure messaging system 10 according to the present invention that is based in part on pairing of devices 12 and 14 using MAC addresses, with are device identifiers that are each uniquely associated with a network adapter to identify a device on a network.
- a typical MAC address consists of 12 hexadecimal numbers, typically formatted as follows XX:XX:XX:YY:YY:YY.
- System 10 is designed to allow for the secure pairing of a sending (or receiving) device 12 running system 10 with a receiving (or sending) device 14 also implementing system 10 .
- a device implementing system 10 may act as either a sending device 12 or a receiving device 14 , or both, and have been assigned reference numerals as one or the other strictly for the purposes of illustrating an embodiment of the invention.
- System 10 ensures that messages are sent to the correct person/device and that the sender is the person authorized to make the transmission.
- a host server 16 facilitates system 10 in combination with devices 12 and 14 , preferably through the use of software installed on participating devices 12 and 14 , such as an application that is downloaded and run on the sending and receiving devices 12 and 14 that will be participating in data transmission or messaging.
- the local device portions of system 10 may be implemented via a downloadable app for devices such as smartphones, tablets, laptops, desktop computers, as well as gaming systems, smart televisions, navigation systems, vehicular computers, and the like.
- system 10 can be configured to require a conventional user identification and password for each user to provide added security and, as explained below, for a user to remotely access host 16 , such as if a participating device 12 or 14 is lost.
- system 10 contains a device management module 18 that manages authentications, subscriptions, user contacts, and ciphering, and is in communication with a database 20 for storing and retrieving data associated with the various processes.
- database 20 is maintained remotely from devices 12 and 14 for additional security, such as in the “cloud” as that term is used in the field to refer to remotely positioned storage accessible via the internet.
- messages themselves are not retained in database 20 to improve security.
- a user may request remote pairing with a particular contact stored within database 20 by using management module 18 to retrieve the contact from database 20 .
- System 10 then communicates the pairing request, which may be rejected or accepted by device 14 . If accepted, the MAC addresses are shared between the host files associated with devices 12 and 14 , and thus stored in the corresponding database files associated with the other device along with appropriate user identification (ID) information.
- ID user identification
- system 10 may be configured to operate over Extensible Messaging and Presence Protocol (XMPP) 22 or Session Initiation Protocol (SIP) 24 based networks, and includes module for performing authentication/paring 26 , messaging multiplexing 28 , encryption/decryption, and an LDAP database 30 .
- System 10 further includes an application/web module 32 for retrieving and using user information, pairing relationships, contacts, subscriptions, logs, and status information.
- a data transmission may be made using system 10 .
- a user can select a contact from management module 18 and send a message that is encrypted by system 10 . If the receiving device's MAC address and user ID information are confirmed based on pre-configured pairing information in database 20 , the message is sent from sending device 12 to the receiving device 14 via system 10 . Thus, messages pass through system 10 , which acts as a postmaster, and not directly between the devices.
- system 10 employs a hierarchy of servers to accomplish securing message transmissions. More particularly, an authentication server 36 having access to database 20 is in communication with an XMPP relay server 38 , a pairing server 40 , a messaging relay status server 42 , a plug-in control server 44 , and a web server 46 .
- System 10 may thus be used to provide user identification, such as in connection with a voice or video conferencing session, wherein one or more sessions are started by the participants. For example, the identity of the user/participants may be confirmed by checking the device MAC addresses of users after they have logged into the program.
- System 10 may further be programmed to control the amount of time that secure messages are available to the receiving device.
- each message may be accompanied by a deletion parameter that is set by sending device 12 and specifies when the message is to be automatically deleted by the receiving device 14 .
- sending device 12 may remotely set the deletion trigger to cause immediate deletion of the message regardless of the status of the message on receiving device 14 , i.e., a message may be deleted before it has been read or viewed.
- system 10 employs the hierarchy of FIG. 5 to avoid the need for storage of data involved in the secure transmission.
- picture, video, sound, and data files may be transmitted between and viewed using devices using system 10 .
- System 10 may further be programmed to allow a user to remotely disable paired connection. For example, a user that loses device 12 may access system 10 via the internet using the web server of system 10 to delete all paired connections from system 10 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Telephonic Communication Services (AREA)
Abstract
A secure messaging system that requires pairing of second and receiving devices via user identification credentials and the associated media access control addresses (MAC addresses) of the paired devices. Paired devices may communicate encrypted messages and deletion parameters may be established by a sending device, including immediate deletion requests. The message and the instructions are automatically decrypted by the receiving device and interpreted to provide the data and configure the deletion parameters. The system preferably manages device pairing via a remote server that is accessed by a device application.
Description
- The present application is a continuation of U.S. application Ser. No. 13/897,865, filed on May 20, 2013, which claims priority to U.S. Provisional Patent Application No. 61/795,804, filed on Oct. 26, 2012, and U.S. Provisional Patent Application No. 61/688,712, filed on May 21, 2012.
- 1. Field of the Invention
- The present invention relates to data transmission systems and, more particularly, to a system that provides identity and data theft protection.
- 2. Description of the Related Art
- Messaging over the internet and mobile cellular networks has been growing at an astonishing rate over the last decade, and includes the transmission of additional date, such as sound, video, and picture files. A primary concern in the use of messaging systems is the security and integrity of such data transmission. While some solutions exist that perform encryption on transmitted data or require encryption keys, there is no way to know whether the receiving party is the intended target or whether a third party with unauthorized access has intercepted or broken the encryption. In addition, there is typically no way to ensure that the receiving party deletes sensitive messages or data as promised. Accordingly, there is a need in the art for a data transmission system that can verify the receiving party is authorized to receive the transmission and is actually the authorized party prior to data transmission, and that can ensure the appropriate deletion of received data after transmission.
- The present invention comprises a secure messaging system that provides identity and data theft protection by requiring that devices participating in the transmission of data be paired via an exchange of media access control addresses (MAC addresses). By requiring the pairing of devices via exchanged MAC addresses before data can be transferred between devices, data transmission security is enhanced. In an embodiment of the present invention, sent data may also be deleted from a receiving device after it has been reviewed, such as by a remote sender, thereby further ensuring data security and protecting against identity theft. In the data transmission process according to the present invention, a request to transmit data, such as encrypted text, an image, sound, video, or music file, a check is first made to determine whether the sending and receiving devices have been paired. For example, a check may be made via a host server.
- Once a paired relationship has been verified, data is sent to the receiving device in encrypted fashion along with instructions on how long the message is to be made available for viewing before automatic deletion. The message and the instructions are automatically decrypted by the receiving device and interpreted to provide the data and configure the deletion parameters. Alternatively, a sending device may transmit a delete instruction that deletes a received data file regardless of whether the file was reviewed, viewed or used.
- The present invention will be more fully understood and appreciated by reading the following Detailed Description in conjunction with the accompanying drawings, in which:
-
FIG. 1 is a schematic of a secure messaging system according to the present invention implemented into two smart phones; -
FIG. 2 is a schematic of a user device management module according to the present invention; -
FIG. 3 is a schematic of data flow in a secure messaging system according to the present invention. -
FIG. 4 is a schematic of message sending and receiving according to the present invention; and -
FIG. 5 is a schematic of the hierarchy of servers according to the present invention. - Referring now to the drawings, wherein like reference numerals refer to like parts throughout, there is seen in
FIG. 1 a schematic of thesecure messaging system 10 according to the present invention that is based in part on pairing ofdevices 12 and 14 using MAC addresses, with are device identifiers that are each uniquely associated with a network adapter to identify a device on a network. A typical MAC address consists of 12 hexadecimal numbers, typically formatted as follows XX:XX:XX:YY:YY:YY.System 10 is designed to allow for the secure pairing of a sending (or receiving) device 12running system 10 with a receiving (or sending)device 14 also implementingsystem 10. It should be recognized by those of skill in the art that adevice implementing system 10 may act as either a sending device 12 or a receivingdevice 14, or both, and have been assigned reference numerals as one or the other strictly for the purposes of illustrating an embodiment of the invention.System 10 ensures that messages are sent to the correct person/device and that the sender is the person authorized to make the transmission. - As seen in
