Secure customer communication method and system

a customer communication and customer technology, applied in the field of encryption methods, can solve the problems of unintended disclosure of information to others, little protection available to the end user, and easy to become vulnerable to attack or fraud

Active Publication Date: 2005-12-08
WILMINGTON TRUST NAT ASSOC AS ADMINISTATIVE AGENT +1
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technical effect of this patented technology is how to create a secure channel between two parties while they are trying to compromise their communication without being detected. This ensures that only authorized users will be able to access important data from servers on the internet.

Problems solved by technology

The technical problem addressed in this patent text is how to provide strong security measures against potential attacks from hackers or other types of cyber-attacks, while also ensuring effective data transmission even if there were no trustworthiness issues during the course of the business.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure customer communication method and system
  • Secure customer communication method and system
  • Secure customer communication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] While the present invention is susceptible of embodiments in various forms, there is shown in the drawings and will hereinafter be described some exemplary and non-limiting embodiments, with the understanding that the present disclosure is to be considered an exemplification of the invention and is not intended to limit the invention to the specific embodiments illustrated. In this disclosure, the use of the disjunctive is intended to include the conjunctive. The use of the definite article or indefinite article is not intended to indicate cardinality. In particular, a reference to “the” object or “a” object is intended to denote also one of a possible plurality of such objects.

[0018] RSA is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. The RSA algorithm is a commonly used encryption and authentication algorithm and is included as part of the Web browsers from Microsoft and Netscape. It'

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method for creating communication encryption keys for use over a communications channel comprises the steps of: selecting a code number for a user or web browser; selecting the two highest prime numbers, excluding 1 and the code number itself, in the code number; determining if each of these prime numbers is greater than the square root of the code number; and, if so, establishing with a web server two communication encryption keys equal to the two highest prime numbers.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner WILMINGTON TRUST NAT ASSOC AS ADMINISTATIVE AGENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products