USING SUCCESSIVE LEVELS OF AUTHENTICATION IN ONLINE COMMERCE
First Claim
1. A method comprising:
- receiving, at a network server, a communication from a mobile device operated by a first user, the communication relating to a use of software;
performing, by the network server, a verification of the first user'"'"'s mobile device and/or the first user;
in response to a determination that the verification for the first user has been successful, the network server transmitting a first code to the first user'"'"'s mobile device enabling use of the software for a time period by the first user;
receiving a request at the network server to send a recommendation regarding the software to a second user having a mobile device, the received request being received from the first user'"'"'s mobile device and including an address of the second user'"'"'s mobile device;
performing, by the network server, a verification of the second user'"'"'s mobile device and/or the second user; and
the network server transmitting a second access or activation code to the first user enabling further use of the software by the first user in response to a determination that the verification for the second user has been successful.
13 Assignments
0 Petitions
Accused Products
Abstract
A method comprising performing following acts on a network server: receiving a communication from a client terminal operated by a client; performing a first authentication of the client terminal or client; in response to the first authentication, delivering a first service to the client; after delivering the first service, sending an offer for a second service to the client terminal; receiving an acceptance message for the second service from the client terminal; performing a second authentication of the client terminal and/or the client; in response to receiving the acceptance message for the second service from the client terminal and to the second authentication being successful, delivering a second service to the client; wherein the first authentication and the second authentication use different authentication techniques. Other aspects include a programmed data processing apparatus for carrying out the method and a tangible program carrier instructing the apparatus to perform the acts.
-
Citations
24 Claims
-
1. A method comprising:
-
receiving, at a network server, a communication from a mobile device operated by a first user, the communication relating to a use of software; performing, by the network server, a verification of the first user'"'"'s mobile device and/or the first user; in response to a determination that the verification for the first user has been successful, the network server transmitting a first code to the first user'"'"'s mobile device enabling use of the software for a time period by the first user; receiving a request at the network server to send a recommendation regarding the software to a second user having a mobile device, the received request being received from the first user'"'"'s mobile device and including an address of the second user'"'"'s mobile device; performing, by the network server, a verification of the second user'"'"'s mobile device and/or the second user; and the network server transmitting a second access or activation code to the first user enabling further use of the software by the first user in response to a determination that the verification for the second user has been successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A mediator for facilitating authentication of software use rights, the mediator comprising:
-
a network server that is coupled to at least one communication network to receive a user communication from a first user'"'"'s mobile device, the communication relating to use of software, wherein the network server performs a verification of the first user'"'"'s mobile device and/or the first user, wherein the network server transmits, in response to a determination that the verification for the first user has been successful, a first code to the first user'"'"'s mobile device enabling use of the software for a time period by the first user, wherein, in response to the network server receiving a request to send a recommendation regarding the software to a second user having a mobile device, the received request being received from the first user'"'"'s mobile device and including an address of the second user'"'"'s mobile device, the network server performs a verification of the second user'"'"'s mobile device and/or the second user, and wherein the network server transmits a second access or activation code to the first user enabling further use of the software by the user in response to a determination that the verification for the second user has been successful. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification