Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2011-06-21
2011-06-21
Hoffman, Brandon S (Department: 2433)
Information security
Prevention of unauthorized use of data including prevention...
C726S027000, C726S029000, C726S030000, C726S031000, C713S181000, C380S270000, C380S277000, C380S247000
Reexamination Certificate
active
07966662
ABSTRACT:
An authentication system is disclosed. The authentication system includes a content provider configured to distribute encrypted content, wherein the encrypted content is generated using a content key, and a client having a symmetric key and configured to store the encrypted content received from the content provider and issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input, wherein the content provider is further configured to verify the client via the request to ensure that the client has received the encrypted content.
REFERENCES:
patent: 6175922 (2001-01-01), Wang
patent: 6332025 (2001-12-01), Takahashi et al.
patent: 6496928 (2002-12-01), Deo et al.
patent: 6915272 (2005-07-01), Zilliacus et al.
patent: 6961858 (2005-11-01), Fransdonk
patent: 6993137 (2006-01-01), Fransdonk
patent: 7136840 (2006-11-01), Pinkas et al.
patent: 7149545 (2006-12-01), Hurst et al.
patent: 7310732 (2007-12-01), Matsuyama et al.
patent: 7359375 (2008-04-01), Lipsanen et al.
patent: 7506367 (2009-03-01), Ishibashi
patent: 7568234 (2009-07-01), Naslund et al.
patent: 2005/0086334 (2005-04-01), Aaltonen et al.
patent: 1 221 690 (2002-07-01), None
patent: 1 237 323 (2002-09-01), None
patent: 1237323 (2002-09-01), None
patent: 2004 159036 (2003-12-01), None
Carol H. Fancher, “In your pockets smartcards,” Electronic Payments, IEEE Spectrum, Feb. 1997, Motorola, Inc., pp. 47-53.
Lue, Q., Safavi-Naini, R. and Sheppard, N. Digital Rights Management for Content Distribution. In Proceedings of the Australasian Information Society Workshop (2003), 49-58.
FIPS PUB 198, “The Keyed-Hash Message Authentication Code (HMAC)”, http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf, Mar. 6, 2002.
Thomas S. Messerges, “Digital rights management in a 3G mobile phone and beyond”, ACM Workshop on Digital Rights Management, Proceedings of the 3rd ACM workshop on Digital rights management, pp. 27-38, 2003.
FIPS PUB 198, “The Keyed-Hash Message Authentication Code (HMAC)”, http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf, Mar. 6, 2002.
Thomas S. Messerges, “Digital Rights Management in a 3G mobile phone and beyond,” ACM Workshop on Digital Rights Management, Proceedings of teh 3rd ACM workshop on Digital Rights Management, pp. 27-38, 2003.
International Search Report—PCT/US05/031451, International Search Authority—European Patent Office—Jan. 16, 2006.
Written Opinion—PCT/US05/031451, International Search Authority—European Patent Office—Jan. 16, 2006.
Hawkes Philip Michael
Quick, Jr. Roy Franklin
Rose Gregory Gordon
Semple James
Hoffman Brandon S
Kim Won Tae
Qualcomm Incorporated
Song Hee
LandOfFree
Method and system for managing authentication and payment... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for managing authentication and payment..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for managing authentication and payment... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2689642