throbber
TAPI: Transactions for Accessing Public Infrastructure
`
`Matt Blaze1, John Ioannidis2, Sotiris Ioannidis3, Angelos D. Keromytis4,
`Pekka Nikander5, and Vassilis Prevelakis6
`
`1 AT&T Labs – Research, mab@research.att.com
`2 AT&T Labs – Research, ji@research.att.com
`3 CIS Department, University of Pennsylvania, sotiris@dsl.cis.upenn.edu
`4 CS Department, Columbia University, angelos@cs.columbia.edu
`5 Nomadic Lab, pekka.nikander@nomadiclab.com
`6 CS Department, Drexel University, vp@drexel.edu
`
`Abstract. This paper describes TAPI, an offline scheme intended for general
`Internet-based micropayments. TAPI, which extends and combines concepts from
`the KeyNote Microchecks and OTPCoins architectures, encodes risk management
`rules in bank-issued users’ credentials which are in turn used to acquire small-
`valued payment tokens. The scheme has very low transaction overhead and can
`be tuned to use different risk strategies for different environments and clients.
`
`1 Introduction
`
`Traditional electronic payment systems impose a low bound on the value of each
`transaction due to the associated processing and clearing overhead. For small-value
`transactions, this overhead dominates the value of the transaction itself, making the use
`of such a system uneconomical. Various schemes have been proposed, aiming to reduce
`overheads so as to handle payments of fractions of a cent. These systems must cope with
`problems of scale, risk, and trust. It is important to have mechanisms that can scale to
`millions of transactions while maintaining acceptable levels of risk.
`However, cryptographic and other computational operations have non-negligible
`cost. Thus, we need to minimize the crypto operations by aggregating them in larger
`transactions. Our observation is that we can take advantage of any locality of reference
`exhibited by micropayments, i.e., a user paying for a service from a web site is more
`likely to purchase additional services from the same site. For applications where this
`holds, we can amortize the cost of many micropayments over a larger payment.
`We present a mechanism that allows multiple partial charges against a payment
`authorization. By splitting a micropayment transaction into a number of partial transac-
`tions (minipayments) for smaller amounts, up to the amount of the original micropay-
`ment, we can accommodate multiple purchases within the original (single) transaction.
`Thus, we spread the cost of the transaction over a number of distinct purchases. A simi-
`lar approach is being used by some vendors: multiple small credit card transactions are
`aggregated and presented as a single transaction to the credit card company. Typically,
`special agreements that cover liability and specify dispute handling policies need to be
`in place before this can be used. We built a system where dispute handling can eas-
`
`GUEST TEK EXHIBIT 1016
`Guest Tek v. Nomadix, IPR2019-01191
`
`Page 1 of 10
`
`

`

`ily be managed, i.e., the merchant or the user can prove (or disprove) that a particular
`minipayment occurred, and thus limit the exposure to fraud.
`We discuss a case study involving per-packet charging in a wireless network. In Sec-
`tion 2, we describe the background for our case study and arrive at the requirements for
`the charging scheme. We then describe the key features of our partial micropayment ar-
`chitecture by presenting a detailed example, namely a microcheck payment framework
`that is based on the KeyNote [1] trust-management system and a mechanism for making
`partial payments from a single microcheck. We briefly discuss our implementation in
`Section 3, and give an overview of related work in Section 4.
`
`1.1 Motivation
`
`The massive reduction in cost of wireless LAN (WiFi) base-stations has resulted in
`the gradual deployment of wireless LANs in public places by commercial operators,
`who want to charge for access. In most existing installations, the user must establish
`credit with the site operator (usually through a Web portal) before being allowed access
`to the network. As the density of WiFi coverage increases, the requirement for separate
`authentication with each provider becomes more onerous. Ideally, the user should be
`able to move between WiFi networks and access the Internet with authentication and
`payment done automatically. The rigidity of current payment methods (including the
`inability of the payment infrastructure to handle small payments) forces the network
`operators to charge for access in large time slots (e.g., on a daily or weekly basis). The
`use of micropayments would allow the operator to be much more flexible. For example,
`the operator may wish to charge for each packet sent or received by the user.
`Even if operators do not charge real money for the services offered, it is sometimes
`desirable to have some type of accountability, to detect infrastructure abusers (to avoid
`the “tragedy of the commons”). Such schemes still depend on some type of user reg-
`istration and accounting; the missing part is the translation to the real-world concepts
`(i.e., money). A micropayment scheme with “play” money can be used to provide this
`accountability. In order to be able to perform this type of charging, we need a system
`that satisfies the following requirements: First, it must be able to handle very small pay-
`ments. Second, it should not require a user-initiated login procedure; instead, be able to
`receive payment dynamically. Third, it should not require on-line authentication with
`the user’s credit institution in order to minimize connection overhead and accommodate
`situations where the user’s credit institution is temporarily inaccessible.
`To satisfy these requirements, we employ two different techniques: (a) The KeyNote
`trust-management System that establishes trust between the user, the service provider
`and the user’s credit institution, using the architecture we originally described in [2],
`and (b) we introduce the concept of OTP Coins that allow single microchecks to be
`broken into smaller payment increments. We present these two techniques in detail.
`
`1.2 KeyNote Microchecks
`
`The micropayments system introduced in [2] forms the basis of our approach. The
`general architecture of this microbilling system is shown in Figure 1. We consider an
`environment where Merchants and Payers sign up for service with a Provisioning Agent
`
`Page 2 of 10
`
`

