Method and systems for protecting subscriber identification between service and content providers
First Claim
1. A method for protecting an identifier of a subscriber, during data transfer between a service provider and a content provider, when said subscriber sends a request to said service provider to obtain data belonging to said content provider, said method comprising the steps of:
- upon reception of said subscriber request by said service provider;
computing an encrypted token using said identifier of said subscriber; and
, transmitting said subscriber request and said encrypted token to said content provider;
upon reception by said service provider of a certification request comprising an encrypted token, sent by said content provider;
extracting said encrypted token from said certification request;
decrypting said extracted encrypted token to determine said subscriber identifier;
checking said determined subscriber identifier; and
, transmitting a success or failure indication to said content provider in response to said certification request;
upon reception of said data belonging to said content provider by said service provider, transmitting said data belonging to said content provider to said subscriber.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and systems for protecting the identification of a subscriber when a service provider transmits a subscriber request to a content provider in a distributed network environment, such as Internet. After the user sends a request to a service provider to which he has subscribed, the service provider encrypts the user identifier before transmitting this request with the encrypted user identifier to the content provider. Upon reception, the content provider uses an authentication Web Service supplied by the service provider for certifying the user identifier. If the user identifier is certified, the content provider transmits the requested content to the service provider, which formats it before sending it to the user. The content provider may charge the user through the service provider.
63 Citations
10 Claims
-
1. A method for protecting an identifier of a subscriber, during data transfer between a service provider and a content provider, when said subscriber sends a request to said service provider to obtain data belonging to said content provider, said method comprising the steps of:
-
upon reception of said subscriber request by said service provider;
computing an encrypted token using said identifier of said subscriber; and
,transmitting said subscriber request and said encrypted token to said content provider;
upon reception by said service provider of a certification request comprising an encrypted token, sent by said content provider;
extracting said encrypted token from said certification request;
decrypting said extracted encrypted token to determine said subscriber identifier;
checking said determined subscriber identifier; and
,transmitting a success or failure indication to said content provider in response to said certification request;
upon reception of said data belonging to said content provider by said service provider, transmitting said data belonging to said content provider to said subscriber. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification