Method and system for managing authentication and payment...

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S027000, C726S029000, C726S030000, C726S031000, C713S181000, C380S270000, C380S277000, C380S247000

Reexamination Certificate

active

07966662

ABSTRACT:
An authentication system is disclosed. The authentication system includes a content provider configured to distribute encrypted content, wherein the encrypted content is generated using a content key, and a client having a symmetric key and configured to store the encrypted content received from the content provider and issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input, wherein the content provider is further configured to verify the client via the request to ensure that the client has received the encrypted content.

REFERENCES:
patent: 6175922 (2001-01-01), Wang
patent: 6332025 (2001-12-01), Takahashi et al.
patent: 6496928 (2002-12-01), Deo et al.
patent: 6915272 (2005-07-01), Zilliacus et al.
patent: 6961858 (2005-11-01), Fransdonk
patent: 6993137 (2006-01-01), Fransdonk
patent: 7136840 (2006-11-01), Pinkas et al.
patent: 7149545 (2006-12-01), Hurst et al.
patent: 7310732 (2007-12-01), Matsuyama et al.
patent: 7359375 (2008-04-01), Lipsanen et al.
patent: 7506367 (2009-03-01), Ishibashi
patent: 7568234 (2009-07-01), Naslund et al.
patent: 2005/0086334 (2005-04-01), Aaltonen et al.
patent: 1 221 690 (2002-07-01), None
patent: 1 237 323 (2002-09-01), None
patent: 1237323 (2002-09-01), None
patent: 2004 159036 (2003-12-01), None
Carol H. Fancher, “In your pockets smartcards,” Electronic Payments, IEEE Spectrum, Feb. 1997, Motorola, Inc., pp. 47-53.
Lue, Q., Safavi-Naini, R. and Sheppard, N. Digital Rights Management for Content Distribution. In Proceedings of the Australasian Information Society Workshop (2003), 49-58.
FIPS PUB 198, “The Keyed-Hash Message Authentication Code (HMAC)”, http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf, Mar. 6, 2002.
Thomas S. Messerges, “Digital rights management in a 3G mobile phone and beyond”, ACM Workshop on Digital Rights Management, Proceedings of the 3rd ACM workshop on Digital rights management, pp. 27-38, 2003.
FIPS PUB 198, “The Keyed-Hash Message Authentication Code (HMAC)”, http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf, Mar. 6, 2002.
Thomas S. Messerges, “Digital Rights Management in a 3G mobile phone and beyond,” ACM Workshop on Digital Rights Management, Proceedings of teh 3rd ACM workshop on Digital Rights Management, pp. 27-38, 2003.
International Search Report—PCT/US05/031451, International Search Authority—European Patent Office—Jan. 16, 2006.
Written Opinion—PCT/US05/031451, International Search Authority—European Patent Office—Jan. 16, 2006.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for managing authentication and payment... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for managing authentication and payment..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for managing authentication and payment... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2689642

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.