Browse Prior Art Database

Method for Securely Transmitting Information Online When the Security Is Enabled by the Sender

IP.com Disclosure Number: IPCOM000179664D
Original Publication Date: 2009-Feb-20
Included in the Prior Art Database: 2009-Feb-20
Document File: 7 page(s) / 61K

Publishing Venue

Linux Defenders

Related People

Mr Rich Maggiani: AUTHOR

Abstract

Most digital data transmissions are not secure; most don’t need to be. There are times, however, when a network client wants to secure a transmission, to transmit encrypted data (files, messages, or any other type of data). While methods exist to individually transmit secure messages, they can be cumbersome. This invention describes a method whereby Linux simplifies the process for a user to initiate a secure transmission while adding a deeper level of security to better ensure a successful transmission.

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 41% of the total text.

Linux Invention

Contact Information

Mr Rich Maggiani; rich.maggiani@solari.net

Solari Communication
137 Lost Nation, Suite 14
Essex, Vermont 05452
United States of America
802.879.9330

Title of the Invention

Method for Securely Transmitting Information Online When the Security Is Enabled by the Sender

Description of the Invention

Most digital data transmissions are not secure; most don’t need to be. There are times, however, when a network client wants to secure a transmission, to transmit encrypted data (files, messages, or any other type of data). While methods exist to individually transmit secure messages, they can be cumbersome. This invention describes a method whereby Linux simplifies the process for a user to initiate a secure transmission while adding a deeper level of security to better ensure a successful transmission.

Problem or Opportunity

Users sometimes want to secure online transmissions that would otherwise not need to be secured (such as text transmissions in email messages). In order to do this, a user must implement their own secure transmissions and ensure that the receiver also has the necessary decryption process.

Users also want transactions that are regularly encrypted and sent securely to be more reliable and not subject to random identity theft.

A process that reliably and automatically secures all such transmissions would be most welcome.

Detailed Description of the Invention

Linux loads a java applet that creates a security button into the browsers of the sender and receiver of a transmission. The sender clicks the security button whenever a secure transmission was desired. This can be any type of transmission, from a text-only email to a complicated financial transaction.

Once the security button is clicked, Linux applies a security protocol to the transmission so that the message is sent securely. This security protocol includes a security key and a number of data packets.

Linux creates an asymmetrically encrypted security key for the transmission; the security key indicates the number of data packets to be sent. Linux creates two or more encrypted data packets. Only one data packet contains the actual data the sender wants to transmit; the remaining packets, while looking like they contain actual data, in fact contain only dummy data. The security key identifies which packet contains the actual data.

For example, Linux sends a security key, then sends four packets of secure data, the third of which contains the actual information to be decrypted.

Linux begins the actual transmission by passing the security key to the sender’s browser, which then sends the key to the receiver’s browser or to any online service that will process the transaction. Both must be running under a version of Linux. This transmission invokes the security button on the receiver’s browser or contai...