FIG. 1 , ahost server 16 facilitatessystem 10 in combination withdevices 12 and 14, preferably through the use of software installed on participatingdevices 12 and 14, such as an application that is downloaded and run on the sending and receivingdevices 12 and 14 that will be participating in data transmission or messaging. For example, the local device portions ofsystem 10 may be implemented via a downloadable app for devices such as smartphones, tablets, laptops, desktop computers, as well as gaming systems, smart televisions, navigation systems, vehicular computers, and the like. Along these lines,system 10 can be configured to require a conventional user identification and password for each user to provide added security and, as explained below, for a user to remotely accesshost 16, such as if a participatingdevice 12 or 14 is lost. - Referring to
FIG. 2 ,system 10 contains adevice management module 18 that manages authentications, subscriptions, user contacts, and ciphering, and is in communication with adatabase 20 for storing and retrieving data associated with the various processes. Preferably,database 20 is maintained remotely fromdevices 12 and 14 for additional security, such as in the “cloud” as that term is used in the field to refer to remotely positioned storage accessible via the internet. Preferably, messages themselves are not retained indatabase 20 to improve security. For example, a user may request remote pairing with a particular contact stored withindatabase 20 by usingmanagement module 18 to retrieve the contact fromdatabase 20.System 10 then communicates the pairing request, which may be rejected or accepted bydevice 14. If accepted, the MAC addresses are shared between the host files associated withdevices 12 and 14, and thus stored in the corresponding database files associated with the other device along with appropriate user identification (ID) information. - As seen in
FIG. 3 ,system 10 may be configured to operate over Extensible Messaging and Presence Protocol (XMPP) 22 or Session Initiation Protocol (SIP) 24 based networks, and includes module for performing authentication/paring 26, messaging multiplexing 28, encryption/decryption, and anLDAP database 30.System 10 further includes an application/web module 32 for retrieving and using user information, pairing relationships, contacts, subscriptions, logs, and status information. - After at least one pair is achieved and stored in
database 20, a data transmission may be made usingsystem 10. For example, as seen inFIG. 4 , a user can select a contact frommanagement module 18 and send a message that is encrypted bysystem 10. If the receiving device's MAC address and user ID information are confirmed based on pre-configured pairing information indatabase 20, the message is sent from sending device 12 to the receivingdevice 14 viasystem 10. Thus, messages pass throughsystem 10, which acts as a postmaster, and not directly between the devices. - Referring to
FIG. 5 ,system 10 employs a hierarchy of servers to accomplish securing message transmissions. More particularly, anauthentication server 36 having access todatabase 20 is in communication with anXMPP relay server 38, apairing server 40, a messagingrelay status server 42, a plug-incontrol server 44, and aweb server 46.System 10 may thus be used to provide user identification, such as in connection with a voice or video conferencing session, wherein one or more sessions are started by the participants. For example, the identity of the user/participants may be confirmed by checking the device MAC addresses of users after they have logged into the program. -
System 10 may further be programmed to control the amount of time that secure messages are available to the receiving device. For example, each message may be accompanied by a deletion parameter that is set by sending device 12 and specifies when the message is to be automatically deleted by the receivingdevice 14. In an additional embodiment of the present invention, sending device 12 may remotely set the deletion trigger to cause immediate deletion of the message regardless of the status of the message on receivingdevice 14, i.e., a message may be deleted before it has been read or viewed. - In a preferred embodiment of the present invention,
system 10 employs the hierarchy ofFIG. 5 to avoid the need for storage of data involved in the secure transmission. For example, picture, video, sound, and data files may be transmitted between and viewed usingdevices using system 10. By not retaining the data associated with messaging files indevice 12 or 14, such as deleting or flushing immediately or as directed by users, such as after the messages have been read or accessed, there is total privacy and integrity during paired conversations.System 10 may further be programmed to allow a user to remotely disable paired connection. For example, a user that loses device 12 may accesssystem 10 via the internet using the web server ofsystem 10 to delete all paired connections fromsystem 10.
Claims (20)
1. A method of securely transmitting messages between electronic devices, comprising:
receiving a request to send a message from a sending device having a first MAC address to a receiving device having a second MAC address;
confirming that said first MAC address of said sending device matches at least said one of a predetermined plurality of unique MAC addresses associated with a corresponding plurality of registered electronic devices and stored in memory;
confirming that said second MAC address of said receiving device matches another one of said predetermined plurality of unique MAC addresses in said memory; and
forwarding said message from said sending device to said receiving device if said first and second MAC addresses are confirmed as having matches in said memory.