`

`(PA). Merchants interact with Payers through the Merchant Payment Processor (MPP).
`The Clearing and Settlement Center (CSC) for reconciling transactions may be a sepa-
`rate entity, or may be part of the PA.
`
`PROVISIONING
`(Check Guarantor)
`
`PAYER
`
`VENDOR
`
`CLEARING
`
`Payer’s Bank
`
`Vendor’s Bank
`
`Fig. 1. Microbilling architecture diagram. We give the generic terms for each component,
`and in parentheses the corresponding players. Arrows represent communication between
`two parties: Provisioning issues credentials to Payers and Merchants; these communicate to
`complete transactions; Merchants send transaction information to Clearing, which verifies
`the transaction and posts the necessary credits/charges or arranges money transfers. Pro-
`visioning and Clearing exchange status information about Payer and Merchant accounts.
`
`The PA issues KeyNote [1] credentials to Payers and Merchants, that describe the
`conditions under which a Payer is allowed to perform a transaction, and the fact that a
`Merchant is authorized to participate in a transaction. When a Payer wants to buy some-
`thing from a Merchant, the Merchant encodes the details of the proposed transaction
`into an offer, which is sent to the Payer. To proceed, the Payer issues to the Merchant a
`microcheck for this offer. The microchecks are encoded as KeyNote credentials that au-
`thorize payment for a specific transaction. This credential is effectively a check signed
`by the Payer and payable to the Merchant. The conditions under which this check is
`valid match the Merchant’s offer. Part of the offer is a nonce, which maps payments to
`specific transactions and prevents double-depositing of microchecks by the Merchant.
`To determine whether he will be paid, the Merchant passes the offer description and
`the Payer’s key along with the Merchant’s policy (that identifies the PA key), the Payer
`credential (signed by the PA) and the microchecks credential (signed by the Payer) to
`his local KeyNote compliance checker. If the compliance checker authorizes the trans-
`action, the Merchant is guaranteed that Provisioning will allow payment.
`If the transaction is approved, the Merchant stores a copy of the microcheck along
`with the payer credential and associated offer details for later settlement. Otherwise,
`depending on their network connectivity, either the Payer or the Merchant can request
`a transaction-specific credential that can be used to authorize the transaction. This ap-
`proach, if implemented transparently and automatically, provides a continuum between
`online and offline transactions tuned to the specific risk and operational conditions.
`Periodically, the Merchant will ‘deposit’ the microchecks and associated transaction
`details to the CSC, which may or may not be run by the same entity as the PA, but
`
`Page 3 of 10
`
`

`

`must have the proper authorization to transmit billing and payment records to the PA
`for the customers. The CSC receives payment records from the various Merchants;
`these records consist of the Offer, the KeyNote microcheck, and the credential from
`the payer sent in response. In order to verify a microcheck, the CSC goes through the
`same procedure as the Merchant did when accepting the microcheck. If the KeyNote
`compliance checker approves, the check is accepted and the account balances adjusted.
`The main advantage of this architecture is the ability to encode risk management
`rules for micropayments in user credentials. Other electronic systems have focused on
`preventing fraud and failure, rather than on managing it. As prevention mechanisms are
`often too expensive for micropayments, risk management seems particularly attractive.
`
`1.3 OTP Coins
`
`Electronic coins based on One Time Passwords (OTP) are another fundamental as-
`pect of our approach. While the microchecks manage the risks of single transactions,
`OTP coins allow the cost of a microcheck to be distributed even more thinly, effectively
`making it possible to divide a microcheck transaction into hundreds of smaller, partial
`transactions. This approach is especially suitable for paying for access time, e-content,
`or other kinds of “continuous” goods, i.e., goods that can be sold by some measure.
`The basic approach, without microchecks, was outlined in [3]: an OPIE [4] OTP
`account was sent to the Client, who used the passwords to pay for wireless Internet
`access. The system was based on the IEEE 802.1x protocol, running OPIE over TLS.
`When combined with microchecks, the Merchant spells out the OTP terms in the of-
`fer, e.g., it might state he provides wireless Internet access time at $0.001 per 5 seconds
`when bought in lots of 100 5 second units. That is, he offers 100 pieces of 5 second
`access time units for the price of $0.1. If the Client accepts the offer, she generates a
`random number H100, calculates a hash function over it 100 times, forming a reverse
`hash chain H100; H99; :::; H1; H0, where Hi = hash(Hi+1), and embeds the result H0
`into the microcheck she sends to the Merchant. The Merchant stores the hash value H0
`(called Hcheck) along with the number of remaining valid tokens, 100. At this point, the
`Merchant has sold to the Client 100 OTP coins, only valid with that Merchant. However,
`the construction allows the Client to be charged only for the actual amount spent.
`When the Client wants to use the coins, she sends the next hash value to the Mer-
`chant. That is, she first sends H1, then H2, etc. The Merchant checks that the received
`hash value gives the previously stored value, i.e., that Hstored = hash(Hreceived). If
`so, she decrements the number of remaining valid tokens, and stores the new received
`value. Thus, we have established a convention where a single OTP password repre-
`sents the value for a certain commodity, e.g., for 5 seconds of access time. Once the
`commodity has been used up, the Merchant asks for the next token, to continue service.
`Once the Client has used all coins or stops using more coins, the Merchant pos-
`sesses a hash value HN where N is the number of coins used. When he deposits the
`microcheck to the CSC, he also sends these numbers. The CSC computes Hcheck =
`hashN (HN ) and compares this to the number stored in the microcheck. If they match,
`it can be certain that the Client has indeed bought N units of the good.
`
`Page 4 of 10
`
`

`

`2 Architecture
`
`We describe the TAPI architecture through an example use in pay-per-use 802.11
`access. We then give a brief security analysis of our architecture.
`
`2.1 Example Usage Scenario
`
`As an example, we show how the system can be adapted to a public wireless In-
`ternet access using Wireless LANs. We begin with a client that has signed up with an
`acceptable Provisioning agent. Here, access points subsume the role of the Merchant
`and users play the role of the Payer. As a result of this registration process (which hap-
`pens offline), the user is issued with a clearing check, signed with the PA’s public key:
`
`Authorizer: PA KEY
`Licensees: PAYER KEY
`Conditions: app domain == "Internet Access" &&
`currency == "USD" &&
`&amount < 2.51 && date < "20031231" -> "true";
`Signature: ...
`
`Wireless LAN Authentication
`The IEEE 802.1x standard [5] defines a means to
`authenticate clients in an Ethernet-like network, e.g., it allows authenticating devices
`starting to use WLAN or a corporate LAN for Internet access. In practice, the standard
`defines how to run the IETF standard Extensible Authentication Protocol (EAP) [6]
`over raw Ethernet frames. The encapsulation is called EAP over LAN (EAPoL) [5].
`Since we use the standard EAP protocol, it is possible to use any or all of its sub-
`protocols. However, since neither EAP or EAPoL provide any cryptographic protection
`themselves, the security of the system depends on the security of the underlying net-
`work and on the properties of the EAP subprotocol. Thus, the risks and the protections
`must be matched to provide the desired level of security.
`When 802.1x is used, there are two kinds of client hosts: authenticated and unau-
`thenticated. In a wired LAN, the clients are usually distinguished based on the port: a
`physical port is either authenticated or not. In a shared medium, e.g., Wireless LAN
`(WLAN), the distinction is usually based on the Layer 2 addresses. It may be possible
`to falsify or “steal” a MAC address, depending on the actual implementation. In the
`case of public WLAN, where no encryption is used, the only protection is the relative
`difficulty of using a MAC address at the same time another client is using it.
`Buying OTP coins Whenever a new client host wants to join a LAN that uses IEEE
`802.1x, the access-point attempts to run EAPoL. The status of the client is kept unau-
`thenticated as long as the client fails to authenticate through EAPoL. In our case, we
`provide unauthenticated clients limited access so that they can buy OTP coins, used for
`the actual EAPoL level authentication (see below). That is, any unauthenticated client
`is served (via DHCP) a private IP address. This address can be used only locally.
`
`Page 5 of 10
`
`

`

`The client uses the MPP protocol to purchase a pile of OTP coins. In the simplest
`case (and lacking any special-purpose protocol for purchasing coins), a simple web
`interface can be used with the user. When the user contacts the captive portal, he sees a
`web page that encodes the details of the Merchant offer, e.g.:
`
`merchant = "ADK’S WIRELESS"
`currency = "USD"
`product = "Internet Access"
`date = "20020916"
`packets per coin = "100"
`coins per dollar = "10000"
`amount = "2"
`nonce = "eb2c3dfc860dde9a"
`
`The user examines the details of the request and, if acceptable, authorizes a payment
`to the merchant by issuing the appropriate KeyNote microcheck:
`
`Authorizer: PAYER KEY
`Licensees: "ADK’s Internet"
`Conditions: app domain == "Internet Access" &&
`currency == "USD" && amount == "2" &&
`packets per coin == "100" &&
`coins per dollar == "10000" &&
`first coin == "c637bf92f9f371dfa09n
`59bc467d04b91c2ea1b29" &&
`nonce == "eb2c3dfc860dde9a" &&
`date == "20001227" -> "true";
`Signature: ...
`
`The microcheck also contains the value for the first OTP Coin. This coin is not actu-
`ally used, but serves as the beginning of the OTP chain. The next time the client needs to
`authorize a payment, she will use the next coin in the chain, i.e., “310b86e0b62b82856-
`2fc91c7be5380a992b2786a”. The user sends this microcheck and its guaranteeing check,
`issued by the PA, to the access point. The latter verifies the integrity of the credentials
`and determines (by invoking KeyNote) whether the CSC will honor the payment terms.
`Using OTP coins
`Once the Client has acquired a set of OTP coins, she runs the
`standard 802.1x EAPoL protocol with the local access point. The access point requests
`a user identifier from the client, who answers with a string identifying the microcheck
`used for buying the OTP coins, and the merchant the coins where bought from. The
`access point then contacts the back-end authenticator (the Merchant). The microcheck
`fingerprint indicates the correct unused OTP coin pile.
`Once the back-end authenticator receives the identity response, it checks the OTP
`coin pile and sends an OPIE request, requesting for the next unused OPIE password,
`i.e., OTP coin. The Client responds with the next unused coin, Hi+1. The back-end
`authenticator checks the coin, records it as used, and replies with an EAP SUCCESS
`
`Page 6 of 10
`
`

`

`message. As the access point receives the EAP SUCCESS message from the back-
`end authenticator, it changes the status of the client into authenticated, and passes the
`message to the client. When the client receives the SUCCESS message, she releases her
`current IP address and requests a new one with DHCP. Since she is now authenticated,
`she gets a new IP address that she can use to communicate with the outside world.
`Alternatively, the client could have received a valid IP address which was appropriately
`filtered by the access point; on success, the relevant filters are simply removed.
`Before the OTP coin is used up, the back-end authenticator sends a new OPIE re-
`quest to the client. If the client wants to continue, she replies with the next OTP coin.
`On the other hand, if the client does not want to continue access for any reason, she
`simply does not respond to the request. Thus, if the client goes off-line, the access point
`changes the status of the client’s MAC address into unauthenticated.
`Clearing
`Periodically, the access point provides all these microchecks along with
`the related transaction records to the CSC, which uses this information to verify the
`transaction and charge/credit the relevant accounts. The user’s device (laptop, PDA,
`etc.) may also keep a record of all transactions, which can be used in case of a charge
`dispute. CSCs communicate with PAs to indicate the status of Payers’ and Merchants’
`accounts. Part of the transaction records include the last OTP coin received from a
`user, and its serial number. The CSC can verify its validity, by repeatedly hashing it the
`appropriate number of times and comparing the result with the initial OTP coin included
`in the microcheck. Thus, the CSC can respectively debit the Merchant’s account and
`credit the Payer’s account for the appropriate amount. In case of dispute, the exact usage
`can be determined by verifying the credentials and the OTP coin chain. Assuming the
`underlying cryptography is not broken, the results are non-repudiable.
`
`2.2 Security Analysis
`
`The security of the system can be broken into two parts: one that relates to the secu-
`rity at the network level, and one that refers to the security of the payment mechanisms.
`WLAN security Wireless LANs are known to be notoriously insecure. However,
`their insecurity depends heavily in the way they are used. In our example case, where
`WLAN is used for providing public Internet access, the operator is mainly interested
`in collecting the access fees, while the clients are interested in getting the service they
`pay for. Other security concerns that the users may have (e.g. privacy) can be taken care
`of at an upper layer, and fall beyond the scope of this paper. Consequently, the main
`threats we are interested in are: (a) someone gaining access without paying, and (b)
`someone paying but not gaining access. Naturally, these threats may occur at the same
`time, through an attacker “stealing” access that another user has paid for.
`Thus, it is certainly possible for an attacker to cause an authenticated client to dis-
`connect from the network, and start using its MAC address. However, the access point
`is likely to detect the event and may require immediate re-authentication as the MAC
`address re-connects to the network. If the value of the OTP coins is low enough, e.g.,
`just a few seconds of access time, the gain for the potential attacker is small. Finally, it
`should be straightforward to detect an attacker that repeatedly steals MAC addresses.
`A more powerful attacker can set up a phony access point. If he lures other clients
`to send OTP coins to it, he can then use these coins to pay towards the real access point,
`
`Page 7 of 10
`
`

`

`effectively riding free. The victim clients are unlikely to notice anything, since they
`still get the service they expect. The real access point may not notice anything either,
`depending on its sophistication. While this attack can be made harder, e.g., by including
`the Client’s MAC address in the microchecks, the simple nature of the OTP coins makes
`it impossible to block the attack altogether. However, given the current status of WLAN
`deployment, the cost of the attack compared to the benefits gained seems to be high
`enough to render the attack academic. For proper security, either the OTP coins must
`be replaced with something more sophisticated (and costly), or the underlying network
`must be secured. The additional cost should be evaluated against the expected risk and
`cost of fraud, and implemented only if economically viable.
`Payment Framework Security When dealing with electronic payments we must
`ensure that fraudulent transactions cannot take place, e.g., the merchant should not be
`able to forge an OTP coin, nor should the user be able to deny that she has spent one.
`The scheme requires that we select a non-reversible hash function. Thus, the mer-
`chant can verify that Hn(cid:0)1 was derived from Hn, but is unable to produce Hn(cid:0)1 given
`Hn. Similarly, if the client sends a number other than Hn(cid:0)1, the merchant will detect
`that and revoke the service. Similarly, if the merchant produces Hn(cid:0)1, the client cannot
`claim that she has not sent it. An extensive discussion of the security of the KeyNote
`microcheck architecture may be found in [7]. A key observation is that the low value of
`the checks and the need for light-weight verification mechanisms favor the use of cre-
`dential expiration (with short lifetimes) over the use of a more heavyweight revocation
`mechanism such as credential revocation lists.
`
`3 Implementation
`
`We have implemented the IEEE 802.1x protocol and the OTP coins in the FreeBSD
`operating system [3]. Our initial performance measurements indicate that the effect on
`payload performance is negligible: a typical EAPoL transaction is performed in less
`than two seconds, making it possible to support re-authentication every 5-10 seconds.
`Our 802.1x implementation consists of kernel code that implements the basic fram-
`ing functions for the authentication protocol, plus a number of user level programs. The
`user-level programs implement the individual EAP subprotocols, and in particular the
`EAP OTP authenticator and supporting modules. These rely on a small new library,
`libeap. They also utilize the libskey library present in FreeBSD. To make it easy to buy
`OTP coins, we use a captive portal to allow users to download the 802.1x and EAP OTP
`implementations. Our MAC filter module forward to a web server packets arriving from
`unauthenticated users. Thus, it is possible to create a situation where the only services
`provided to an unauthenticated client are DHCP and the captive web server.
`We are currently working on implementing the full-fledged MPP protocol on top
`of EAP, without the need for a captive portal. Users can specify their payment poli-
`cies using KeyNote (or some other front-end mechanism, which is then translated to
`KeyNote). On receipt of an offer from an access point, KeyNote is called to determine
`whether the terms are acceptable. If so, a microcheck is automatically issued, and the
`necessary OTP coins are generated and used without user interaction. If the offer is not
`acceptable, the user is notified and presented with the offer.
`
`Page 8 of 10
`
`

`

`4 Related Work
`
`IEEE 802.1x Security
`IEEE 802.1x [5] is a forthcoming standard for authenticating
`and authorizing users in Ethernet like local area network (LAN) environments. It is
`primarily meant to secure switched Ethernet wireline networks and IEEE 802.11 based
`WLANs. In the typical usage scenarios, the network requires user authentication before
`any other traffic is allowed, i.e., even before the client is assigned an IP address. This
`allows corporations to strictly control access to their networks. It is important to note
`that 802.1x implements only authentication and MAC address based access control.
`Since MAC spoofing is fairly easy, the resulting system may not be secure enough.
`[8] argues that 802.1x security is flawed since it does not provide per-packet in-
`tegrity and authenticity. Depending on the settings, this may allow session hijacking,
`enabling an attacker to take over a MAC address that belongs to a legitimate, authen-
`ticated user. In a shared medium such as 802.11, authentication should be tightly inte-
`grated with a link-level integrity system using different session keys for different clients.
`Electronic Cash and Micropayments NetBill [9] is a transactional payment proto-
`col with many advanced features (atomicity, group membership, pseudonyms, etc.) that
`requires communication with the NetBill server for each transaction, thus exhibiting the
`same drawback with respect to micropayments as the simpler online protocols already
`mentioned. Other general payment protocols [10–12] suffer the same problem.
`Digital cash-based systems (e.g., [13]) do not directly address the issue of double-
`spending (fraud). Some e-cash systems use online checking, thus negating the off-line
`operation capability. Others rely on detection after the fact. This drawback is manifest
`in several micropayment protocols [14–17]. While double-spending is a problem in all
`off-line systems, none of these protocols address the issue of risk management.
`NetCents [18] and Millicent [19] are scrip-based off-line-friendly micropayment
`protocols. As the monetary unit used in these protocols is vendor-specific, double-
`spending is made difficult. A hidden assumption is that merchants have “total informa-
`tion”. If there are many points of sale, continuous communication and synchronization
`is required between the different points, negating the benefits of off-line operation.
`MiniPay [20] was developed primarily for use with a web browser, with a lot of ef-
`fort gone into the user interface aspect. Risk management is implemented as a decision
`to perform an online check with the billing server based on the total spending by the
`customer that day, and some parameter set by the merchant. The billing provider cannot
`customize the risk-management parameters per-customer or per-merchant. Fileteller [7]
`uses a scheme similar to ours for buying and selling network-based storage.
`
`5 Summary and Concluding Remarks
`
`We presented TAPI, a simple offline electronic payment scheme intended for gen-
`eral Internet-based micropayments. TAPIallows multiple partial charges on a single
`payment authorization by splitting a micropayment transaction into a number of mini-
`payments for smaller amounts (totaling the amount of the original micropayment), thus
`accommodating multiple purchases within the original transaction.
`
`Page 9 of 10
`
`

