Check patentability & draft patents in minutes with Patsnap Eureka AI!

Systems and methods for establishing a secure communication channel using a browser component

A communication channel and browser technology, applied in secure communication devices, transmission systems, digital transmission systems, etc., can solve the problems of limited and limited ability to prevent identity theft

Inactive Publication Date: 2010-11-24
REDIFF COM INDIA
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] While many solutions exist that attempt to "clean" a user's computer system of any malware, such agents are limited in their ability to protect trusted users from organized identity theft
Other measures taken by various websites, such as digital certificates, etc., are also limited in their ability to prevent identity theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for establishing a secure communication channel using a browser component
  • Systems and methods for establishing a secure communication channel using a browser component
  • Systems and methods for establishing a secure communication channel using a browser component

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] figure 1 is a block diagram of a system 100 in which a trusted two-way authenticated communication channel can be established and used. The system 100 includes two computing devices 110 and 120 connected on a network 130 . Each component is described in further detail below.

[0015] Computing device 110 represents a class of computing devices, which can be any device having a processing unit that can execute instructions and memory. The computing device can be a personal computer, computing tablet, set top box, video game system, personal video recorder, telephone, personal digital assistant (PDA), portable computer, notebook computer, fax machine, cellular telephone, and special purpose equipment. A computing device includes a processor and memory. These computing devices may run operating systems including, for example, various Linux, Unix, MS-DOS, Microsoft Windows, Palm OS, and Apple Mac OS X operating systems. In addition, these computing devices can run seve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for providing a secure channel for communication comprises a client comprising a browser, a secure server and a browser component installed on the client that enables a user to establish a connection with the secure server, the browser component configured to generate a first token. The secure server is configured to generate a second token, and wherein the client is provided with access to the secure server upon verification of the first token and the second token.

Description

[0001] Background of the invention technical field [0002] This application relates to the establishment of a secure communication channel on the Internet, and more particularly, to the establishment of a secure communication channel between a server and a client. Background technique [0003] Today's computer systems are extensively connected and exchange information over telecommunication networks such as the Internet. These interactions involve many transactions that may require disclosure of user identity information such as login information, passwords, social security information, or other user credentials. Such user identity information is sometimes compromised due to malicious proxies or social attacks such as phishing attacks in which a "phisher" misdirects a user to a fake website that appears substantially identical to the genuine website. Misleading a user to a fake website can be accomplished in several ways, including email, links on other websites, misleadi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/44
CPCG06F21/445H04L63/1483H04L63/1441H04L9/0838H04L63/0869H04L2209/56H04L29/06006H04L9/3234H04L2463/061H04L69/02
Inventor 阿吉特·巴拉克里斯南桑杰伊·迪施潘德萨米特·N·拉吉韦德拉赫尔·柯特恩尤德伊·索迪南朱迪施沃·加纳帕斯
Owner REDIFF COM INDIA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More