Dynamic authentication of mark use

ABSTRACT

Disclosed are systems and methods for authenticating use of a mark. In one embodiment, a system for facilitation, authentication, and authorization of the use of a mark comprises a mark owner server that receives registration information from a reseller server via a network that requests to use a mark. The mark owner server determines whether the reseller server is authenticated to use the mark. If the reseller server is authenticated to use the mark, the mark owner server sends a key to the reseller server. The mark owner server receives the key from the reseller server to access the mark via the network and determines whether the reseller server is authorized to use the mark based on the key. If the reseller server is authorized to use the mark, the mark owner server sends a first mark via the network to be displayed.

TECHNICAL FIELD

The present disclosure relates to computers, and more particularly, thedisclosure relates to systems and methods for authentication.

BACKGROUND OF THE DISCLOSURE

Trademarks and Servicemarks (“Marks”) are used in economic sourcesignaling, and owners of marks often use the marks to indicate licensed,certified, or qualified third-party resellers of the mark owners' goodsand/or services. Professional organizations (e.g., doctors, attorneys,engineers, accountants, etc.), consumer bureaus (e.g., UnderwritersLaboratories and Better Business Bureau), and standards organizations(ANSI, DOCSIS) also use marks to indicate that products and/or servicesof third parties meet various requirements. However, mark usage isdifficult to control by the owner of the mark when the qualifications ofthe third-party change, from certified to uncertified, i.e., when thequalifications no longer meet the various requirements.

Typically, the owner of the mark manually tells a reseller to stopindicating support/sales of the marked goods/services when the resellerno longer meets the quality standards or no longer has access to sellthe marked goods or services. In a fixed medium, such as but not limitedto paper telephone advertising directory books, the reseller may not beable to change the advertising until the next printing of theadvertising book. However, digital networked media such as the Internetoffer dynamic and immediate mark updating capabilities. Even with thedynamic updating capabilities, current trademark and service mark logouse on web pages is controlled by the owner of the web page, whichnormally would be the reseller. Thus, there is typically no way for theowner of the mark to automatically take away access rights to displaythe mark on the digital media such as a web page. Consumers usingtelephone directory advertising books generally do not consider thestaleness of the printing of the advertising book in evaluating marksbecause there is no simple way for the consumer to discern that a markshown in the book is no longer valid. Similarly, the delayed and manualmark updating system, even for marks used in digital media, allowsconsumers to be misled by stale and counterfeit marks on the Internet.

Thus, a heretofore-unaddressed need exists in the industry to addressthe aforementioned deficiencies and inadequacies.

SUMMARY OF THE DISCLOSURE

Disclosed are systems and methods for authenticating use of a mark. Inone embodiment, a method for facilitating the authentication andauthorization of the use of a mark comprises receiving registrationinformation from a reseller server via a network that requests to use amark and determining whether the reseller server is authenticated to usethe mark. The method further comprises sending a key to the resellerserver if the reseller server is authenticated to use the mark andreceiving the key from the reseller server to access the mark via thenetwork. The method further comprises determining whether the resellerserver is authorized to use the mark based on the key and sending afirst mark via the network to be displayed if the reseller server isauthorized to use the mark.

In one embodiment, a system for facilitating the authentication andauthorization of the use of a mark comprises a mark owner server thatreceives registration information from a reseller server via a networkthat requests to use a mark. The mark owner server determines whetherthe reseller server is authenticated to use the mark. If the resellerserver is authenticated to use the mark, the mark owner server sends akey to the reseller server. The mark owner server receives the key fromthe reseller server to access the mark via the network and determineswhether the reseller server is authorized to use the mark based on thekey. If the reseller server is authorized to use the mark, the markowner server sends a first mark via the network to be displayed.

Other systems, methods, features, and advantages of the presentinvention will be or become apparent to one with skill in the art uponexamination of the following drawings and detailed description. It isintended that all such additional systems, methods, features, andadvantages be included within this description, be within the scope ofthe present invention, and be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The disclosed systems and methods can be better understood withreference to the following drawings. The components in the drawings arenot necessarily to scale.

FIG. 1 is a schematic view of an embodiment of a system through whichauthenticating the use of a mark can be processed.

FIG. 2 is a block diagram of an embodiment of a mark owner server shownin FIG. 1.

FIG. 3 is a block diagram of an embodiment of components stored inmemory of the mark owner server shown in FIG. 2.

FIG. 4 is a block diagram of an embodiment of a public-key certificatethat includes a public key.

FIG. 5 is a block diagram of an embodiment of a reseller server shown inFIG. 1.

FIG. 6 is a flow diagram that illustrates an embodiment of operation ofthe system shown in FIG. 1 in authenticating the use of a mark.

FIG. 7 is a flow diagram that illustrates an embodiment of operation ofa registration manager of the mark owner server shown in FIG. 2.

FIG. 8 is a flow diagram that illustrates an embodiment of operation ofa certification manager of the mark owner server shown in FIG. 2.

DETAILED DESCRIPTION

Disclosed herein are systems and methods for authenticating use of amark. In particular, a reseller that would like to use a mark can beauthenticated via a network, and the mark that is used by a reseller canbe controlled, tracked, and monitored via the network. Example systemsare first discussed with reference to the figures. Although thesesystems are described in detail, they are provided for purposes ofillustration only and various modifications are feasible. After theexample systems have been described, examples of operation of thesystems are provided to explain the manner in which the reimbursementprocessing can be achieved.

Referring now in more detail to the figures in which like referencenumerals identify corresponding parts, FIG. 1 illustrates an examplesystem 1 that authenticates the use of a mark. As indicated in thisfigure, the system 1 generally comprises a user mark owner server 3, areseller server 5, and a client computing device 7. Although FIG. 1shows one user mark owner server 3, one reseller server 5, and oneclient computing device 7, it should be appreciated that there may bemultiple user mark owner servers 3, multiple reseller servers 5, andmultiple client computing devices 7 (also referred to herein as “networkclients”). The reseller server 5 requests the use of a mark from a markowner server 3 via the network 9, which includes the Internet in oneembodiment, as well as one or more other conventional local and widearea networks, among others. The mark owner server 3 determines whetherto authenticate the reseller to use the mark of a mark owner.

If the reseller server 5 is authenticated, the mark owner server 3, inone embodiment, sends an encrypted mark (not shown) to the resellerserver 5, which in turn makes that mark available for transmissionthrough the network 9 for display on a client computing device 7. Insome embodiments, the mark owner server 3, reseller server 5, and clientcomputing devices 7 are considered part of the network 9, but are shownseparate in FIG. 1 for purposes of illustration. Thus, when a clientcomputing device 7 receives through the network 9 a mark for display,such as when a user interacts with a browser client (not shown) toinvoke the display of a web page on the client computing device 7, forexample, the mark is considered to have been in a sense displayed on thenetwork, in one example among others.

The encrypted mark can, in one embodiment, include time expiringsoftware that enables the encrypted mark to be displayed for a certaintime period, e.g., one day, one week, one month, one quarter of a year,one half of a year, a year, etc. The time expiring software applicationcan receive clock information from a network time server to prevent thereseller from tampering with the clock. A customer or end user can viewthe encrypted mark that is stored on the reseller server 5 via theclient computing device 7, which can, for instance, comprise desktoppersonal computers (PCs) or other types of computers.

In an alternative embodiment, if the reseller server 5 is authenticated,the mark owner server 3 sends a key or password (not shown), etc., tothe reseller server 5. The key or password enables the reseller toaccess a mark stored in the mark owner server 3 in which the mark can bemade available for display through network 9 by client computing devices7. For example, when an end user accesses a web page from a resellerserver 5, the reseller server 5 sends a uniform resource locator (URL)to the mark owner server 3 that includes the key and the reseller'sidentification information. If the reseller is authorized to use a mark,the reseller server 5 pulls the mark from the mark owner server 3 andtransmits the mark for display on a client computing device 7 for theend user to view. Thus, in one embodiment, the owner server 3 includesprogramming (logic) for, among other functions referenced herein,initially registering a reseller, as well as providing real-timeauthorization verification as end users attempt to view marks. Inanother example, the reseller server 5 can obtain an encrypted markhaving time expiring software from the mark owner server 3 using thekey. In yet other embodiments, reseller web pages accessible by endusers include URLs that point directly to mark owner web servers andfurther include identification information corresponding to particularresellers so that the mark owner servers can control access to the marksthrough real-time authorization control or manipulation of stored marks,i.e., marks associated with certain resellers can be changed (ordeleted) to reflect changes in reseller authorization.

In an alternative embodiment, the mark owner 3 can provide via thenetwork 9 a list of certified resellers who are authenticated andauthorized to display the mark. The end user can verify on the markowner server 3 via the network 9 that a particular reseller is certifiedby the mark owner.

FIG. 2 is a block diagram illustrating an exemplary architecture for themark owner server 3 shown in FIG. 1. As indicated in FIG. 2, the markowner server 3 comprises a processing device 17, memory 19, one or moreuser interface devices 23, one or more I/O devices 25, and one or morenetworking devices 27, each of which is connected to a local interface25. The processing device 17 can include any custom made or commerciallyavailable processor, a central processing unit (CPU) or an auxiliaryprocessor among several processors associated with the mark owner server3, a semiconductor based microprocessor (in the form of a microchip), ora macroprocessor. The memory 19 can include any one or a combination ofvolatile memory elements (e.g., random access memory (RAM, such as DRAM,SRAM, etc.)) and nonvolatile memory elements (e.g., ROM, hard drive,tape, CDROM, etc.).

The one or more user interface devices 23 comprise those components withwhich the user (e.g., administrator) can interact with the mark ownerserver 3. Where the mark owner server 3 comprises a server computer orsimilar device, these components can comprise those typically used inconjunction with a PC, such as a display device, keyboard and mouse.

The one or more I/O devices 25 comprise components used to facilitateconnection of the mark owner server 3 to other devices and therefore,for instance, comprise one or more serial, parallel, small systeminterface (SCSI), universal serial bus (USB), or IEEE 1394 (e.g.,Firewire™) connection elements. The networking devices 27 comprise thevarious components used to transmit and/or receive data over the network9, where provided. By way of example, the networking devices 27 includea device that can communicate both inputs and outputs, for instance, amodulator/demodulator (e.g., modem), a radio frequency (RF) or infrared(IR) transceiver, a telephonic interface, a bridge, a router, as well asa network card, etc.

The memory 19 normally comprises various programs (in software and/orfirmware) including an operating system (O/S) 21, a key recoverydatabase 18, a certification manager 11, a mark database 13, and aregistration manager 15. The O/S 21 controls the execution of programs,including the key recovery database 18, the certification manager 11,the mark database 13, and the registration manager 15. The O/S 21 alsoprovides scheduling, input-output control, file and data managementmemory management, and communication control and related services. Thekey recovery database 18, the certification manager 11, the markdatabase 13, and the registration manager 15 facilitate the process forauthenticating and authorizing the use of a mark.

According to an exemplary embodiment, the registration manager 15authenticates the reseller server 5 and sends the information to thecertification manager 11. The certification manager 11 authorizes thereseller to use the mark. The process for both the registration manager15 and the certification manager 11 in general involves receivinginformation from a reseller server via a network that enables the markowner to authenticate and authorize the reseller server 5 to use a mark.If the reseller server 5 is authenticated and authorized, preferably, akey and an encrypted mark are sent to the server that facilitatesdisplaying the mark. Operation of the registration manager 15 isdescribed in relation to FIGS. 3 and 7. Operation of the certificationmanager 11 is described in relation to FIGS. 3 and 8.

FIG. 3 is a block diagram of an embodiment of components stored inmemory 19 of the mark owner server shown in FIG. 2. The registrationmanager 15 effectively communicates with a reseller server 5 via network9. The registration manager 15 receives registration and authorizationinformation from the reseller server 5 to authenticate the resellerserver 5. The information for registering and authorizing the resellerto use the mark can include, but is not limited to, identity of thereseller, the address of the reseller, the telephone number of thereseller, user number already established as one of the mark owners'distributors and manufacturers, etc. The registration manager 15 sendsthe registration and authorization information to a certificationmanager 11, which processes the information and determines whether thereseller is authorized to use the mark of the mark owner. Theregistration manager 15 can store the reseller's registration andauthorization information in a reseller database (not shown), whichenables the mark owner server 3 to track and monitor the identity of thereseller. If the reseller is authorized, the certification manager 11sends information of successful registration and authorization to theregistration manager 15, which sends the information to the resellerserver 5.

In addition, the certification manager 11 retrieves a public key andbackup key from a key recovery database 18, and an encrypted mark andupdated mark from a mark database 13. The certification manager 11sends, any one of or in combination, the public key, backup key,encrypted mark, and updated mark to the registration manager 15 if thecertification manager 11 determines that the reseller server 5 isauthorized to use the mark. The registration manager 15 sends, any oneof or in combination, the public key, backup key, encrypted mark, andupdated mark to the reseller server 5 via the network 9. The keyrecovery database 18 tracks the public keys and backup keys that aredistributed to the resellers and creates new keys for new resellers.

The mark database 13 tracks the encrypted marks and updated marks thatare distributed to the resellers. The mark can be watermarked to includeinformation to identify the mark owner and, after identifying the markowner, deter users from using the mark in unauthorized ways. One methodis to include time expiring logic such that the mark cannot be displayedby the reseller server 5 after the mark is displayed for a period oftime, e.g., monthly, quarterly, and yearly. In general, a watermarkcould be used in various embodiments to deter improper attempts fromcopying or replicating the mark.

The certification manager 11 can further issue a certificate to thereseller server 5 from a certification database (not shown). Thecertificate is a secure means of distributing public keys to theresellers via the network 9. An example of an embodiment of acertificate is shown in FIG. 4. The certification database trackscertificates 22 that are distributed to the resellers. In addition toothers, the certificate 22 may be in a format under the InternationalTelecommunication Union's X.509 version 3, which is hereby incorporatedby reference in its entirety. The certificates 22 include informationrelating to, but are not limited to, version 2 of the certificate 22,certificate serial number 4, signature algorithm identifier 6, identityof the mark owner 8, validity date/time values 10, identity of thereseller 12, and public key 14.

FIG. 5 is a block diagram of an embodiment of a reseller server shown inFIG. 1. The architecture for the reseller server 5 is similar to thearchitecture of the mark owner server 3 described above and thereforeincludes a processing device 29, one or more user interface devices 39,one or more I/O devices 41, and one or more networking devices 43, eachof which is connected to a local interface 37.

The memory 31 in the reseller server 5 includes, among other elements, areseller manager 35 that facilitates authenticating the use of a mark.According to an exemplary embodiment, the reseller manager 35 providesdata corresponding to authenticating the use of a mark via the network9. More particularly, the reseller manager 35 sends information forregistering the reseller with the mark owner server 3 and forauthorizing the reseller to obtain other information to use the mark,such as, certificates, public keys, encrypted mark, etc. As mentionedabove, the information for registering and authorizing the reseller touse the mark can include, but is not limited to, identity of thereseller, the address of the reseller, the telephone of the reseller,customer (end user) number already established as one of the markowner's distributors and manufacturers, etc. The reseller manager 35further receives information from the mark owner server that allows thereseller to display the mark, such as the encrypted mark, a certificatecontaining a key, etc. In addition, in some embodiments, among others,memory 31 includes web pages and programming for generating and servingweb pages in accordance with the functions described herein, and otherembodiments include additional web servers for such functions.

Various programs have been described above. It is to be understood thatthese programs can be stored on any computer-readable medium for use byor in connection with any computer-related system or method. In thecontext of this document, a computer-readable medium is an electronic,magnetic, optical, or other physical device or means that can contain orstore a computer program for use by or in connection with acomputer-related system or method. The programs can be embodied in anycomputer-readable medium for use by or in connection with an instructionexecution system, apparatus, or device, such as a computer-based system,processor-containing system, or other system that can fetch theinstructions from the instruction execution system, apparatus, or deviceand execute the instructions. In the context of this document, a“computer-readable medium” can be any means that can store, communicate,propagate, or transport the program for use by or in connection with theinstruction execution system, apparatus, or device.

The computer-readable medium can be, for example, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, device, or propagation medium. More specific examples (anon-exhaustive list) of the computer-readable medium include anelectrical connection having one or more wires, a portable computerdiskette, a random access memory (RAM), a read-only memory (ROM), anerasable programmable read-only memory (EPROM, EEPROM, or Flash memory),an optical fiber, and a portable compact disc read-only memory (CDROM).Note that the computer-readable medium can even be paper or anothersuitable medium upon which a program is printed, as the program can beelectronically captured, via for instance optical scanning of the paperor other medium, then compiled, interpreted or otherwise processed in asuitable manner if necessary, and then stored in a computer memory.

Example systems having been described above, system operation will nowbe discussed. In the discussions that follow, flow diagrams areprovided. Any process steps or blocks in these flow diagrams mayrepresent modules, segments, or portions of code, preferably storedand/or communicated on recordable medium as logic, that include one ormore executable instructions for implementing specific logical functionsor steps in the process. Although particular example process steps aredescribed, alternative implementations are feasible. Moreover, steps maybe executed out of order from that shown or discussed, includingsubstantially concurrently or in reverse order, depending on thefunctionality involved.

FIG. 6 is a flow diagram that illustrates an embodiment of operation ofthe system shown in FIG. 1 in authenticating the use of a mark. With thesystem 1, a mark owner can control, monitor and track the use of itsmark. The mark can include, but not is limited to, visual and audiomarks. In addition, the visual marks could be static or dynamic images.According to an exemplary embodiment, marks may include any sourceidentifier, such as that described in a treatise, McCarthy on Trademarksand Unfair Competition, 4th ed. (©2005 Thomson/West), which isincorporated by reference herein in its entirety. In addition, as wouldbe understood by one reasonably skilled in the art upon reading thepresent disclosure, the term “mark” (in singular and plural tenses) isused in the present application in various contexts, including not onlythe intellectual property embodied in source identifiers themselves, aswould be understood from the treatise identified above, but alsoincluding electronic (and other) representations of those identifiers,including stored and displayed representations. Furthermore, asdiscussed herein, additional access control coding may also be includedwith or in those digital representations.

Beginning with block 51, the system 1 for authenticating the use of amark includes a reseller server 5 that registers with a mark ownerserver 3. The reseller server 5 can provide information such as,identity of the reseller, the address of the reseller, the telephone ofthe reseller, end user (customer) number already established as one ofthe mark owners' distributors and manufacturers, etc. In one example,among others, a reseller user provides registration information througha secure website that prompts for the registration information, such asthrough a display device connected to the reseller server 5. Theinformation can be transmitted from the reseller server 5 to the markowner server 3 via the network 9. In block 53, the mark owner 3 servergenerates and sends a key to the reseller server 5 based on theinformation provided by the reseller during registration. The mark ownerserver 3 can send the key to the reseller 5 server by way of filetransfer protocol (FFP), hypertext transfer protocol (HTTP), or anyother file transfer protocol. In addition, more generally,communications between the mark owner server 3 and the reseller server 5can be conducted, in various embodiments, according to numerous optionalcommunication protocols that would be understood by those reasonablyskilled in the art.

As mentioned above, the key enables the reseller to access a mark storedin the mark owner server 3 so that the mark can be transmitted to aclient computing device 7 for display. For example, an end user mayaccess a web page from a reseller server 5 in some embodiments. Thereseller server 5 sends a uniform resource locator (URL) to the markowner server 3 that may include the key and the reseller'sidentification information. If the reseller is authorized to use a mark,the reseller server 5 pulls the mark from the mark owner server 3 andtransmits the mark through the network 9 for display on a clientcomputing device 7 for the end user to view. In various embodiments,authorization controls exist in reseller server software, mark ownerserver software, or both. In some embodiments, reseller web pagesaccessible by end users include URLs that point directly to mark ownerweb servers and further include identification information correspondingto particular resellers so that the mark owner servers can controlaccess to the marks through real-time authorization control ormanipulation of stored marks. For example, such manipulation includes,in some implementations, changing or deleting stored marks associatedwith certain resellers to reflect changes in reseller authorizations,including levels of authorization. Thus, in some implementations, therewould be no need for real-time authorization controls on reseller ormark owner servers or for encryption of marks since mark owners couldsimply change or delete stored marks that are associated with particularresellers based upon changes in authorization.

In another example, the reseller server 5 can access an encrypted markhaving time expiring software application from the mark owner server 3using the key, as generally indicated in block 55. As mentioned above,the time expiring software application enables the encrypted mark to bedisplayed to an end user for a certain time period, e.g., one day, oneweek, one month, one quarter of a year, one half of a year, a year, etc.The time expiring software application can receive clock informationfrom a network time server to prevent the reseller from tampering withthe clock. In addition, a mark can contain tracking and reporting logicthat obtains URL and/or IP address information associated with any webpage currently displaying the mark and reports that information to themark owner server 3, which can monitor and analyze use of the markthrough a logging database.

In block 57, the mark owner server 3 sends the encrypted mark to thereseller server 5. In block 59, the reseller server 5 receives theencrypted mark and accesses the encrypted mark using the key. In block61, the reseller incorporates the mark on the reseller's website and inblock 63, the mark is displayed the reseller's website when an end userbrowses to it.

FIG. 7 is a flow diagram that illustrates an embodiment of operation ofa registration manager of the mark owner server 3 shown in FIG. 2. Theregistration manager 15 receives, as indicated in block 71, a requestfrom a reseller server 5 for registering with the mark owner server 3for authenticating the use of the mark. The registration manager 15 canfurther receive a request for a backup key and an updated mark from thereseller server 5. For example, the reseller server 5 can log into asecure web site that enables the reseller server 5 to request a backupkey and an updated mark. It should be noted that the mark owner server 3could provide the updated mark based on a certified level of thereseller. For example, the reseller could be certified at a gold, silveror standard level of, e.g., service. The mark owner server 3 can sendthe updated mark to the reseller server 5 if the reseller obtained adifferent certified level of service.

In block 73, the registration manager 15 requests the reseller server 5for registration or authorization information and, in block 75, receivesthe registration or authorization information from the reseller server5. The registration and authorization information can be, for example,the identity of the reseller, the address of the reseller, the telephonenumber of the reseller, and user (customer) number already establishedas one of the mark owners' distributors and manufacturers, etc. In block77, the registration manager 15 sends information to a certificationmanager 11 to verify or authorize the reseller for the use of the mark.

In block 79, the registration manager 15 receives information whetherauthentication or authorization was successful from the certificationmanager 11 and, in block 81, determines from the information of thecertification manager 11 that the reseller is authenticated orauthorized to use the mark. If the reseller is authenticated orauthorized to use the mark, the registration manager 15, as indicated inblock 83, sends information of successful authentication orauthorization to the reseller server 5, and in block 87, sendsinformation that enables the reseller to use the mark, such as, but notlimited to, a public key, backup key, an encrypted mark, updated mark, acertificate for transmitting the public key, etc. If the reseller is notauthenticated or authorized to use the mark, the registration manager15, as indicated in block 85, sends information of unsuccessfulauthentication or authorization to the reseller server 5. For example, ahacker could have stolen a reseller's registration and authorizationinformation and so the reseller informs the mark owner of the incident,whereby the mark owner revokes any transaction using the reseller'sstolen registration and authorization information. In other examples, amark owner may determine that a reseller is no longer authorized for anyuse of a mark or for various levels of use, and that determination maybe based upon a variety of factors, including, among others, failures ofresellers to pay licensing fees, meet particular standards or levels ofservice or quality of products required by the mark owner.

FIG. 8 is a flow diagram that illustrates an embodiment of operation ofa certification manager 11 of the mark owner server 5 shown in FIG. 2.Beginning with block 101 of FIG. 8, the certification manager 11receives registration or authorization information from a registrationmanager 15. In block 103, the certification manager 11 determineswhether the reseller is authenticated or authorized to use the markbased on the received registration or authorization information from theregistration manager 15. If the reseller is authenticated or authorizedto use the mark, the certification manager 11, as indicated in block105, sends information of successful authentication or authorization tothe registration manager 15.