2. The method of claim 1 , wherein each of said predetermined plurality of unique MAC addresses associated with a corresponding plurality of registered electronic devices have been paired with at least another of predetermined plurality of unique MAC addresses.
3. The method of claim 2 , further comprising the step of confirming that said first MAC address of said sending device has been paired with said second MAC address of said receiving device and wherein the step of forwarding said message is performed only if said first and second MAC addresses have been paired.
4. The method of claim 1 , further comprising the step of pairing at least one of said predetermined plurality of unique MAC addresses with another of said predetermined plurality of unique MAC addresses in response to a pairing request received from a requesting device having one of said predetermined plurality of unique MAC addresses that is forwarded to and accepted by another of said plurality of registered devices.
5. The method of claim 4 , further comprising the step of terminating said pairing at request of either device involved in said pairing.
6. The method of claim 1 , wherein said message further comprises a deletion parameter that specifies how long said message is to be retained by said receiving device.
7. The method of claim 1 , further comprising the step of causing the deletion of said message from said receiving device in response to a deletion request from said sending device.
8. The method of claim 1 , further comprising the step of registering at least one of said predetermined plurality of unique MAC addresses associated with a corresponding plurality of registered electronic devices by requiring a user identification and a password from each device and associating said user name and password with said MAC address for said registered device.
9. The method of claim 8 , wherein the step of registering at least one of said predetermined plurality of unique MAC addresses associated with a corresponding plurality of registered electronic devices further comprises the step of requiring the presence of downloadable software on each electronic device to be registered.
10. The method of claim 8 , further comprising the step of confirming that said username and password of said sending device match said registered username and password associated with the one of said predetermined plurality of unique MAC addresses that corresponds with said sending device.
11. A system for securely transmitting messages between electronic devices, comprising:
a database containing a plurality of MAC addresses uniquely corresponding with a plurality of electronic devices;
a server programmed to forward a message from a sending device having a first MAC address to a receiving device having a second MAC address if said database contains said first MAC address and said second MAC address.
12. The system of claim 11 , wherein said server is further programmed to establish at least one pairing between two or more of said electronic devices and save said pairing relationship with said database.
13. The system of claim 12 , wherein the server is further programmed to verify that said sending device and said receiving device have a pairing relationship prior to forwarding said message.
14. The system of claim 12 , wherein said served is programmed to establish at least one pairing by forwarding a request from a first device registered in said database to a second device registered in said database and receiving from said second electronic device an acceptance or denial of said request.
15. The system of claim 14 , wherein said server is further programmed to terminate said pairing at request of any device within said pairing relationship.
16. The system of claim 11 , wherein said server is further programmed to add a deletion parameter to said message to notify said second device to delete said message after a predetermined time.
17. The system of claim 11 , wherein said server is further programmed to remotely delete said message from said second device after a predetermined time.
18. The system of claim 11 , wherein said database stores, along with each MAC address, a username and password associated with each of said electronic devices in said database.
19. The system of claim 18 , wherein said server is further programmed to request from said sending device a first username and password and from said receiver device a second username and password and to confirm that said first username and password matches said username and password associated with said first electronic device and said second username and password matches said username and password associated with said second device.
