Generating a verifiable download code
First Claim
Patent Images
1. A method comprising:
- obtaining, by a computing device, a transaction identifier corresponding to an acquisition of a digital product by a user; and
generating, by the computing device, a download authorization code based at least in part on the transaction identifier by;
concealing the transaction identifier by hashing the transaction identifier wherein a salt value used for a hash function for the hashing corresponds to a time of the transaction;
combining the hashed transaction identifier with a fixed predetermined verification value that is uniquely associated with a network site through which the user acquired the digital product; and
encrypting the combined transaction identifier to produce the download authorization code.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for generating a verifiable download authorization code. A computing device obtains a transaction identifier that corresponds to an acquisition of a digital product by a user. The computing device generates a download authorization code based at least in part on the transaction identifier.
19 Citations
20 Claims
-
1. A method comprising:
-
obtaining, by a computing device, a transaction identifier corresponding to an acquisition of a digital product by a user; and generating, by the computing device, a download authorization code based at least in part on the transaction identifier by; concealing the transaction identifier by hashing the transaction identifier wherein a salt value used for a hash function for the hashing corresponds to a time of the transaction; combining the hashed transaction identifier with a fixed predetermined verification value that is uniquely associated with a network site through which the user acquired the digital product; and encrypting the combined transaction identifier to produce the download authorization code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
at least one computing device; a first module executed by the at least one computing device, the first module, when executed, causing the at least one computing device to at least; obtain a transaction identifier corresponding to an acquisition of a digital product by a user through a network site; and generate a download authorization code based at least in part on the transaction identifier and on a verification value by hashing the transaction identifier with a salt value corresponding to a time of the transaction, combining the transaction identifier with the verification value and encrypting the combined transaction identifier to produce the download authorization code, the verification value being fixed and predetermined, the verification value further being uniquely associated with the network site; and a second module executed by in the at least one computing device, the second module causing the at least one computing device to at least; provide the digital product to the user in response to a download request for the digital product and to a separate transaction that includes the generated download authorization code, wherein the generated download authorization code is received in a transaction related to the download request. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium embodying a program executable in a computing device, the program, when executed, causing the computing device to at least:
-
obtain a transaction identifier corresponding to an acquisition of a digital product by a user; and generate a download authorization code based at least in part on the transaction identifier by hashing the transaction identifier with a salt value corresponding to a time of the transaction, combining the transaction identifier with a fixed predetermined verification value and encrypting the combined transaction identifier to produce the download authorization code, wherein the fixed predetermined verification value is uniquely associated with a network site through which the user acquired the digital product and is associated with a predetermined subset of digital products. - View Dependent Claims (19, 20)
-
Specification