AUTHENTICATION SERVICE FOR SALES OF GOODS AND SERVICES
First Claim
1. A method comprising:
- an authentication service storing registration information that indicates;
that a particular item was purchased by a first party; and
contact information that indicates a particular address for communicating with the first party;
the authentication service receiving an intent-to-sell message that indicates a desire to sell the particular item;
in response to receiving the intent-to-sell message, the authentication service sending access information to the particular address;
wherein the access information specifies a manner for potential buyers to obtain authentication information from the authentication service, wherein the authentication information includes at least a portion of the registration information for said particular item;
the authentication service providing the authentication information to potential buyers that employ the manner identified in the access information;
wherein the method is performed by one or more computing devices.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication service provides authentication information to help potential buyers determine the legitimacy of an offer to sell a good or service. For example, an authentication service stores registration information that indicates (a) that a particular item was purchased by a particular party, and (b) contact information that indicates a particular address for communicating with the party. When the registered owner of an item wants to sell the item, the owner sends an intent-to-sell message to the authentication service. In response to receiving the intent-to-sell message, the authentication service sends access information to the particular address. The access information specifies a manner of receiving authentication information about the item from the authentication service. The registered owner includes the access information in his or her advertisements for the item. When a potential buyer sees the access information in an advertisement, the potential buyer can obtain the authentication information, directly from the authentication service, using the manner specified in the access information.
65 Citations
20 Claims
-
1. A method comprising:
-
an authentication service storing registration information that indicates; that a particular item was purchased by a first party; and contact information that indicates a particular address for communicating with the first party; the authentication service receiving an intent-to-sell message that indicates a desire to sell the particular item; in response to receiving the intent-to-sell message, the authentication service sending access information to the particular address; wherein the access information specifies a manner for potential buyers to obtain authentication information from the authentication service, wherein the authentication information includes at least a portion of the registration information for said particular item; the authentication service providing the authentication information to potential buyers that employ the manner identified in the access information; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
storing, at an authentication service, a first identifier for an item; comparing the first identifier to a second identifier extracted from the item by an identifier-checker program executing on the communication-capable item; at the authentication service, storing a record of when the second identifier was extracted from the item and whether the second identifier matched the first identifier; in response to a request, the authentication service reading the record and sending authentication information about the item, wherein the authentication information indicates when the second identifier was extracted from the item and whether the second identifier matched the first identifier.
-
-
13. A non-transitory storage storing instructions which, when executed by one or more processors, cause:
-
an authentication service storing registration information that indicates; that a particular item was purchased by a first party; and contact information that indicates a particular address for communicating with the first party; the authentication service receiving an intent-to-sell message that indicates a desire to sell the particular item; in response to receiving the intent-to-sell message, the authentication service sending access information to the particular address; wherein the access information specifies a manner for potential buyers to obtain authentication information from the authentication service, wherein the authentication information includes at least a portion of the registration information for said particular item; the authentication service providing the authentication information to potential buyers that employ the manner identified in the access information; wherein the non-transitory storage is performed by one or more computing devices. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory storage storing instructions which, when executed by one or more processors, cause:
-
storing, at an authentication service, a first identifier for an item; comparing the first identifier to a second identifier extracted from the item by an identifier-checker program executing on the communication-capable item; at the authentication service, storing a record of when the second identifier was extracted from the item and whether the second identifier matched the first identifier; in response to a request, the authentication service reading the record and sending authentication information about the item, wherein the authentication information indicates when the second identifier was extracted from the item and whether the second identifier matched the first identifier.
-
Specification