Cryptography – Key management – Having particular key generator
Patent
1996-04-26
1999-11-16
Gregory, Bernaar E.
Cryptography
Key management
Having particular key generator
380 9, 380 23, 380 24, 380 25, 380 28, 380 30, 395156, 39518701, 705 26, 705 35, 705 39, H04L 900, H04L 930
Patent
active
059871407
ABSTRACT:
Secure transmission of data is provided between a plurality of computer systems over a public communication system, such as the Internet. Secure transmission of data is provided from a customer computer system to a merchant computer system, and for the further secure transmission of data from the merchant computer system to a payment gateway computer system. The payment gateway system evaluates the information and returns authorization or denial of credit via a secure transmission to the merchant which is communicated to the customer by the merchant.
REFERENCES:
patent: 3651511 (1972-03-01), Andrews et al.
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4277837 (1981-07-01), Stuckert
patent: 4303904 (1981-12-01), Chasek
patent: 4454414 (1984-06-01), Benton
patent: 4614861 (1986-09-01), Pavlov et al.
patent: 4630201 (1986-12-01), White
patent: 4689478 (1987-08-01), Hale et al.
patent: 4766293 (1988-08-01), Boston
patent: 4799156 (1989-01-01), Shavit et al.
patent: 4859837 (1989-08-01), Halpern
patent: 4877950 (1989-10-01), Halpern
patent: 4906828 (1990-03-01), Halpern
patent: 4935962 (1990-06-01), Austin
patent: 4968873 (1990-11-01), Dethloff et al.
patent: 4992646 (1991-02-01), Collin
patent: 5016274 (1991-05-01), Micali et al.
patent: 5030806 (1991-07-01), Collin
patent: 5175416 (1992-12-01), Mansvelt et al.
patent: 5221838 (1993-06-01), Gutman et al.
patent: 5283819 (1994-02-01), Glick et al.
patent: 5297030 (1994-03-01), Vassigh
patent: 5420405 (1995-05-01), Chasek
patent: 5440634 (1995-08-01), Jones et al.
patent: 5442791 (1995-08-01), Wrabetz et al.
patent: 5448045 (1995-09-01), Clark
patent: 5452352 (1995-09-01), Talton
patent: 5453601 (1995-09-01), Rosen
patent: 5455407 (1995-10-01), Rosen
patent: 5459304 (1995-10-01), Eisenmann
patent: 5465291 (1995-11-01), Barrus et al.
patent: 5475826 (1995-12-01), Fischer
patent: 5476259 (1995-12-01), Weingardt
patent: 5478993 (1995-12-01), Derksen
patent: 5485510 (1996-01-01), Colbert
patent: 5506832 (1996-04-01), Arshi
patent: 5557518 (1996-09-01), Rosen
patent: 5590038 (1996-12-01), Pitroda
patent: 5590197 (1996-12-01), Chen et al.
patent: 5638445 (1997-06-01), Spelman et al.
patent: 5671279 (1997-09-01), Elgamal
patent: 5671280 (1997-09-01), Aucsmith et al.
patent: 5677955 (1997-10-01), Doggett et al.
patent: 5715314 (1998-02-01), Payne et al.
patent: 5729594 (1998-03-01), Klingman
patent: 5742845 (1998-04-01), Wagner
patent: 5754772 (1998-05-01), Leaf
patent: 5793966 (1998-12-01), Amstein et al.
Marvin Sirbu et al.; "NetBill: An Internet Commerce System Optimized for Network Delivered Services"; IEEE CompCon Conference (Mar., 1995).
Warr, Michael. "Business Wants Telecom of the Future--Today," Telephony's SUPERCOMM Wrap-up, pp. 12-13. Apr. 1991.
Muller, R., "Lon-Das Universelle Netzwerk, Teil 1." Elektronik., vol. 40, No. 22, Oct. 29, 1991, Munchen De, pp. 59-69, XP000268228.
Snow, C.R. et al: "Simple Authentication" Software Practice & Experience., vol. 24, No. 5, May 1994, Chichester GB, pp. 437-447, XP0006555455, p. 440-441.
Stallings, W. "Data and Computer Communications", 1994, MacMillan Publishing Co., New York, US, XP002069639, pp. 636-644, 663-666.
Anderson, R. et al. "NetCard--a Practical Electronic-cash System." International Workshop Proceedings, Security Protocols. International Workshop, Cambridge, UK, Apr. 10-12, 1996. p. 49. XP00203977.
Anderson, R.J., UEPS A Second Generation Electronic Wallet, (1992) University of Cambridge Computer Laboratory, pp. 411-418.
Bank Systems Technology, SET Tool Kit for Secure Commerce, (May 1996) p. 16.
Bellare et al., iKP--A Family of Secure Electronic Payment Tools, USENIX Association, First USENIX Workshop on Electronic Commerce, (Jul. 11-12, 1995) pp. 89-106.
Bryant, A., Am I Bid Six? Click to Bid Six!, The New York Times, (Mar. 13, 1996) pp. D1-D6.
Camp et al., Token and Notational Money in Electronic Commerce, USENIX Association, First USENIX Workshop on Electronic Commerce, (Jul. 11-12, 1995), pp. 1-12.
Cox et al., NetBill Security and Transaction Protocol, USENIX Association, First USENIX Workshop on Electronic Commerce, (Jul. 11-12, 1995), pp. 77-88.
One-Click Software Distribution Via the Web, Cutting Edge, Datamation, (May 1, 1996), p. 16.
Software Taps Net for Supply Data Sharing, Purchasing, EBN, (Apr. 22, 1996), p. 50.
Flohr, U., Electronic Money, Byte, (Jun. 1996), p. 74.
Gifford, et al., Payment Switch for Open Networks, USENIX Association, First USENIX Workshop on Electronic Commerce, (Jul. 11-12, 1995), pp. 69-75.
Gosling, et al., The Java Language Environment a White Paper, Sun Microsystems Computer Company, (May 1995).
Jones, et al., Securing the World Wide Web, Smart Tokens and Their Implementation, World Wide Web Journal, O'Reilly & Associates, Inc., (Dec. 11-14, 1995), pp. 397-409.
Kamens, J., Retrofitting Network Security to Third-Party Applications--The SecureBase Experience, USENIS Association, UNIX Security Symposium IV. (1993) pp. 41-57.
Marshall, M., Banking on the Internet, Communications Week, (May 20, 1996) No. 611.
Messmer, E., ActiveX Pioneer Pushes a Commerce, Network World, (May 6, 1996) p. 33.
Messmer, E., Edify Soft to Let Banks Open Doors Online, Network World, (May 20, 1996).
Messmer, E., Start-Up Puts Security SOCKS on Window Apps, Network World, (May 20, 1996).
Microsoft and VeriFone Announce Agreement to Deliver Commerce-enabled Internet Retailing Solutions, Microsoft Press Release, (Aug. 5, 1996) pp. 1-3.
Real Security, Mondex Magazine, (Summer 1996) pp. 5-6.
What's Up Doc?, That's Infotainment, Mondex Magazine, (Summer 1996) pp. 8-10.
Ready to Go. The Trillion Yen Business, Mondex Magazine, (Summer 1996) pp. 27-29.
Morgan, L., Cashing In: The Rush is on to Make Net Commerce Happen, Internet World, (Feb. 1995), pp. 48-51.
Nash, et al., Vendors Deliver Is-Specific Apps Over the 'Net, News (May 6, 1996) p. 16.
Nee, E., Hatim Tyabji, Upside, (Sep. 1996) pp. 85-93.
Neuman, et al., Requirements for Network Payment: The NetCheque Perspective, University of Southern California, (1995) pp. 32-36.
Ozer, K., Online Software Stores, PC Magazine, (May 28, 1996), p. 36.
Rodriguez, K., Pushing the Envelope, Communications Week, (May 13, 1996) pp. 37-39.
Rupley, S., Digital Bucks? Stop Here, PC Magazine, (May 28, 1996), pp. 54-60.
Semilof, M., Boosting Web Business, Communications Week, (May 20, 1996) pp. 31-32.
Sibert et al., The DigiBox: A Self-Protecting Container for Information Commerce, First USENIX Workshop on Electronic Commerce, (Jul. 11-12, 1995), pp. 171-183.
Sixbu, et al., NetBill: An Internet Commerce System Optimized for Network Delivered Services, Carnegie Mellon University, (1995) pp. 20-25.
Sviwa, C., Netscape Unveils New 'Net Commerce Offerings, Network World, (May 13, 1996) p. 10.
Singleton, A., Cash on the Wirehead, Byte, (Jun. 1995) pp. 71-78.
Tang, et al., A Set of Protocols for Micropayments in Distributed Systems, First USENIX Workshop on Electronic Commerce, (Jul. 11-12, 1995) pp. 107-115.
Thompson, et al., A Secure Public Network Access Mechanism, UNIX Security Symposium, (1992) pp. 227-238.
Trommer, D., ECS Catalog Merges EDI/Net Platforms: Enables Online Ordering in EDI Format Over Net, EBN, (May 20, 1996) p. 54.
Trommer, D., GE/Netscape Form Software Venture: Will Focus on Electronic Commerce Solutions, EBN, (Apr. 22, 1996) p. 54.
Vaughan-Nichols, Steven, XVision Turns a PC Into X Terminal for Unix, VMS Host, Government Computer News, Jul. 8, 1996, pp. 38, 42.
Vincenzetti et al., STEL: Secure TELnet, 5th UNIX Security Symposium, Jun. 5-7, 1995.
Wexler, Joanie, AT&T Sell Insurers on the Web, Network World, May 20, 1996, p. 27.
Wiggins, Richard, Business Browser: A Tool to Make Web Commerce Secure, Internet World, Feb. 1995, pp. 52, 54, 55.
Yacobi, Yacov, Efficient Electronic Money, Official Gazette, Apr. 23, 1996, p. 2976.
Yee et al., Secure Coprocessors in Electronic Commerce Applications, First USENIX Workshop on Electronic Commerce, Jul. 11-12, 1995, pp. 155-169.
ARA Banking Journal, Will SET Kill Card Fraud On the Internet?, Apr., 1996, pp. 237-238.
Advertising Age, Visa Turns To Redgate for Online, CD-ROM Work, Sa
Nadig Deepak S.
Rowney Kevin Thomas Bartholomew
Chalker Daniel J.
Gregory Bernaar E.
Veri-Fone, Inc.
Warren, Jr. Sanford E.
LandOfFree
System, method and article of manufacture for secure network ele does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System, method and article of manufacture for secure network ele, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System, method and article of manufacture for secure network ele will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1334424