20. The system of claim 11 , wherein said server is further programmed to require the presence of downloadable software on each device stored in said database.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/870,740 US20160197921A1 (en) | 2012-05-21 | 2015-09-30 | Secure Data Transmission System |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261688712P | 2012-05-21 | 2012-05-21 | |
| US201261795804P | 2012-10-26 | 2012-10-26 | |
| US13/897,865 US9160739B2 (en) | 2012-05-21 | 2013-05-20 | Secure data transmission system |
| US14/870,740 US20160197921A1 (en) | 2012-05-21 | 2015-09-30 | Secure Data Transmission System |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/897,865 Continuation US9160739B2 (en) | 2012-05-21 | 2013-05-20 | Secure data transmission system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20160197921A1 true US20160197921A1 (en) | 2016-07-07 |
Family
ID=50826925
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/897,865 Expired - Fee Related US9160739B2 (en) | 2012-05-21 | 2013-05-20 | Secure data transmission system |
| US14/870,740 Abandoned US20160197921A1 (en) | 2012-05-21 | 2015-09-30 | Secure Data Transmission System |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/897,865 Expired - Fee Related US9160739B2 (en) | 2012-05-21 | 2013-05-20 | Secure data transmission system |
Country Status (1)
| Country | Link |
|---|---|
| US (2) | US9160739B2 (en) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150172467A1 (en) * | 2013-12-17 | 2015-06-18 | Snypir Inc. | Using virtual subscriber identifiers in communication systems |
| US9916839B1 (en) * | 2014-03-27 | 2018-03-13 | Amazon Technologies, Inc. | Shared audio functionality based on device grouping |
| US9762676B2 (en) * | 2014-09-26 | 2017-09-12 | Intel Corporation | Hardware resource access systems and techniques |
| US20170048310A1 (en) * | 2015-08-14 | 2017-02-16 | Google Inc. | Peer-to-peer enabled activation |
| FR3090253B1 (en) * | 2018-12-12 | 2021-07-02 | Evidian | Method for opening a secure session on a computer terminal |
| CN110602130B (en) * | 2019-09-24 | 2021-10-08 | 中盈优创资讯科技有限公司 | Terminal authentication system and method, equipment terminal and authentication server |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100663510B1 (en) * | 2003-11-19 | 2007-01-02 | 삼성전자주식회사 | Apparatus and method for deleting a text message received in a mobile communication terminal |
| AU2008258222C1 (en) * | 2007-06-06 | 2013-11-07 | Datavalet Technologies | Remote service access system and method |
| CA2732181C (en) * | 2011-02-18 | 2017-08-29 | Ruggedcom Inc. | Stand alone wimax system and method |
-
2013
- 2013-05-20 US US13/897,865 patent/US9160739B2/en not_active Expired - Fee Related
-
2015
- 2015-09-30 US US14/870,740 patent/US20160197921A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| US9160739B2 (en) | 2015-10-13 |
| US20140157430A1 (en) | 2014-06-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR101508360B1 (en) | Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer | |
| US8099761B2 (en) | Protocol for device to station association | |
| EP2314090B1 (en) | Portable device association | |
| US9130935B2 (en) | System and method for providing access credentials | |
| US20160197921A1 (en) | Secure Data Transmission System | |
| US20180367540A1 (en) | Controlling access to content | |
| GB2568966A (en) | An encryption process | |
| US20060005033A1 (en) | System and method for secure communications between at least one user device and a network entity | |
| JP2017521934A (en) | Method of mutual verification between client and server | |
| CN113473458B (en) | Device access method, data transmission method and computer readable storage medium | |
| CA2636780A1 (en) | Method and device for anonymous encrypted mobile data and speech communication | |
| US10129229B1 (en) | Peer validation | |
| EP2963854A1 (en) | Device for secure peer-to-peer communication for voice and data | |
| CN113079506B (en) | Network security authentication method, device and equipment | |
| TW201830949A (en) | Methods for sharing sim card and mobile terminals | |
| JP2005167412A (en) | Communication system, communication terminal and server apparatus used in communication system, and connection authentication method used in communication system | |
| GB2612499A (en) | Peer-to-peer secure communication, apparatus, and method | |
| JP7717656B2 (en) | System and method for monitoring encrypted communication paths | |
| KR102387911B1 (en) | Secure instant messaging method and attaratus thereof | |
| JP2006217446A (en) | Remote conference system | |
| US11265298B2 (en) | Method for end-to-end transmission of a piece of encrypted digital information, application of this method and object implementing this method | |
| CN111756698B (en) | Message transmission method, device, equipment and computer readable storage medium | |
| CN108270917B (en) | Encrypted smart phone | |
| CN118573425A (en) | Online conference secret transmission method and system | |
| JP4472566B2 (en) | Communication system and call control method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: INVISIBLE TEXT, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MCDOWELL-WHITE, DESIREE GINA;REEL/FRAME:036693/0924 Effective date: 20130518 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |