GB2354102A - System for communicating over a public network - Google Patents
System for communicating over a public network Download PDFInfo
- Publication number
- GB2354102A GB2354102A GB9921227A GB9921227A GB2354102A GB 2354102 A GB2354102 A GB 2354102A GB 9921227 A GB9921227 A GB 9921227A GB 9921227 A GB9921227 A GB 9921227A GB 2354102 A GB2354102 A GB 2354102A
- Authority
- GB
- United Kingdom
- Prior art keywords
- user
- card
- processor unit
- security system
- public network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 claims abstract description 23
- 238000003780 insertion Methods 0.000 claims abstract description 5
- 230000037431 insertion Effects 0.000 claims abstract description 5
- 238000013475 authorization Methods 0.000 abstract description 2
- 238000010200 validation analysis Methods 0.000 description 5
- 238000012795 verification Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 3
- 238000000034 method Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 239000012141 concentrate Substances 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0866—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
Landscapes
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A system for communicating with a remote service over a public network 18, such as the Internet, includes a client device 10 with a memory card 28 or the like, a card reader 26 and a public network communication device such as a personal computer or television, and a processor unit, such as a central gateway 12, which is located remotely from the client device. The memory card includes user details which are transmitted by the client device to the processor unit, and may be encrypted. The card reader may activate communication with the processor unit upon insertion of the memory card, which may be a smart card or magnetic card. The processor unit may determine which of a plurality of services 14,16 a user is authorised to access. The system provides for secure communication without burdening the user with encryption or authorisation tasks.
Description
2354102 SECURITY SYSTEM The present invention relates to a security
system, for use for example in accessing remote services such as on the Internet.
With the advent of modern technology, a growing number of transactions are being carried out by the user across insecure networks. These can be, for example, transactions involving confidential data and money for payment or investment. With such transactions there are problems with security, fraud and so on. Various security systems have been devised, such as use of personal identification numbers, encryption of io transmissions - While these systems usually work well for the particular environment for which they have been designed, they can be a nuisance to use and can be difficult or expensive to implement for a new service provider.
Systems have also been developed for Internet use. These systems concentrate on authentication of the user and then, once this has been established, provide for unencrypted connection to the service. When particular transactions are undertaken, the service determines whether encryption is necessary, for example to secure credit card details. Other solutions require entry of credit card details for each transaction. These systems inevitably must provide a balance between security and user convenience as the encryption mechanisms used cause additional work for and complication to the user.
The present invention seeks to provide an improved security system.
According to an aspect of the present invention, there is provided a security system for communicating with a remote service over a public network including a user card or other memory device, a user located card or memory device reader, a user located public network communication device and a processor unit located remotely from the user located public network communication device, wherein the user card includes user details and the user located public network communication device is operable to transmit the user details to the processor unit.
2 Advantageously, the processor unit is operable to carry out encryption between it and the user and to provide to the user a transparent path to the service. Thus, the user need not be aware of any security steps taken or any encryption system used, this being carried out by the card reader and the processor unit or central gateway.
The card may be any suitable device which can store user information and, preferably, encryption data. The card, can for example be a smart card, a magnetic card such as a credit/debit card or store loyalty card or any other suitable device. In addition to the card, the user may be required to input a secret identification code, such as an io identification number.
In the preferred embodiment, the system provides for the user to insert the card into his/her card reader and to initiate the connection to the processor unit or central gateway. Once the connection is made, the processor unit obtains the relevant data from the card and upon verification by the identification code, allows the user access to the authorised service without any intermediate tasks, such as requirements to encrypt or decrypt transmitted data, to provide other user details and, where appropriate account or payment details. Thus, as with the preferred embodiment, all communications between the processor unit and the user can be encrypted, without the user necessarily being aware of or involved in this encryption. The communication between the user and the processor unit can therefore be totally secure yet without user inconvenience.
Advantageously, communications between the service and the processor unit, which are preferably carried out via a secure link, need not be encrypted.
The splitting of the encryption from the service results in being able to provide a dedicated encryption device, the processor unit, which can therefore be designed to maximise encrypted communication efficiency. Typically, encryption of all communications from the service unit is not practicable because the service unit is not designed for such a task and even if it were it would result in a loss of efficiency in providing the service itself.
3 In the preferred embodiment, the processor unit is also able to determine which of a plurality of services the user is authorised to access and/or the level of access such as spending limit, and to control access to the service or relevant service on this basis. It can also or alternatively undertake transactions against an account identified by the card.
