Information security – Access control or authentication – Network
Reexamination Certificate
2007-07-03
2007-07-03
Vu, Kim (Department: 2135)
Information security
Access control or authentication
Network
C726S027000
Reexamination Certificate
active
10243474
ABSTRACT:
A method and apparatus for digital content access control comprises receiving an authenticated digital content request based at least in part on a digital content request comprising a request for digital content, validating the authenticated digital content request and providing the digital content if the authenticated digital content request is valid. The validating comprises indicating the authenticated digital content request is valid if the authenticated digital content request is validly associated with the digital content and if the authenticated digital content request authenticates the digital content request, and indicating the authenticated digital content request is invalid if the authenticated digital content request is not validly associated with the digital content.
REFERENCES:
patent: 5483596 (1996-01-01), Rosenow et al.
patent: 5577227 (1996-11-01), Finnell et al.
patent: 5594227 (1997-01-01), Deo
patent: 5706427 (1998-01-01), Tabuki
patent: 5757920 (1998-05-01), Misra et al.
patent: 5774670 (1998-06-01), Montulli
patent: 5784464 (1998-07-01), Akiyama et al.
patent: 5802518 (1998-09-01), Karaev et al.
patent: 5841866 (1998-11-01), Bruwer et al.
patent: 5841970 (1998-11-01), Tabuki
patent: 5862325 (1999-01-01), Reed et al.
patent: 5905987 (1999-05-01), Shutt et al.
patent: 5930804 (1999-07-01), Yu et al.
patent: 6003039 (1999-12-01), Barry et al.
patent: 6018627 (2000-01-01), Iyengar et al.
patent: 6023698 (2000-02-01), Lavey et al.
patent: 6041357 (2000-03-01), Kunzelman et al.
patent: 6088451 (2000-07-01), He et al.
patent: 6092196 (2000-07-01), Reiche
patent: 6148404 (2000-11-01), Yatsukawa
patent: 6199169 (2001-03-01), Voth
patent: 6201790 (2001-03-01), Teboul
patent: 6226744 (2001-05-01), Murphy et al.
patent: 6236981 (2001-05-01), Hill
patent: 6275941 (2001-08-01), Saito
patent: 6286104 (2001-09-01), Buhle et al.
patent: 6314425 (2001-11-01), Serbinis et al.
patent: 6360254 (2002-03-01), Linden et al.
patent: 6438550 (2002-08-01), Doyle et al.
patent: 6483433 (2002-11-01), Moskowitz et al.
patent: 6510236 (2003-01-01), Crane et al.
patent: 6658000 (2003-12-01), Raciborski et al.
patent: 6714921 (2004-03-01), Stefik et al.
patent: 6766305 (2004-07-01), Fucarile et al.
patent: 6892306 (2005-05-01), En-Seung et al.
patent: 6898711 (2005-05-01), Bauman et al.
patent: 6928545 (2005-08-01), Litai et al.
patent: 6947908 (2005-09-01), Slater
patent: 6947910 (2005-09-01), Hsu et al.
patent: 6970904 (2005-11-01), Rode
patent: 6981015 (2005-12-01), Palmer et al.
patent: 6993137 (2006-01-01), Fransdonk
patent: 2001/0000814 (2001-05-01), Montgomery et al.
patent: 2002/0049679 (2002-04-01), Russell et al.
patent: 2003/0061170 (2003-03-01), Uzo
patent: 2003/0063750 (2003-04-01), Medvinsky et al.
patent: 2003/0073440 (2003-04-01), Mukherjee et al.
patent: 2004/0006693 (2004-01-01), Vasnani et al.
patent: 2004/0015703 (2004-01-01), Madison et al.
patent: 2004/0073903 (2004-04-01), Melchione et al.
patent: 1 089 516 (2001-04-01), None
patent: 2 352 850 (2001-02-01), None
patent: WO 97/08868 (1997-03-01), None
patent: WO 00 42491 (2000-07-01), None
Anderson et al., “A New Family of Authentication Protocols”, Cambridge University Computer Laboratory, England, 13 pages.
Chen, Zhiqun, “Java Card™ Technology for Smart Cards”,Sun Microsystems, pp. 11-16, Jun. 2000.
Deianov, Borislav, “Authentication—Lamport Hash and Biometrics”, printed on Jan. 9, 2002 from http://www.cs.cornell.edu/html/cs513-sp99/NL12.html.
de Kerf, B. et al., “N-Count Fast, Low-Cost Secure Payments using Smart Cards”, QC Technology, Version 1.1, Feb. 1997, 8 pages.
Goldreich, Oded, “The Foundations of Modern Cryptography”, May 2, 1998, Department of Computer Science and Applied Mathematics, Version Nr. 3.1, 41 pages.
Islam, N. et al. “A Flexible Security Model for Using Internet Content”, IBM Thomas J. Watson Research Center Papers, ‘Online!’, Jun. 28, 1997.
“Kerberos: The Network Authentication Protocol”, printed on Jan. 9, 2002 from http://web.mit.edu/kerberos/www/.
Naor, et al., “Universal One-Way Hash Functions and Their Cryptographic Applications”, Mar. 13, 1995, 14 pages.
Woo et al., “Authentication for Distributed Systems”, IEEE Computer, pp. 39-52, Jan. 1992.
Phillip Hallam-Baker, “Security Assertions Markup Language”, May 14, 2001, ver. 0.7, pp. 1-24.
International Search Report, PCT/US 03/24227, International filing date Aug. 1, 2003, date Search Report mailed Feb. 9, 2004.
R. Rivest, “The MD4 Message Digest Algorithm”, Request for Comments (RFC) 1320, MIT Laboratory for Computer Science and RSA Data Security , Inc., Apr. 1992, pp. 1-20.
R. Rivest, “The MD5 Message-Digest Algorithm”, Request for Comments (RFC) 1321 MIT Laboratory for Computer Science and RSA Data Security, Inc., Apr. 1992.
“Secure Hash Standard”, Federal Information Processing Standard Publication 180-1, Apr. 17, 1995.
“Smart Card Stage I Description”, Version 1.1, CDMA Development Group- Smart Card Team Document, May 22, 1996.
“Digital Cellular Telecommunications Systems(Phase 2+);AT Command Set for GSM Mobile Equipment(ME)”, ETSI TS 100 916 V7.4.0, 1998.
“Wireless Identity Module Pert: Security” Version 12, Wireless Application Protocol WAP-260-WIM-20010712-a, Jul. 2001.
“3rdGeneration Partnership Project; Technical Specification Group Terminals; USIM and IC Card Requirements(Release 4)”, 3GPP TS 21.111 V4.0.0, 2001.
“3rdGeneration Partnership Project 2: Removable User Identity Module for Spread Spectum Systems” 3GPP2 C.S0023-A, Version 1.0, Sep. 13, 2002, pp. 1-1-5-2, A1-A4.
International Search Report, PCT/US 03/24295, International filing date Aug. 1, 2003, dated Search Report mailed Feb. 11, 2004.
Samar, V., “Single Sign-on Using Cookies for Web Applications”,Enabling Technologies: Infrastructure for Collaborative Enterprises, 1999. (Wet Ice '99). Proceedings.IEEE 8thInternational Workshops on Stanford, CA, USA Jun. 16-18, 1999, IEEE Comput. Soc, Los Alamitos, CA, USA, pp. 158-163, Jun. 16, 1999. (XP010358606).
Bostrom Jon
Cooley Aaron
de Jong Eduard
Gunnison Forrest
Gunnison McKay & Hodgson, L.L.P.
Nirav Patel
Sun Microsystems Inc.
Vu Kim
LandOfFree
Repositing for digital content access control does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Repositing for digital content access control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Repositing for digital content access control will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3820523