Information security – Access control or authentication – Network
Reexamination Certificate
2006-11-14
2006-11-14
Jung, David (Department: 2134)
Information security
Access control or authentication
Network
C726S018000, C726S021000
Reexamination Certificate
active
07137140
ABSTRACT:
A customer computer12, vendor computer16and verification computer14are interconnected by means of a network18, such as the internet The customer12can initiate a transaction, such as the purchase of information from the vendor16. However, the vendor16will not proceed until verification of the transaction has been received from the site14. This is not provided until the customer12has sent a unique fingerprint of data to the site14, identifying the customer machine by reference to hardware device types or serial numbers, software types or licences, e-mail addressed or the like. This fingerprint is stored for future reference in showing that the transaction was validly implemented by the customer machine12.
REFERENCES:
patent: 4885777 (1989-12-01), Takaragi et al.
patent: 5337357 (1994-08-01), Chou et al.
patent: 5521980 (1996-05-01), Brands
patent: 5668878 (1997-09-01), Brands
patent: 5696827 (1997-12-01), Brands
patent: 5793028 (1998-08-01), Wagener et al.
patent: 6023509 (2000-02-01), Herbert et al.
patent: 6078902 (2000-06-01), Schenkler
patent: 6131162 (2000-10-01), Yoshiura et al.
patent: 6148407 (2000-11-01), Aucsmith
patent: 6948168 (2005-09-01), Kuprionas
patent: 2 355 322 (2001-04-01), None
patent: 97/50207 (1997-12-01), None
patent: 98/44402 (1998-10-01), None
patent: 00/31644 (2000-06-01), None
http://www.east-shore.com/verify.html.
http://www.divassoftware.com/services/securityNet.htm.
http://biz.yahoo.com/pz/050131/71730.html.
Access control system with high level security using fingerprints, Younhee Gil; Dosung Ahn; Sungbum Pan; Yongwha Chung; Applied Imagery Pattern Recognition Workshop, 2003. Proceedings. 32nd, Oct. 15-17, 2003 pp. 238-243.
Fingerprint multicast in secure video streaming, Zhao, H.V.; Liu, K.J.R.; Image Processing, IEEE Transactions on, vol. 15, Issue 1, Jan. 2006 pp. 12-29.
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting, Zhao, H.V.; Min Wu; Wang, Z.J.; Liu, K.J.R.; Image Processing, IEEE Transactions on, vol. 14, Issue 5, May 2005 pp. 646-661.
Lang, Paul, “How to Beat Credit Card Fraud,” NETrageous Inc., Olney, MD. http://web.archive.org/web/20000118013545/http://scambusters.org/reports/lang.html.
Jung David
Simplex Major SDN.BHD
Smith-Hill and Bedell
LandOfFree
Transaction verification does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Transaction verification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Transaction verification will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3697131