System and method of secure payment and delivery of goods and services
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/60
G06F-013/00
G06F-015/16
출원번호
US-0511237
(2000-02-23)
발명자
/ 주소
Zilliacus, Martin
Ginzboorg, Philip
출원인 / 주소
Nokia Corporation
대리인 / 주소
Antonelli, Terry, Stout &
인용정보
피인용 횟수 :
85인용 특허 :
16
초록▼
A system, method and computer program for ordering, paying for and delivering goods and services from a content provider to a user which assures the content provider that he will be paid and that assures the user that he will receive the content at an agreed upon price. Thus, this system, method and
A system, method and computer program for ordering, paying for and delivering goods and services from a content provider to a user which assures the content provider that he will be paid and that assures the user that he will receive the content at an agreed upon price. Thus, this system, method and computer program facilitates business transactions occurring between parties who do not know each other by using a trusted third party to either take the user's order, deliver to the user's order, and/or bill the user the correct amount for the goods and services contracted for. This system, method and computer program relies on the Global System for Mobile (GSM) communications system to authenticate the user and provide algorithms and modules that are used to generate cipher keys and service responses so as to insure the content provider will be paid and that the user will not be overcharged. Further, these algorithms and modules are used to encrypt important information so as to prevent third parties from intercepting this important information. Five business model modules are detailed with numerous variations possible to accomplish the task of facilitating business transactions between parties that do not necessarily know or trust each other.
대표청구항▼
1. A method of ordering, paying for and delivering content, comprising:ordering and paying for the content by a user at a first location, the content being selected from a content provider; transmitting a first service response value calculated by the user to the content provider; calculating a seco
1. A method of ordering, paying for and delivering content, comprising:ordering and paying for the content by a user at a first location, the content being selected from a content provider; transmitting a first service response value calculated by the user to the content provider; calculating a second service response value by a network operator when the user at a second location, different from the first location, requests the content from the network operator; verifying, by the network operator contacting the content provider, that the first service response value matches the second service response value; and transmitting the content to the user at the second location by the network operator when the first service response value matches the second service response value, wherein: at least one of ordering and paying for the content, transmitting the first service response value, and transmitting the content is done by a network. 2. The method recited in claim 1, wherein the first service response value is calculated by the user based on a random number supplied by the content provider and a first secret key possessed by the user.3. The method recited in claim 1, wherein the second service response value is calculated by the network operator based on a random number received from the user and a second secret key possessed by the network operator and associated with the user.4. The method recited in claim 2, wherein the first secret key is contained in a subscriber identification module provided by the network operator and contained in a mobile station within the network which is a wireless network operated by the network operator in such a manner that the mobile user and the mobile station may not discover the value of the secret key.5. The method recited in claim 3, wherein the second secret key is stored in an authentication center of a telecom infrastructure operated by the network operator and the first secret key and the second secret key are identical and assigned when the user subscribes for a telecommunication service provided by the network operator.6. The method recited in claim 4, wherein the first service response value is calculated by an A3 algorithm module contained in the subscriber identification module of the mobile station based on the first secret key and the random number.7. The method recited in claim 5, wherein the second service response value is calculated by an A3 algorithm module, contained in the authentication center of the telecom infrastructure, based on the second secret key, contained in the authentication center of the telecom infrastructure, and the random number.8. The method recited in claim 6, wherein the mobile station is a cellular phone with GSM authentication capability connected to a processor based system, or a WAP-capable cellular phone with GSM authentication capability, or a HTML capable cellular phone with GSM authentication capability.9. The method recited in claim 7, wherein the content is encrypted by the network operator using a cipher key, calculated by an A8 algorithm module based on the random number and the second secret key, prior to transmitting the content to the user.10. The method recited in claim 8, further comprising:decrypting the content by the mobile station using an A8 algorithm module contained in the subscriber identification module of the mobile station to generate the cipher key based on the random number and the first secret key. 11. The method recited in claim 9, wherein the cipher key is used as a seed to a cryptographic protocol which transforms the cipher key into a stronger cipher key.12. The method recited in claim 1, wherein the user pays the content provider for the content, using a credit card, debit card, or electronic transferral of funds.13. A method of ordering, paying for and delivering content, comprising:ordering the content having a content ID by a user at a first location, the content being selected from a content provider; transmitting a first service response value, a network identifier, and a cipher key by the user to the content provider; transmitting the first service response value, the network identifier, and a random number to a network operator by the content provider; calculating a second service response value and a cipher key by the network operator and determining if the first service response value matches the second service response value; and transmitting the content to the user at a second location, different from the first location, when the first service response value matches the second service response value, by the content provider, wherein: at least one of ordering the content, transmitting the first service response value, and transmitting the content is done by a network. 14. The method recited in claim 13, wherein the first service response value is calculated by the user based on a random number supplied by the content provider and a first secret key contained in a subscriber identification module provided by the network operator and contained in a mobile station within the network which is a wireless network operated by the network operator.15. The method recited in claim 13, wherein the second service response value and a cipher key are calculated based on the random number, and a network identifier, used to access a second secret key located in an authentication center of a telecom infrastructure, received from the content provider.16. The method recited in claim 14, wherein the first secret key is not accessible directly by the user or the mobile station and the value of the secret key may not be discovered by the user, but is identical to the second secret key and both the first secret key and the second secret key are assigned when the user subscribes for a telecommunication service provided by the network operator.17. The method recited in claim 16, wherein the first service response value is calculated by an A3 algorithm module contained in the subscriber identification module of the mobile station based on the first secret key and the random number.18. The method recited in claim 15, wherein the second service response value is calculated by an A3 algorithm module, contained in the authentication center of the telecom infrastructure, based on the second secret key, contained in the authentication center of the telecom infrastructure, and the random number.19. The method recited in claim 17, wherein the mobile station is a cellular phone with GSM authentication capability connected to a processor based system, or a WAP-capable cellular phone with GSM authentication capability, or a HTML capable cellular phone with GSM authentication capability.20. The method recited in claim 18, wherein the content is encrypted by the network operator using the cipher key, calculated by an A8 algorithm module based on the random number and the second secret key, prior to transmitting the content to the user.21. The method recited in claim 19, further comprising:decrypting the content by the mobile station using an A8 algorithm module contained in the subscriber identification module of the mobile station to generate a cipher key based on the random number and the first secret key. 22. The method recited in claim 13, wherein the user is billed by the network operator for the content in a telephone bill.23. The method recited in claim 13, further comprising:hashing, by the user, a price of the content, the random number and a seller ID to create a hashed number; computing, by the user, the first service response value based on the secret key and the hashed random number; transmitting, by the user, the first service response value to the content provider; transmitting, by the content provider, the random number, the seller ID the price of the content and the first service response to the network operator; computing, by the network operator, the second service response value based on the secret key, the price transmitted by the content provider and the random number; verifying, by the network operator that the first service response value matches the second service response value; and billing the user, by the network operator, the price when the first service response value matches the second service response value in a telephone bill. 24. The method recited in claim 20, wherein the cipher key is used as a seed to a cryptographic protocol which transforms the cipher key into a stronger cipher key.25. A method of ordering, paying for and delivering content, comprising:ordering the content from a network operator, having a content ID selected by a user at a first location; transmitting a first service response value calculated by the user to the network operator; calculating a second service response value and a cipher key by the network operator and determining if the first service response value matches the second service response value; transmitting the content ID, and a cipher key to Ha content provider; and transmitting the content to the user at a second location, different from the first location, by the content provider when requested by the user, wherein: at least one of ordering the content, transmitting the first service response value, and transmitting the content is done by a network. 26. The method recited in claim 25, wherein the first service response value is calculated by the user based on a random number supplied by the network operator and a first secret key possessed by the user.27. The method recited in claim 25, wherein the second service response value is calculated by the network operator based on the random number and a second secret key possessed by the network operator and associated with the user.28. The method recited in claim 26, wherein the first secret key is contained in a subscriber identification module provided by the network operator and contained in a mobile station within the network which is a wireless network operated by the network operator in such a manner that the user and the mobile station may not discover the value of the secret key.29. The method recited in claim 27, wherein the second secret key is stored in an authentication center of a telecom infrastructure operated by the network operator and the first secret key and the second secret key are identical and assigned when the user subscribes for a telecommunication service provided by the network operator.30. The method recited in claim 28, wherein the first service response value is calculated by an A3 algorithm module contained in the subscriber identification module of the mobile station based on the first secret key and the random number.31. The method recited in claim 29, wherein and the second service response value is calculated by an A3 algorithm module, contained in the authentication center of the telecom infrastructure based on the second secret key, contained in the authentication center of the telecom infrastructure, and the random number.32. The method recited in claim 30, wherein the station is a cellular phone with GSM authentication capability connected to a processor based system, or a WAP-capable cellular phone with GSM authentication capability, or a HTML capable cellular phone with GSM authentication capability.33. The method recited in claim 31, wherein the content is encrypted by the content provider using a cipher key, calculated by an A8 algorithm module based on the random number and the second secret key and supplied by the network operator, prior to transmitting the content to the user.34. The method recited in claim 32, further comprising:decrypting the content received by from the content provider by the mobile station using an A8 algorithm module contained in the subscriber identification module of the mobile station to generate a cipher key based on the random number and the first secret key. 35. The method recited in claim 33, wherein the cipher key is used as a seed to a cryptographic protocol which transforms the cipher key into a stronger cipher key.36. The method recited in claim 25, wherein the user is billed by the network operator for the content in a telephone bill.37. A method of ordering, paying for and delivering content, comprising:ordering the content, having a content ID, by a user at a first location, the content being selected from a network operator, transmitting a first service response value calculated by the user to the network operator; calculating a second service response value and a cipher key by the network operator and determining if the first service response value matches the second service response value; and transmitting the content to the user at a second location, different from the first location, by the network operator when requested by the user wherein: at least one of ordering the content, transmitting the first service response value, and transmitting the content is done by a network. 38. The method recited in claim 37, wherein the first service response value is calculated by the user based on a random number supplied by the network operator and a first secret key possessed by the user.39. The method recited in claim 37, wherein the second service response value is calculated by the network operator based on a random number and a second secret key possessed by the network operator and associated with the user.40. The method recited in claim 38, wherein the first secret key is contained in a subscriber identification module provided by the network operator and contained in a mobile station within the network which is a wireless network operated by the network operator in such a manner that the user and the mobile station may not discover the value of the secret key.41. The method recited in claim 39, wherein the second secret key is stored in an authentication center of a telecom infrastructure operated by the network operator and the first secret key and the second secret key are identical and assigned when the user subscribes for a telecommunication service provided by the network operator.42. The method recited in claim 40, wherein the first service response value is calculated by an A3 algorithm module contained in the subscriber identification module of the mobile station based on the first secret key and the random number.43. The method recited in claim 41, wherein the second service response value is calculated by an A3 algorithm module, contained in the authentication center of the telecom infrastructure, based on the second secret key, contained in the authentication center of the telecom infrastructure, and the random number.44. The method recited in claim 42, wherein the mobile station is a cellular phone with GSM authentication capability connected to a processor based system, or a WAP-capable cellular phone with GSM authentication capability, or a HTML capable cellular phone with GSM authentication capability.45. The method recited in claim 43, wherein the content is encrypted by the network operator using a cipher key, calculated by an A8 algorithm module based on the random number and the second secret key and supplied by the network operator, prior to transmitting the content to the user.46. The method recited in claim 44, further comprising:decrypting the content received by from the network operator by the mobile station using an A8 algorithm module contained in the subscriber identification module of the mobile station to generate a cipher key based on the random number and the first secret key. 47. The method recited in claim 45, wherein the cipher key is used as a seed to a cryptographic protocol which transforms the cipher key into a stronger cipher key.48. The method recited in claim 37, wherein the user is billed by the network operator for the content in a telephone bill.49. A method of ordering, paying for and delivering contents, comprising:ordering and paying for the contents by a user at a first location, the content being selected from a content provider; transmitting a plurality of first service response values calculated by the user to the content provider; calculating a plurality of second service response values by a network operator when the user at a second location, different from the first location, requests one of the contents from the network operator; verifying, by the network operator contacting the content provider, that one of the plurality of first service response values associated with the requested contents matches one of the plurality of second service response values associated with the requested contents; and transmitting one of the requested contents to the user at a second location different from the first location, by the network operator when the one of the plurality of first service response values matches the one of the plurality of second service response values, wherein: at least one of ordering and paying for the plurality of contents, transmitting the plurality of first service response values, and transmitting the requested content is done by a network. 50. The method recited in claim 49, wherein the plurality of first service response values are calculated by the user based on a plurality of random numbers supplied by the content provider and a first secret key possessed by the user.51. The method recited in claim 49, wherein the plurality of second service response values are calculated by the network operator based on a plurality of random numbers received from the user and a second secret key possessed by the network operator and associated with the user.52. The method recited in claim 50, wherein the first secret key is contained in a subscriber identification module provided by the network operator and contained in a mobile station within the network which is a wireless network operated by the network operator in such a manner that the user and the station may not discover the value of the secret key.53. The method recited in claim 51, wherein the second secret key is stored in an authentication center of a telecom infrastructure operated by the network operator and the first secret key and the second secret key are identical and assigned when the user subscribes for a telecommunication service provided by the network operator.54. The method recited in claim 52, wherein the plurality of first service response values are calculated by an A3 algorithm module contained in the subscriber identification module of the mobile station based on the first secret key and the plurality of random numbers.55. The method recited in claim 53, wherein and the plurality of second service response values are calculated by an A3 algorithm module, contained in the authentication center of the telecom infrastructure based on the second secret key, contained in the authentication center of the telecom infrastructure, and the plurality of random numbers.56. The method recited in claim 54, wherein the mobile station is a cellular phone with GSM authentication capability connected to a processor based system, or a WAP-capable cellular phone with GSM authentication capability, or a HTML capable cellular phone with GSM authentication capability.57. The method recited in claim 55, wherein the requested content is encrypted by the network operator using a cipher key, calculated by an A8 algorithm module based on a random number of the plurality of random numbers and the second secret key, prior to transmitting the requested to the user.58. The method recited in claim 56, further comprising:decrypting the requested content by the mobile station using an A8 algorithm module contained in the subscriber identification module of the mobile station to generate a cipher key based on one random number of the plurality of random numbers and the first secret key. 59. The method recited in claim 57, wherein the cipher key is used as a seed to a cryptographic protocol which transforms the cipher key into a stronger cipher key.60. The method recited in claim 49, wherein the user pays the content provider for the plurality of contents, using a credit card, debit card, or electronic transferral of funds.61. A method in accordance with claim 1 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 62. A method in accordance with claim 2 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 63. A method in accordance with claim 3 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 64. A method in accordance with claim 4 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 65. A method in accordance with claim 5 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 66. A method in accordance with claim 6 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 67. A method in accordance with claim 7 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 68. A method in accordance with claim 8 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 69. A method in accordance with claim 9 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 70. A method in accordance with claim 10 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 71. A method in accordance with claim 11 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 72. A method in accordance with claim 12 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 73. A method in accordance with claim 13 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 74. A method in accordance with claim 14 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 75. A method in accordance with claim 15 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 76. A method in accordance with claim 16 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 77. A method in accordance with claim 17 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 78. A method in accordance with claim 18 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 79. A method in accordance with claim 19 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 80. A method in accordance with claim 20 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 81. A method in accordance with claim 21 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 82. A method in accordance with claim 22 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 83. A method in accordance with claim 23 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 84. A method in accordance with claim 24 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 85. A method in accordance with claim 25 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 86. A method in accordance with claim 26 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 87. A method in accordance with claim 27 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 88. A method in accordance with claim 28 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 89. A method in accordance with claim 29 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 90. A method in accordance with claim 30 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 91. A method in accordance with claim 31 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 92. A method in accordance with claim 32 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 93. A method in accordance with claim 33 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 94. A method in accordance with claim 34 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 95. A method in accordance with claim 35 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 96. A method in accordance with claim 36 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 97. A method in accordance with claim 37 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 98. A method in accordance with claim 38 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 99. A method in accordance with claim 39 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 100. A method in accordance with claim 40 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 101. A method in accordance with claim 41 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 102. A method in accordance with claim 42 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 103. A method in accordance with claim 43 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 104. A method in accordance with claim 44 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 105. A method in accordance with claim 45 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 106. A method in accordance with claim 46 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 107. A method in accordance with claim 47 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 108. A method in accordance with claim 48 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 109. A method in accordance with claim 49 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 110. A method in accordance with claim 50 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 111. A method in accordance with claim 51 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 112. A method in accordance with claim 52 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 113. A method in accordance with claim 53 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 114. A method in accordance with claim 54 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 115. A method in accordance with claim 55 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 116. A method in accordance with claim 56 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 117. A method in accordance with claim 57 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 118. A method in accordance with claim 58 wherein:the network is a wireless network operated by the network operator; and the user uses the mobile station within the wireless network to receive the content at the second location. 119. A method in accordance with claim 59 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location. 120. A method in accordance with claim 60 wherein:the network is a wireless network operated by the network operator; and the user uses a mobile station within the wireless network to receive the content at the second location.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (16)
Bellovin Steven M. (Westfield NJ) Merritt Michael J. (Berkeley Heights NJ), Cryptographic protocol for remote authentication.
Teper Jeffrey A. ; Koneru Sudheer ; Mangione Gordon ; Balaz Rudolph ; Contorer Aaron M. ; Chao Lucy, System and method for providing trusted brokering services over a distributed network.
Talbert, Vincent W.; Keithly, Thomas H.; Hirschfeld, Daniel A.; Lavelle, Mark L., Computer-implemented method, system and apparatus for the dynamic verification of a consumer engaged in a transaction with a merchant and authorization of the transaction.
Wysocki, Christopher R.; Heller, David; Jawa, Amandeep; Gupta, Sandeep; Marriott, Greg; Sprauer, Max; Shayer, David A.; Archibald, John Wesley; Wells, Shannon E., Integrated media jukebox and physiologic data handling application.
Semple, James; Rose, Gregory Gordon, Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system.
Talbert, Vincent W.; Keithly, Thomas H.; Hirschfeld, Daniel A.; Lavelle, Mark L., Method and system for completing a transaction between a customer and a merchant.
Talbert, Vincent W; Keithly, Thomas H; Hirschfeld, Daniel A; Lavelle, Mark L, Method and system for completing a transaction between a customer and a merchant.
Rose, Gregory Gordon; Semple, James; Quick, Jr., Roy Franklin; Hawkes, Philip Michael, Method and system for managing authentication and payment for use of broadcast material.
Chen, Tao; Bender, Paul E.; Agashe, Parag A.; Rezaiifar, Ramin; Pankaj, Rajesh K.; Wei, Yongbin, Method and system for reduction of decoding complexity in a communication system.
Chen, Tao; Bender, Paul E.; Agashe, Parag A.; Rezaiifar, Ramin; Pankaj, Rajesh K.; Wei, Yongbin, Method and system for reduction of decoding complexity in a communication system.
Aabye, Christian; Ngo, Hao; Wilson, David William; Zeiden, Gustavo Mariath; Pitchford, Chris; Pirzadeh, Kiushan, Over the air update of payment transaction data stored in secure memory.
Aabye, Christian; Ngo, Hao; Wilson, David William; Zeiden, Gustavo Mariath; Pitchford, Chris; Pirzadeh, Kiushan, Over the air update of payment transaction data stored in secure memory.
Somayajula, Siva Rama Kumar; Liu, Clifton; Kiraly, Kenneth P.; Gopalakrishnan, Varadarajan; Desai, Jay P.; Narasimhan, Subram, Single version of a user device modem for use with different wireless carriers.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.