throbber
United States Patent (19)
`Arent
`
`54 METHOD AND APPARATUS FOR
`AUTHENTICATING ON-LINE
`TRANSACTION DATA
`
`75 Inventor: Michael A. Arent, Albany, Calif.
`73 Assignee: Sun Micorsystems, Inc., Palo Alto,
`Calif.
`
`21 Appl. No.: 08/885,055
`22 Filed:
`Jun. 30, 1997
`(51) Int. Cl. ................................................ G06F 19/00
`52 U.S. Cl. ................................................. 705/44; 705/39
`58 Field of Search ........................ 705/44, 39; 395/186;
`380/23
`
`56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,659,616 8/1997 Sudia ........................................ 380/23
`5,796,841
`8/1998 Cordery et al. ........................... 380/55
`5,815,657 9/1998 Williams et al. .....
`... 395/186
`5,826,245 10/1998 Sandberg-Diment ..................... 705/44
`Primary Examiner Allen R. MacDonald
`Assistant Examiner Penny Caudle
`
`USOO6O18724A
`Patent Number:
`11
`(45) Date of Patent:
`
`6,018,724
`Jan. 25, 2000
`
`Attorney, Agent, or Firm-Hecker & Harriman
`57
`ABSTRACT
`The present invention comprises a method and apparatus for
`authenticating data related to on-line transactions. The
`invention utilizes a user-customized certification indicator
`that informs a user as to the Success or failure of one or more
`authentication and/or Security protocols implemented on a
`user communications access device Such as a personal
`computer, a personal digital assistant ("PDA"), an enhanced
`function telephone, etc. In one or more embodiments, one of
`the components of the indicator is user defined, and locally
`Stored, reducing the likelihood of interception and counter
`feiting. In one or more embodiments, the indicator compo
`nents include a centrally provided graphic element and a
`user defined text overlay. When a user initiates an electronic
`transaction, a background validation proceSS is initiated that
`implements procedures for determining the authenticity of
`data related to the transaction, Such as the identity of a
`transaction party. If the validation process determines that
`the data is authentic, the validation process displays a
`certification indicator comprising the graphic overlaid with
`the user defined text-String. In another embodiment, the
`certification indicator includes one or more multi-media
`components, Such as, for example, an audio component.
`8 Claims, 10 Drawing Sheets
`
`Request proof
`of certification from
`merchant
`
`22O
`
`Certification
`Provided?
`
`Display "Not
`Certified" symbol
`
`2OO
`
`
`
`210
`
`Test authenticity
`of certification
`
`
`
`230
`
`
`
`
`
`240
`
`Merchant
`Authentic?
`
`No
`
`Display "Not
`Certified" symbol
`-
`250
`
`260
`
`27O
`
`Other
`data to be
`Certified?
`
`Display "Certified"
`symbol
`
`Yes -28
`
`O
`
`Test other data
`
`290
`
`
`
`
`
`
`
`Data
`authentic?
`
`No
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 1 of 24
`
`

`

`U.S. Patent
`
`Jan. 25, 2000
`
`Sheet 1 of 10
`
`6,018,724
`
`
`
`HONEST JOE'S COMPUTERS
`If you can't trust Honest Joe, who can you trust?
`This Month's UNBELIEVABLE Specials:
`2-0 250 Mhz Famous Make Computer, 32 MB Ram, 5GB
`HardDrive, Monitor, Printer, $2000 of software:
`HONEST JOE'S UN BELIEVABLE PRICE: $499.00
`Do it in Laser Color Famous Make Color Laser Printer,
`/ 16 MILLION colors, 25 pages per minute:
`130
`Elsewhere $5000,
`HONEST JOE'S UNBELIEVABLE PRICE: $699.00
`
`125
`
`120
`
`To order, just dick the box next to the item you want, 1
`fill in your name address and credit card number, and
`click the "Buy" button, and your new computer product
`will be on its way
`
`Name:
`
`Street
`City, State Zip:
`Credit Card
`Expiration
`
`FIG. 1
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 2 of 24
`
`

`

`U.S. Patent
`
`Jan. 25, 2000
`
`Sheet 2 of 10
`
`6,018,724
`
`Request proof
`of Certification from
`merchant
`
`2OO
`
`
`
`
`
`220
`
`Certification
`Provided?
`
`Display "Not
`Certified" symbol
`
`210
`
`
`
`Yes
`
`Test authenticity
`of Certification
`
`
`
`
`
`Merchant
`Authentic?
`
`230
`
`
`
`
`
`240
`
`
`
`
`
`Display "Not
`Certified" symbol
`-
`250
`
`
`
`260
`
`270
`
`
`
`Other
`data to be
`Certified?
`
`Display "Certified"
`symbol
`
`Yes 28O -
`
`Test other data
`
`
`
`Data
`authentic?
`
`No
`
`FIG. 2
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 3 of 24
`
`

`

`U.S. Patent
`
`Jan. 25, 2000
`
`Sheet 3 of 10
`
`6,018,724
`
`
`
`HONEST JOE'S COMP UTERS
`If you can't trust Honest Joe, who can you trust?
`This Month's UN BELIEVABLE Specials:
`250 Mhz Famous Make Computer, 32 MB Ram, 5GB
`Hard Drive, Monitor, Printer, $2000 of software:
`HONEST JOE'S UNBELIEVABLE PRICE: $499.00
`Do it in Laser Color Famous Make Color Laser Printer,
`16 MILLION colors; 25 pages per minute.
`Elsewhere $5000,
`HONEST JOE'S UNBELIEVABLE PRICE: $699.00
`
`WARNING
`This site is
`Not Certified
`
`To order, just click the box next to the item you want,
`fill in your name address and credit card number, and
`click the "Buy" button, and your new computer product
`will be on its way
`
`Name:
`
`Street:
`City, State Zip.
`Credit Card
`
`1OO
`
`FIG. 3
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 4 of 24
`
`

`

`U.S. Patent
`
`Jan. 25, 2000
`
`Sheet 4 of 10
`
`6,018,724
`
`
`
`HONEST JOE'S COMP UTERS
`if you can't trust Honest Joe, who can you trust?
`This Month's UNBELIEVABLE Specials:
`250 Mhz Famous Make Computer, 32 MB Ram, 5GB
`Hard Drive, Monitor, Printer, $2000 of Software:
`HONEST JOE'S UNBELIEVABLE PRICE: $499.00
`Do it in Laser Color! Famous Make Color Laser Printer,
`16 MILLION colors; 25 pages per minute:
`Elsewhere $5000,
`HONEST JOE'S UNBELIEVABLE PRICE: S699.00
`$
`
`Certified
`
`To order, just click the box next to the item you want,
`fill in your name address and credit card number, and
`click the "Buy" button, and your new computer product
`will be on its way
`
`Name:
`
`Street:
`City, State Zip:
`Credit Card
`Expiration
`
`1OO
`
`FIG. 4
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 5 of 24
`
`

`

`U.S. Patent
`
`Jan. 25, 2000
`
`Sheet 5 of 10
`
`6,018,724
`
`51O
`
`5tfiel
`
`
`
`
`
`500
`
`Certified
`
`IDX21A7
`
`-
`
`520
`
`FIG. 5
`
`
`
`Standard Graphic
`
`Audio File
`
`User defined
`text string
`
`FIG. 7
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 6 of 24
`
`

`

`U.S. Patent
`
`Jan. 25, 2000
`
`Sheet 6 of 10
`
`6,018,724
`
`
`
`H O N E S T J O E'S COMPUTERS
`If you can't trust Honest Joe, who can you trust?
`This Month's UN BELIEVABLE Specials:
`250 Mhz Famous Make Computer, 32 MB Ram, 5GB
`Hard Drive, Monitor, Printer, $2000 of software:
`HONEST JOE'S UNBELIEVABLE PRICE: $499.00
`Do it in Laser Color! Famous Make Color Laser Printer,
`16 MILLION colors, 25 pages per minute:
`Elsewhere $5000,
`HONEST JOE'S UN BELIEVABLE PRICE: $699.00
`
`To order, just click the box next to the item you want,
`fill in your name address and credit card number, and
`click the "Buy!" button, and your new computer product
`will be on its way
`
`Name:
`
`Street.
`City, State Zip.
`Credit Card
`Expiration
`
`100
`
`FIG. 6
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 7 of 24
`
`

`

`U.S. Patent
`
`Jan. 25, 2000
`
`Sheet 7 of 10
`
`6,018,724
`
`811
`
`/ TRUSTED
`812
`7- UNTRUSTED
`814
`/ D2X21 A7
`
`816
`
`
`
`
`
`811
`
`812
`
`
`
`
`
`
`
`822
`
`
`
`
`
`811
`
`
`
`816
`
`814
`
`?és -Xict,
`16 -XEC,
`
`82O
`
`816
`
`824
`
`816
`
`
`
`
`
`
`
`as trusted
`
`
`
`826
`
`
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 8 of 24
`
`

