Abstract: Methods and systems for performing electronic commerce using mutating identifiers. One method can include encrypting buyer transaction data with a first mutating identifier, transmitting the buyer transaction data to an authenticator device, decrypting the buyer transaction data, generating a payment request, encrypting the payment request with a third mutating identifier, and transmitting the payment request to a payment authenticator device.
Type:
Grant
Filed:
November 23, 2005
Date of Patent:
May 25, 2010
Assignee:
Imagineer Software, Inc.
Inventors:
William Sellars, Richard Malina, William Cochran
Abstract: A multiple party system for distributing content. In one embodiment, four parties are involved in the system: a consumer, a service provider, an authenticator, and a content provider. The distribution of content from the content provider to the consumer is carried out using a predefined protocol, mutating IDs, watermarks, and licenses. The authenticator controls the distribution of mutating IDs, verifies the identity of one or more participating parties, and provides tracking information for mapping service providers and consumers to particular, possibly watermarked, content items.
Type:
Grant
Filed:
May 26, 2004
Date of Patent:
May 20, 2008
Assignee:
Imagineer Software, Inc.
Inventors:
William Cochran, Samuel M. Gustman, William R. Sellars
Abstract: Methods and systems of encrypting data. One method includes establishing data that includes discoverable or “white” data and undiscoverable or “black” data. Black data is generally unrecognizable. For example, it may be random data. White data generally has recognizable content or is transmitted in a recognizable format. A first key and a second key are created or established, such that the second key is substantially underivable from the first key. The discoverable or white data is encrypted with the first key and the undiscoverable or black data is encrypted with the second key. In subsequent communications or transactions, at least one of the first key and the second key is mutated.
Abstract: Methods and systems for performing electronic commerce using mutating identifiers. One method can include encrypting buyer transaction data with a first mutating identifier, transmitting the buyer transaction data to an authenticator device, decrypting the buyer transaction data, generating a payment request, encrypting the payment request with a third mutating identifier, and transmitting the payment request to a payment authenticator device.
Type:
Application
Filed:
November 23, 2005
Publication date:
August 3, 2006
Applicant:
Imagineer Software, Inc.
Inventors:
William Sellars, Richard Malina, William Cochran
Abstract: A multiple party system for distributing content. In one embodiment, four parties are involved in the system: a consumer, a service provider, an authenticator, and a content provider. The distribution of content from the content provider to the consumer is carried out using a predefined protocol, mutating IDs, and licenses. The authenticator controls the distribution of mutating IDs and verifies the identity of one or more participating parties.
Type:
Application
Filed:
October 6, 2005
Publication date:
February 9, 2006
Applicant:
Imagineer Software, Inc.
Inventors:
William Sellars, William Cochran, David Hunt
Abstract: A multiple party system for distributing content. In one embodiment, four parties are involved in the system: a consumer, a service provider, an authenticator, and a content provider. The distribution of content from the content provider to the consumer is carried out using a predefined protocol, mutating IDs, and licenses. The authenticator controls the distribution of mutating IDs and verifies the identity of one or more participating parties.
Type:
Grant
Filed:
February 27, 2003
Date of Patent:
February 7, 2006
Assignee:
Imagineer Software, Inc.
Inventors:
William Sellars, William K. Cochran, Jr., David C. Hunt
Abstract: A multiple party system for distributing content. In one embodiment, four parties are involved in the system: a consumer, a service provider, an authenticator, and a content provider. The distribution of content from the content provider to the consumer is carried out using a predefined protocol, mutating IDs, watermarks, and licenses. The authenticator controls the distribution of mutating IDs, verifies the identity of one or more participating parties, and provides tracking information for mapping service providers and consumers to particular, possibly watermarked, content items.