Transaction method and verification method
    1.
    发明申请
    Transaction method and verification method 审中-公开
    交易方式和验证方法

    公开(公告)号:US20090119505A1

    公开(公告)日:2009-05-07

    申请号:US11913748

    申请日:2005-05-10

    IPC分类号: G06F1/00

    摘要: In a method for performing an electronic transaction a first transaction part generates a digital signature and an encrypted digital signature. The second transaction party receives both signatures. The second party is enabled to verify the digital signature, but cannot verify or (re)generate the encrypted digital signature. A trusted third party is enabled to verify the encrypted digital signature if the digital signature is also provided, since the trusted third party cannot (re)generate the digital signature. Thus, no other party than the first transaction party can (re)generate both the digital signature and the encrypted digital signature. Therefore, no other party presenting himself as the first transaction party can be verified as being the first transaction party.

    摘要翻译: 在执行电子交易的方法中,第一交易部分生成数字签名和加密的数字签名。 第二个交易方收到两个签名。 第二方能够验证数字签名,但不能验证或(重新)生成加密的数字签名。 如果还提供了数字签名,则可信任的第三方能够验证加密的数字签名,因为可信第三方不能(重新)生成数字签名。 因此,除第一交易方之外,其他方不能(再)生成数字签名和加密的数字签名。 因此,任何其他表现自己为第一交易方的其他方都可以被验证为第一交易方。

    SOFTWARE ACTIVATION CONTROL METHOD
    2.
    发明申请
    SOFTWARE ACTIVATION CONTROL METHOD 审中-公开
    软件激活控制方法

    公开(公告)号:US20090031430A1

    公开(公告)日:2009-01-29

    申请号:US11913834

    申请日:2005-05-13

    IPC分类号: G06F21/22

    CPC分类号: G06F21/123 G06F21/121

    摘要: A software application installation method installs a software application on a device such that the installed application can only be activated on said device. Thereto, an authorization application is installed as well on the device. During installation, the authorization application generates a software release code that is stored in a first and a second memory location, of which at least one is a memory location not accessible to a user. When the software application is later activated on the device, the authorization application compares the software release codes stored in said two memory locations. The application is only started if the software release codes correspond. Further, an authorization verification method is disclosed. A second party may verify the legitimacy of the installed application by storing device specific identification data and application specific installation data when a first connection is established and later comparing said data if a second or further connection is established.

    摘要翻译: 软件应用程序安装方法在设备上安装软件应用程序,以便只能在所述设备上激活已安装的应用程序。 此外,在设备上也安装了授权应用程序。 在安装期间,授权应用程序生成存储在第一和第二存储器位置的软件版本代码,其中至少一个是用户不可访问的存储器位置。 当软件应用程序稍后在设备上被激活时,授权应用程序比较存储在所述两个存储单元中的软件释放代码。 该应用程序仅在软件版本代码对应时启动。 此外,公开了授权验证方法。 第二方可以在建立第一连接时存储设备特定的识别数据和特定于应用的安装数据来验证所安装的应用的合法性,并且如果建立了第二或另外的连接,则稍后对所述数据进行比较。

    Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data

    公开(公告)号:US11063766B2

    公开(公告)日:2021-07-13

    申请号:US10560579

    申请日:2004-06-14

    IPC分类号: H04L9/32

    摘要: A method for performing an electronic transaction is disclosed. The method provides authentication data and authentication software to an electronic device and preferably stored in a secure storage location or other location inaccessible to the user or the operating system of the device. When digital data is requested from a transaction party that requests a digital signature, the authentication software is activated to generate said digital signature from the authentication data. Next, the digital signature is provided to the other transaction party, which then provides the requested digital data. The digital signature may be embedded in the requested and provided digital data. Further, a method for performing a verification of legitimate use of digital data is disclosed. Digital data digitally signed according to the present invention may only be accessed if the embedded digital signature is identical to a regenerated digital signature that is regenerated by the authentication software, using user inaccessible authentication data installed on the device. If the embedded and regenerated digital signatures are not identical, the data may not be accessed and an error signal is generated.

    Transaction method and system for data networks, like internet
    4.
    发明授权
    Transaction method and system for data networks, like internet 失效
    数据网络的交易方式和系统,如互联网

    公开(公告)号:US06889325B1

    公开(公告)日:2005-05-03

    申请号:US09561351

    申请日:2000-04-28

    IPC分类号: G06Q20/00 H04L29/06 H04L9/00

    摘要: A method and a system for performing a transaction between at least one first party and at least one second party are disclosed. A data network connects data input/output terminals of the parties. In the data network, a secure and trusted transaction server is provided, in which a profile of the parties is registered, having a party identifier identifying a particular party, and authentication data for authenticating the party and data sent by the party. The parties communicate with each other through the transaction server by means of various transaction messages, which are digitally signed using a table of random numbers and a hashing operation, wherein the table of random numbers is generated by reading a token.

    摘要翻译: 公开了一种在至少一个第一方和至少一个第二方之间执行交易的方法和系统。 数据网络连接各方的数据输入/输出终端。 在数据网络中,提供了一种安全可信的交易服务器,其中注册了各方的简档,具有标识特定方的方标识符,以及用于认证方和由该方发送的数据的认证数据。 各方通过各种事务消息通过交易服务器进行通信,各种事务消息使用随机数表和散列操作进行数字签名,其中通过读取令牌来生成随机数表。