Data processing: financial – business practice – management – or co – Business processing using cryptography – Secure transaction
Reexamination Certificate
2006-09-12
2006-09-12
Hayes, John W. (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Secure transaction
C705S064000, C705S065000, C705S071000, C705S075000, C705S076000, C713S150000, C713S155000, C713S156000
Reexamination Certificate
active
07107248
ABSTRACT:
A system, method and computer program for ordering, paying for and delivering goods and services through the use of certificates. These certificates insure that the buyer is only billed once for the good or service purchased and only for the correct amount. This system, method and computer program employs the authentication center used to enable access to a telecommunication infrastructure to bootstrap a public-key infrastructure. This system, method and computer program will validate the identity of the mobile station being used utilizing long term keys stored in the mobile station and an authentication center. The system, method and computer program will then utilize these keys and variables to generate digital certificates and signatures which enable the purchase of goods and services using a mobile station. The gateway will then verify the authenticity of any charges made based on the digital certificates and signatures received. Thus, a user of this system, method and computer program can purchase goods and services without fear of fraud or errors. This mobile station may be a cellular phone and when used with this system, method and computer program the cellular phone may be used similarly to a credit card but with the advantage of little possibility of fraud or error.
REFERENCES:
patent: 5467398 (1995-11-01), Pierce et al.
patent: 5608778 (1997-03-01), Partridge, III
patent: 5796832 (1998-08-01), Kawan
patent: 6003135 (1999-12-01), Bialick et al.
patent: 6062472 (2000-05-01), Cheung
patent: 6081518 (2000-06-01), Bowman-Amuah
patent: 6084969 (2000-07-01), Wright et al.
patent: 6141752 (2000-10-01), Dancs et al.
patent: 6285991 (2001-09-01), Power
patent: 6385729 (2002-05-01), DiGiorgio et al.
patent: 6463534 (2002-10-01), Geiger et al.
patent: 6516316 (2003-02-01), Ramasubramani et al.
patent: 2003/0046237 (2003-03-01), Uberti
patent: 2003/0140007 (2003-07-01), Kramer et al.
patent: 2005/0138363 (2005-06-01), Fox et al.
patent: 0651533 (1995-05-01), None
patent: 2 779 896 (1999-12-01), None
patent: WO 97/45814 (1997-12-01), None
patent: WO 99/49404 (1999-09-01), None
“The GSM System for Mobile Communications”, Michel Mouly, et al., pp. 477-498, 1992.
“Handbook of Applied Cryptography”, Alfred J. Menezes, et al., http://www.cacr.math.uwaterloo.ca/hac/, Chapter 9, pp. 321-383, Chapter 13, pp. 543-590.
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Architecture (3G TS 33.102 version 3.5.0 Release 1999)”, 3GPP, 650 Route des Lucioles—Sophia Antipolis Valbonne—France, http://www/3gpp.org.
Asokan Nadarajah
Ginzboorg Philip
Foley & Lardner LLP
Hayes John W.
Nokia Corporation
Worjloh Jalatee
LandOfFree
System and method of bootstrapping a temporary public-key... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method of bootstrapping a temporary public-key..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method of bootstrapping a temporary public-key... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3579888