An embodiment of the present invention is described below, by way of example only, with reference to the accompanying drawings, in which:
lo Figure 1 is a schematic diagram of an embodiment of security system coupled to a processor unit or central gateway and a service; and Figure 2 is a flow chart of an example of validation routine for use with the system of Figure 1.
Referring to Figure 1, the embodiment of security system shown is designed for communications through the Internet or a similar public network.
The system includes an intelligence client device 10, which may be a personal computer, television, or any other suitable device which can communicate with a remote system. A processor unit, in this example a central gateway 12 is coupled between the client device 10 and one or more service units 14.
Communication between the client device 10 and the central gateway 12 is, in this embodiment, via a public network 18 such as the Internet. Communication between the central gateway 12 and the service units 14, 16 is, on the other hand, via a private network 20 which cannot be accessed by the public.
The client device 10 is provided with an application and user interface 22; which can be the usual computer devices such as monitor, keyboard and software in the case that it is a personal computer; the screen and a suitable keyboard or keypad in the case that the 4 device 10 is a television or any other suitable device. The device 10 could also be a portable telephone with suitable display and keypad.
The device 10 also includes suitable network protocol 24 for allowing communication to 5 the gateway 12 through the chosen network 18 or other public transmission medium.
The device 10 also includes a card reader 26 designed for reading the card-type chosen for the system and a card 28 which is specific to that iiser. The card 28 could be a: smart card or magnetic card of the types well known or any other portable memory device. It io is envisaged that the card 28 could have other functions in addition to the security function for this system, for example it could also be a credit/debit card, store loyalty card and the like.
The card 28 has stored thereon one or more user identifiers, one or more encryption keys and the desired service information, that is details of the service to which the user wants access. His/her level of authorisation in the service and so on will be determined by the central gateway 12.
The card reader 26 is designed, in the preferred embodiment, to be able to detect the insertion of the card 28 thereinto and in response to such insertion to commence immediately communication with the gateway 12 via the client device 10.
The central gateway 12 includes an encryption and network protocol stack 30 designed to allow comniunication via the chosen public network 18 and to provide encryption of all communications between itself and the client device 10. It also includes an authentication and validation unit 32 for authenticating the client data from the client card 28. The authentication and validation unit 32 is coupled to a verification database 34 of the gateway 12 in which is stored the identification data of all the users registered for the services 14,16. The database 34 may be provided either within the gateway 12 or in a remote database 34' accesses through secure network 20.
The authentication and validation unit 32 is also coupled to server access permission unit 36 designed to control the type of access to the service units 14,16 in dependence upon the user's authority.
Also provided in the gateway 12 are a typical HTTP server for management of the gateway 12 and an authentication and attachment unit 38 for communicating with the desired services 14,16 and with any remote verification database 34'. The central gateway 12 is designed specifically for encrypting all communications over io the public network 18 and for carrying out the authentication procedure. The operation of the this embodiment will now be described with reference to Figure 2. Insertion 50 of the card 28 into the card reader 26 prompts the card reader 26 to 15 commence automatically the connection to the gateway 12. For this purpose, card reader 26 activates a software component in the device 10 to establish a communication link with the gateway 12 on the basis of information stored on the card 28 about the location on the Internet and access details of the gateway 12. 20 When a connection with the gateway 12 is established, the gateway 12 requests the user's personal identification code which is then inputted 52 at a suitable prompt on the user interface 22. Validation 54 of the user's details and identification. code is caff ied out either internally 25 of the gateway 12, by the units 32 and 34, or externally at the verification database 34'. If the gateway 12 determines 54 that the user's identification code is invalid, the user is rejected 56 and the connection is cut 58. On the other hand, if it is determined 54 the user's identification code is valid, the gateway 12 determines 60 the desired service 14, 30 16 and level of service to be provided and connects 62 to the desired service unit 14, 16.
6 During the connection to the desired service 14, 16, all data transfers between the gateway 12 and user device 10 are encrypted on the basis of the encryption keys on the user's card 28 and within verification database 34, while all data transfers between the gateway 12 and the service units 14, 16 through the private network 20 are not encrypted for ease of access and for increased efficiency. In practice, the user will not be aware of the encryption between him/her and the gateway 12 as this will be carried out as a background task. Moreover, the user will not need to re-confirm his/her identity or financial details as these will be provided by the card 28 or gateway 12.
lo The gateway 12, in some embodiments, records the activities of the client, such as transaction details, either within the gateway 12 or in a remote memory accessed via a private network.
Disconnection from the services 14, 16 is, in this embodiment, effected simply by removing 64 the card 28 from the card reader 26.
Thus, connection is made by a simple two step process of inserting the card 28 into the reader 26 and entering the user identification code and disconnection is effected by removing the card 28 from the card reader 26. The user is not involved in any other authentication or encryption process and need not re-enter personal details.
This system can be used for any remote service, including business to consumer (in which case the card could be designed also to function as a store or credit card), business to business (for example for transactions on account) and for internal networking (where the activity of staff, for example, needs to be secured).
It will be apparent from the above that the system can provide simple but absolutely secure access to a remote service. Moreover, by identifying the user to the desired service, user access can be customised. By removing the need for entry of account details, transactions into the desired service become quicker and less risky for the user's perspective.
7 Performance of the services can also be enhanced by carrying out the encryption tasks within the gateway rather than in the service units.
In addition, the service company can establish a relationship with the user by providing the user with the card and, possibly, also with the card reader.
It will be apparent that the card 28 and card reader 26 could be configured to communicate with a plurality of separate gateways 12.
8
Claims (8)
1. A security system for communicating with a remote service over a public network including a user card or other memory device, a user located card or memory device reader, a user located public network communication device and a processor unit located remotely from the user located public network communication device, wherein the user card includes usei details and the user locatedpublic network communicatioin device is operable to transmit the user details to the processor unit.
2. A security system according to claim 1, wherein the processor unit is operable to carry out encryption between itself and the user.
3. A security system according to claim I or 2, wherein the card has stored thereon user information and, preferably, encryption data.
4. A security system according to claim 3, wherein the card is a smart card, a magnetic card or any other suitable device.
5. A security system according to any preceding claim, wherein the card reader is operable to activate communication with the remote processor means upon insertion of a card thereinto.
6. A security system according to any preceding claim, wherein the processor unit is operable to encrypt substantially all communications between the user and itself.
7. A security system according to any preceding claim, wherein the processor unit is operable to determine which of a plurality of services a user is authenticated onto the desired service.
9
8. A security system substantially as hereinbefore described with reference to and as illustrated in the accompanying drawings.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9921227A GB2354102B (en) | 1999-09-08 | 1999-09-08 | Security system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9921227A GB2354102B (en) | 1999-09-08 | 1999-09-08 | Security system |
Publications (3)
Publication Number | Publication Date |
---|---|
GB9921227D0 GB9921227D0 (en) | 1999-11-10 |
GB2354102A true GB2354102A (en) | 2001-03-14 |
GB2354102B GB2354102B (en) | 2004-01-14 |
Family
ID=10860573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9921227A Expired - Fee Related GB2354102B (en) | 1999-09-08 | 1999-09-08 | Security system |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2354102B (en) |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003046718A2 (en) * | 2001-11-26 | 2003-06-05 | Carlos Cesar Moretzsohn Rocha | A system to provide an individual data processing environment |
US7664708B2 (en) | 1994-11-23 | 2010-02-16 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
US7685642B2 (en) | 2003-06-26 | 2010-03-23 | Contentguard Holdings, Inc. | System and method for controlling rights expressions by stakeholders of an item |
US7720767B2 (en) | 2005-10-24 | 2010-05-18 | Contentguard Holdings, Inc. | Method and system to support dynamic rights and resources sharing |
US7725401B2 (en) | 2001-05-31 | 2010-05-25 | Contentguard Holdings, Inc. | Method and apparatus for establishing usage rights for digital content to be created in the future |
US7743259B2 (en) | 2000-08-28 | 2010-06-22 | Contentguard Holdings, Inc. | System and method for digital rights management using a standard rendering engine |
US7765403B2 (en) | 1997-02-28 | 2010-07-27 | Contentguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermarking |
US7774280B2 (en) | 2001-06-07 | 2010-08-10 | Contentguard Holdings, Inc. | System and method for managing transfer of rights using shared state variables |
US7774279B2 (en) | 2001-05-31 | 2010-08-10 | Contentguard Holdings, Inc. | Rights offering and granting |
US7805371B2 (en) | 2002-03-14 | 2010-09-28 | Contentguard Holdings, Inc. | Rights expression profile system and method |
US7809644B2 (en) | 1994-11-23 | 2010-10-05 | Contentguard Holdings, Inc. | Digital work structure |
US7840488B2 (en) | 2001-11-20 | 2010-11-23 | Contentguard Holdings, Inc. | System and method for granting access to an item or permission to use an item based on configurable conditions |
US7853531B2 (en) | 2001-06-07 | 2010-12-14 | Contentguard Holdings, Inc. | Method and apparatus for supporting multiple trust zones in a digital rights management system |
US7907749B2 (en) | 2000-12-29 | 2011-03-15 | Contentguard Holdings, Inc. | Multi-stage watermarking process and system |
US7913095B2 (en) | 2000-08-28 | 2011-03-22 | Contentguard Holdings, Inc. | Method and apparatus for providing a specific user interface in a system for managing content |
US7974923B2 (en) | 2001-11-20 | 2011-07-05 | Contentguard Holdings, Inc. | Extensible rights expression processing system |
US8001053B2 (en) | 2001-05-31 | 2011-08-16 | Contentguard Holdings, Inc. | System and method for rights offering and granting using shared state variables |
US8069116B2 (en) | 2001-01-17 | 2011-11-29 | Contentguard Holdings, Inc. | System and method for supplying and managing usage rights associated with an item repository |
US8099364B2 (en) | 2001-05-31 | 2012-01-17 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US8108313B2 (en) | 2002-03-14 | 2012-01-31 | Contentguard Holdings, Inc. | Rights expression profile system and method using templates |
US8244579B2 (en) | 2001-01-17 | 2012-08-14 | Contentguard Holdings, Inc. | Method and apparatus for distributing enforceable property rights |
US8271350B2 (en) | 2000-11-03 | 2012-09-18 | Contentguard Holdings, Inc. | Method and system for automatically publishing content |
US8275709B2 (en) | 2001-05-31 | 2012-09-25 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US8275716B2 (en) | 2001-05-31 | 2012-09-25 | Contentguard Holdings, Inc. | Method and system for subscription digital rights management |
US8442916B2 (en) | 2001-05-31 | 2013-05-14 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US8543511B2 (en) | 2002-04-29 | 2013-09-24 | Contentguard Holdings, Inc. | System and method for specifying and processing legality expressions |
US8660961B2 (en) | 2004-11-18 | 2014-02-25 | Contentguard Holdings, Inc. | Method, system, and device for license-centric content consumption |
US8869293B2 (en) | 2001-05-31 | 2014-10-21 | Contentguard Holdings, Inc. | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights |
US9898715B2 (en) | 2001-11-20 | 2018-02-20 | Contentguart Holdings, Inc. | Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates |
US11921868B2 (en) | 2021-10-04 | 2024-03-05 | Bank Of America Corporation | Data access control for user devices using a blockchain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997029416A2 (en) * | 1996-02-09 | 1997-08-14 | Integrated Technologies Of America, Inc. | Access control/crypto system |
EP0813175A2 (en) * | 1996-05-21 | 1997-12-17 | NCR International, Inc. | Financial transaction system |
WO1997050207A1 (en) * | 1996-06-26 | 1997-12-31 | Telia Ab (Publ) | Improvements in, or relating to, internet communication systems |
WO1998032260A1 (en) * | 1997-01-14 | 1998-07-23 | Commonwealth Bank Of Australia | Secure messaging table system |
US5809143A (en) * | 1995-12-12 | 1998-09-15 | Hughes; Thomas S. | Secure keyboard |
-
1999
- 1999-09-08 GB GB9921227A patent/GB2354102B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5809143A (en) * | 1995-12-12 | 1998-09-15 | Hughes; Thomas S. | Secure keyboard |
WO1997029416A2 (en) * | 1996-02-09 | 1997-08-14 | Integrated Technologies Of America, Inc. | Access control/crypto system |
EP0813175A2 (en) * | 1996-05-21 | 1997-12-17 | NCR International, Inc. | Financial transaction system |
WO1997050207A1 (en) * | 1996-06-26 | 1997-12-31 | Telia Ab (Publ) | Improvements in, or relating to, internet communication systems |
WO1998032260A1 (en) * | 1997-01-14 | 1998-07-23 | Commonwealth Bank Of Australia | Secure messaging table system |
Cited By (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7788182B2 (en) | 1994-11-23 | 2010-08-31 | Contentguard Holdings, Inc. | Method for loaning digital works |
US7664708B2 (en) | 1994-11-23 | 2010-02-16 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
US9953328B2 (en) | 1994-11-23 | 2018-04-24 | Contentguard Holdings, Inc. | Method and system for conducting transactions between repositories |
US8170955B2 (en) | 1994-11-23 | 2012-05-01 | Contentguard Holdings, Inc. | System and method for enforcing usage rights associated with digital content |
US7970709B2 (en) | 1994-11-23 | 2011-06-28 | Contentguard Holdings, Inc. | Method and apparatus for client customization by executing software parts on plural servers |
US7809644B2 (en) | 1994-11-23 | 2010-10-05 | Contentguard Holdings, Inc. | Digital work structure |
US8205089B2 (en) | 1997-02-28 | 2012-06-19 | Contentguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermarking |
US7765403B2 (en) | 1997-02-28 | 2010-07-27 | Contentguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermarking |
US7913095B2 (en) | 2000-08-28 | 2011-03-22 | Contentguard Holdings, Inc. | Method and apparatus for providing a specific user interface in a system for managing content |
US8832852B2 (en) | 2000-08-28 | 2014-09-09 | Contentguard Holdings, Inc. | Method and apparatus for dynamic protection of static and dynamic content |
US8489900B2 (en) | 2000-08-28 | 2013-07-16 | Contentguard Holdings, Inc. | Method and apparatus for providing a specific user interface in a system for managing content |
US7743259B2 (en) | 2000-08-28 | 2010-06-22 | Contentguard Holdings, Inc. | System and method for digital rights management using a standard rendering engine |
US8271350B2 (en) | 2000-11-03 | 2012-09-18 | Contentguard Holdings, Inc. | Method and system for automatically publishing content |
US7907749B2 (en) | 2000-12-29 | 2011-03-15 | Contentguard Holdings, Inc. | Multi-stage watermarking process and system |
US8244579B2 (en) | 2001-01-17 | 2012-08-14 | Contentguard Holdings, Inc. | Method and apparatus for distributing enforceable property rights |
US8069116B2 (en) | 2001-01-17 | 2011-11-29 | Contentguard Holdings, Inc. | System and method for supplying and managing usage rights associated with an item repository |
US8099364B2 (en) | 2001-05-31 | 2012-01-17 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US8412644B2 (en) | 2001-05-31 | 2013-04-02 | Contentguard Holdings, Inc. | Method and apparatus for establishing usage rights for digital content to be created in the future |
US8862517B2 (en) | 2001-05-31 | 2014-10-14 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US8001053B2 (en) | 2001-05-31 | 2011-08-16 | Contentguard Holdings, Inc. | System and method for rights offering and granting using shared state variables |
US8869293B2 (en) | 2001-05-31 | 2014-10-21 | Contentguard Holdings, Inc. | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights |
US7774279B2 (en) | 2001-05-31 | 2010-08-10 | Contentguard Holdings, Inc. | Rights offering and granting |
US8468098B2 (en) | 2001-05-31 | 2013-06-18 | Contentguard Holdings, Inc. | Method and system for subscription digital rights management |
US8442916B2 (en) | 2001-05-31 | 2013-05-14 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US7725401B2 (en) | 2001-05-31 | 2010-05-25 | Contentguard Holdings, Inc. | Method and apparatus for establishing usage rights for digital content to be created in the future |
US8275716B2 (en) | 2001-05-31 | 2012-09-25 | Contentguard Holdings, Inc. | Method and system for subscription digital rights management |
US8892473B2 (en) | 2001-05-31 | 2014-11-18 | Contentguard Holdings, Inc. | Method and system for subscription digital rights management |
US8275709B2 (en) | 2001-05-31 | 2012-09-25 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US7774280B2 (en) | 2001-06-07 | 2010-08-10 | Contentguard Holdings, Inc. | System and method for managing transfer of rights using shared state variables |
US7853531B2 (en) | 2001-06-07 | 2010-12-14 | Contentguard Holdings, Inc. | Method and apparatus for supporting multiple trust zones in a digital rights management system |
US7840488B2 (en) | 2001-11-20 | 2010-11-23 | Contentguard Holdings, Inc. | System and method for granting access to an item or permission to use an item based on configurable conditions |
