Data exchange token
Publication Date: 2010-Dec-16
The IP.com Prior Art Database
A method and system for transferring data utilizing a data exchange token is disclosed.
Page 01 of 4
Data exchange token
Disclosed is a method and system for transferring data utilizing a data exchange token.
Connecting local devices together for data exchange, such as a binary file transfer, transfer of contacts or calendar data or any other data involves several steps that depend on the medium used, the location of the devices and the data to be exchanged.
Current local data exchange mechanisms have been devised with one of two models behind them: The "wired" model and the "wireless" models. These are a by-product of the characteristics of the communication medium itself, and take little account of human factors.
In the "wired" model the following holds:
Devices are connected together by cables.
Authentication between the devices is usually implicit, assumed sufficient by physical connection.
Encryption between devices is not deemed needed based on the difficulty of tapping the data signal - Wiretapping is assumed difficult.
In the "wireless" model the following holds:
Devices communicate by radio waves, infrared light or other means without wires.
Authentication between devices must be explicit; all devices are considered unauthorized until authentication takes
Encryption between devices is usually deemed essential to data privacy - Signal interception is easy.
As more and more work groups are used in business environments with increasing worker mobility, the models for sharing
information for these work groups becomes severely restricted by the need to secure communications. Two individuals from different organizations sitting in the same room have the same vehicles to exchange information as two people sitting across the globe. There are many advantages to physical proximity and these are not being exploited by current computing systems. In this context, security has trumped usability and individuals and their devices perform as islands, instead of as cohesive work groups. Workers laboriously verbally spell out internet addresses to each other, e-mail large files across the globe, shuttle portable storage devices from one machine to another, and copy phone book entries manually between device. These are inefficient ways to collaborate and share information when the group is in a single physical location. Specifically, URLs get misspelled, e-mail gateways limit file sizes, e-mails have to travel thousands of miles to reach a person sitting across a desk, files in e-mails as well as portable devices have to be copied and transmitted in their entirety before they can be used by the receiver. These processes are extremely cumbersome, error-prone, time-consuming and at times circumvent security policies regarding secure data transmission of sensitive information.
There are two key functions of security that cannot be compromised:
intend to, and not an impostor.
2) Privacy - Data being exchanged should not be viewable by anyone but the intended recipient.
Work groups have an additional requirement:
3) Location - devices, a...