`

`U.S. Patent
`
`Jan. 25, 2000
`
`Sheet 8 of 10
`
`6,018,724
`
`Begin Wallet setup
`
`
`
`Prompt user to
`/ enter text string
`
`Ask user to Confirm
`/ entered text string
`952
`
`Store text string in
`Wallet database
`
`954
`
`
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 9 of 24
`
`

`

`U.S. Patent
`
`Jan. 25, 2000
`
`Sheet 9 of 10
`
`6,018,724
`
`
`
`X{{HONALEN
`TWOOT
`
`000 ||
`
`Å HOWE'W
`
`NIV/W
`
`Å HOWE'W
`
`OEC?IA
`
`| || 0 ||
`
`ESTOW
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 10 of 24
`
`

`

`U.S. Patent
`
`Jan. 25, 2000
`
`Sheet 10 of 10
`
`6,018,724
`
`
`
`Nvorce
`
`S43.98
`
`Total Cost of items
`TotatDiscouts
`Sales Tax
`Shipping Handling
`
`Purchase Total
`
`Whileage Plus
`First Card
`
`Manufactures
`Coupon
`
`DG2383
`
`FIG 11
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 11 of 24
`
`

`

`1
`METHOD AND APPARATUS FOR
`AUTHENTICATING ON-LINE
`TRANSACTION DATA
`
`BACKGROUND OF THE INVENTION
`1. Field of the Invention
`The present invention relates to electronic commerce, and
`more particularly to a method and apparatus for authenti
`cating and verifying data related to electronic transactions.
`Portions of the disclosure of this patent document contain
`material that is Subject to copyright protection. The copy
`right owner has no objection to the facsimile reproduction
`by anyone of the patent document or the patent disclosure as
`it appears in the Patent and Trademark Office file or records,
`but otherwise reserves all copyright rights whatsoever.
`2. Background Art
`Electronic commerce Via distributed network environ
`ments Such as the internet and intranets has the potential for
`replacing many forms of traditional commerce. One factor
`impeding the growth of electronic commerce is a concern
`over the Security of transactions conducted via the internet.
`This concern stems in part from the difficulty of providing
`Verification and accountability via the internet. It is easy for
`legitimate and illegitimate businesses alike to Set up web
`Sites to Solicit business over the internet. Accordingly, there
`is a degree of uncertainty about the identity and legitimacy
`of any busineSS offering goods or Services via an internet
`web page and about the authenticity of data related to on-line
`transactions. Customers are wary about purchasing goods or
`Services and Sending confidential information Such as credit
`card numbers to internet based businesses without a degree
`of certainty as to the authenticity and legitimacy of an
`internet merchant.
`
`SUMMARY OF THE INVENTION
`The present invention comprises a method and apparatus
`for authenticating and Verifying data related to electronic
`transactions and for providing positive confirmation to a
`user of Such authentication and Verification. In one
`embodiment, Such data includes the contents of an electronic
`“wallet, including identity and other data from a transaction
`party, electronic payment instrument data, Security protocol
`data, and wallet operation data. The invention utilizes a
`user-customized certification indicator that informs a user as
`to the Success or failure of one or more authentication and/or
`Security protocols implemented on a user communications
`access device Such as a personal computer, a network
`computer (“NC), a personal digital assistant ("PDA"), an
`enhanced function telephone, etc. In one or more
`embodiments, the certification indicator includes multiple
`components. One of the components of the indicator is user
`defined, and locally Stored, reducing the likelihood of inter
`ception and counterfeiting. In one or more embodiments, the
`indicator components include a centrally provided graphic
`element and a user defined text overlay. In one embodiment,
`the centrally provided graphic element is a graphic image,
`for example an image of an official Seal, Supplied by a
`trusted certification authority that provides transaction party
`certification Services. The user defined text overlay is a user
`defined text String, Similar to a user defined password. When
`a user initiates an electronic transaction with a transaction
`party, a background validation proceSS is initiated that
`implements procedures for determining the authenticity of
`the transaction party as well as of other data related to the
`transaction. In one embodiment, Such transaction data
`includes data received by and displayed (for example using
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6,018,724
`
`2
`a “wallet' interface) by the user's communications access
`device. If the validation process determines that the data is
`authentic, the validation process displays a certification
`indicator comprising the graphic of the official Seal Overlaid
`with the user defined text-String. In another embodiment, the
`certification indicator includes one or more multi-media
`components, Such as, for example, an audio component.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 shows an example of an on-line merchants web
`page.
`FIG. 2 is a flow chart of a method that may be used by a
`user's communications acceSS device to authenticate an
`on-line-merchant.
`FIG. 3 shows an example of a certification indicator
`indicating an absence of certification displayed on a user's
`communications acceSS device.
`FIG. 4 shows an example a certification indicator dis
`played on a user's communications acceSS device.
`FIG. 5 shows an example of a multi-component certifi
`cation indicator.
`FIG. 6 shows an example of a multi-component certifi
`cation indicator displayed on a user's communications
`acceSS device.
`FIG. 7 is a block diagram of a certification indicator
`comprising a Sequence of multi-media components.
`FIG. 8 shows examples of multi-component certification
`indicators.
`FIG. 9 is a flow chart of a method for generating a
`user-defined component of a certification indicator.
`FIG. 10 is a schematic showing an example of a commu
`nications acceSS device that may be used with one or more
`embodiments of the invention.
`FIG. 11 shows an example of a Java Wallet in which a
`certification indicator is displayed.
`DETAILED DESCRIPTION OF THE
`INVENTION
`A method and apparatus for authenticating data related to
`on-line transactions is described. In the following
`description, numerous Specific details are Set forth in order
`to provide a more thorough description of the invention. It
`will be apparent, however, to one skilled in the art that the
`invention may be practiced without these specific details. In
`other instances, well-known features have not been
`described in detail So as not to obscure the invention.
`FIG. 1 shows an example of a web page 100 of an internet
`merchant that offers items for sale via the internet. Web page
`100 may, for example, be an HTML page, and may include
`functionality provided by Java applets, as is well known in
`the art.
`In the example of FIG. 1, web page 100 contains a
`merchant's name 110, a list of items for sale 120, check
`boxes 125 and 130, purchasing instructions 135, a customer
`information entry area 140, and a “buy” button 150. Accord
`ing to purchasing instructions 135, to purchase one of the
`items listed in list 120, a user clicks the check box next to
`the item desired, fills in the user's name, address and credit
`card information in customer information entry area 140,
`and clicks on button 150. In the example of FIG. 1 these
`payment mechanisms are provided by the web page and the
`users web browser. In other embodiments, payment mecha
`nisms may be provided in a different manner, for example by
`an electronic “wallet” application program or applet.
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 12 of 24
`
`

`

`3
`A user browsing a merchants web page Such as web page
`100 may be interested in purchasing one or more items being
`offered for Sale on the web page, but may have concerns
`about buying from an on-line merchant whose identity and
`business practices are unknown to the user and with whom
`the user has had no previous experience.
`One way to alleviate the user's concerns is for an entity
`trusted by the user to certify the legitimacy of the merchant.
`The trusted entity may be a certification authority that
`evaluates and certifies merchants that meet the certification
`authority's certification criteria, for example, by issuing
`digital certificates to certified merchants or by including the
`merchant in a database of certified merchants maintained by
`the certification authority.
`To check the authenticity of a particular on-line merchant,
`the computer or other communications access device used
`by the user (for example a personal digital assistant (PDA),
`a network computer, an internet television acceSS device
`such as “WebTV” (tm), an enhanced cellular telephone, etc.)
`is provided with computer processor readable program
`instructions for determining whether a merchant has been
`certified by a trusted certification authority and for verifying
`the identity of the merchant and other data related to the
`transaction. The instructions may, for example, form part of
`an internet browser application, or may be part of a separate
`application program, Such as an electronic “wallet,” that
`may be used in conjunction with an internet browser.
`FIG. 2 is a block diagram of a method that may be used
`by a user's communications acceSS device to authenticate an
`on-line-merchant. AS Shown in FIG. 2, the user's commu
`nications acceSS device Sends a request for proof of certifi
`cation to the merchant at step 200. The sending of the
`request may be initiated as part of Some other transaction
`(e.g. requesting an invoice) or may be initiated through an
`express user action. The requested proof of certification may
`have any of a variety of forms as are known in the art. For
`example, the proof of certification may comprise a digitally
`signed message or a copy of a digital certificate from a
`trusted certification authority. At Step 210, a determination is
`made as to whether a requested proof of certification was
`provided by the merchant in response to the user's request.
`If no proof of certification was provided by the merchant, the
`user's acceSS device displays a certification indicator that
`indicates an absence of certification to the user. An example
`of a certification indicator that indicates an absence of
`certification is indicator 300 of FIG. 3. In the example of
`FIG. 3, certification indicator 300 is displayed by the user's
`access device as a graphic that floats above merchant web
`page 100. In other embodiments, certification indicator 300
`may be displayed elsewhere, Such as in the interface of
`another application program or applet. For example, in one
`embodiment certification indicator 300 is displayed in an
`electronic “wallet' interface.
`If it is determined at step 210 that the merchant did supply
`a proof of certification in response to the user's request at
`block 200, the authenticity of the certification is tested at
`Step 230, using an appropriate testing process for the form
`of proof of certification provided by the merchant. For
`example, if the proof of certification is a digital Signature,
`the user's device may obtain a copy of the merchant's public
`key from a trusted party, and use the key to test the
`merchant's digital Signature.
`At step 240, a determination is made as to whether the test
`of the merchant's proof of certification has authenticated the
`merchant. If the merchant is not authenticated, a certification
`indicator indicating an absence of certification, Such as
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6,018,724
`
`15
`
`25
`
`4
`indicator 300 of FIG. 3, is displayed to the user at step 250.
`The certification indicator may be displayed as a graphic that
`floats over the merchants web page as shown in FIG. 3, or
`may be displayed in Some other manner, for example in an
`electronic “wallet' interface.
`If it is determined that the merchant is authentic, a
`determination is made at step 260 as to whether any other
`data related to the transaction needs to be certified. Such
`other data may include, for example, the contents of an
`electronic “wallet” that is being displayed, Such as electronic
`payment instruments displayed in the wallet. Data to be
`certified may also include, without limitation, Security pro
`tocols and electronic payment or transfer operations. If there
`is no additional data to be certified, a certification indicator
`indicating Successful certification is displayed to the user at
`step 270. An example of a certification indicator that indi
`cates successful certification is symbol 400 of FIG. 4. In the
`example of FIG.4, certification indicator 400 is displayed by
`the user's acceSS device as a graphic that floats above
`merchant web page 100. Alternatively, certification indicator
`400 may be displayed elsewhere, such as in the interface of
`another application program or applet, for example an
`electronic “wallet” applet or application program.
`If there is additional data to be certified, such data is tested
`at Step 280, and a determination as to the data's authenticity
`is made at step 290. If the data is not authenticated, a
`certification indicator indicating an absence of certification
`is displayed to the user at step 250. If the data is
`authenticated, a certification indicator confirming authenti
`cation is displayed to the user at step 270.
`In the embodiment of FIG. 4, certification indicator 400 is
`a Standard Symbol Supplied as part of the program code that
`performs the authentication process of FIG. 2. One draw
`back of using a Standard certification indicator Such as
`symbol 400 of FIG. 4 is that an unscrupulous merchant
`could make a copy of the certification indicator and cause it
`to be displayed on the user's access device to make it appear
`that the user's device has Successfully authenticated the the
`transaction data, even when the user's acceSS device has
`found the data to be not certified.
`To prevent unauthorized counterfeiting of a certification
`indicator, one or more embodiments of the invention use a
`certification indicator that comprises a component that has
`been customized by the user. This user defined component is
`Stored in a Secure form in a local Storage device of the user's
`internet access device. Since the user defined component is
`not predictable and is available only on the user's local
`acceSS device, it cannot be easily copied and forged by an
`unscrupulous merchant.
`One embodiment of a certification indicator of the inven
`tion comprising a user defined component is shown in FIG.
`5. In this embodiment, certification indicator 500 is a
`multi-component indicator that consists of a Standard com
`ponent 510 and a user defined component 520. In the
`example of FIG. 5, standard component 510 comprises a
`graphic Symbol Supplied, for example, by the Supplier of the
`user's merchant authentication computer code. In this
`embodiment, user defined component 520 consists of a text
`String, Similar to a password, Selected by the user. The text
`String may be selected, for example, during a Setup phase of
`the user's merchant authentication Software. The text String
`may include any kind of text in any machine readable
`format, including ASCII, Unicode, etc.
`Standard component 510 and user defined component 520
`are Stored in Separate locations on the user's computer or
`other communications acceSS device. In the embodiment of
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 13 of 24
`
`

