Methods and systems for transaction record delivery using thresholds and multi-stage protocol
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-015/16
G06F-015/173
출원번호
US-0176638
(2011-07-05)
등록번호
US-8326983
(2012-12-04)
발명자
/ 주소
Strohwig, Marc E.
McGinty, John M.
Sibert, W. Olin
출원인 / 주소
Intertrust Technologies Corp.
대리인 / 주소
Finnegan, Henderson, Farabow, Garrett & Dunner
인용정보
피인용 횟수 :
1인용 특허 :
69
초록▼
The present invention provides systems and methods for conducting electronic transactions in a distributed computing environment. A communications protocol is provided that enables reliable transactional state synchronization for peers participating in a distributed transaction. A transaction proces
The present invention provides systems and methods for conducting electronic transactions in a distributed computing environment. A communications protocol is provided that enables reliable transactional state synchronization for peers participating in a distributed transaction. A transaction processing application is deployed on a local computer system to manage transactions thereon. The local computer system contacts a remote computer system to obtain authorization to execute a transaction. The local computer system initiates a failure-recovery job that is operable to automatically resend status signals and other information to the remote system if the communication with the remote system exhibits certain predefined fault conditions. The remote system is able to dynamically adjust the definition of the predefined fault conditions. If the transaction concludes without triggering the predefined fault conditions, the failure-recovery job is cancelled. The transaction processing application may also allow deferred transactions between remote parties. The transaction processing application maintains a record of the transactions performed by the consumer on the consumer's local system. Upon the occurrence of predefined conditions, transactional records are sent to a remote vendor or clearinghouse. The vendor or clearinghouse can manage the risk it bears by setting the predefined conditions appropriately.
대표청구항▼
1. A method performed by a first computer system for gaining access to a piece of content, the method comprising: sending a request to a second computer system communicatively coupled to the first computer system in a networked environment, the request seeking permission to access the piece of conte
1. A method performed by a first computer system for gaining access to a piece of content, the method comprising: sending a request to a second computer system communicatively coupled to the first computer system in a networked environment, the request seeking permission to access the piece of content;initiating execution of an acknowledgement-monitoring process at the first computer system, the acknowledgement-monitoring processing being configured to: detect a second acknowledgement from the second computer system, the second acknowledgement indicating that the second computer system received a first acknowledgement from the first computer system; andsend a third acknowledgment to the second computer system if the second acknowledgement is not received by the first computer system within a defined time period;receiving a status indicator from the second computer system, the status indicator including an indication that the request has been granted;granting access to the piece of content to the first computer system;sending the first acknowledgment to the second computer system, the first acknowledgement indicating that the access to the piece of content was successfully granted to the first computer system;receiving the second acknowledgement from the second computer system; andterminating execution of the acknowledgement-monitoring process;wherein the status indicator further includes a first time value, the defined time period being measured based, at least in part, on the first time value. 2. A method as in claim 1, wherein the defined time period is measured from the initiation of execution of the acknowledgement-monitoring process. 3. A method performed by a remote computer system for granting access to a piece of content by a local computer system, the method comprising: receiving a request from the local computer system seeking permission to access the piece of content;determining that request should be granted; sending a status indicator to the local computer system, the status indicator including an indication that the request has been granted and authorizing the content to be released to a local of the local computer system;receiving a first acknowledgement from the local computer system indicating that the piece of content was successfully released to a local of the computer system; andsending a second acknowledgement to the local computer system indicating that the first acknowledgement signal was received, the second acknowledgement signal being configured to direct an acknowledgement-monitoring process executing on the local computer to terminate;wherein the status indicator further includes a first time value, the first time value being configured to be utilized by the local computer system in determining a defined time period for receiving the second acknowledgement signal. 4. A method performed by a first computer system for managing a transaction between the first computer system and a second computer system, the method comprising: receiving a request from the second computer system requesting authorization to execute the transaction;receiving a status signal from the second computer system, the status signal indicating the occurrence of a defined fault condition in communication between the first computer system and the second computer system, wherein the defined fault condition comprises the second computer system failing to receive within a defined amount of time a response from the first computer system to a signal received from the second computer system;sending a signal to the second computer system, the signal being configured to modify, at least in part, a definition of the defined fault condition; andreceiving a second status signal from the second computer system, the second status signal indicating the occurrence of a second defined fault condition in the communication between the first computer system and the second computer system, wherein the second defined fault condition comprises the second computer sending the status signal to the second computer system more than a predetermined number of times without receive a response to the status signal from the first computer system. 5. A method as in claim 4, wherein the signal is configured to modify the definition of the defined fault condition such that a future receipt of the status signal indicates the occurrence of the modified defined fault condition. 6. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor, are configured to cause the processor to perform a method for granting access to a piece of content, the method comprising: receiving from a local computer system a request to access a conditionally-accessible piece of content;determining whether the request should be granted;sending a response to the request to local computer system based on determining that the request should be granted;receiving a first acknowledgement from the local computer system indicating receipt of the response;receiving a second instance of the first acknowledgement from the local computer system based on the occurrence of a defined condition; andsending a signal to the local computer system, the signal being configured to modify, at least in part, a definition of the defined condition;wherein the defined condition comprises a predetermined amount of time elapsing from the time the first acknowledgement from the local computer system is sent. 7. The non-transitory computer-readable storage medium of claim 6, wherein the computer-readable storage medium comprises one of a CD-ROM, a DVD, a MINIDISC, a floppy disk, a tape memory, a flash memory, a RAM, a ROM, system memory, a hard drive, and an optical storage medium.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (69)
Dolev Danny (Mevasserret ILX) Reischuk Rdiger K. (Mnster-Altheim CA DEX) Strong Hovey R. (San Jose CA), Anonymous time synchronization method.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Dolev Danny,ILX ; Reischuk Rudiger Karl,DEX ; Strong Hovey Raymond, Computer program product for use with a network node for performing anonymous time synchronization in a network.
Cheung Yeung Joemanne Chi,GBX ; Thompson Jonathan A.,GBX ; Lysejko Martin,GBX ; Cooper Guy A.,GBX, Control message transmission in telecommunications systems.
Talati Kirit K. (207 Sun Ray La. Sunnyvale TX 75102), Control system and method for direct execution of software application information models without code generation.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Baecker,Thomas; Buddendiek,Joerg; Carnahan,Kevin; Egert,Ralph; Feder,Patrick C.; Frank,Carsten; Nargolwalla,Tanya F.; Zahm,Robert R., Event-driven trade link between trading and clearing systems.
Gill Robert Bradley,CAX ; Baghdadi Gaby,CAX ; Symonds Robert D. ; Singer Irek,CAX ; St. George Peter,CAX ; Shirah Roy ; Stock Timothy M., Fault monitoring and notification system for automated banking machines.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Crayford, Ian; Runaldue, Thomas J., Method and apparatus for a network hub to diagnose network operation and broadcast information to a remote host or monitoring device.
Crayford,Ian; Runaldue,Thomas J., Method and apparatus for a network hub to diagnose network operation and broadcast information to a remote host or monitoring device.
Doyle Thomas F. (San Diego CA), Method and apparatus for detecting fault conditions in a vehicle data recording device to detect tampering or unauthoriz.
Brunmeier Terry J. (Shoreview MN) Byers Larry L. (Apple Valley MN) Miller John A. (Shoreview MN) Robeck Gary R. (Albertville MN), Method and apparatus for determining the source and nature of an error within a computer system.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Herzberg Amir ; Krawczyk Hugo Mario ; Kutten Shay ; Le An Van ; Matyas Stephen Michael ; Yung Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
Walker Jay S. ; Case T. Scott ; Jorasch James A. ; Sparico Thomas M., Method, apparatus, and program for pricing, selling, and exercising options to purchase airline tickets.
Goldsmith Amy M. (Los Gatos CA) Goldsmith David B. (Los Gatos CA) Pettus Christopher E. (San Francisco CA), Object-oriented remote procedure call networking system.
Dolev Danny (Jerusalem ILX) Reischuk Rudiger K. (Munster-Altheim DEX) Strong Hovey R. (San Jose CA), Processing system for use as a network node for performing anonymous time synchronization in a network.
Higgins Peter ; Hebert Mark P. ; Lynch John T., Redundancy, expanded switching capacity and fault isolation arrangements for expandable telecommunications system.
Ketcham Larry R. (Laguna Niguel CA), Software security system for maintaining integrity of compiled object code by restricting users ability to define compil.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
McManis Charles E. (Sunnyvale CA), System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.