`

`To demonstrate our design in practice, we implemented the IEEE 802.1x protocol
`along with the OTP coins in the FreeBSD operating system. Our case study involved
`per-packet charging in a wireless network. Initial performance measurements indicated
`that the effect on payload performance was negligible and that the typical EAPoL trans-
`action takes less than 2 seconds on average. We are in the process of implementing the
`full-fledged MPP protocol on top of EAP, without the need for a captive portal.
`
`References
`
`In:
`
`1. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote Trust Management
`System Version 2. Internet RFC 2704 (1999)
`2. Blaze, M., Ioannidis, J., Keromytis, A.D.: Offline Micropayments without Trusted Hardware.
`In: Proceedings of the Fifth International Conference on Financial Cryptography. (2001)
`3. Nikander, P.: Authorization and charging in public wlans using freebsd and 802.1x.
`Proceedings of the Annual USENIX Technical Conference, Freenix Track. (2002)
`4. N. Haller, C. Metz, P.N.M.S.: A One-Time Password System. RFC 2289, IETF (1998)
`5.
`: IEEE Draft P802.1X/D11: Standard for Port based Network Access Control (2001)
`6. L. Blunk, J.V.: PPP Extensible Authentication Protocol (EAP). RFC 2284, IETF (1998)
`7. Ioannidis, J., Ioannidis, S., Keromytis, A., Prevelakis, V.: Fileteller: Paying and Getting
`Paid for File Storage. In: Proceedings of the Sixth International Conference on Financial
`Cryptography. (2002)
`8. Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the IEEE 802.1x Standard. Tech-
`nical Report UMIACS-TR-2002-10, Computer Science Department, University of Maryland
`(2002)
`9. Cox, B., Tygar, D., Sirbu, M.: NetBill security and transaction protocol. In: Proceedings of
`the First USENIX Workshop on Electronic commerce, USENIX (1995)
`10. Neuman, C., Medvinsky, G.: Requirements for network payment: The Netcheque prospec-
`tive. In: Proceedings of IEEE COMCON. (1995)
`11. Bellare, M., Garay, J., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Waidner, M.: iKP
`– A Family of Secure Electronic Payment Protocols. In: Proceedings of the First USENIX
`Workshop on Electronic Commerce, USENIX (1995)
`12. Foo, E., Boyd, C.: A Payment Scheme Using Vouchers. In: Proceedings of the Second Inter-
`national Conference on Financial Cryptography. Number 1465 in Lecture Notes in Computer
`Science, Springer-Verlag (1998) 103–121
`13. Chaum, D.: Achieving Electronic Privacy. Scientific American (1992) 96–101
`14. Rivest, R., Shamir, A.: PayWord and MicroMint. CryptoBytes (2) 7–11
`15. Jutla, C., Yung, M.: Paytree: amortized signature for flexible micropayments. In: Proceedings
`of the Second USENIX Workshop on Electronic Commerce, USENIX (1996)
`16. Hauser, R., Steiner, M., Waidner, M.: Micro-payments based on ikp. In: Proceedings of the
`14th Worldwide Congress on Computer and Communication Security Protection. (1996)
`17. Tang, L.: A Set of Protocols for MicroPayments in Distributed Systems. In: Proceedings of
`the First USENIX Workshop on Electronic Commerce, USENIX (1995)
`18. Poutanen, T., Hinton, H., Stumm, M.: NetCents: A Lightweight Protocol for Secure Mi-
`cropayments. In: Proceedings of the Third USENIX Workshop on Electronic Commerce,
`USENIX (1998)
`19. Manasse, M.S.: The Millicent protocols for electronic commerce. In: Proceedings of the
`First USENIX Workshop on Electronic Commerce, USENIX (1995)
`20. Herzberg, A.: Safeguarding Digital Library Contents. D-Lib Magazine (1998)
`
`Page 10 of 10
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket