Processing

Please wait...

Settings

Settings

Goto Application

1. WO2013163575 - PROVIDING CONTENT TO A USER ACROSS MULTIPLE DEVICES

Publication Number WO/2013/163575
Publication Date 31.10.2013
International Application No. PCT/US2013/038457
International Filing Date 26.04.2013
IPC
G06F 21/31 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
G06F 21/44 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
44Program or device authentication
G06F 15/16 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
15Digital computers in general; Data processing equipment in general
16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
CPC
H04L 2209/42
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
42Anonymization, e.g. involving pseudonyms
H04L 9/0861
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
H04L 9/3226
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3226using a predetermined code, e.g. password, passphrase or PIN
Applicants
  • GOOGLE INC. [US]/[US] (AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BE, BF, BG, BH, BJ, BN, BR, BW, BY, BZ, CA, CF, CG, CH, CI, CL, CM, CN, CO, CR, CU, CY, CZ, DE, DK, DM, DO, DZ, EC, EE, EG, ES, FI, FR, GA, GB, GD, GE, GH, GM, GN, GQ, GR, GT, GW, HN, HR, HU, ID, IE, IL, IN, IS, IT, JP, KE, KG, KM, KN, KP, KR, KZ, LA, LC, LK, LR, LS, LT, LU, LV, LY, MA, MC, MD, ME, MG, MK, ML, MN, MR, MT, MW, MX, MY, MZ, NA, NE, NG, NI, NL, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SC, SD, SE, SG, SI, SK, SL, SM, SN, ST, SV, SY, SZ, TD, TG, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, UZ, VC, VN, ZA, ZM, ZW)
  • RAJKUMAR, Nareshkumar [IN]/[US] (US)
  • RAMACHANDRAN, Vinod Kumar [IN]/[US] (US)
  • VEMULA, Gopal Venu [US]/[US] (US)
Inventors
  • RAJKUMAR, Nareshkumar
  • RAMACHANDRAN, Vinod Kumar
  • VEMULA, Gopal Venu
Agents
  • JORDAN, David E.A.
Priority Data
13/458,12427.04.2012US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) PROVIDING CONTENT TO A USER ACROSS MULTIPLE DEVICES
(FR) PROCÉDÉ PERMETTANT DE FOURNIR DU CONTENU À UN UTILISATEUR À TRAVERS PLUSIEURS DISPOSITIFS
Abstract
(EN)
Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium, and including a method for providing content. The method comprises receiving a first login associated with a first anonymous identifier and first device, creating an associated first private-public key pair, storing a first private key locally in the first device, and publishing a first public key. The method further comprises receiving a second login from a second different device, creating a second private-public key pair, storing a second private key, publishing the second public key, creating a secret key using the first public key, and associating a second anonymous identifier with the secret key. The method further comprises subsequently receiving a login on the first device, creating the secret key, associating the first anonymous identifier with the secret key, receiving a request for content from either device, and providing content using the association.
(FR)
L'invention concerne des procédés, systèmes et appareils, notamment des programmes informatiques codés sur un support de stockage lisible par ordinateur, ainsi qu'un procédé permettant de fournir du contenu. Le procédé consiste à recevoir une première ouverture de session associée à un premier identifiant anonyme et un premier dispositif, à créer une première paire de clés privée-publique associée, à stocker une première clé privée localement dans le premier dispositif, puis à publier une première clé publique. Le procédé consiste également à recevoir une seconde ouverture de session depuis un second dispositif différent, à créer une seconde paire de clés privée-publique, à stocker une seconde clé privée, à publier la seconde clé publique, à créer une clé secrète au moyen de la première clé publique, et à associer un second identifiant anonyme avec la clé secrète. Ensuite, le procédé consiste à recevoir une ouverture de session sur le premier dispositif, à créer la clé secrète, à associer le premier identifiant anonyme avec la clé secrète, à recevoir une demande de contenu provenant de l'un ou l'autre des dispositifs, puis à fournir le contenu en utilisant l'association.
Also published as
Latest bibliographic data on file with the International Bureau