Transaction verification

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S018000, C726S021000

Reexamination Certificate

active

07137140

ABSTRACT:
A customer computer12, vendor computer16and verification computer14are interconnected by means of a network18, such as the internet The customer12can initiate a transaction, such as the purchase of information from the vendor16. However, the vendor16will not proceed until verification of the transaction has been received from the site14. This is not provided until the customer12has sent a unique fingerprint of data to the site14, identifying the customer machine by reference to hardware device types or serial numbers, software types or licences, e-mail addressed or the like. This fingerprint is stored for future reference in showing that the transaction was validly implemented by the customer machine12.

REFERENCES:
patent: 4885777 (1989-12-01), Takaragi et al.
patent: 5337357 (1994-08-01), Chou et al.
patent: 5521980 (1996-05-01), Brands
patent: 5668878 (1997-09-01), Brands
patent: 5696827 (1997-12-01), Brands
patent: 5793028 (1998-08-01), Wagener et al.
patent: 6023509 (2000-02-01), Herbert et al.
patent: 6078902 (2000-06-01), Schenkler
patent: 6131162 (2000-10-01), Yoshiura et al.
patent: 6148407 (2000-11-01), Aucsmith
patent: 6948168 (2005-09-01), Kuprionas
patent: 2 355 322 (2001-04-01), None
patent: 97/50207 (1997-12-01), None
patent: 98/44402 (1998-10-01), None
patent: 00/31644 (2000-06-01), None
http://www.east-shore.com/verify.html.
http://www.divassoftware.com/services/securityNet.htm.
http://biz.yahoo.com/pz/050131/71730.html.
Access control system with high level security using fingerprints, Younhee Gil; Dosung Ahn; Sungbum Pan; Yongwha Chung; Applied Imagery Pattern Recognition Workshop, 2003. Proceedings. 32nd, Oct. 15-17, 2003 pp. 238-243.
Fingerprint multicast in secure video streaming, Zhao, H.V.; Liu, K.J.R.; Image Processing, IEEE Transactions on, vol. 15, Issue 1, Jan. 2006 pp. 12-29.
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting, Zhao, H.V.; Min Wu; Wang, Z.J.; Liu, K.J.R.; Image Processing, IEEE Transactions on, vol. 14, Issue 5, May 2005 pp. 646-661.
Lang, Paul, “How to Beat Credit Card Fraud,” NETrageous Inc., Olney, MD. http://web.archive.org/web/20000118013545/http://scambusters.org/reports/lang.html.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Transaction verification does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Transaction verification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Transaction verification will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3697131

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.