Controlling access to information on a network using an...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S193000, C705S040000, C705S053000, C705S077000, C709S217000

Reexamination Certificate

active

07426638

ABSTRACT:
Systems and methods for controlling access to information on a network where a first network entity receives a message requesting access to stored information via a network communication. The received message includes a first component encrypted with a first crypto-key associated with the first network entity and a second component encrypted with a second crypto-key associated with a second network entity such that both can be decrypted by the first network entity. The second network entity controls access to the network by the user. After receiving the message, the first network entity decrypts the first component and the second component and then transmits the stored information to the user based on the content of the first component and the second component.

REFERENCES:
patent: 5444780 (1995-08-01), Hartman, Jr.
patent: 5727065 (1998-03-01), Dillon
patent: 5737414 (1998-04-01), Walker et al.
patent: 5809144 (1998-09-01), Sirbu et al.
patent: 5815665 (1998-09-01), Teper et al.
patent: 5987140 (1999-11-01), Rowney et al.
patent: 6049786 (2000-04-01), Smorodinsky
patent: 6275934 (2001-08-01), Novicov et al.
patent: 6285991 (2001-09-01), Powar
patent: 6292789 (2001-09-01), Schutzer
patent: 6530025 (2003-03-01), Nakagawa et al.
patent: 6557102 (2003-04-01), Wong et al.
patent: 6560581 (2003-05-01), Fox et al.
patent: 6751733 (2004-06-01), Nakamura et al.
patent: 2001/0001147 (2001-05-01), Hutchison et al.
patent: 2002/0016765 (2002-02-01), Sacks
Open Financial Exchange Specification 1.5.1, Nov. 23, 1998, pp. 61, 452-453.
Open Financial Exchange Bill Presentment, Jun. 12, 1997, 1997 CheckFree Corp. Intuit Inc., Microsoft Corp. pp. 312-356.
Hush Encryption Engine Whit Paper Version 2.1, Jul. 2001.
Stallings, William Cryptography and Network Security, Second Edition. Jul. 15, 1998, Prentice Hall.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Controlling access to information on a network using an... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Controlling access to information on a network using an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Controlling access to information on a network using an... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3987789

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.