Personal digital key and receiver/decoder circuit system and method
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
G07F-007/10
G06Q-020/12
G06Q-020/34
G07C-009/00
출원번호
US-0443873
(2017-02-27)
등록번호
US-10026253
(2018-07-17)
발명자
/ 주소
Giobbi, John J.
출원인 / 주소
Proxense, LLC
대리인 / 주소
Patent Law Works LLP
인용정보
피인용 횟수 :
0인용 특허 :
123
초록▼
The present invention enables automatic authentication of a personal digital key based upon proximity of the key which is associated with a person. The system enables linking of the personal digital key to an account based upon the automatic authentication. The personal digital key includes encrypte
The present invention enables automatic authentication of a personal digital key based upon proximity of the key which is associated with a person. The system enables linking of the personal digital key to an account based upon the automatic authentication. The personal digital key includes encrypted digital data unique thereto, which enables automatic authentication based upon proximity thereof to a receiver and the account linking system. The system further includes an account linking system based upon automatic authentication of the personal digital key. The account linking system comprises a receiver/decoder circuit, which is able to automatically authenticate the personal digital key, whereby the personal digital key is able to be linked to and associated with an account.
대표청구항▼
1. A system comprising: a plurality of personal digital keys associated with different persons including a first personal digital key associated with a first person and a second personal digital key associated with a second person;a receiver device configured to wirelessly communicate with the plura
1. A system comprising: a plurality of personal digital keys associated with different persons including a first personal digital key associated with a first person and a second personal digital key associated with a second person;a receiver device configured to wirelessly communicate with the plurality of personal digital keys within a range of the receiver device;a first device;a second device, in use by the second person, providing content; andan account linking system able to: accumulating data associated with a plurality of personal digital keys associated with different persons in an area including content received at a second device in use by an owner of a second personal digital key, the plurality of personal digital keys including the first personal digital key and the second personal digital key,determining devices associated with the area, the devices associated with the area including the first device and the second device; andbased on satisfaction of a predefined threshold associated with the accumulated data associated with the plurality of personal digital keys in the area and the content provided by the second device, determining to provide content similar to the content provided by the second device, which is in use by the second person, at the first device, the first device subsequently providing the content similar to the content provided by the second device. 2. A system as in claim 1, wherein the receiver device detects, authenticates, and securely communicates with the first personal digital key. 3. A system as in claim 1, wherein the first personal digital key and receiver device include embedded challenge-response logic and cryptographic algorithms, for enabling authentication of the first personal digital key and the receiver device as original, not copied, authorized devices. 4. A system as in claim 1, wherein the first device is a first gaming machine and games are able to be downloaded to the first gaming machine, the account linking system tracking user preferences regarding games. 5. A system as in claim 1, further including a content server and the content, the content server encrypting content with a unique identifier of a receiver device as an encryption key, and wherein the receiver device decrypts the content, the receiver device associated with the first device. 6. A system as in claim 1, wherein the first device is a first gaming machine, the first gaming machine including a receiver device that is able to encrypt transaction data delivered to the first gaming machine, to be decrypted upon proximity of the first personal digital key to the first gaming machine. 7. The system as in claim 1, wherein the devices associated with the area are physically located in the area, the accumulated data including data regarding a content preference associated with the owner of the first personal digital key, data associated with one or more browsers in the area, and the content received at the second device. 8. The system as in claim 1, wherein the account linking system sends the first device the content similar to the content provided by the second device and additional deliverable information to the first device, wherein the additional deliverable information includes information intended to grab an attention of or entice a browser or the first person to interact with the first device. 9. The system as in claim 8, wherein the additional deliverable information includes one or more of a personalized greeting, an incentive to play, an incentive to shop, a promotion and a prize for playing a particularly high-stakes game. 10. A method comprising: accumulating, using one or more processors, data associated with a plurality of personal digital keys associated with different persons in an area including content received at a second device in use by an owner of a second personal digital key, the plurality of personal digital keys including first personal digital key associated with a first person and a second personal digital key associated with a second person;determining, using the one or more processors, devices associated with the area, the devices associated with the area including a first device and a second device; andbased on satisfaction of a predefined threshold associated with the accumulated data associated with the plurality of personal digital keys in the area and the content provided by the second device, determining, using the one or more processors, to provide content similar to the content provided by the second device, which is in use by the second person, at the first device, the first device subsequently providing the content similar to the content provided by the second device. 11. A method of claim 10, wherein a receiver device detects, authenticates, and securely communicates with the first personal digital key. 12. The method of claim 10, wherein the first personal digital key and receiver device include embedded challenge-response logic and cryptographic algorithms, for enabling authentication of the first personal digital key and the receiver device as original, not copied, authorized devices. 13. The method of claim 10, wherein the first device is a first gaming machine and games are able to be downloaded to the first gaming machine as the content, and the method includes tracking user preferences regarding games. 14. The method of claim 10, further including encrypting content sent to the first device with a unique identifier of a receiver device as an encryption key, and wherein the receiver device decrypts the content, the receiver device associated with the first device. 15. The method of claim 10, wherein the first device is a first gaming machine, the first gaming machine including a receiver device that is able to encrypt transaction data delivered to the first gaming machine, to be decrypted upon proximity of the first personal digital key to the first gaming machine. 16. The method of claim 10, wherein the devices associated with the area are physically located in the area, the accumulated data including data regarding a content preference associated with the owner of the first personal digital key, data associated with one or more browsers in the area, and the content received at the second device. 17. The method of claim 10, further including sending the content similar to the content provided by the second device and additional deliverable information to the first device, wherein the additional deliverable information includes information intended to grab an attention of or entice a browser or the first person to interact with the first device. 18. The method of claim 17, wherein the additional deliverable information includes one or more of a personalized greeting, an incentive to play, an incentive to shop, a promotion and a prize for playing a particularly high-stakes game.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (123)
Yap, Sue-Ken; Yourlo, Zhenya Alexander, Apparatus and method for distributing audio and video content.
Van Tilburg Johan,NLX ; Hekstra Andries Pieter,NLX, Authentication system wherein definition signals of two devices are altered, communicated between the two devices, and compared.
Matsuyama, Shinako; Ishibashi, Yoshihito; Futamura, Ichiro; Kon, Masashi; Watanabe, Hideaki, Content distribution system, content distribution method, information processing apparatus, and program providing medium.
Hatakeyama, Takahisa; Yoshioka, Makoto; Miyazawa, Yuji, Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method.
Steven T. Ansell ; Andrew R. Cherenson ; Mark E. Paley ; Steven B. Katz ; John Michael Kelsey, Jr. ; Bruce Schneier, Copy security for portable music players.
Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
Johnson, Barry W.; Olvera, Kristen R.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
Rosin Robert ; Hsu P. Robert ; Sonoda Yumie ; Niijima Makoto,JPX ; Nakano Hiroaki, Internet content and television programming selectively displaying system.
Hammersley Scott D. (Rochester MN) Smet Arthur D. (Rochester MN) Wottreng Peter M. (Rochester MN), Method and apparatus for intraprocess locking of a shared resource in a computer system.
Adams, William Mark; Coyne, John Robert; Coyne, Christopher Andrew; Wallace, Raymond Munson, Method and system for creating and operating biometrically enabled multi-purpose credential management devices.
Schena, Robert J.; Anderer, Mike; Ritz, Peter B.; Bernstein, Mike, Method for managing printed medium activated revenue sharing domain name system schemas.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kato Naotaka,JPX ; Kanada Yoshihisa,JPX, Methods and apparatus for downloading data between an information processing device and an external device via a wireless communications technique.
Naotaka Kato JP; Yoshihisa Kanada JP, Methods and apparatus for downloading data between an information processing device and an external device via a wireless communications technique.
Blair William (1154 W. Lunt ; Apt. 302 Chicago IL 60626) Brooks Stanley J. (P.O. Box 906 Douglas GA 31533), Microprocessor controlled security system for computers.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Campinos Arnaldo,FRX ; Fischer Jean-Bernard,FRX, Process for protecting an information item transmitted from a security element to a decoder and protection system using such a process.
Bowers John H. ; Clare Thomas J., RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Kamibayashi,Tooru; Yamada,Hisashi; Iwasaki,Hiroshi; Tamura,Masafumi; Ishibashi,Yasuhiro; Kato,Taku; Tatebayashi,Makoto; Harada,Shunji; Katsuta,Noboru, Storage medium and contents protection method using the storage medium.
Michael S. Kupka ; Michael G. Lundgren, System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same.
Getsin, Evgeniy M.; Lamkin, Allan B.; Collart, Todd R., System, method and article of manufacture for remote unlocking of local content located on a client device.
Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.