Data processing: financial – business practice – management – or co – Business processing using cryptography – Secure transaction
Reexamination Certificate
2005-10-18
2005-10-18
Trammell, James P. (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Secure transaction
C705S080000, C705S064000, C705S065000, C705S067000, C705S070000, C705S071000, C705S075000, C705S053000, C705S050000, C713S155000, C713S156000
Reexamination Certificate
active
06957199
ABSTRACT:
The invention pertains to a method, online service, and system, for creating partnerships based on trust relationships over a public network, authenticating trade partners, infrastructure providers and collaborators to each other, and providing users with an environment suitable for conducting transactions requiring a high level of trust. A service according to the invention is a persistent authentication and mediation service (PAMS) which is provided as an on-line service. One embodiment is a method for conducting authenticated business transactions involving microprocessor equipped devices over the Internet comprising:A. providing an on-line authentication service available on the distributed network;B. authenticating a plurality of users to said on-line authentication service using a closed authentication system to produce a plurality of authenticated users; andC. connecting a group of at least two of said plurality of authenticated users under persistent mediation of said on-line authentication service, producing a connected group of authenticated users.
REFERENCES:
patent: 5812670 (1998-09-01), Micali
patent: 5815665 (1998-09-01), Teper et al.
patent: 5850442 (1998-12-01), Muftic
patent: 6404337 (2002-06-01), Van Till et al.
patent: 6598027 (2003-07-01), Breen et al.
patent: 2003/0004894 (2003-01-01), Rowney et al.
patent: 2003/0095726 (2003-05-01), Kia et al.
patent: 2004/0128257 (2004-07-01), Okamoto et al.
patent: WO 99/66436 (1999-12-01), None
“Software Smart Cards via Crypotographic Camouflage”, Hoover et al., 1999 IEEE.
Protecting Digital Identities, Arcot Webfort Whitepaper, Arcot Systems, Inc., downloaded from “www.arcot.com”, Aug. 3, 2000.
Hoover, D.,N, and Kausik, B.,N., “Software Smart Cards via Cryptographic Camouflage”, Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999, IEEE.
Hewlett Packard, “Enabling New Business Opportunities—A Primer on E-Speak”, Downloaded from “www.hp.com/e-speak” on Aug. 1, 2000.
Tidepoint-Business Partner Infrastructure Services. Downloaded from “www.tidepoint.net” on Jan. 26, 2001.
Foothill Group, LLP
Lebowitz Howard E.
Smith Barton A.
Trammell James P.
Worjloh Jalatee
LandOfFree
Method, system and service for conducting authenticated... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method, system and service for conducting authenticated..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system and service for conducting authenticated... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3474276