Method for Enticing Computer Users to Return to an Electronic Commerce Portal
    1.
    发明申请
    Method for Enticing Computer Users to Return to an Electronic Commerce Portal 审中-公开
    引导计算机用户返回电子商务门户的方法

    公开(公告)号:US20080255932A1

    公开(公告)日:2008-10-16

    申请号:US11734590

    申请日:2007-04-12

    IPC分类号: G06Q30/00

    摘要: A method for enticing computer users to return to an electronic commerce portal is disclosed. In response to a user registering to a merchant server for the first time, a unique number is associated with the user. Hardware information is then obtained from a computer utilized by the user. A digital certificate is generated by encrypting the unique number along with the obtained hardware information. The digital certificate is subsequently sent to the user computer for generating a unique customer number to be displayed on a web page of the user computer. On a periodic basis, the merchant server sends a master number to the user computer to be displayed on a web page of the user computer. In response to a notification of the master number matches the unique customer number on the user computer, a prize claiming process can be initiated.

    摘要翻译: 公开了一种诱使计算机用户返回电子商务门户的方法。 响应于用户首次向商家服务器注册,唯一的号码与用户相关联。 然后从用户使用的计算机获得硬件信息。 通过加密所获得的硬件信息的唯一编号来产生数字证书。 随后将数字证书发送到用户计算机,以生成要在用户计算机的网页上显示的唯一的客户号码。 周期性地,商家服务器向用户计算机发送主号码以显示在用户计算机的网页上。 响应于主号码的通知与用户计算机上的唯一客户号码相匹配,可以启动奖励声明处理。

    System, method, and program for managing a user key used to sign a message for a data processing system
    2.
    发明授权
    System, method, and program for managing a user key used to sign a message for a data processing system 有权
    用于管理用于对数据处理系统的消息进行签名的用户密钥的系统,方法和程序

    公开(公告)号:US08307098B1

    公开(公告)日:2012-11-06

    申请号:US09651548

    申请日:2000-08-29

    IPC分类号: G06F15/16

    摘要: A system, method, and program for managing a user key used to sign a message for a data processing system having an encryption chip are disclosed. A user is assigned a user key. In order to encrypt and send messages to a recipient(s), the messages are encrypted with the user key. The user key, in turn, is encrypted with an associated key. The associated key is further encrypted using an encryption chip key stored on the encryption chip. The encrypted messages are communicated to a recipient to validate an association of the user with the encrypted messages. The associated key is decrypted with the encryption chip key. The user key is decrypted with the associated key, and the messages are decrypted with the user key. Thereafter, validation of the association of messages with the user is removed by revoking the associated key. In a preferred embodiment, encryption resources are centralized in a server system having the encryption chip. The server system is coupled to and provides encryption services to a plurality of client systems. Messages to be encrypted are sent from a user's client system to the server system, which encrypts the messages using the encryption chip. The encrypted messages are sent from the server system to the client system, which then transmits the encrypted messages to their intended recipient(s). All data relating to the encrypted messages are erased from the server system after the encrypted messages are sent from the server system to the client system.

    摘要翻译: 公开了一种用于管理用于签署具有加密芯片的数据处理系统的消息的用户密钥的系统,方法和程序。 给用户分配一个用户密钥。 为了加密和发送消息给收件人,消息用用户密钥加密。 用户密钥依次用相关密钥加密。 使用存储在加密芯片上的加密芯片密钥进一步加密相关密钥。 将加密的消息传送到接收者以验证用户与加密消息的关联。 相关密钥用加密芯片密钥解密。 用关键字解密用户密钥,用用户密钥对消息进行解密。 此后,通过撤消关联的密钥来消除与用户的消息关联的验证。 在优选实施例中,加密资源集中在具有加密芯片的服务器系统中。 服务器系统耦合到并向多个客户端系统提供加密服务。 要加密的消息从用户的客户端系统发送到服务器系统,服务器系统使用加密芯片加密消息。 加密的消息从服务器系统发送到客户端系统,然后客户端系统将加密的消息发送到其预期的接收者。 在将加密的消息从服务器系统发送到客户端系统之后,与加密消息相关的所有数据从服务器系统中被擦除。

    Securing mobile computer systems in a corporate environment
    3.
    发明授权
    Securing mobile computer systems in a corporate environment 有权
    在企业环境中保护移动计算机系统

    公开(公告)号:US06546491B1

    公开(公告)日:2003-04-08

    申请号:US09273297

    申请日:1999-03-19

    IPC分类号: H04L900

    摘要: The present invention provides a method and system for securing a computer. The method includes providing a zone of authorized operation for the computer; determining if a possessor of the computer is authorized to have possession when the computer and the possessor leaves the zone of authorized operation and pass through a portal; and allowing continued access to the computer without requiring a password if the possessor is authorized. The method and system is transparent to the possessor and provides no advantage in hiding the computer from the portal. This method and system may be easily applied in a corporate environment and is particularly apt for securing mobile computer systems.

    摘要翻译: 本发明提供了一种用于固定计算机的方法和系统。 该方法包括为计算机提供授权操作区域; 当计算机和拥有者离开授权操作区并通过门户时,确定计算机的拥有者是否被授权拥有; 并允许持续访问计算机,而不需要密码,如果拥有者被授权。 该方法和系统对拥有者是透明的,并且没有从门户隐藏计算机的优点。 该方法和系统可以容易地应用在企业环境中,并且特别适用于保护移动计算机系统。