Using electronic security value units to control access to a...

Data processing: financial – business practice – management – or co – Business processing using cryptography – Secure transaction

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S065000, C705S051000, C705S052000, C705S053000, C705S054000, C705S066000, C713S152000, C380S201000, C709S229000

Reexamination Certificate

active

07013296

ABSTRACT:
A network utilizes electronic security value units to prevent unauthorized access to resources in the network. The network includes at least a resource manager and an electronic bank server (e.g., the local resource bank). The resource manager determine a pricing strategy in electronic security value units for a group of one or more resources in the network. The electronic bank server selectively distributing electronic security value units to a client in the network, where the electronic security value units are unique to a group of one or more resources. Accordingly, access to a resource in the group, by the client, is determined by at least the above pricing strategy and by an amount of electronic security value units distributed to the client.

REFERENCES:
patent: 4321672 (1982-03-01), Braun et al.
patent: 5506961 (1996-04-01), Carlson et al.
patent: 5542046 (1996-07-01), Carlson et al.
patent: 5627886 (1997-05-01), Bowman
patent: 5815574 (1998-09-01), Fortinsky
patent: 5819226 (1998-10-01), Gopinathan et al.
patent: 5913202 (1999-06-01), Motoyama
patent: 5930777 (1999-07-01), Barber
patent: 5956404 (1999-09-01), Schneier et al.
patent: 6000032 (1999-12-01), Millard
patent: 6018723 (2000-01-01), Siegel et al.
patent: 6032123 (2000-02-01), Jameson
patent: 6078818 (2000-06-01), Kingdon et al.
patent: 6122625 (2000-09-01), Rosen
patent: 6157917 (2000-12-01), Barber
patent: 6161139 (2000-12-01), Win et al.
patent: 6163604 (2000-12-01), Baulier et al.
patent: 6182142 (2001-01-01), Win et al.
patent: 6232974 (2001-05-01), Horvitz et al.
patent: 6237096 (2001-05-01), Bisbee et al.
patent: 6327352 (2001-12-01), Betts et al.
patent: 6338046 (2002-01-01), Saari et al.
patent: 6339423 (2002-01-01), Sampson et al.
patent: 6374300 (2002-04-01), Masters
patent: 6389541 (2002-05-01), Patterson
patent: 6418420 (2002-07-01), DiGiorgio et al.
patent: 6427140 (2002-07-01), Ginter
patent: 6453305 (2002-09-01), Glassman et al.
patent: 6473802 (2002-10-01), Masters
patent: 6490601 (2002-12-01), Markus et al.
patent: 6490624 (2002-12-01), Sampson et al.
patent: 6535728 (2003-03-01), Perfit et al.
patent: 6542729 (2003-04-01), Chmaytelli et al.
patent: 6567511 (2003-05-01), Betts et al.
patent: 6594481 (2003-07-01), Johnson et al.
patent: 6631473 (2003-10-01), Townsend
patent: 6640304 (2003-10-01), Ginter et al.
patent: 6643696 (2003-11-01), Davis et al.
patent: 6675261 (2004-01-01), Shandony
patent: 6704563 (2004-03-01), Senn et al.
patent: 6782379 (2004-08-01), Lee
patent: 6816871 (2004-11-01), Lee
patent: 2002/0111912 (2002-08-01), Hunter et al.
patent: 2002/0133412 (2002-09-01), Oliver et al.
patent: WO 98/32066 (1998-07-01), None
Kohn and Neuman, “The Kerberos Network Authentication Service (V5), ” RFC 1510, Sep. 1993.
Needham, FL, and VL Schroeder “Using Encryption for Authentication in Large Networks of Computers,” Communications of ACM, vol. 21, Dec. 1978, pp. 993-999.
Ilgun, Kemmerer, and Porras, “State Transition Analysis: A Rule-based Intrusion Detection Approach,” IEEE Transactions on Software Engineering, 21 (3), pp. 181-199, Mar. 1995.
Lunt, Tamaru, et al., “A Real-time Intrusion Detection Expert System (IDES) -final technical report,” Technical Report, Computer Science Laboratory, SRI International, Feb. 1992.
Bellare, Garray, et al., “iKP -A family of secure electronic payment Protocols,” First USENIX Workshop on Electronic Commerce, pp, 89-106, Jul. 1995.
Jarecki, Odlyzko, “An Efficient Micropayment System Based on Probabilistic Polling,” in Proc. of Financial Cryptography '97, R. Hirschfeld, ed., Lecture Notes in Computer Science, Springer, 1997.
Manasse, “Millicent protocols for electronic commerce,” Proceedings of the first USENIX Workshop on Electronic Commerce, Jul. 1995.
Pedersen, “Electronic Payment of Small Amounts” Cambridge Workshop of 1996.
“Secure Electronic Transactions: Credit Card Payment on the Web in Theory and Practice,” IBM International Technical Support Organization, Jun. 1997.
Sairamesh, J., D. Ferguson, and Y. Yemini-“An Approach to Pricing, Optimal Allocation and Quality of Service Provisioning in High-speed Packet Networks,” in Proc. of the Conference on Computer Communications, Boston, Massachusetts, Apr. 1995.
Mark S. Manasse, “The Millicent Protocols for Electronic Commerce,” www.usenix.org, Jul. 1995.
Stanislaw Jarecki and Andrew Odlyzko, “An Efficient Micropayment System Based on Probabilistic Polling,” in Proc. of Financial Cryptography '97, R. Hirschfeld, ed., Lecture Notes in Computer Science, Springer, 1997.
Mihir Bellare, et al. “iKP—A Family of Secure Electronic Payment Protocols,” USENIX Workshop on Electronic Commerce, May 8, 1995.
“Network Security. Private Communication in a PUBLIC World,” Charlie Kaufman et al., Prentice Hall series in computer networking and distributed systems, 1994, pp. 177-203.
“Firewalls and Internet Security. Repelling the Wily Hacker,” Second Edition, William Cheswick et al., Addison-Wesley, Reading, Mass. 1995, pp. 175-232.
NIST, “Special Pub 800-12-An Introduction to Computer Security: The NIST Handbook”, NIST, (p. 60 and cover page).
Neuman and Ts'o, “Kerberos: An Authentication Service for Computer Networks,” Sep. 1994, IEEE Communications Magazine, pp. 33-38.
Gittler and Hopkins, “The DCE Security Service,” Dec. 1996, Hewlett-Packard Journal, pp. 41-48.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Using electronic security value units to control access to a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Using electronic security value units to control access to a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using electronic security value units to control access to a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3569160

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.