In block 109, the certification manager 11 then retrieves informationthat enables the reseller to use the mark, such as, but not limited to apublic key, backup key, an encrypted mark, updated mark, a certificatefor transmitting the public key, etc. In block 111, the certificationmanager 11 sends the information that enables the reseller to use themark to the registration manager 15, which sends the information to thereseller as explained in FIG. 7. If the certification manager 11determines that the reseller is not authenticated or authorized to usethe mark, the certification manager 11, as indicated in block 107, sendsinformation of unsuccessful authentication or revoked authorization tothe registration manager. The revoked authorization occurs when anauthorized entity informs the certification manager of an abnormalsituation requiring certification revocation. For example, a hackercould have stolen a reseller's registration and authorizationinformation and so the reseller informs the mark owner of the incident,whereby the mark owner revokes any transaction using the reseller'sstolen registration and authorization information. In another example,the reseller fails to meet the standard level of service and quality ofproduct required by the mark owner. The certification manager 11 canretrieve from a revocation list (not shown) stored in memory thatcontains a time-stamped list of revoked authorizations.

It should be emphasized that the above-described embodiments of thepresent invention, particularly, any “preferred” embodiments, are merelypossible examples of implementations, merely set forth for a clearunderstanding of the principles of the invention. Many variations andmodifications may be made to the above-described embodiment(s) of theinvention without departing substantially from the spirit and principlesof the invention. All such modifications and variations are intended tobe included herein within the scope of this disclosure and the presentinvention and protected by the following claims.

What is claimed is:
 1. A system for facilitating authentication andauthorization of use of a mark of a mark owner, the system comprising: aprocessor; and a memory storing instructions that, when executed by theprocessor, cause the processor to perform operations comprising:receiving a first request from a reseller server to use the mark of themark owner; registering the reseller server to use the mark of the markowner; associating the reseller server with an authorization level thatallows the reseller server to use the mark of the mark owner; receivinginformation indicating that the reseller server is not authorized to usethe mark of the mark owner at the authorization level; changing, basedon receipt of the information indicating that the reseller server is notauthorized to use the mark of the mark owner at the authorization level,the authorization level associated with the reseller server; receiving asecond request from the reseller server to access the mark of the markowner; and providing access to a manipulated version of the mark of themark owner that reflects a change in the authorization level associatedwith the reseller server since registering the reseller server.
 2. Thesystem of claim 1, wherein the manipulated version of the mark of themark owner comprises a deleted version of the mark of the mark owner. 3.A non-transitory computer-readable medium storing computer-executableinstructions which, when executed by a computer, cause the computer toperform operations comprising: receiving a first request from a resellerserver to use a mark of a mark owner; registering the reseller server touse the mark of the mark owner; associating the reseller server with anauthorization level associated with using the mark of the mark owner;receiving information indicating that the reseller server is notauthorized to use the mark of the mark owner at the authorization level;changing, based on receipt of the information indicating that thereseller server is not authorized to use the mark of the mark owner atthe authorization level, the authorization level associated with thereseller server; receiving a second request from the reseller server toaccess the mark of the mark owner; and providing access to a manipulatedversion of the mark of the mark owner to reflect a change in theauthorization level associated with the reseller server sinceregistering the reseller server.
 4. The non-transitory computer-readablemedium of claim 3, wherein the manipulated version of the mark of themark owner is a deleted version of the mark of the mark owner.
 5. Amethod for facilitating authentication and authorization of the use of amark of a mark owner, the method comprising: receiving, at a processor,a first request from a reseller server to use the mark of the markowner; registering, by the processor, the reseller server to use themark of the mark owner; associating the reseller server with anauthorization level associated with using the mark of the mark owner;receiving, at the processor, information indicating that the resellerserver is not authorized to use the mark of the mark owner at theauthorization level; changing, by the processor based on receipt of theinformation indicating that the reseller server is not authorized to usethe mark of the mark owner at the authorization level, the authorizationlevel associated with the reseller server; receiving, at the processor,a second request from the reseller server to access the mark of the markowner; and providing, by the processor, access to a manipulated versionof the mark of the mark owner to reflect a change in the authorizationlevel associated with the reseller server since registering the resellerserver.
 6. The method of claim 5, wherein the manipulated version of themark of the mark owner comprises a deleted version of the mark of themark owner.