`

`S
`FIG. 5, they are retrieved and combined to form certification
`indicator 500 only after a particular merchant or other
`transaction party has been authenticated. For example, in the
`embodiment of FIG. 2, components 510 and 520 are
`retrieved from storage and combined as part of step 270.
`FIG. 6 shows combined certification indicator 510 displayed
`on top of merchant web page 100. Alternatively, certification
`indicator 510 may be displayed elsewhere, such as in the
`interface of another application program or applet, for
`example an electronic “wallet” applet or application pro
`gram.
`In the embodiment of FIG. 5, the certification indicator
`comprises two components: a Standard graphic component
`and a user-defined text String. The certification indicator
`may, however, have any of a variety of other structures,
`provided that Some aspect of the indicator is user defined So
`that the indicator cannot easily be forged.
`The term “indicator” as used with respect to the invention
`includes Static indicators as well as dynamic, multi-media
`indicators. FIG. 7 is a block diagram of an embodiment of
`a certification indicator of the invention that comprises a
`Sequence of one or more media items Such as graphics, text,
`Sound, animation, and Video. In the embodiment shown in
`FIG. 7, certification indicator 700 comprises a sequence of
`three media items: a Standard graphic 710, an audio Segment
`720, and a user-defined text string 730. In this embodiment,
`when the certification indicator is to be displayed to the user
`(as, for example, at step 250 of FIG. 2), the indicator is
`presented to the user in a sequential manner. First, Standard
`graphic 710 is displayed. Next, audio segment 720 is played.
`Finally, user-defined text string 730 is Superimposed on
`standard graphic 710. It will be apparent to those skilled in
`the art that media items of a certification indicator can be
`presented in any desired order, and that more than one media
`item may be presented Simultaneously.
`Preferably, certification indicator 700 comprises at least
`one user defined component. Such a user-defined component
`may constitute a user-defined media item (Such as, for
`example, user defined text string 730), or a user-defined
`order for presentation of different media components, or a
`user defined Selection of media items from a pool of Supplied
`Standard media items.
`FIGS. 8 shows embodiments of certification indicators
`that may be used in conjunction with the Java Wallet (TM),
`a user interface for the Java Electronic Commerce Frame
`work (TM) (“JECF) from JavaSoft. JECF includes a client
`Side Software architecture for Secure electronic commerce
`and sensitive data transactions. The Java Wallet (TM) is a
`user interface for JECF that provides interaction controls
`and user input and display areas that allow on-line
`purchases, value transferS and administrative functions.
`When activated for use, the Wallet is displayed indepen
`dently on a user's communications access device on top of
`other applications, such as, for example, World Wide Web
`browserS or operating environments Such as the various
`implementations of Windows from Microsoft. A description
`of the Java Wallet (TM) user interface is attached as Appen
`dix A. FIG. 11 shows an example of a Java Wallet 1100 in
`which a certification indicator 1110 is displayed. A descrip
`tion of the procedure used to display indicator 1110 in Java
`Wallet 1100 is attached as Appendix B.
`A Java Wallet, in conjunction with JECF, includes com
`puter program instructions for performing authentication
`tests on web site proprietors and on other on-line transaction
`parties, and for authenticating data related to on-line trans
`actions. These instructions have the ability to determine
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6,018,724
`
`15
`
`25
`
`6
`whether or not a transaction party is authentic (i.e. is who the
`party says the party is). The instructions also have the ability
`to determine whether or not an offer presented to a user (e.g.
`via a web site) has been digitally signed by the party making
`the offer, as well as whether or not other information
`displayed to the user by the Wallet is authentic. These
`determinations are made by the Wallet and JECF transpar
`ently to the user. The possible results of these determinations
`include the following:
`1. The transaction party and/or other transaction data is
`authentic and the offer is signed.
`2. The transaction party and/or other transaction data is
`authentic and the offer is unsigned.
`3. The transaction party and/or other transaction data is
`not authentic (or not recognized) and the offer is signed.
`4. The transaction party and/or other transaction data is
`not authentic (or not recognized) and the offer is unsigned.
`These results are displayed to the user using certification
`indicators such as the indicators shown in FIG. 8.
`FIG. 8 shows components 810,812, 814, and 816 that are
`assembled, as appropriate, into certification indicators 818
`and 820. Components 810 and 811 are standard graphic
`components which may, for example, be Supplied to the user
`as part of the Java Wallet code. Components 812and814 are
`standard text strings comprising the words “TRUSTED' and
`“UNTRUSTED,” respectively. Like standard graphic com
`ponents 810 and 811, standard text string components 812
`and 814 may be supplied to the user as part of the Java
`Wallet Code. Component 816 is a user defined text string
`which may, for example, be generated during a Setup pro
`cedure for the Java Wallet.
`Certification indicator 818 is displayed to the user in
`Situation number 1 listed above: when the transaction party
`and/or other transaction data is authentic and the offer from
`the transaction party is signed. At the time of display,
`certification indicator 818 is assembled from components
`810, 812 and 816, as shown in FIG. 8.
`Certification indicator 820 is displayed to the user in
`Situation number 2 listed above: when the transaction party
`and/or other transaction data is authentic and the offer from
`the transaction party is unsigned. At the time of display,
`certification indicator 820 is assembled from components
`810, 814 and 816, as shown in FIG. 8.
`Certification indicator 822 is displayed to the user in
`Situation number 3 listed above: when the transaction party
`and/or other transaction data is not authentic (or is not
`recognized) and the offer from the transaction party is
`signed. At the time of display, certification indicator 822 is
`assembled from components 811, 812 and 816, as shown in
`FIG. 8.
`Certification indicator 824 is displayed to the user in
`Situation number 4 listed above: when the transaction party
`and/or other transaction data is not authentic (or is not
`recognized) and the offer from the transaction party is
`unsigned. At the time of display, certification indicator 824
`is assembled from components 811, 814 and 816, as shown
`in FIG. 8.
`Certification indicators 826 and 828 are versions of cer
`tification indicators 822 and 824, respectively, that do not
`include component 816. Certification indicators 826 and 828
`are used in certain embodiments instead of indicatorS 822
`and 824, respectively.
`In one or more embodiments, indicators 818, 820, 822,
`824, 826 or 828, as applicable, are displayed as part of the
`user's Java Wallet interface when the user initiates use of the
`Java Wallet with respect to an on-line transaction. For
`example, while browsing the internet, a user may happen
`
`APPL-1043 / IPR2018-00361
`Apple v. Uniloc / Page 14 of 24
`
`

`

`6,018,724
`
`15
`
`35
`
`40
`
`25
`
`7
`upon a web site with which the user wants to transact
`business. The user calls up the user's Java Wallet by
`activating an appropriate icon displayed, for example, by the
`user's browser or on the web site's web page. AS the Java
`Wallet program code is being activated, authentication mes
`Sages are Sent from the user's device to the web site, and the
`responses received, if any, are evaluated according to the
`Wallet's authorization protocols to determine the authentic
`ity of the web site. Depending on the result, the appropriate
`certification indicator is displayed as part of the Wallet
`interface.
`In one or more embodiments, the certification indicators
`of FIG. 8, like the indicator shown in FIG. 7, include
`additional media components Such as, for example, Sound,
`Video and animation.
`In the embodiment of FIG. 8, the user-defined component
`816 is defined by the user as part of the initial setup of the
`user's Java Wallet interface. A flow chart for a portion of the
`Java Wallet Setup process used to generate the user-defined
`text string is shown in FIG. 9.
`As shown in FIG. 9, the Wallet setup process begins at
`step 900. The setup process may, for example, be invoked
`the first time the user starts the Wallet process. During the
`Wallet Setup process, the user is asked to Select user pref
`erences and enter user information. The dotted arrow in FIG.
`9 between step 900 and 950 indicates that additional steps
`not directly related to the certification indicator may occur in
`between these steps. At step 950, the user is prompted to
`enter a text String to be used as the user-defined component
`of the user's certification indicator. In one embodiment, the
`user is prompted to enter an eight digit alphanumeric text
`String. After the user has entered the text String, the user is
`asked to confirm the text string at Step 952. After the user has
`confirmed the user's choice of text String, the text String is
`stored at step 954 in a Wallet database containing Wallet
`related information. The Wallet Setup process ends at Step
`990.
`The Wallet database is stored in a secure manner on local
`Storage of the user's computer or other communications
`access device. In one or more embodiments, the user defined
`component is Stored Separately from Standard components
`(such as, for example, components 810 and 811).
`An example of a communicatio

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket