Method of and system for controlling access to contents provided by a contents supplier
First Claim
1. A method of controlling access to a content by a user of two terminals, using a first terminal connected through a computer network to at least one server of a contents supplier, the method comprising causing an interactive data exchange through a wireless communication network between a trusted organization on the computer network and a wireless mobile second terminal accessible to the user, the trusted organization being selected or accepted by the user and the interactive data exchange being triggered by the first terminal through the contents supplier.
1 Assignment
0 Petitions
Accused Products
Abstract
Access control to contents is by a user of a terminal connected through a computer network to at least one server of a contents supplier. The user selects or accepts interactive data exchange through a wireless communication network between a trusted organization on the computer network, and a mobile terminal accessible to the user.
10 Citations
30 Claims
- 1. A method of controlling access to a content by a user of two terminals, using a first terminal connected through a computer network to at least one server of a contents supplier, the method comprising causing an interactive data exchange through a wireless communication network between a trusted organization on the computer network and a wireless mobile second terminal accessible to the user, the trusted organization being selected or accepted by the user and the interactive data exchange being triggered by the first terminal through the contents supplier.
- 16. System for access control to a content by a user of two terminals, wherein the user can use a first terminal connected through a computer network to at least one server of a contents supplier, the system comprising a data exchanger for making interactive data exchanges through a wireless communication network between a wireless mobile second terminal accessible to the user and a selected trusted organization on the computer network or a trusted organization accepted by the user, the data exchanger being arranged to be triggered by the first terminal through the contents supplier.
-
30. A method of controlling coupling of a mobile wireless terminal for a user to a server arrangement of an organization trusted by the user, the trusted organization and the mobile terminal including transmitters and receivers that are parts of a wireless communication network;
- the trusted organization also being part of a computer network including a client computer of the user of the mobile terminal, the computer network also including a protected contents supplier storing a profile of the user;
the trusted organization, the client computer and the protected contents supplier including transmitters and receivers that are parts of the computer network;
the method comprising;in response to the user logging in to the computer network, causing the protected contents supplier to send an authentication request with at least some of the protected contents about the profile of the user to the trusted organization via the computer network, and the trusted organization responding to the authentication request by determining whether the protected contents supplier can be trusted as being authentic for the user of the client computer;
the authentic determination being performed in response to the trusted organization communicating with the mobile terminal via the wireless communication network; andestablishing coupling between the mobile wireless terminal and the server arrangement of the trusted organization in response to the authentic determination being positive.
- the trusted organization also being part of a computer network including a client computer of the user of the mobile terminal, the computer network also including a protected contents supplier storing a profile of the user;
Specification