Data processing: financial – business practice – management – or co – Business processing using cryptography – Secure transaction
Reexamination Certificate
2007-01-09
2007-01-09
Abdi, Kambiz (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Secure transaction
C705S001100, C705S050000, C705S064000, C713S180000, C716S030000, C716S030000
Reexamination Certificate
active
10164658
ABSTRACT:
A method for private personal identification number (PIN) management comprises ascertaining a first delay period of a preceding PIN. The first delay period is greater than zero if the preceding PIN does not match a validated PIN and the first delay period equals zero if the preceding PIN matches the validated PIN. The method also includes receiving a current PIN after at least the first delay period and delaying for a second delay period if the current PIN does not match the validated PIN. The second delay period is greater than the first delay period.
REFERENCES:
patent: 5495235 (1996-02-01), Durinovic-Johri et al.
patent: 5699514 (1997-12-01), Durinovic-Johri et al.
patent: 5721781 (1998-02-01), Deo et al.
patent: 5742756 (1998-04-01), Dillaway et al.
patent: 5781723 (1998-07-01), Yee et al.
patent: 5826016 (1998-10-01), Ito et al.
patent: 5841866 (1998-11-01), Bruwer et al.
patent: 5930363 (1999-07-01), Stanford et al.
patent: 6018583 (2000-01-01), Hawthorne
patent: 6044154 (2000-03-01), Kelly
patent: 6052690 (2000-04-01), de Jong
patent: 6094656 (2000-07-01), de Jong
patent: 6226744 (2001-05-01), Murphy et al.
patent: 6438550 (2002-08-01), Doyle et al.
patent: 2001/0000814 (2001-05-01), Montgomery et al.
patent: 2347248 (2000-08-01), None
patent: 97/45817 (1997-04-01), None
R. Rivest, “The MD4 Message Digest Algorithm”, Request for Comments (RFC) 1320, MIT Laboratory for Computer Science and RSA Data Security , Inc., Apr. 1992, pp. 1-20.
R. Rivest, “The MD5 Message-Digest Algorithm”, Request for Comments (RFC) 1321 MIT Laboratory for Computer Science and RSA Data Security, Inc., Apr. 1992.
“Secure Hash Standard”, Federal Information Processing Standard Publication 180-1, Apr. 17, 1995.
“Smart Card Stage I Description”, Version 1.1, CDMA Development Group- Smart Card Team Document, May 22, 1996.
“Digital Cellular Telecommunications Systems(Phase 2+);AT Command Set for GSM Mobile Equipment(ME)”, ETSI TS 100 916 V7.4.0, 1998.
“Wireless Identity Module Pert: Security” Version 12, Wireless Application Protocol WAP-260-WIM-20010712-a, Jul. 2001.
“3rdGeneration Partnership Project; Technical Specification Group Terminals; USIM and IC Card Requirements(Release 4)”, 3GPP TS 21.111 V4.0.0, 2001.
“3rdGeneration Partnership Project 2: Removable User Identity Module for Spread Spectum Systems” 3GPP2 C.S0023-A, Version 1.0, Sep. 13, 2002, pp. 1-1-5-2, A1-A4.
International Search Report, PCT/US 03/15953, International filing date May 20, 2003, date Search Report mailed- Jan. 16, 2004.
Anderson et al., “A New Family of Authentication Protocols”, Cambridge University Computer Laboratory, England, 13 pages.
Dreifus, H., Smart Cards; A Guide to Building and Managing Smart Card Applications; Copyright 1998; Publisher Robert Ipsen' “Smart Card Development Skills, Methods, and Tools”; pp. 159-176; 224-225.
Goldreich, Oded, “The Foundations of Modern Cryptography”, May 2, 1998, Department of Computer Science and Applied Mathematics, Version Nr. 3.1, pp. 0-41.
Heiss, J. et al., “Java Card™ Technology Grows Up Smart”, printed on Apr. 22, 2000 at http://java.sum.com/features/1990/01/javacard.html, 5 pages.
Islam, N. et al., “A Flexible Security Model for Using Internet Content”, IMB Thomas J. Watson Research Center Papers, ‘Online!’, Jun. 28, 1997.
“Kerberos: The Network Authentication Protocol”, printed on Jan. 9, 2002 from http://web.mit.edu/kerberos/www/.
Naor, et al., “Universal One-Way Hash Functions and Their Cryptographic Applications”, Mar. 13, 1995, pp. 0-14.
Thomas David, J., “Smart and Smarter: The Emergence of Java Card™ Technology”, printed on Apr. 22, 2000 from http://java/sun.com/features/1998/04/javacard.html, pp. 1-8.
Sun Microsystems, Inc., “Smart Cards: A primer”, printed on Apr. 22, 2000 from http://www.javaworld.com/javaworld/jw-12-19 b97/f—jw-12-javadev—p.html, pp. 1-13.
Chan, “Infrastructure of Multi-Application Smart Card”, http://home.hkstar.com/˜alanchan/papers/multiApplicationSmartCard/, Jul. 25, 2002.
Chen, Zhiqun, “Java Card™ Technology for Smart Cards”,Sun Microsystems,pp. 11-16, Jun. 2000.
Cordonnier, et al., “The concept of suspicion: a new security model for identification management in smart cards”, http://inforge.unil.ch/isdss97/papers/48.htm, (1997).
de Kerf, B. et al., “N-Count Fast, Low-Cost Secure Payments using Smart Cards”, QC Technology, Version 1.1, Feb. 1997, 8 pages.
PCT Invitation to pay additional fees/partial international search, PCT/US 03/15954, International filing date May 20, 2003, date of mailing Nov. 5, 2003.
International Search Report, PCT/US 03/15951, International filing date May 20, 2003, date Search Report mailed- Dec. 17, 2003.
Abdi Kambiz
Gunnison Forrest
Gunnison McKay & Hodgson, L.L.P.
Sun Microsystems Inc.
LandOfFree
Method for private personal identification number management does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for private personal identification number management, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for private personal identification number management will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3725801