US9898715B2 (en) | 2001-11-20 | 2018-02-20 | Contentguart Holdings, Inc. | Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates |
US7974923B2 (en) | 2001-11-20 | 2011-07-05 | Contentguard Holdings, Inc. | Extensible rights expression processing system |
WO2003046718A3 (en) * | 2001-11-26 | 2004-01-29 | Carlos Cesar Moretzsohn Rocha | A system to provide an individual data processing environment |
WO2003046718A2 (en) * | 2001-11-26 | 2003-06-05 | Carlos Cesar Moretzsohn Rocha | A system to provide an individual data processing environment |
US8108313B2 (en) | 2002-03-14 | 2012-01-31 | Contentguard Holdings, Inc. | Rights expression profile system and method using templates |
US7805371B2 (en) | 2002-03-14 | 2010-09-28 | Contentguard Holdings, Inc. | Rights expression profile system and method |
US9626668B2 (en) | 2002-03-14 | 2017-04-18 | Contentgaurd Holdings, Inc. | Rights expression profile system and method using templates |
US8543511B2 (en) | 2002-04-29 | 2013-09-24 | Contentguard Holdings, Inc. | System and method for specifying and processing legality expressions |
US7685642B2 (en) | 2003-06-26 | 2010-03-23 | Contentguard Holdings, Inc. | System and method for controlling rights expressions by stakeholders of an item |
US8768850B2 (en) | 2004-11-18 | 2014-07-01 | Contentguard Holdings, Inc. | Method, system, and device for license-centric content consumption |
US8660961B2 (en) | 2004-11-18 | 2014-02-25 | Contentguard Holdings, Inc. | Method, system, and device for license-centric content consumption |
US7720767B2 (en) | 2005-10-24 | 2010-05-18 | Contentguard Holdings, Inc. | Method and system to support dynamic rights and resources sharing |
US11921868B2 (en) | 2021-10-04 | 2024-03-05 | Bank Of America Corporation | Data access control for user devices using a blockchain |
Also Published As
Publication number | Publication date |
---|---|
GB9921227D0 (en) | 1999-11-10 |
GB2354102B (en) | 2004-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2354102A (en) | System for communicating over a public network | |
US9741033B2 (en) | System and method for point of sale payment data credentials management using out-of-band authentication | |
US5778072A (en) | System and method to transparently integrate private key operations from a smart card with host-based encryption services | |
RU2518680C2 (en) | Verification of portable consumer devices | |
JP5619007B2 (en) | Apparatus, system and computer program for authorizing server operation | |
US8661520B2 (en) | Systems and methods for identification and authentication of a user | |
US20160063491A1 (en) | Secure online transactions using a trusted digital identity | |
US7147157B2 (en) | Secure remote-control unit | |
US20050187901A1 (en) | Consumer-centric context-aware switching model | |
CN105357196A (en) | Network login method and system | |
JP4996085B2 (en) | Service providing apparatus and program | |
US20080319902A1 (en) | Method and Apparatus for Facilitating a Secure Transaction | |
US9348983B2 (en) | Method for controlling the access to a specific type of services and authentication device for controlling the access to such type of services | |
US11531991B1 (en) | Home router authentication device | |
EA018591B1 (en) | The method of payment transactions performance by user of electronic communication mobile devices and computer based system for noncash transfers therefor | |
KR20050032653A (en) | System and method for providing automated banking services using fingerprint recognition | |
KR100963921B1 (en) | System and Method for Providing Information of Loan Approval Customer and Program Recording Medium | |
KR20000033930A (en) | Integrated electronic wallet system and electronic commercial service method | |
WO2011156911A1 (en) | System, device and method for secure handling of key credential information within network servers field of the invention | |
Fischmeister et al. | Symbolon-a Novel Concept For Secure E-Commerce | |
US20150269550A1 (en) | Apparatus for Improving Security for User Input and/or Access to Secure Resources and/or for Point of Sale | |
JP2004272828A (en) | Individual identification system and method | |
Abidin et al. | ATM IN YOUR POCKET’A PROPOSED FRAMEWORK FOR A MOBILE E-ATM AND E-PAY | |
KR20070021867A (en) | Wireless authentication system interworking with wireless terminal and method | |
KR20090036479A (en) | System and method for processing loan without visiting by using intranet banking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) | ||
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20130908 |