US20080195551A1 - Method of and system for effecting anonymous credit card purchases over the internet - Google Patents
Method of and system for effecting anonymous credit card purchases over the internet Download PDFInfo
- Publication number
- US20080195551A1 US20080195551A1 US12/104,069 US10406908A US2008195551A1 US 20080195551 A1 US20080195551 A1 US 20080195551A1 US 10406908 A US10406908 A US 10406908A US 2008195551 A1 US2008195551 A1 US 2008195551A1
- Authority
- US
- United States
- Prior art keywords
- server system
- buyer
- information
- merchant
- transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
- G06Q20/027—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/085—Payment architectures involving remote charge determination or related payment systems
- G06Q20/0855—Payment architectures involving remote charge determination or related payment systems involving a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
Definitions
- This invention relates generally to a method of and system for effecting anonymous and secure credit card purchases over the internet and more particularly to a method of and system for encrypting and distributing a purchaser's private information such that only parties authorized to receive the information receive it and are able to decrypt it.
- the preferred solution to the Internet privacy problem will not require the buyer to take extra steps such as downloading software or browsing to a special Internet site in order to obtain alias identity. Most buyers will be unwilling to take such extra effort, and will prefer a solution that will enable them to browse directly to the merchant's Web site and to make private and secure purchases without the need to take any extra steps or precautions, and without noticeable latency
- the preferred solution to the need to control the distribution of information among multiple parties to an Internet transaction will manage disclosure to each party such that each party receives only that information it needs to complete the transaction, without any need to establish any party as a trusted repository of the information of others.
- the present invention provides a method and system for anonymous and secure Internet commerce under which each party to a transaction receives only the specific information it needs to know in order for the transaction to be completed, and by which the buyer can remain anonymous to the merchant.
- the invention enables the buyer to browse directly to the merchant's Web site without taking any extra or preliminary steps, and also enables the transaction to be consummated without disclosure of the buyer's name, address or credit card number to the merchant.
- the invention further enables the merchant to determine what specific information of the buyer will be disclosed to the merchant, and thus to offer the buyer a technological guarantee that it will not see any buyer information that is designated by the merchant as private to the buyer.
- the invention provides a method and system by which the buyer's anonymity is protected, not only for purchases, but also for ordinary returns and chargebacks.
- the invention enables the buyer and seller to communicate privately by e-mail.
- the buyer begins the transaction by browsing to the Web site of the Internet merchant, where the buyer identifies any items it wishes to purchase and places them in a shopping cart.
- the buyer is not required to browse first to a third-party's Web site, nor is the buyer required to download any software.
- the security server system serves up one or more forms that are filled in by the buyer, consisting of one or more checkout forms, a payment instrument form, an email address form, and a delivery information form.
- Some or all of these data supplied by the buyer are encrypted using the public keys of those entities that need to know those items of information in order for the transaction to be completed and assembled into a protected information package that is then sent from the security server system to the merchant.
- a public key security system such as RSA is used to encrypt the buyer's information.
- the merchant receives the information package(s) and stores their data elements in an order management database in their encrypted form.
- the merchant does not possess the capability of decrypting information in the protected information package that is delivered to the merchant in encrypted form, although it does have the capability of reading any information that is passed to the merchant from the security server system in unencrypted form.
- the merchant sends an encrypted payment authorization request to the merchant acquirer or to the issuing bank.
- the merchant acquirer or issuing bank decrypts the payment authorization request, processes that request, and sends a response to the merchant either authorizing or denying the transaction.
- the merchant can communicate with the buyer without knowing the real e-mail address of the buyer by using a secure mail feature of the present invention. In that situation, the merchant directs its e-mail to the buyer through the security server system.
- the security server system assigns alias identities to the merchant and the buyer. Only the merchant can communicate with the buyer using the secure mail feature.
- the merchant sends an encrypted delivery request to the delivery company containing the buyer's name and shipping address and an order number, or other appropriate information.
- the delivery company decrypts the delivery request and provides the merchant with a numerical identifier that it associates with the goods ordered by the buyer.
- the merchant or a party providing fulfillment services on behalf of the merchant, receives the numerical identifier and places it on the package containing the goods ordered by the buyer.
- the delivery company picks up the package from the merchant or fulfillment party, translates the numerical identifier as necessary, and delivers the package to the buyer.
- the invention also accommodates returns and chargebacks without comprising the anonymity of the buyer.
- the invention satisfies the following objectives:
- a transaction system for performing secure transactions over a communication network includes (i) a merchant server system including a computer processor and associated memory, the merchant server system offering items for sale; (ii) a buyer system including a computer processor and associated memory, the buyer system being selectively couplable to the merchant server system over the communication network to initiate a transaction, wherein, during the transaction, the buyer system selects one or more of the items for purchase; (iii) a security server system including a computer processor and associated memory and an encryption device, the security server system receiving buyer information from the buyer system, encrypting the buyer information in an encryption key that prevents the merchant server system from decrypting the buyer information, and transferring the encrypted buyer information to the merchant server system; and (iv) a third server system including a computer processor and associated memory, the third server system being selectively couplable to the merchant server system, wherein the merchant server system transmits at least a portion of the encrypted buyer information to the third server system for processing during the transaction.
- the third server system may be one of a delivery server system and a payment processor server system.
- the encrypted buyer information received by the delivery server system may be delivery address information of the buyer.
- the encrypted buyer information received by the payment processor server system may be payment information of the buyer.
- the transaction system may further include a fourth server system including a computer processor and associated memory, the fourth server system being selectively couplable to one of the merchant server system and the third server system, wherein the one of the merchant server system and the third server system transmits at least a portion of the encrypted buyer information to the fourth server system for processing during the transaction.
- the security server system may encrypt the buyer information into a first document and a second document, wherein the first document is transmitted to the third server system by the merchant server system and the second document is transmitted to the fourth server system by the merchant server system.
- the security server system may encrypt the buyer information into a first document and a second document, wherein the first and second documents are transmitted to the third server system by the merchant server system and the second document is transmitted to the fourth server system by the third server system.
- the third server system may be one of a delivery server system and a payment processor server system and wherein the fourth server system is the other of the delivery server system and the payment processor server system, and wherein the first document may contain one of the buyer system's delivery address information and the buyer system's payment information and the second document may contain the other of the buyer system's delivery address information and the buyer system's payment information.
- the security server system may encrypt the first document using a first encryption key and the second document using a second encryption key, wherein the one of the third server system and the fourth server system that receives the first document can decrypt the first document but not the second document and wherein the other one of the third server system and the fourth server system that receives the second document can decrypt the second document but not the first document
- a system for performing secure transactions over a communication network includes (i) a merchant server system including a computer processor and associated memory, the merchant server system offering items for sale; (ii) a buyer system including a computer processor and associated memory, the buyer system being selectively couplable to the merchant server system over the communication network to initiate a transaction, wherein, during the transaction, the buyer system selects one or more of the items for purchase; (iii) a security server system including a computer processor and associated memory, the security server system being selectively couplable to the buyer system to receive buyer information from the buyer system in the course of the transaction, the buyer information including delivery address information and payment information; (iv) a delivery server system including a computer processor and associated memory; and (v) a payment processor server system including a computer processor and associated memory.
- the security server transmits the delivery address information to the delivery server system and the payment information to the payment processor server system
- the security server system may encrypt the delivery address information into a first document and the payment information into a second document.
- the security server system may transmit the first and second document to the merchant server system, which transmits the first document to the delivery server system and the second document to the payment processor server system.
- the merchant server system is incapable of decrypting the first and second documents.
- a transaction system for performing secure transactions over a communication network includes (i) a merchant server system including a computer processor and associated memory, the merchant server system offering items for sale; (ii) a buyer system including a computer processor and associated memory, the buyer system being selectively couplable to the merchant server system over the communication network to initiate a transaction, wherein, during the transaction, the buyer system selects one or more of the items for purchase and transmits information regarding the one or more items to the merchant server system; (iii) a security server system including a computer processor and associated memory and an encryption device, the security server system receiving buyer information from the buyer system, encrypting the buyer information in an encryption key that prevents the merchant server system from decrypting the buyer information, and transferring the encrypted buyer information to the merchant server system; and (iv) a third server system including a computer processor and associated memory, the third server system being selectively couplable to the merchant server system, wherein the merchant server system transmits at least a portion of the encrypted buyer information to the third
- a system for performing secure transactions over a communication network includes (i) a merchant server system including a computer processor and associated memory, the merchant server system offering items for sale; (ii) a buyer system including a computer processor and associated memory, the buyer system being selectively couplable to the merchant server system over the communication network to initiate a transaction, wherein, during the transaction, the buyer system selects one or more of the items for purchase and (iii) a security server system including a computer processor and associated memory and an encryption device, the security server system receiving buyer information from the buyer system and forming a merchant document including information regarding the item being purchased, encrypting the buyer information into a payment document including the buyer's payment information and encrypting the buyer information into an address document including the buyer's shipping address.
- the security server system transfers the buyer information to a first one of the merchant server system, a payment server system and a delivery server system, wherein the first system removes the document associated with the first system and transmits the remaining documents to a second one of the merchant server system, the payment server system and the delivery server system, wherein the second system removes the document associated with the second system and transmits the remaining document to a third one of the merchant server system, the payment server system and the delivery server system.
- the security server system encrypts the buyer information using an encryption key in which only the payment server system is capable of decrypting the payment document and only the delivery server system is capable of decrypting the address document.
- a method for performing secure transactions over a communication network includes:
- the security server system encrypting the buyer information using an encryption key that prevents the merchant server system from decrypting the encrypted buyer information
- the merchant server system transmitting at least a portion of the encrypted buyer information to a third server system for processing during the purchase transaction;
- the third server system decrypting the at least a portion of the encrypted buyer information before processing the information.
- a method for identifying a party includes, in a security server system including a computer processor and associated memory the security server system being selectively couplable to a second server system, including a computer processor and associated memory, over a communications network, performing the steps of
- FIG. 1 is a schematic diagram of conventional information distribution in an online transaction
- FIG. 2 is a schematic diagram of the system for effecting anonymous credit card purchases in accordance with the present invention
- FIGS. 3A-3F are schematic diagrams showing different types of transactions hat may be carried out according to the present invention.
- FIG. 4 is a schematic diagram showing the steps involved in a purchase transaction in accordance with the present invention.
- FIG. 5 is a schematic diagram showing the steps involved in a return transaction in accordance with the present invention.
- FIGS. 6A-6C are a schematic diagrams showing the steps involved in a chargeback transaction in accordance with the present invention.
- FIG. 7 is a schematic diagram showing the steps involved in enabling private communication between a merchant and a buyer using alias email addresses in accordance with the present invention.
- FIG. 8 is a schematic diagram showing the steps involved in the creation of an electronic wallet in accordance with the present invention.
- FIG. 9 is a schematic diagram showing the steps involved in a purchase transaction using the electronic wallet in accordance with the present invention.
- FIG. 10 is a schematic diagram showing the steps involved in a direct marketing fulfillment transaction in accordance with the present invention.
- FIG. 11A is a schematic diagram showing the creation of a digest array in accordance with the present invention.
- FIG. 11B is a schematic diagram showing the steps involved utilizing a digest array to identify a buyer in accordance with the present invention.
- FIGS. 12A-12B are schematic diagrams showing other types of purchase transaction schemes in accordance with the present invention.
- FIG. 1 is a schematic diagram of a conventional online transaction in which a buyer 12 , during the course of the online transaction, provides certain information S to the merchant 14 .
- This information S includes the buyer's delivery address, payment information, such as a credit card number, and information about the item being purchased.
- the merchant 14 possesses and has access to all of the buyer's information.
- the merchant 14 distributes the buyer's delivery address information S 1 to the delivery firm 16 and distributes the buyer's payment information S 2 to the payment processor 18 .
- the payment is approved by the payment processor 18
- the transaction is consummated and the delivery firm 16 picks up the item from the merchant 14 or an agent of the merchant 14 and delivers the item to the buyer 12 . While this type of transaction has been generally successful in enabling buyers to purchase item from merchants, a potential security risk exists since at least one party other than the buyer has possession of all of the buyer's private information.
- FIG. 2 shows a diagram of a system 100 for enabling secure online transactions in which the merchant either never possesses all of the buyer's information or possesses the information in a form that it cannot read in accordance with a preferred embodiment of the present invention.
- the system 100 includes buyer system 110 , merchant server system 120 , security server system 130 , a payment processor server system 140 , including merchant acquirer server system 142 and bank server system 144 , and delivery server system 160 , all connected to a common communications network 170 .
- the buyer system 110 , merchant server system 120 , security server system 130 , merchant acquirer server system 142 , bank server system 144 and delivery server system 160 are each a personal computer such as an IBM PC or IBM PC compatible system or an APPLE® MacINTOSH® system or a more advanced computer system such as an Alpha-based computer system available from Compaq Computer Corporation or SPARC® Station computer system available from SUN Microsystems Corporation, although a main frame computer system can also be used.
- the communications network 170 is a TCP/IP-based network such as the Internet or an intranet, although almost any well known LAN, WAN or VPN technology can be used.
- the buyer system 110 is an BM PC compatible system operating an operating system such as the Microsoft Windows® operating system
- merchant server system 120 , security server system 130 , merchant acquirer server system 142 , bank server system 144 and delivery server system 160 are configured as web servers providing access to information such as web pages in HTML format via a protocol such as the HyperText Transport Protocol (http).
- the buyer system 110 includes software to allow viewing of web pages, commonly referred to as a web browser, thus being capable of accessing web pages located on merchant server system 120 and security server system 130 .
- buyer system 110 can be any wired or wireless device that can be connected to a communications network, such as an interactive television system, such as WEBTV, a personal digital assistant (PDA) or a cellular telephone.
- merchant server system 120 is an e-tail system offering a plurality of items for sale over the Internet.
- FIGS. 3A-3E are schematic diagrams showing various forms of transactions that are achievable with the present invention.
- FIGS. 3A-3E shows the transfer of information after the buyer has selected an item to purchase from the merchant server system and has proceeded to the checkout process.
- FIG. 3A shows a transaction in which the buyer system 110 provides a set of information S to the security server system 130 .
- the information S includes the buyer's delivery address information, payment information and optionally, information about the item being purchased, such as a stock number, etc.
- the security server system which is operated separately from the merchant, is dedicated to collecting the buyer's information and protecting the buyer's information as encrypted documents.
- two encrypted documents are created from the buyer's information S: a delivery document E 1 that can only be decrypted by the participating delivery server system 160 and a payment document E 2 that can only be decrypted by the participating payment processor server system 140 .
- the documents E 1 and E 2 are then transmitted to the merchant server system 120 for storage and processing.
- the merchant server system 120 decrypt the documents, but the merchant server system 120 can use them for a full range of services, including all credit card transaction types (e.g. authorization, settlement, void, chargeback) and for shipping and returns.
- the merchant server system 120 can never see the personal information S of the buyer, but is not hindered in its service offering.
- FIG. 3B shows a transaction where the buyer's delivery address information S 1 and payment information S 2 are transmitted to the security server system 130 while the purchase item information S 3 is transmitted directly to the merchant server system 120 .
- the security server system 130 encrypts the information S 1 and S 2 to form encrypted documents E 1 and E 2 which are transmitted to the merchant server system 120
- the merchant server system 120 then transmits the encrypted delivery document E 1 , which includes the buyer's delivery address information, to the delivery server system 160 and transmits the encrypted payment document E 2 , which includes the buyer's payment information, to the payment processor server system 140 .
- the delivery server system 160 and the payment processor server system 140 then decrypt their respective documents and the transaction can then be carried out without the merchant ever having possession of the buyer's deliver address information or payment information.
- FIG. 3C shows a transaction in which transfer of information between the buyer system 110 , the security server system 130 and the merchant server system 120 is the same as that shown in FIG. 3B .
- the encrypted delivery document E 1 is transmitted from the merchant server system 120 to a intermediate delivery server system 162 which decrypts the document E 1 and transmits the decrypted information S 1 to the delivery server system 160 .
- the encrypted payment document E 2 is transmitted from the merchant server system 120 to an intermediate payment server system 146 which decrypts the document E 2 and transmits the decrypted information S 2 to the payment processor server system 140 .
- FIG. 3D shows a fork-type transaction in which the buyer 110 provides its information S to the security server system 130 .
- the security server system then separates the information into separate documents and distributes the delivery address information S 1 to the delivery server system 160 , the payment information S 2 to the payment processor server system and the purchase item information S 3 to the merchant server system 120 .
- the security server system 130 ensures that each server system receives only the information necessary for it to enable the purchase transaction.
- FIG. 3E shows an encryption pipe-type transaction, in which the buyer 110 provides its information S to the security server system 130 .
- the security server system 130 encrypts the information to form an encrypted document E 1 , which includes the buyer's delivery address information and an encrypted document E 2 , which includes the buyer's payment information.
- the encrypted documents E 1 and E 2 are then transmitted to the merchant server system 120 , which transmits both encrypted documents to the delivery server system 160 , which retains the encrypted delivery document E 1 and transmits the remaining encrypted payment document E 2 to the payment processor server system 140 .
- FIG. 3F shows an encryption pipe-type transaction, in which the buyer 110 provides its delivery address information S 1 and its payment information S 2 to the security server system and order information S 3 , particularly information regarding the item being purchased by the buyer, to the merchant server system 120 .
- the security server system 130 encrypts the information S 1 and S 2 to form an encrypted document E 1 and E 2 , respectively.
- the encrypted documents E 1 and E 2 are then transmitted to the merchant server system 120 , which transmits both encrypted documents to the delivery server system 160 , which retains the encrypted delivery document E 1 and transmits the remaining encrypted payment document E 2 to the payment processor server system 140 .
- the buyer's private information is not disclosed to the merchant server system 120 .
- the buyer provides this information directly to the security server system 130 which encrypts the delivery address information into a delivery document and encrypts the payment information into a payment document.
- These documents are encrypted using a key which enables only the delivery server system 160 to decrypt the delivery document and which enables only the payment processor server system 140 to decrypt the payment document.
- These documents are transmitted by the security server system 130 to the merchant server system 120 , which then transmits the delivery document to the delivery server system 160 and the payment document to the payment processor server system 140 .
- the payment processor server system 140 is able to decrypt the payment document to authorize the payment and the delivery server system 160 is able to decrypt the delivery document to provide delivery of the purchased item to the buyer.
- the delivery server system provides the merchant server system 120 with an address signature code which preferably is a bar code that corresponds to an order number on the merchant server system.
- the delivery address information of the buyer is stored in the delivery server system and is “tagged” with the address signature.
- the merchant server system labels the package containing the item with the address signature.
- the delivery firm associated with the delivery server system 160 picks up the package from the merchant, it reads the address signature to determine the address to which the package will be delivered.
- FIG. 4 is a schematic diagram which specifically shows this transfer of information between the buyer system 110 , merchant server system 120 , security server system 130 , merchant acquirer server system 142 , bank server system 144 and delivery server system 160 in accordance with the present invention.
- a vertical bar in the column below each of the systems 110 , 120 , 130 , 142 , 144 and 160 indicates an action performed by the associated system.
- tasks shown in a solid line indicate data transmitted “in the clear” or unencrypted
- tasks shown in dotted dashed lines indicate tasks performed by the security server system 130 or tasks performed under the direction of security server system 130
- tasks shown in dotted lines indicate a transfer of encrypted data.
- step 202 the buyer system 110 initiates a connection to the merchant server system 120 over network 170 .
- the buyer system 110 places one or more items in the shopping cart provided by the merchant server system 120 , step 204 , and proceeds to checkout, step 206 , thus initiating the purchase transaction.
- the buyer system 110 is transferred to the security server system 130 , step 206 .
- the merchant server system 120 references an XML document that contains instructions to the security server system 130 for what information is needed to be collected from the buyer system 110 , and for which other server systems the resulting documents are to be encrypted.
- Security server system 130 maintains a schema to ensure that the merchant server system 120 cannot direct information to be encrypted for inappropriate recipients (such as credit cards to a delivery firm).
- Security server system 130 serves forms (either created dynamically or drawn from a library of static forms) to the buyer system 110 , step 208 , to collect the sought information that was defined in the XML instructions of the merchant server system 120 .
- the buyer system 110 provides, to the security server system 130 , the necessary payment information, including credit card number and expiration date, the buyer system's email address and the buyer system's delivery address information.
- the security server system 130 creates, in steps 212 - 218 , an encrypted delivery document E 1 that includes the buyer's delivery address information and an encrypted payment document E 2 that includes the buyer's payment information.
- Encrypted delivery document E 1 preferably includes the buyer's name, delivery address, email address and the name of the delivery company This document is encrypted with a key such that only the delivery server system is capable of decrypting the information contained therein.
- Encrypted payment document E 2 preferably includes a merchant identification number (MID), a transaction identification number (TID), the credit card type, number, expiration date, the name on the credit card, the billing address associated with the credit card digital signature, a debit limit, which ensures that the credit card is not charged above the order amount and an order expiration date.
- This document is encrypted with a key such that only the payment processor server system is capable of decrypting the information contained therein.
- Security server system 140 also creates an alias email address for the buyer. The alias email address is discussed in greater detail below with reference to FIG. 7 .
- the security server system creates a digest array, which includes all of the information collected by the security server system 130 . This array is used to identify the buyer during future transactions, as is described in greater detail below with reference to FIG. 11A
- a package of the encrypted documents is assembled and transmitted to the merchant server system 120 , step 222 .
- the package of information is transmitted to the merchant server system 120 as items in an XML document, including encrypted documents E 1 and E 2 , and unencrypted documents and one or more digest arrays.
- the XML tags are not encrypted so that the XML document can be parsed by the merchant server system 120 .
- the merchant server system 120 receives the XML document and parses out the discrete items, step 222 .
- the items are stored in the merchant server systems order processing system, step 224 .
- the merchant server system 120 sends the encrypted payment document E 2 to the participating merchant acquirer server system 142 , step 226 , which decrypts the document and transmits it to the bank server system 144 , step 228 , for authorization.
- the bank server system 144 transmits a payment authorization response to merchant acquirer server system 142 , which transmits a payment authorization document to merchant server system 120 , step 232 .
- the merchant server system 120 transmits the encrypted delivery document E 1 and an order number to delivery server system 160 , step 234 .
- the delivery server system 160 decrypts the delivery document E 1 , step 236 , assigns an address signature to the order and transmits the address signature to the merchant server system 120 , which notifies the buyer system 110 that the order has been successfully processed via the merchant server system website, step 236 .
- the address signature is similar to a tracking number, but uniquely identifies a shipping address as opposed to just a package.
- the merchant server system produces a label with the address signature only, since it does not have access to the buyer delivery address information, and transmits a delivery request to the delivery server system 160 .
- the delivery server system 160 matches the delivery request to the address signature which includes the buyer's delivery address information.
- the delivery server system 160 transmits a request to the security server system 130 , step 242 , for the security server system to notify the buyer of the delivery tracking number information via the security server system's secure email component 132 , FIG. 7 .
- Security server system 130 transmits the delivery tracking number information to the buyer via its secure email component 132 , step 244 .
- the merchant server system 120 transmits the encrypted payment document E 2 , as well as the payment authorization document, to the merchant acquirer server system 142 , which decrypts the payment document E 2 and transmits a settlement request to the bank server system 144 , step 248 .
- the bank approves the settlement request and transmits payment, in the form of a settlement response, to the merchant server system 120 , step 250 .
- the delivery firm associated with the delivery server system 160 picks up the package from the merchant firm associated with the merchant server system 120 , matches the address signature on the label provided by the merchant server system 120 to the delivery address information contained in the delivery document E 1 and delivers the package to the buyer.
- the invention enables a purchase transaction to be completed without disclosing any of the buyers private information to the merchant server system 120 .
- the security server system 120 ensures that only the delivery server system obtains information pertaining to the delivery of the purchased item.
- the security server system 120 ensures that only the payment processor server system 140 obtains information pertaining to the payment of the purchased item. Since these discrete documents are encrypted before they are transmitted to the merchant server system 120 , the merchant server system cannot access the buyer's information. This example transfers the pertinent information similar to the transaction shown in FIG. 3A .
- FIG. 5 is a schematic diagram which shows a transfer of information between the buyer system 110 , merchant server system 120 , security server system 130 , merchant acquirer server system 142 , bank server system 144 and delivery server system 160 in a situation where the buyer returns a purchased product to the merchant for a refund.
- the buyer system 110 informs the merchant server system 120 , either by telephone or email, that the buyer would like to return a product.
- the merchant server system 120 validates the request, step 302 , and initiates a digest request, step 304 , in which the customer provides information about the order, step 306 , so that the merchant can identify the order, step 308 .
- the use of the digest array to identify a buyer is discussed in greater detail below with reference to FIG. 11B .
- order receipts and other proofs of purchase can be used to authenticate the buyer system 110 without drawing on a digest array created during the initial order.
- the merchant server system 120 approves the return, step 310 and transmits the encrypted payment document from the initial transaction to the merchant acquirer server system 142 for a credit authorization, step 312 .
- the merchant acquirer server system 142 authorizes the credit and transmits a credit authorization to the merchant server system 120 , step 314 .
- the merchant server system 120 then transmits a return material authorization (RMA) number in an email to the buyer system 110 through the secure email component 132 of the security server system 130 , steps 316 , 318 .
- RMA return material authorization
- the buyer sends the item back to the merchant through the delivery firm using the RMA, steps 320 , 322 .
- the merchant server system requests a credit settlement from the bank server system 144 , step 324 .
- the bank server system transmits the credit settlement to the merchant server system 120 , step 326 and the bank server system 144 provides the appropriate credit to the buyer's credit card, step 328 .
- FIGS. 6A , 6 B and 6 C are schematic diagrams which show a transfer of information between the buyer system 110 , merchant server system 120 , security server system 130 , merchant acquirer server system 142 and bank server system 144 in the case of a buyer-initiated chargeback.
- a chargeback occurs when the buyer informs the bank that it will not pay for a charge resulting from a transaction.
- the buyer system 110 initiates the chargeback by informing the bank server system 144 that the charge will not be honored.
- the bank server system 144 reviews the request, step 352 and instructs the merchant acquirer server system 142 to search for the payment document associated with the request, step 354 .
- the merchant acquirer server system 142 transmits a report to the merchant server system including the nature of the complaint, step 356 .
- the report only identifies the specific transaction to the merchant server system 120 .
- the merchant server system only possesses information about the specific transaction and does not posses any of the buyer's personal information.
- the merchant server system 120 and the buyer system 110 communicate with each other anonymously through the secure email component of the security server system 130 , steps 358 - 364 .
- the merchant server system then transmits a chargeback response to the merchant acquirer server system 142 , step 366 .
- the merchant acquirer server system 142 transmits the request to the bank server system 144 , step 368 , and the bank server system issues a chargeback credit to the buyer's credit card, step 370 .
- the process shown in FIG. 6B is similar to the process shown in FIG. 6A , with the difference being that the security server system 130 creates the report to the merchant server system 120 rather than the merchant acquirer server system 142 . This enables the security server system 130 to either encrypt or withhold private information of the buyer from the merchant server system.
- the process shown in FIG. 6C is also similar to the process shown in FIG. 6A , with the difference being that the merchant server system 120 receives the chargeback request directly from the bank server system 144 without any intervention from the merchant acquirer server system 144 or the security server system 130 .
- the security server system 130 is also capable of enabling private email communications between parties, in particular between the buyer system 110 and the merchant server system 120 .
- Security server system 130 includes a secure email component 132 , FIG. 7 , with which both the buyer system 110 and the merchant server system register.
- the secure email component 132 receives the buyer system's true email address and assigns a buyer alias email address to the buyers true address.
- the secure email component 132 receives the merchant server system's true email address and assigns a merchant alias address to the merchant's true address. All email transactions between the buyer system 110 and the merchant server system 120 pass through the secure email component 132 . In this way, the neither party possesses the other party's true email address and all communication takes place through the secure email component with the alias email addresses.
- FIG. 7 is a schematic diagram which shows this process.
- the merchant server system identifies a buyer to which it will send an email message.
- the message is created, step 404 , and sent to the buyer's alias email address via the merchant's SMTP server.
- the email is directed to the secure email component 132 by the buyer's alias address, step 406 , where it is validated by the secure email component 132 .
- Validation involves ensuring that a particular merchant is authorized to send email to a particular buyer with the buyer's alias email address. If the validation is rejected, the message is returned to the merchant's true email address, step 408 .
- the secure email component 132 rewrites the SMTP header on the email message, changing the buyer's alias email address to the buyers true email address, and the merchant's true email address to the merchant's alias email address.
- the message is then sent to the buyer system 110 via the secure email component's SMPT server, step 410 . If the buyer system 110 replies to the merchant's email message, the reply is sent via the buyer's SMTP server to the merchant's alias email address, step 412 .
- the message is then validated in the same manner as the original email message from the merchant server system 120 . If validation fails, the message is returned to the buyer's true e-mail address without having been delivered to the merchant server system 120 , step 414 .
- the secure email component 132 rewrites the SMTP header on the mail message, changing the merchant's alias to the merchant's true e-mail address, and the buyer's true e-mail address to the buyer's alias email address.
- the message is then sent via the secure email component's SMTP server to the merchant's true e-mail address (MTMA).
- the system of the present invention enables the buyer system 110 to create an electronic “wallet” which includes all of the buyer's information such as delivery address information and payment information.
- the security server system creates the wallet by encrypting the delivery address information into a delivery document E 1 and encrypting the payment information into a payment document E 2 as described above.
- the wallet is created, it is stored in a database on the merchant server system 120 for future purchase transactions.
- FIG. 8 is a schematic diagram of the process involved in the creation of the electronic wallet.
- step 420 the buyer system 110 , from the merchant server system website, requests that a wallet be created.
- the merchant server system prompts the buyer system 110 to create a user name and password, step 422 .
- the merchant server system then directs the buyer system 110 to the security server system 130 , step 424 , where the wallet creation takes place.
- the security server system 130 sends a personal information request form to the buyer system 110 , step 426 .
- the buyer system 110 provides the required information to the security server system 130 , including the buyer's payment information, step 428 , true email address, step 430 and delivery address information, step 432 .
- the security server system 130 receives the information and encrypts the delivery address information into the delivery document E 1 , encrypts the payment information into the payment document E 2 and creates an alias email address for the buyer system, steps 430 - 434 .
- a digest array is created from the received information, step 436 , and a protected information package is assembled, step 438 , which includes all of the buyer's information in a form which is not decryptable by the merchant server system 120 .
- the package is transmitted to the merchant server system 120 , which notifies the buyer system 110 via its website that the wallet has been successfully created, step 440 .
- the merchant server system then parses the package into its separate documents, step 442 , and stores the documents in a “wallet” associated with the particular buyer in a database of the merchant server system 120 .
- the merchant server system 120 may request other information from the buyer, such as buyer preferences and behavior profiles, which information is stored in the wallet with the buyer's encrypted information, steps 444 - 448 .
- FIG. 9 is a schematic diagram of a transaction according to the present invention which includes the use of the electronic wallet described above.
- the buyer system 110 establishes a connection with the merchant server system 120 over the network 170 .
- the buyer system 110 places items in its shopping cart, step 504 and, when ready to checkout, logs into its wallet which is stored on the merchant server system 120 using its user name and password, step 506 .
- the merchant server system 120 then asks if the buyer would like to follow an automatic checkout procedure, step 508 . If no changes are to be made to the buyer system's information, the buyer system will choose this procedure.
- the process then proceeds to step 528 , to continue the transaction, wherein steps 528 - 552 are identical to steps 228 - 252 of FIG. 4 .
- the merchant server system 120 transmits the wallet information to the security server system 130 , step 510 .
- the security server system decrypts the wallet information, step 512 , and transmits a form to the buyer system 110 with a prompt to make any necessary changes to the information, steps 514 , 516 .
- the security server system 130 encrypts the updated information into the delivery document E 1 and payment document E 2 , step 518 .
- the new protected information package is assembled, step 520 , and transmitted to the merchant server system 120 to update the buyer's wallet information.
- the transaction then proceeds with steps 522 - 552 , which are identical to steps 222 - 252 of FIG. 4 .
- the security server system 130 of the present invention is also capable of enabling the merchant server system 120 to conduct a direct marketing fulfillment process while keeping the buyer system's information private.
- FIG. 10 is a schematic diagram showing the steps involved in this process.
- the merchant server system 120 develops a target list of buyer's to which it will send direct marketing material. Since all of the buyer information in the possession of the merchant server system is encrypted, this target list is also encrypted. However, since the different encrypted documents associated with each buyer system or parsable by the merchant server system 120 , it is able to provide a list to the security server system 130 which includes the encrypted delivery address information of its buyers to the security server system 130 , step 602 .
- the security server system 130 decrypts the buyer list, step 604 , and transmits the buyer list to a fulfillment server system 172 , step 606 .
- the fulfillment server system 172 receives the direct marketing pieces from the merchant server system, step 608 , labels them with the delivery address information received from the security server system 130 , step 610 , and sends the labeled pieces to the delivery firm associated with the delivery server system 160 , step 612 .
- the delivery firm then delivers the direct marketing pieces to the buyers. This process enables the merchant server system to cause direct marketing pieces to be delivered to buyers without the need for the merchant server system 120 to possess the actual delivery address information of the buyers.
- FIG. 11A is a schematic diagram showing the process involved in the creation of a digest array, which occurs when the buyer system's information is first input to the security server system 130 .
- the security server system receives the buyer's information, such as in steps 210 - 214 of FIG. 4 , the information S 1 -S n , in addition to being encrypted into documents that can only be decrypted by a predetermined intended party, is passed through a hashing function 174 such as the Secure Hash Algorithm (SHA), which creates a hash output D 1 -D n , corresponding to the information S 1 -S n .
- the digest array is stored on the merchant server system 120 for future reference.
- the merchant server system can match the buyer with the particular order by using the digest array. For example, in the return process shown in FIG. 5 , the buyer provides information to the merchant server system 120 and the merchant server system searches its digest array to match the buyer with the particular order. As shown in FIG. 11B , the buyer system discloses certain portions of information, such as its name 180 , the last 4 digits of its credit card 182 and its zip code 184 . This information is passed through hashing function 174 to form hash outputs 186 corresponding to the information 180 , 182 and 184 . The merchant server system 120 searches the digest array 188 until the information provided by the buyer enables a match in the digest array 188 that enables the merchant server system to identify the particular order.
- the present invention provides a method of and system for enabling online transactions in which the merchant does not have access to the buyer's private delivery address information and payment information.
- the security server system encrypts the delivery address information to form a delivery document which can be decrypted only by the delivery server system.
- the security server system also encrypts the payment address information to form a payment document which can be decrypted only by the payment processor server system.
- the delivery document and the payment document are provided by the security server system to the merchant server system, which, in turn, distributes the documents to the respective server systems for processing during the course of an online transaction. While, in the example of FIG. 4 , the transaction carried out is in the form of the combination encryption pipe/fork transaction shown in FIG.
- the system can be utilized to carry out any or all of the transaction types shown in FIGS. 3A-3E .
- the system and method of the present invention can be utilized to carry out transactions which take the form of a token passing ring, such as is shown in FIG. 12A , wherein encrypted documents may be passed among all of the parties in the ring 190 and a distributive ring, such as is shown in FIG. 12B , wherein a head party introduces encrypted documents into the ring 194 , which documents are then passed among the other parties of the ring 194 .
Abstract
Description
- This application claims the benefit from U.S. application Ser. No. 60/194,346, filed Apr. 3, 2000; U. S. application Ser. No. 60/254,056, filed Dec. 7, 2000; U.S. application Ser. No. 60/251,984, filed Dec. 7, 2000; and U.S. application Ser. No. 60/273,595, filed Mar. 5, 2001, the disclosures of which are hereby incorporated by reference into this application.
- This invention relates generally to a method of and system for effecting anonymous and secure credit card purchases over the internet and more particularly to a method of and system for encrypting and distributing a purchaser's private information such that only parties authorized to receive the information receive it and are able to decrypt it.
- To make purchases using the Internet, buyers are required to disclose the buyer's name, address, shipping address, and credit card number to the merchant. Many would-be purchasers are uncomfortable with providing such information to the Web merchant, because they are concerned that their credit card numbers could be misused and that their privacy could be compromised As a result, such potential buyers choose not to use the Internet to make purchases or restrict their purchases to particular merchants whom they trust. The growth of e-commerce is restricted by these privacy and security concerns.
- Likewise, businesses that make Internet purchases from other businesses using the Internet are required by present Internet order processing systems to reveal identifying and payment information to the selling business that may result in the compromise of information regarding the transaction that the buyer would prefer to remain private.
- The growth of the Internet for consumer and commercial transactions creates a need to control what information is revealed to whom in the course of the transaction. In the case of Internet transactions that involve more than two parties (such as an e-commerce transaction involving a buyer, a seller, a merchant acquirer, and a delivery company), all participants will benefit from a technology solution that provides each party with only that kind and amount of information about the transaction that is required in order for the transaction to be completed.
- The preferred solution to the Internet privacy problem will not require the buyer to take extra steps such as downloading software or browsing to a special Internet site in order to obtain alias identity. Most buyers will be unwilling to take such extra effort, and will prefer a solution that will enable them to browse directly to the merchant's Web site and to make private and secure purchases without the need to take any extra steps or precautions, and without noticeable latency
- The preferred solution to the need to control the distribution of information among multiple parties to an Internet transaction will manage disclosure to each party such that each party receives only that information it needs to complete the transaction, without any need to establish any party as a trusted repository of the information of others.
- The present invention provides a method and system for anonymous and secure Internet commerce under which each party to a transaction receives only the specific information it needs to know in order for the transaction to be completed, and by which the buyer can remain anonymous to the merchant. The invention enables the buyer to browse directly to the merchant's Web site without taking any extra or preliminary steps, and also enables the transaction to be consummated without disclosure of the buyer's name, address or credit card number to the merchant. The invention further enables the merchant to determine what specific information of the buyer will be disclosed to the merchant, and thus to offer the buyer a technological guarantee that it will not see any buyer information that is designated by the merchant as private to the buyer. Where the merchant is offering anonymity to the buyer, the invention provides a method and system by which the buyer's anonymity is protected, not only for purchases, but also for ordinary returns and chargebacks. In addition, the invention enables the buyer and seller to communicate privately by e-mail.
- The buyer begins the transaction by browsing to the Web site of the Internet merchant, where the buyer identifies any items it wishes to purchase and places them in a shopping cart. The buyer is not required to browse first to a third-party's Web site, nor is the buyer required to download any software.
- After selecting the items it wishes to purchase from the merchant's Web site, the buyer clicks on a checkout button and is redirected to the security server system of the present invention, which resides on a different computer than that of the merchant. The security server system serves up one or more forms that are filled in by the buyer, consisting of one or more checkout forms, a payment instrument form, an email address form, and a delivery information form. Some or all of these data supplied by the buyer are encrypted using the public keys of those entities that need to know those items of information in order for the transaction to be completed and assembled into a protected information package that is then sent from the security server system to the merchant. Preferably, a public key security system such as RSA is used to encrypt the buyer's information.
- The merchant receives the information package(s) and stores their data elements in an order management database in their encrypted form. The merchant does not possess the capability of decrypting information in the protected information package that is delivered to the merchant in encrypted form, although it does have the capability of reading any information that is passed to the merchant from the security server system in unencrypted form.
- The merchant sends an encrypted payment authorization request to the merchant acquirer or to the issuing bank. The merchant acquirer or issuing bank decrypts the payment authorization request, processes that request, and sends a response to the merchant either authorizing or denying the transaction. The merchant can communicate with the buyer without knowing the real e-mail address of the buyer by using a secure mail feature of the present invention. In that situation, the merchant directs its e-mail to the buyer through the security server system. The security server system assigns alias identities to the merchant and the buyer. Only the merchant can communicate with the buyer using the secure mail feature.
- In situations where the buyer is purchasing hard goods for delivery to his address, the merchant sends an encrypted delivery request to the delivery company containing the buyer's name and shipping address and an order number, or other appropriate information. The delivery company decrypts the delivery request and provides the merchant with a numerical identifier that it associates with the goods ordered by the buyer. The merchant, or a party providing fulfillment services on behalf of the merchant, receives the numerical identifier and places it on the package containing the goods ordered by the buyer. The delivery company picks up the package from the merchant or fulfillment party, translates the numerical identifier as necessary, and delivers the package to the buyer.
- The invention also accommodates returns and chargebacks without comprising the anonymity of the buyer.
- The invention satisfies the following objectives:
- 1. Buyers can make online purchases without disclosing their names, addresses, or payment instrument information to the seller.
- 2. Buyers are not required to go to third-party Web sites or to download software in order to make anonymous and secure purchases from the merchant. All the buyer has to do is to browse directly to the merchant's site and make a purchase by filling in a shopping cart and providing the standard items of information by completing standard forms served to the buyer.
- 3. Internet merchants can offer complete anonymity to privacy-sensitive buyers and eliminate the risk of loss from credit card theft and hacking.
- 4. Merchants using the invention can continue to offer personalization to their customers.
- 5. Merchants using the invention select the level of privacy that will be delivered to their customers—full anonymity or credit card privacy. In both cases, the merchant never receives, stores or transmits the customer's credit card information.
- 6. The invention provides a universal transaction interface through which merchants can deploy a wide range of new payment and security technologies (including smart cards, biometric identity verification, digital signatures, on-line checks, ATM cards, and person-to-person payments) without further changes to the merchant's order processing systems.
- 7. The invention permits e-mail communications without compromising the anonymity of the buyer.
- According to one aspect of the invention, a transaction system for performing secure transactions over a communication network includes (i) a merchant server system including a computer processor and associated memory, the merchant server system offering items for sale; (ii) a buyer system including a computer processor and associated memory, the buyer system being selectively couplable to the merchant server system over the communication network to initiate a transaction, wherein, during the transaction, the buyer system selects one or more of the items for purchase; (iii) a security server system including a computer processor and associated memory and an encryption device, the security server system receiving buyer information from the buyer system, encrypting the buyer information in an encryption key that prevents the merchant server system from decrypting the buyer information, and transferring the encrypted buyer information to the merchant server system; and (iv) a third server system including a computer processor and associated memory, the third server system being selectively couplable to the merchant server system, wherein the merchant server system transmits at least a portion of the encrypted buyer information to the third server system for processing during the transaction.
- The third server system may be one of a delivery server system and a payment processor server system. The encrypted buyer information received by the delivery server system may be delivery address information of the buyer. The encrypted buyer information received by the payment processor server system may be payment information of the buyer. The transaction system may further include a fourth server system including a computer processor and associated memory, the fourth server system being selectively couplable to one of the merchant server system and the third server system, wherein the one of the merchant server system and the third server system transmits at least a portion of the encrypted buyer information to the fourth server system for processing during the transaction. The security server system may encrypt the buyer information into a first document and a second document, wherein the first document is transmitted to the third server system by the merchant server system and the second document is transmitted to the fourth server system by the merchant server system. The security server system may encrypt the buyer information into a first document and a second document, wherein the first and second documents are transmitted to the third server system by the merchant server system and the second document is transmitted to the fourth server system by the third server system. The third server system may be one of a delivery server system and a payment processor server system and wherein the fourth server system is the other of the delivery server system and the payment processor server system, and wherein the first document may contain one of the buyer system's delivery address information and the buyer system's payment information and the second document may contain the other of the buyer system's delivery address information and the buyer system's payment information. The security server system may encrypt the first document using a first encryption key and the second document using a second encryption key, wherein the one of the third server system and the fourth server system that receives the first document can decrypt the first document but not the second document and wherein the other one of the third server system and the fourth server system that receives the second document can decrypt the second document but not the first document
- According to another aspect of the invention, a system for performing secure transactions over a communication network includes (i) a merchant server system including a computer processor and associated memory, the merchant server system offering items for sale; (ii) a buyer system including a computer processor and associated memory, the buyer system being selectively couplable to the merchant server system over the communication network to initiate a transaction, wherein, during the transaction, the buyer system selects one or more of the items for purchase; (iii) a security server system including a computer processor and associated memory, the security server system being selectively couplable to the buyer system to receive buyer information from the buyer system in the course of the transaction, the buyer information including delivery address information and payment information; (iv) a delivery server system including a computer processor and associated memory; and (v) a payment processor server system including a computer processor and associated memory. The security server transmits the delivery address information to the delivery server system and the payment information to the payment processor server system
- The security server system may encrypt the delivery address information into a first document and the payment information into a second document. The security server system may transmit the first and second document to the merchant server system, which transmits the first document to the delivery server system and the second document to the payment processor server system. The merchant server system is incapable of decrypting the first and second documents.
- According to another aspect of the invention, a transaction system for performing secure transactions over a communication network includes (i) a merchant server system including a computer processor and associated memory, the merchant server system offering items for sale; (ii) a buyer system including a computer processor and associated memory, the buyer system being selectively couplable to the merchant server system over the communication network to initiate a transaction, wherein, during the transaction, the buyer system selects one or more of the items for purchase and transmits information regarding the one or more items to the merchant server system; (iii) a security server system including a computer processor and associated memory and an encryption device, the security server system receiving buyer information from the buyer system, encrypting the buyer information in an encryption key that prevents the merchant server system from decrypting the buyer information, and transferring the encrypted buyer information to the merchant server system; and (iv) a third server system including a computer processor and associated memory, the third server system being selectively couplable to the merchant server system, wherein the merchant server system transmits at least a portion of the encrypted buyer information to the third server system for processing during the transaction.
- According to another aspect of the invention, a system for performing secure transactions over a communication network includes (i) a merchant server system including a computer processor and associated memory, the merchant server system offering items for sale; (ii) a buyer system including a computer processor and associated memory, the buyer system being selectively couplable to the merchant server system over the communication network to initiate a transaction, wherein, during the transaction, the buyer system selects one or more of the items for purchase and (iii) a security server system including a computer processor and associated memory and an encryption device, the security server system receiving buyer information from the buyer system and forming a merchant document including information regarding the item being purchased, encrypting the buyer information into a payment document including the buyer's payment information and encrypting the buyer information into an address document including the buyer's shipping address. The security server system transfers the buyer information to a first one of the merchant server system, a payment server system and a delivery server system, wherein the first system removes the document associated with the first system and transmits the remaining documents to a second one of the merchant server system, the payment server system and the delivery server system, wherein the second system removes the document associated with the second system and transmits the remaining document to a third one of the merchant server system, the payment server system and the delivery server system. The security server system encrypts the buyer information using an encryption key in which only the payment server system is capable of decrypting the payment document and only the delivery server system is capable of decrypting the address document.
- According to yet another aspect of the invention, a method for performing secure transactions over a communication network includes:
- A. establishing a connection between a buyer system and a merchant server system over the communications network to initiate a purchase transaction;
- B. the buyer system selecting an item offered for sale by the merchant server system;
- C. the buyer system transmitting buyer information to a security server system;
- D. the security server system encrypting the buyer information using an encryption key that prevents the merchant server system from decrypting the encrypted buyer information;
- E. the security server system transmitting the encrypted buyer information to the merchant server system;
- F. the merchant server system transmitting at least a portion of the encrypted buyer information to a third server system for processing during the purchase transaction; and
- G. the third server system decrypting the at least a portion of the encrypted buyer information before processing the information.
- According to yet another aspect of the invention, a method for identifying a party includes, in a security server system including a computer processor and associated memory the security server system being selectively couplable to a second server system, including a computer processor and associated memory, over a communications network, performing the steps of
- A. obtaining a plurality of identifying indicia from each of a plurality of parties;
- B. performing a one-way hash function on each of the plurality of identifying indicia to form a plurality of hashed identifiers, wherein a particular output of the one-way hash function is unique to a particular input of the hash function;
- C. forming an array of hashed identifiers for each of the plurality of parties, wherein each array includes a number of hashed identifiers that are unique to each party; and
-
- in the second server system, performing the steps of:
- D. receiving an identifying indicium from a party;
- E. performing the hash function on the indicium to form a hashed indicium;
- F. parsing each of the arrays to determine if the hashed indicium coincides with a hashed identifier therein;
- G. determining which, if any, of the arrays contains a coincidence between the hashed indicium and a hashed identifier;
-
- wherein, if only one coincidence occurs, the method comprises:
- H. identifying a unique party from the plurality of parties based the coincidence between the hashed indicium and the hashed identifier; and
-
- wherein, if more than one coincidence occurs, the method comprises:
- I. repeating steps D-G until one of the arrays contains a set of coincidences that none of the other arrays contain; and
- J. identifying a unique party from the plurality of parties based on the set of coincidences.
- The foregoing and other objects of this invention, the various features thereof, as well as the invention itself may be more filly understood from the following description when read together with the accompanying drawings in which:
-
FIG. 1 is a schematic diagram of conventional information distribution in an online transaction; -
FIG. 2 is a schematic diagram of the system for effecting anonymous credit card purchases in accordance with the present invention; -
FIGS. 3A-3F are schematic diagrams showing different types of transactions hat may be carried out according to the present invention; -
FIG. 4 is a schematic diagram showing the steps involved in a purchase transaction in accordance with the present invention; -
FIG. 5 is a schematic diagram showing the steps involved in a return transaction in accordance with the present invention; -
FIGS. 6A-6C are a schematic diagrams showing the steps involved in a chargeback transaction in accordance with the present invention; -
FIG. 7 is a schematic diagram showing the steps involved in enabling private communication between a merchant and a buyer using alias email addresses in accordance with the present invention; -
FIG. 8 is a schematic diagram showing the steps involved in the creation of an electronic wallet in accordance with the present invention; -
FIG. 9 is a schematic diagram showing the steps involved in a purchase transaction using the electronic wallet in accordance with the present invention; -
FIG. 10 is a schematic diagram showing the steps involved in a direct marketing fulfillment transaction in accordance with the present invention; -
FIG. 11A is a schematic diagram showing the creation of a digest array in accordance with the present invention; -
FIG. 11B is a schematic diagram showing the steps involved utilizing a digest array to identify a buyer in accordance with the present invention; and -
FIGS. 12A-12B are schematic diagrams showing other types of purchase transaction schemes in accordance with the present invention. -
FIG. 1 is a schematic diagram of a conventional online transaction in which abuyer 12, during the course of the online transaction, provides certain information S to themerchant 14. This information S includes the buyer's delivery address, payment information, such as a credit card number, and information about the item being purchased. n this conventional transaction, themerchant 14 possesses and has access to all of the buyer's information. Themerchant 14 distributes the buyer's delivery address information S1 to thedelivery firm 16 and distributes the buyer's payment information S2 to thepayment processor 18. When the payment is approved by thepayment processor 18, the transaction is consummated and thedelivery firm 16 picks up the item from themerchant 14 or an agent of themerchant 14 and delivers the item to thebuyer 12. While this type of transaction has been generally successful in enabling buyers to purchase item from merchants, a potential security risk exists since at least one party other than the buyer has possession of all of the buyer's private information. -
FIG. 2 shows a diagram of a system 100 for enabling secure online transactions in which the merchant either never possesses all of the buyer's information or possesses the information in a form that it cannot read in accordance with a preferred embodiment of the present invention. The system 100 includesbuyer system 110,merchant server system 120,security server system 130, a paymentprocessor server system 140, including merchantacquirer server system 142 andbank server system 144, anddelivery server system 160, all connected to acommon communications network 170. Preferably, thebuyer system 110,merchant server system 120,security server system 130, merchantacquirer server system 142,bank server system 144 anddelivery server system 160 are each a personal computer such as an IBM PC or IBM PC compatible system or an APPLE® MacINTOSH® system or a more advanced computer system such as an Alpha-based computer system available from Compaq Computer Corporation or SPARC® Station computer system available from SUN Microsystems Corporation, although a main frame computer system can also be used. Preferably, thecommunications network 170 is a TCP/IP-based network such as the Internet or an intranet, although almost any well known LAN, WAN or VPN technology can be used. - In one preferred embodiment of the invention, the
buyer system 110 is an BM PC compatible system operating an operating system such as the Microsoft Windows® operating system, andmerchant server system 120,security server system 130, merchantacquirer server system 142,bank server system 144 anddelivery server system 160 are configured as web servers providing access to information such as web pages in HTML format via a protocol such as the HyperText Transport Protocol (http). Thebuyer system 110 includes software to allow viewing of web pages, commonly referred to as a web browser, thus being capable of accessing web pages located onmerchant server system 120 andsecurity server system 130. Alternatively,buyer system 110 can be any wired or wireless device that can be connected to a communications network, such as an interactive television system, such as WEBTV, a personal digital assistant (PDA) or a cellular telephone. In this preferred embodiment,merchant server system 120 is an e-tail system offering a plurality of items for sale over the Internet. - While the specific steps involved in the secure transaction system of the present invention are described in detail below,
FIGS. 3A-3E are schematic diagrams showing various forms of transactions that are achievable with the present invention. Each ofFIGS. 3A-3E shows the transfer of information after the buyer has selected an item to purchase from the merchant server system and has proceeded to the checkout process. -
FIG. 3A shows a transaction in which thebuyer system 110 provides a set of information S to thesecurity server system 130. As set forth above the information S includes the buyer's delivery address information, payment information and optionally, information about the item being purchased, such as a stock number, etc. The security server system, which is operated separately from the merchant, is dedicated to collecting the buyer's information and protecting the buyer's information as encrypted documents. In the transaction ofFIG. 3A , two encrypted documents are created from the buyer's information S: a delivery document E1 that can only be decrypted by the participatingdelivery server system 160 and a payment document E2 that can only be decrypted by the participating paymentprocessor server system 140. Once encrypted, the documents E1 and E2 are then transmitted to themerchant server system 120 for storage and processing. At no time can themerchant server system 120 decrypt the documents, but themerchant server system 120 can use them for a full range of services, including all credit card transaction types (e.g. authorization, settlement, void, chargeback) and for shipping and returns. Thus, themerchant server system 120 can never see the personal information S of the buyer, but is not hindered in its service offering. -
FIG. 3B shows a transaction where the buyer's delivery address information S1 and payment information S2 are transmitted to thesecurity server system 130 while the purchase item information S3 is transmitted directly to themerchant server system 120. Thesecurity server system 130 encrypts the information S1 and S2 to form encrypted documents E1 and E2 which are transmitted to themerchant server system 120 Themerchant server system 120 then transmits the encrypted delivery document E1, which includes the buyer's delivery address information, to thedelivery server system 160 and transmits the encrypted payment document E2, which includes the buyer's payment information, to the paymentprocessor server system 140. Thedelivery server system 160 and the paymentprocessor server system 140 then decrypt their respective documents and the transaction can then be carried out without the merchant ever having possession of the buyer's deliver address information or payment information. -
FIG. 3C shows a transaction in which transfer of information between thebuyer system 110, thesecurity server system 130 and themerchant server system 120 is the same as that shown inFIG. 3B . However, in this transaction, the encrypted delivery document E1 is transmitted from themerchant server system 120 to a intermediatedelivery server system 162 which decrypts the document E1 and transmits the decrypted information S1 to thedelivery server system 160. Likewise, the encrypted payment document E2 is transmitted from themerchant server system 120 to an intermediatepayment server system 146 which decrypts the document E2 and transmits the decrypted information S2 to the paymentprocessor server system 140. -
FIG. 3D shows a fork-type transaction in which thebuyer 110 provides its information S to thesecurity server system 130. The security server system then separates the information into separate documents and distributes the delivery address information S1 to thedelivery server system 160, the payment information S2 to the payment processor server system and the purchase item information S3 to themerchant server system 120. In this transaction, even though the buyers information is not encrypted, thesecurity server system 130 ensures that each server system receives only the information necessary for it to enable the purchase transaction. -
FIG. 3E shows an encryption pipe-type transaction, in which thebuyer 110 provides its information S to thesecurity server system 130. Thesecurity server system 130 encrypts the information to form an encrypted document E1, which includes the buyer's delivery address information and an encrypted document E2, which includes the buyer's payment information. The encrypted documents E1 and E2 are then transmitted to themerchant server system 120, which transmits both encrypted documents to thedelivery server system 160, which retains the encrypted delivery document E1 and transmits the remaining encrypted payment document E2 to the paymentprocessor server system 140. -
FIG. 3F shows an encryption pipe-type transaction, in which thebuyer 110 provides its delivery address information S1 and its payment information S2 to the security server system and order information S3, particularly information regarding the item being purchased by the buyer, to themerchant server system 120. Thesecurity server system 130 encrypts the information S1 and S2 to form an encrypted document E1 and E2, respectively. The encrypted documents E1 and E2 are then transmitted to themerchant server system 120, which transmits both encrypted documents to thedelivery server system 160, which retains the encrypted delivery document E1 and transmits the remaining encrypted payment document E2 to the paymentprocessor server system 140. - In a preferred embodiment of the invention, the buyer's private information, including delivery address information and payment information, is not disclosed to the
merchant server system 120. The buyer provides this information directly to thesecurity server system 130 which encrypts the delivery address information into a delivery document and encrypts the payment information into a payment document. These documents are encrypted using a key which enables only thedelivery server system 160 to decrypt the delivery document and which enables only the paymentprocessor server system 140 to decrypt the payment document. These documents are transmitted by thesecurity server system 130 to themerchant server system 120, which then transmits the delivery document to thedelivery server system 160 and the payment document to the paymentprocessor server system 140. The paymentprocessor server system 140 is able to decrypt the payment document to authorize the payment and thedelivery server system 160 is able to decrypt the delivery document to provide delivery of the purchased item to the buyer. In order to enable thedelivery server system 160 to deliver the item from the merchant, the delivery server system provides themerchant server system 120 with an address signature code which preferably is a bar code that corresponds to an order number on the merchant server system. The delivery address information of the buyer is stored in the delivery server system and is “tagged” with the address signature. The merchant server system labels the package containing the item with the address signature. When the delivery firm associated with thedelivery server system 160 picks up the package from the merchant, it reads the address signature to determine the address to which the package will be delivered. -
FIG. 4 is a schematic diagram which specifically shows this transfer of information between thebuyer system 110,merchant server system 120,security server system 130, merchantacquirer server system 142,bank server system 144 anddelivery server system 160 in accordance with the present invention. In each ofFIGS. 4-10 , a vertical bar in the column below each of thesystems security server system 130 or tasks performed under the direction ofsecurity server system 130 and tasks shown in dotted lines indicate a transfer of encrypted data. - In
step 202, thebuyer system 110 initiates a connection to themerchant server system 120 overnetwork 170. Thebuyer system 110 places one or more items in the shopping cart provided by themerchant server system 120,step 204, and proceeds to checkout,step 206, thus initiating the purchase transaction. Upon checkout, thebuyer system 110 is transferred to thesecurity server system 130,step 206. In the transfer, themerchant server system 120 references an XML document that contains instructions to thesecurity server system 130 for what information is needed to be collected from thebuyer system 110, and for which other server systems the resulting documents are to be encrypted.Security server system 130 maintains a schema to ensure that themerchant server system 120 cannot direct information to be encrypted for inappropriate recipients (such as credit cards to a delivery firm). Not all of the collected information needs to be encrypted, and some information may be encrypted for more than 1 recipient, and some may be both encrypted into documents and sent back “in the clear” or unencrypted.Security server system 130 serves forms (either created dynamically or drawn from a library of static forms) to thebuyer system 110,step 208, to collect the sought information that was defined in the XML instructions of themerchant server system 120. In steps 210-214, thebuyer system 110 provides, to thesecurity server system 130, the necessary payment information, including credit card number and expiration date, the buyer system's email address and the buyer system's delivery address information. As the buyer's information is being received, thesecurity server system 130 creates, in steps 212-218, an encrypted delivery document E1 that includes the buyer's delivery address information and an encrypted payment document E2 that includes the buyer's payment information. Encrypted delivery document E1 preferably includes the buyer's name, delivery address, email address and the name of the delivery company This document is encrypted with a key such that only the delivery server system is capable of decrypting the information contained therein. Encrypted payment document E2 preferably includes a merchant identification number (MID), a transaction identification number (TID), the credit card type, number, expiration date, the name on the credit card, the billing address associated with the credit card digital signature, a debit limit, which ensures that the credit card is not charged above the order amount and an order expiration date. This document is encrypted with a key such that only the payment processor server system is capable of decrypting the information contained therein.Security server system 140 also creates an alias email address for the buyer. The alias email address is discussed in greater detail below with reference toFIG. 7 . Instep 218, the security server system creates a digest array, which includes all of the information collected by thesecurity server system 130. This array is used to identify the buyer during future transactions, as is described in greater detail below with reference toFIG. 11A Instep 220, a package of the encrypted documents is assembled and transmitted to themerchant server system 120,step 222. - The package of information is transmitted to the
merchant server system 120 as items in an XML document, including encrypted documents E1 and E2, and unencrypted documents and one or more digest arrays. The XML tags are not encrypted so that the XML document can be parsed by themerchant server system 120. Themerchant server system 120 receives the XML document and parses out the discrete items,step 222. The items are stored in the merchant server systems order processing system,step 224. Themerchant server system 120 sends the encrypted payment document E2 to the participating merchantacquirer server system 142,step 226, which decrypts the document and transmits it to thebank server system 144,step 228, for authorization. Instep 230, if the payment information is approved, thebank server system 144 transmits a payment authorization response to merchantacquirer server system 142, which transmits a payment authorization document tomerchant server system 120,step 232. - Once the payment information has been approved and the merchant server system has received the payment authorization document, the
merchant server system 120 transmits the encrypted delivery document E1 and an order number todelivery server system 160,step 234. Thedelivery server system 160 decrypts the delivery document E1,step 236, assigns an address signature to the order and transmits the address signature to themerchant server system 120, which notifies thebuyer system 110 that the order has been successfully processed via the merchant server system website,step 236. The address signature is similar to a tracking number, but uniquely identifies a shipping address as opposed to just a package. Instep 240, the merchant server system produces a label with the address signature only, since it does not have access to the buyer delivery address information, and transmits a delivery request to thedelivery server system 160. Thedelivery server system 160 matches the delivery request to the address signature which includes the buyer's delivery address information. Thedelivery server system 160 transmits a request to thesecurity server system 130,step 242, for the security server system to notify the buyer of the delivery tracking number information via the security server system'ssecure email component 132,FIG. 7 .Security server system 130 transmits the delivery tracking number information to the buyer via itssecure email component 132,step 244. Instep 246, themerchant server system 120 transmits the encrypted payment document E2, as well as the payment authorization document, to the merchantacquirer server system 142, which decrypts the payment document E2 and transmits a settlement request to thebank server system 144,step 248. Based on the payment authorization document, the bank approves the settlement request and transmits payment, in the form of a settlement response, to themerchant server system 120,step 250. Instep 252, the delivery firm associated with thedelivery server system 160 picks up the package from the merchant firm associated with themerchant server system 120, matches the address signature on the label provided by themerchant server system 120 to the delivery address information contained in the delivery document E1 and delivers the package to the buyer. - Accordingly, the invention enables a purchase transaction to be completed without disclosing any of the buyers private information to the
merchant server system 120. By encrypting the buyer's delivery address information into a discrete delivery document that includes only the buyer's delivery address information in a form which only thedelivery server system 160 can decrypt, thesecurity server system 120 ensures that only the delivery server system obtains information pertaining to the delivery of the purchased item. Furthermore, by encrypting the buyer's payment information into a discrete document that includes only the buyer's payment information in a form which only the paymentprocessor server system 140 can decrypt, thesecurity server system 120 ensures that only the paymentprocessor server system 140 obtains information pertaining to the payment of the purchased item. Since these discrete documents are encrypted before they are transmitted to themerchant server system 120, the merchant server system cannot access the buyer's information. This example transfers the pertinent information similar to the transaction shown inFIG. 3A . -
FIG. 5 is a schematic diagram which shows a transfer of information between thebuyer system 110,merchant server system 120,security server system 130, merchantacquirer server system 142,bank server system 144 anddelivery server system 160 in a situation where the buyer returns a purchased product to the merchant for a refund. Instep 300, thebuyer system 110 informs themerchant server system 120, either by telephone or email, that the buyer would like to return a product. Themerchant server system 120 validates the request,step 302, and initiates a digest request,step 304, in which the customer provides information about the order,step 306, so that the merchant can identify the order,step 308. The use of the digest array to identify a buyer is discussed in greater detail below with reference toFIG. 11B . Alternatively, order receipts and other proofs of purchase can be used to authenticate thebuyer system 110 without drawing on a digest array created during the initial order. If the buyer is successfully authenticated, themerchant server system 120 approves the return,step 310 and transmits the encrypted payment document from the initial transaction to the merchantacquirer server system 142 for a credit authorization,step 312. The merchantacquirer server system 142 authorizes the credit and transmits a credit authorization to themerchant server system 120,step 314. Themerchant server system 120 then transmits a return material authorization (RMA) number in an email to thebuyer system 110 through thesecure email component 132 of thesecurity server system 130,steps bank server system 144,step 324. The bank server system transmits the credit settlement to themerchant server system 120,step 326 and thebank server system 144 provides the appropriate credit to the buyer's credit card,step 328. -
FIGS. 6A , 6B and 6C are schematic diagrams which show a transfer of information between thebuyer system 110,merchant server system 120,security server system 130, merchantacquirer server system 142 andbank server system 144 in the case of a buyer-initiated chargeback. A chargeback occurs when the buyer informs the bank that it will not pay for a charge resulting from a transaction. Instep 350,FIG. 6A , thebuyer system 110 initiates the chargeback by informing thebank server system 144 that the charge will not be honored. Thebank server system 144 reviews the request,step 352 and instructs the merchantacquirer server system 142 to search for the payment document associated with the request,step 354. The merchantacquirer server system 142 transmits a report to the merchant server system including the nature of the complaint,step 356. The report only identifies the specific transaction to themerchant server system 120. At this point, the merchant server system only possesses information about the specific transaction and does not posses any of the buyer's personal information. Themerchant server system 120 and thebuyer system 110 communicate with each other anonymously through the secure email component of thesecurity server system 130, steps 358-364. The merchant server system then transmits a chargeback response to the merchantacquirer server system 142,step 366. The merchantacquirer server system 142 transmits the request to thebank server system 144,step 368, and the bank server system issues a chargeback credit to the buyer's credit card,step 370. - The process shown in
FIG. 6B is similar to the process shown inFIG. 6A , with the difference being that thesecurity server system 130 creates the report to themerchant server system 120 rather than the merchantacquirer server system 142. This enables thesecurity server system 130 to either encrypt or withhold private information of the buyer from the merchant server system. The process shown inFIG. 6C is also similar to the process shown inFIG. 6A , with the difference being that themerchant server system 120 receives the chargeback request directly from thebank server system 144 without any intervention from the merchantacquirer server system 144 or thesecurity server system 130. - The
security server system 130 is also capable of enabling private email communications between parties, in particular between thebuyer system 110 and themerchant server system 120.Security server system 130 includes asecure email component 132,FIG. 7 , with which both thebuyer system 110 and the merchant server system register. Thesecure email component 132 receives the buyer system's true email address and assigns a buyer alias email address to the buyers true address. Likewise, thesecure email component 132 receives the merchant server system's true email address and assigns a merchant alias address to the merchant's true address. All email transactions between thebuyer system 110 and themerchant server system 120 pass through thesecure email component 132. In this way, the neither party possesses the other party's true email address and all communication takes place through the secure email component with the alias email addresses. -
FIG. 7 is a schematic diagram which shows this process. Instep 402, the merchant server system identifies a buyer to which it will send an email message. The message is created,step 404, and sent to the buyer's alias email address via the merchant's SMTP server. The email is directed to thesecure email component 132 by the buyer's alias address,step 406, where it is validated by thesecure email component 132. Validation involves ensuring that a particular merchant is authorized to send email to a particular buyer with the buyer's alias email address. If the validation is rejected, the message is returned to the merchant's true email address,step 408. If the validation is approved, thesecure email component 132 rewrites the SMTP header on the email message, changing the buyer's alias email address to the buyers true email address, and the merchant's true email address to the merchant's alias email address. The message is then sent to thebuyer system 110 via the secure email component's SMPT server,step 410. If thebuyer system 110 replies to the merchant's email message, the reply is sent via the buyer's SMTP server to the merchant's alias email address,step 412. The message is then validated in the same manner as the original email message from themerchant server system 120. If validation fails, the message is returned to the buyer's true e-mail address without having been delivered to themerchant server system 120,step 414. If validation does not fail, thesecure email component 132 rewrites the SMTP header on the mail message, changing the merchant's alias to the merchant's true e-mail address, and the buyer's true e-mail address to the buyer's alias email address. The message is then sent via the secure email component's SMTP server to the merchant's true e-mail address (MTMA). - In order to simplify the transaction consummation process, the system of the present invention enables the
buyer system 110 to create an electronic “wallet” which includes all of the buyer's information such as delivery address information and payment information. The security server system creates the wallet by encrypting the delivery address information into a delivery document E1 and encrypting the payment information into a payment document E2 as described above. Once the wallet is created, it is stored in a database on themerchant server system 120 for future purchase transactions.FIG. 8 is a schematic diagram of the process involved in the creation of the electronic wallet. Instep 420, thebuyer system 110, from the merchant server system website, requests that a wallet be created. The merchant server system prompts thebuyer system 110 to create a user name and password,step 422. The merchant server system then directs thebuyer system 110 to thesecurity server system 130,step 424, where the wallet creation takes place. Thesecurity server system 130 sends a personal information request form to thebuyer system 110,step 426. In response, thebuyer system 110 provides the required information to thesecurity server system 130, including the buyer's payment information,step 428, true email address,step 430 and delivery address information,step 432. Thesecurity server system 130 receives the information and encrypts the delivery address information into the delivery document E1, encrypts the payment information into the payment document E2 and creates an alias email address for the buyer system, steps 430-434. A digest array is created from the received information,step 436, and a protected information package is assembled,step 438, which includes all of the buyer's information in a form which is not decryptable by themerchant server system 120. The package is transmitted to themerchant server system 120, which notifies thebuyer system 110 via its website that the wallet has been successfully created,step 440. The merchant server system then parses the package into its separate documents,step 442, and stores the documents in a “wallet” associated with the particular buyer in a database of themerchant server system 120. Themerchant server system 120 may request other information from the buyer, such as buyer preferences and behavior profiles, which information is stored in the wallet with the buyer's encrypted information, steps 444-448. -
FIG. 9 is a schematic diagram of a transaction according to the present invention which includes the use of the electronic wallet described above. Instep 502, thebuyer system 110 establishes a connection with themerchant server system 120 over thenetwork 170. Thebuyer system 110 places items in its shopping cart,step 504 and, when ready to checkout, logs into its wallet which is stored on themerchant server system 120 using its user name and password,step 506. Themerchant server system 120 then asks if the buyer would like to follow an automatic checkout procedure,step 508. If no changes are to be made to the buyer system's information, the buyer system will choose this procedure. The process then proceeds to step 528, to continue the transaction, wherein steps 528-552 are identical to steps 228-252 ofFIG. 4 . - If the
buyer system 110 does not select the automatic checkout, themerchant server system 120 transmits the wallet information to thesecurity server system 130,step 510. The security server system decrypts the wallet information,step 512, and transmits a form to thebuyer system 110 with a prompt to make any necessary changes to the information, steps 514, 516. Thesecurity server system 130 encrypts the updated information into the delivery document E1 and payment document E2,step 518. The new protected information package is assembled,step 520, and transmitted to themerchant server system 120 to update the buyer's wallet information. The transaction then proceeds with steps 522-552, which are identical to steps 222-252 ofFIG. 4 . - The
security server system 130 of the present invention is also capable of enabling themerchant server system 120 to conduct a direct marketing fulfillment process while keeping the buyer system's information private.FIG. 10 is a schematic diagram showing the steps involved in this process. Instep 600, themerchant server system 120 develops a target list of buyer's to which it will send direct marketing material. Since all of the buyer information in the possession of the merchant server system is encrypted, this target list is also encrypted. However, since the different encrypted documents associated with each buyer system or parsable by themerchant server system 120, it is able to provide a list to thesecurity server system 130 which includes the encrypted delivery address information of its buyers to thesecurity server system 130,step 602. Thesecurity server system 130 decrypts the buyer list,step 604, and transmits the buyer list to afulfillment server system 172,step 606. Thefulfillment server system 172 receives the direct marketing pieces from the merchant server system,step 608, labels them with the delivery address information received from thesecurity server system 130,step 610, and sends the labeled pieces to the delivery firm associated with thedelivery server system 160,step 612. The delivery firm then delivers the direct marketing pieces to the buyers. This process enables the merchant server system to cause direct marketing pieces to be delivered to buyers without the need for themerchant server system 120 to possess the actual delivery address information of the buyers. -
FIG. 11A is a schematic diagram showing the process involved in the creation of a digest array, which occurs when the buyer system's information is first input to thesecurity server system 130. When the security server system receives the buyer's information, such as in steps 210-214 ofFIG. 4 , the information S1-Sn, in addition to being encrypted into documents that can only be decrypted by a predetermined intended party, is passed through ahashing function 174 such as the Secure Hash Algorithm (SHA), which creates a hash output D1-Dn, corresponding to the information S1-Sn. The digest array is stored on themerchant server system 120 for future reference. - If the
buyer system 110 needs to contact the merchant server system regarding a particular order, the merchant server system can match the buyer with the particular order by using the digest array. For example, in the return process shown inFIG. 5 , the buyer provides information to themerchant server system 120 and the merchant server system searches its digest array to match the buyer with the particular order. As shown inFIG. 11B , the buyer system discloses certain portions of information, such as itsname 180, the last 4 digits of its credit card 182 and itszip code 184. This information is passed through hashingfunction 174 to form hash outputs 186 corresponding to theinformation merchant server system 120 searches the digestarray 188 until the information provided by the buyer enables a match in the digestarray 188 that enables the merchant server system to identify the particular order. - Accordingly, the present invention provides a method of and system for enabling online transactions in which the merchant does not have access to the buyer's private delivery address information and payment information. The security server system encrypts the delivery address information to form a delivery document which can be decrypted only by the delivery server system. The security server system also encrypts the payment address information to form a payment document which can be decrypted only by the payment processor server system. The delivery document and the payment document are provided by the security server system to the merchant server system, which, in turn, distributes the documents to the respective server systems for processing during the course of an online transaction. While, in the example of
FIG. 4 , the transaction carried out is in the form of the combination encryption pipe/fork transaction shown inFIG. 3A , it will be understood that the system can be utilized to carry out any or all of the transaction types shown inFIGS. 3A-3E . Furthermore, the system and method of the present invention can be utilized to carry out transactions which take the form of a token passing ring, such as is shown inFIG. 12A , wherein encrypted documents may be passed among all of the parties in thering 190 and a distributive ring, such as is shown inFIG. 12B , wherein a head party introduces encrypted documents into thering 194, which documents are then passed among the other parties of thering 194. - The invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are therefore to be considered in respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of the equivalency of the claims are therefore intended to be embraced therein.
Claims (2)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/104,069 US20080195551A1 (en) | 2000-04-03 | 2008-04-16 | Method of and system for effecting anonymous credit card purchases over the internet |
US15/433,670 US20170161736A1 (en) | 2000-04-03 | 2017-02-15 | Method of and system for effecting anonymous credit card purchases over the internet |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US19434600P | 2000-04-03 | 2000-04-03 | |
US25198400P | 2000-12-07 | 2000-12-07 | |
US25405600P | 2000-12-07 | 2000-12-07 | |
US27359501P | 2001-03-05 | 2001-03-05 | |
US09/826,052 US7376629B1 (en) | 2000-04-03 | 2001-04-03 | Method of and system for effecting anonymous credit card purchases over the internet |
US12/104,069 US20080195551A1 (en) | 2000-04-03 | 2008-04-16 | Method of and system for effecting anonymous credit card purchases over the internet |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/826,052 Division US7376629B1 (en) | 2000-04-03 | 2001-04-03 | Method of and system for effecting anonymous credit card purchases over the internet |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/433,670 Continuation US20170161736A1 (en) | 2000-04-03 | 2017-02-15 | Method of and system for effecting anonymous credit card purchases over the internet |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080195551A1 true US20080195551A1 (en) | 2008-08-14 |
Family
ID=39387690
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/826,052 Expired - Lifetime US7376629B1 (en) | 2000-04-03 | 2001-04-03 | Method of and system for effecting anonymous credit card purchases over the internet |
US12/104,069 Abandoned US20080195551A1 (en) | 2000-04-03 | 2008-04-16 | Method of and system for effecting anonymous credit card purchases over the internet |
US12/123,272 Abandoned US20080222046A1 (en) | 2000-04-03 | 2008-05-19 | Method of and system for effecting anonymous credit card purchases over the internet |
US15/433,670 Abandoned US20170161736A1 (en) | 2000-04-03 | 2017-02-15 | Method of and system for effecting anonymous credit card purchases over the internet |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/826,052 Expired - Lifetime US7376629B1 (en) | 2000-04-03 | 2001-04-03 | Method of and system for effecting anonymous credit card purchases over the internet |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/123,272 Abandoned US20080222046A1 (en) | 2000-04-03 | 2008-05-19 | Method of and system for effecting anonymous credit card purchases over the internet |
US15/433,670 Abandoned US20170161736A1 (en) | 2000-04-03 | 2017-02-15 | Method of and system for effecting anonymous credit card purchases over the internet |
Country Status (1)
Country | Link |
---|---|
US (4) | US7376629B1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020193102A1 (en) * | 2001-03-02 | 2002-12-19 | Petri Hyyppa | Electronic transactions |
US20060265339A1 (en) * | 2005-05-17 | 2006-11-23 | Faramak Vakil | Secure virtual point of service for 3G wireless networks |
US20080183822A1 (en) * | 2007-01-25 | 2008-07-31 | Yigang Cai | Excluding a group member from receiving an electronic message addressed to a group alias address |
US10147089B2 (en) | 2012-01-05 | 2018-12-04 | Visa International Service Association | Data protection with translation |
US10325261B2 (en) | 2014-11-25 | 2019-06-18 | Visa International Service Association | Systems communications with non-sensitive identifiers |
US20190333046A1 (en) * | 2014-07-03 | 2019-10-31 | Mastercard International Incorporated | Method and system for maintaining privacy and compliance in the use of account reissuance data |
US10558975B2 (en) | 2016-08-17 | 2020-02-11 | Mastercard International Incorporated | Systems and methods for use in facilitating transactions |
US11250142B1 (en) * | 2018-09-05 | 2022-02-15 | Jianqing Wu | System and method for protecting data in business transactions |
Families Citing this family (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060178994A1 (en) * | 1999-07-26 | 2006-08-10 | Stolfo Salvatore J | Method and system for private shipping to anonymous users of a computer network |
US6618705B1 (en) * | 2000-04-19 | 2003-09-09 | Tiejun (Ronald) Wang | Method and system for conducting business in a transnational e-commerce network |
US8260723B2 (en) | 2000-12-01 | 2012-09-04 | Carrott Richard F | Transactional security over a network |
US20070288394A1 (en) | 2000-12-01 | 2007-12-13 | Carrott Richard F | Transactional security over a network |
US6839692B2 (en) * | 2000-12-01 | 2005-01-04 | Benedor Corporation | Method and apparatus to provide secure purchase transactions over a computer network |
EP1504320A4 (en) * | 2002-05-09 | 2007-07-04 | Kestrel Wireless Inc | Method and system for enabling electronic transactions via a personal device |
JP2005535967A (en) * | 2002-08-09 | 2005-11-24 | バーリントン コミュニケーションズ インコーポレイテッド | System and method for controlling access to an electronic message recipient |
US8700729B2 (en) | 2005-01-21 | 2014-04-15 | Robin Dua | Method and apparatus for managing credentials through a wireless network |
US7451481B2 (en) | 2005-04-29 | 2008-11-11 | Merchant Link, Llc | Database system and method for encryption and protection of confidential information |
WO2007038593A2 (en) * | 2005-09-28 | 2007-04-05 | Saf-T-Pay, Inc. | Payment system and clearinghouse of internet transactions |
US20070240226A1 (en) * | 2006-03-28 | 2007-10-11 | Samsung Electronics Co., Ltd. | Method and apparatus for user centric private data management |
US7818264B2 (en) | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
US9065643B2 (en) * | 2006-04-05 | 2015-06-23 | Visa U.S.A. Inc. | System and method for account identifier obfuscation |
US10803474B2 (en) | 2006-11-22 | 2020-10-13 | Qualtrics, Llc | System for creating and distributing interactive advertisements to mobile devices |
US11256386B2 (en) | 2006-11-22 | 2022-02-22 | Qualtrics, Llc | Media management system supporting a plurality of mobile devices |
US7983611B2 (en) * | 2006-11-22 | 2011-07-19 | Bindu Rama Rao | Mobile device that presents interactive media and processes user response |
US8700014B2 (en) | 2006-11-22 | 2014-04-15 | Bindu Rama Rao | Audio guided system for providing guidance to user of mobile device on multi-step activities |
US8380175B2 (en) * | 2006-11-22 | 2013-02-19 | Bindu Rama Rao | System for providing interactive advertisements to user of mobile devices |
US8478250B2 (en) | 2007-07-30 | 2013-07-02 | Bindu Rama Rao | Interactive media management server |
US8566239B2 (en) * | 2007-02-22 | 2013-10-22 | First Data Corporation | Mobile commerce systems and methods |
US8924308B1 (en) | 2007-07-18 | 2014-12-30 | Playspan, Inc. | Apparatus and method for secure fulfillment of transactions involving virtual items |
US20090248538A1 (en) * | 2008-01-28 | 2009-10-01 | William Stuart Ervin Taylor | Facilitated mobile transactions |
US9715709B2 (en) | 2008-05-09 | 2017-07-25 | Visa International Services Association | Communication device including multi-part alias identifier |
US8090650B2 (en) * | 2008-07-24 | 2012-01-03 | At&T Intellectual Property I, L.P. | Secure payment service and system for interactive voice response (IVR) systems |
US8069121B2 (en) * | 2008-08-04 | 2011-11-29 | ProPay Inc. | End-to-end secure payment processes |
US9131007B2 (en) * | 2009-05-19 | 2015-09-08 | Vitrual World Computing, Inc. | System and method for dynamically transcoding data requests |
US8346671B2 (en) | 2010-04-01 | 2013-01-01 | Merchant Link, Llc | System and method for point-to-point encryption with adjunct terminal |
US8898086B2 (en) | 2010-09-27 | 2014-11-25 | Fidelity National Information Services | Systems and methods for transmitting financial account information |
US11488142B2 (en) * | 2011-10-12 | 2022-11-01 | Boost Payment Solutions, Inc. | Electronic payment processing |
CA2845602C (en) * | 2011-10-12 | 2021-10-19 | Boost Payment Solutions, LLC | Electronic payment processing |
US11514435B2 (en) | 2011-10-12 | 2022-11-29 | Boost Payment Solutions, Inc. | Electronic payment processing using adjusted interchange rate |
US20130254896A1 (en) * | 2012-03-23 | 2013-09-26 | Infineon Technologies Austria Ag | Method to Detect Tampering of Data |
US20150095238A1 (en) | 2013-09-30 | 2015-04-02 | Apple Inc. | Online payments using a secure element of an electronic device |
US11748746B2 (en) | 2013-09-30 | 2023-09-05 | Apple Inc. | Multi-path communication of electronic device secure element data for online payments |
US10878414B2 (en) | 2013-09-30 | 2020-12-29 | Apple Inc. | Multi-path communication of electronic device secure element data for online payments |
US10079791B2 (en) * | 2014-03-14 | 2018-09-18 | Xpedite Systems, Llc | Systems and methods for domain- and auto-registration |
JP6353693B2 (en) * | 2014-05-08 | 2018-07-04 | 任天堂株式会社 | Payment system, user terminal device, sales server device, payment method, and computer program |
US10614457B2 (en) | 2014-11-12 | 2020-04-07 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9558492B2 (en) | 2014-11-12 | 2017-01-31 | Benedoretse Llc | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9558493B2 (en) | 2014-11-12 | 2017-01-31 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9569776B2 (en) | 2014-11-12 | 2017-02-14 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
CN106557962A (en) * | 2015-09-24 | 2017-04-05 | 腾讯科技(深圳)有限公司 | Method of payment, apparatus and system |
US11847651B2 (en) | 2017-05-23 | 2023-12-19 | Kenneth A Kopf | Systems and methods for facilitating biometric tokenless authentication for services |
EP4123530A1 (en) * | 2018-06-15 | 2023-01-25 | Circularise BV | Distributed database structures for anonymous information exchange |
US10846677B2 (en) | 2019-01-11 | 2020-11-24 | Merchant Link, Llc | System and method for secure detokenization |
US11050571B2 (en) | 2019-02-14 | 2021-06-29 | Carrott Richard F | Systems for producing and maintaining verified electronic signatures |
US11842346B2 (en) * | 2019-09-26 | 2023-12-12 | Discover Financial Services | Payments federated directory |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4977595A (en) * | 1989-04-03 | 1990-12-11 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing electronic cash |
US5420926A (en) * | 1994-01-05 | 1995-05-30 | At&T Corp. | Anonymous credit card transactions |
US5754656A (en) * | 1995-08-04 | 1998-05-19 | Hitachi, Ltd. | Electronic shopping method, electronic shopping system and document authenticating method relating thereto |
US5768385A (en) * | 1995-08-29 | 1998-06-16 | Microsoft Corporation | Untraceable electronic cash |
US5790677A (en) * | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
US5815657A (en) * | 1996-04-26 | 1998-09-29 | Verifone, Inc. | System, method and article of manufacture for network electronic authorization utilizing an authorization instrument |
US5825881A (en) * | 1996-06-28 | 1998-10-20 | Allsoft Distributing Inc. | Public network merchandising system |
US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
US5903652A (en) * | 1996-11-25 | 1999-05-11 | Microsoft Corporation | System and apparatus for monitoring secure information in a computer network |
US5909492A (en) * | 1994-10-24 | 1999-06-01 | Open Market, Incorporated | Network sales system |
US5926548A (en) * | 1996-05-29 | 1999-07-20 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing hierarchical electronic cash |
US6041123A (en) * | 1996-07-01 | 2000-03-21 | Allsoft Distributing Incorporated | Centralized secure communications system |
US6076078A (en) * | 1996-02-14 | 2000-06-13 | Carnegie Mellon University | Anonymous certified delivery |
US6233565B1 (en) * | 1998-02-13 | 2001-05-15 | Saranac Software, Inc. | Methods and apparatus for internet based financial transactions with evidence of payment |
US20010039535A1 (en) * | 2000-02-09 | 2001-11-08 | Tsiounis Yiannis S. | Methods and systems for making secure electronic payments |
US6336095B1 (en) * | 1994-04-28 | 2002-01-01 | Citibank, N.A. | Method for electronic merchandise dispute resolution |
US6507856B1 (en) * | 1999-01-05 | 2003-01-14 | International Business Machines Corporation | Dynamic business process automation system using XML documents |
US20040260653A1 (en) * | 1999-04-19 | 2004-12-23 | First Data Corporation | Anonymous transactions |
US6971030B2 (en) * | 2001-03-26 | 2005-11-29 | International Business Machines Corporation | System and method for maintaining user security features |
US6970562B2 (en) * | 2000-12-19 | 2005-11-29 | Tricipher, Inc. | System and method for crypto-key generation and use in cryptosystem |
US7050989B1 (en) * | 2000-03-16 | 2006-05-23 | Coremetrics, Inc. | Electronic commerce personalized content delivery system and method of operation |
US7120927B1 (en) * | 1999-06-09 | 2006-10-10 | Siemens Communications, Inc. | System and method for e-mail alias registration |
US7577582B1 (en) * | 1999-09-21 | 2009-08-18 | Nextag, Inc. | Methods and apparatus for facilitating transactions |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE29518712U1 (en) * | 1995-11-25 | 1996-01-25 | Brugg Rohrsysteme Gmbh | Arrangement for connecting the end of a helically corrugated metal tube to a connector |
JP2006185179A (en) * | 2004-12-27 | 2006-07-13 | Nippon Telegraph & Telephone East Corp | Public key authentication method and system |
-
2001
- 2001-04-03 US US09/826,052 patent/US7376629B1/en not_active Expired - Lifetime
-
2008
- 2008-04-16 US US12/104,069 patent/US20080195551A1/en not_active Abandoned
- 2008-05-19 US US12/123,272 patent/US20080222046A1/en not_active Abandoned
-
2017
- 2017-02-15 US US15/433,670 patent/US20170161736A1/en not_active Abandoned
Patent Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4977595A (en) * | 1989-04-03 | 1990-12-11 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing electronic cash |
US5420926A (en) * | 1994-01-05 | 1995-05-30 | At&T Corp. | Anonymous credit card transactions |
US6336095B1 (en) * | 1994-04-28 | 2002-01-01 | Citibank, N.A. | Method for electronic merchandise dispute resolution |
US7478239B1 (en) * | 1994-04-28 | 2009-01-13 | Citibank, N.A. | Electronic ticket vending system |
US5909492A (en) * | 1994-10-24 | 1999-06-01 | Open Market, Incorporated | Network sales system |
US5790677A (en) * | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
US6560581B1 (en) * | 1995-06-29 | 2003-05-06 | Visa International Service Association | System and method for secure electronic commerce transaction |
US5754656A (en) * | 1995-08-04 | 1998-05-19 | Hitachi, Ltd. | Electronic shopping method, electronic shopping system and document authenticating method relating thereto |
US5768385A (en) * | 1995-08-29 | 1998-06-16 | Microsoft Corporation | Untraceable electronic cash |
US6076078A (en) * | 1996-02-14 | 2000-06-13 | Carnegie Mellon University | Anonymous certified delivery |
US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
US5815657A (en) * | 1996-04-26 | 1998-09-29 | Verifone, Inc. | System, method and article of manufacture for network electronic authorization utilizing an authorization instrument |
US5926548A (en) * | 1996-05-29 | 1999-07-20 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing hierarchical electronic cash |
US5825881A (en) * | 1996-06-28 | 1998-10-20 | Allsoft Distributing Inc. | Public network merchandising system |
US6041123A (en) * | 1996-07-01 | 2000-03-21 | Allsoft Distributing Incorporated | Centralized secure communications system |
US5903652A (en) * | 1996-11-25 | 1999-05-11 | Microsoft Corporation | System and apparatus for monitoring secure information in a computer network |
US6233565B1 (en) * | 1998-02-13 | 2001-05-15 | Saranac Software, Inc. | Methods and apparatus for internet based financial transactions with evidence of payment |
US6507856B1 (en) * | 1999-01-05 | 2003-01-14 | International Business Machines Corporation | Dynamic business process automation system using XML documents |
US20040260653A1 (en) * | 1999-04-19 | 2004-12-23 | First Data Corporation | Anonymous transactions |
US7120927B1 (en) * | 1999-06-09 | 2006-10-10 | Siemens Communications, Inc. | System and method for e-mail alias registration |
US7577582B1 (en) * | 1999-09-21 | 2009-08-18 | Nextag, Inc. | Methods and apparatus for facilitating transactions |
US20010039535A1 (en) * | 2000-02-09 | 2001-11-08 | Tsiounis Yiannis S. | Methods and systems for making secure electronic payments |
US7050989B1 (en) * | 2000-03-16 | 2006-05-23 | Coremetrics, Inc. | Electronic commerce personalized content delivery system and method of operation |
US6970562B2 (en) * | 2000-12-19 | 2005-11-29 | Tricipher, Inc. | System and method for crypto-key generation and use in cryptosystem |
US6971030B2 (en) * | 2001-03-26 | 2005-11-29 | International Business Machines Corporation | System and method for maintaining user security features |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7848740B2 (en) * | 2001-03-02 | 2010-12-07 | Nokia Corporation | Electronic transactions |
US20020193102A1 (en) * | 2001-03-02 | 2002-12-19 | Petri Hyyppa | Electronic transactions |
US20060265339A1 (en) * | 2005-05-17 | 2006-11-23 | Faramak Vakil | Secure virtual point of service for 3G wireless networks |
US8645282B2 (en) * | 2005-05-17 | 2014-02-04 | Tti Inventions C Llc | Method and apparatus to conduct a commercial transaction over wireless networks |
US20080183822A1 (en) * | 2007-01-25 | 2008-07-31 | Yigang Cai | Excluding a group member from receiving an electronic message addressed to a group alias address |
US11276058B2 (en) | 2012-01-05 | 2022-03-15 | Visa International Service Association | Data protection with translation |
US10147089B2 (en) | 2012-01-05 | 2018-12-04 | Visa International Service Association | Data protection with translation |
US20190333046A1 (en) * | 2014-07-03 | 2019-10-31 | Mastercard International Incorporated | Method and system for maintaining privacy and compliance in the use of account reissuance data |
US11762877B2 (en) * | 2014-07-03 | 2023-09-19 | Mastercard International Incorporated | Method and system for maintaining privacy and compliance in the use of account reissuance data |
US10325261B2 (en) | 2014-11-25 | 2019-06-18 | Visa International Service Association | Systems communications with non-sensitive identifiers |
US10990977B2 (en) | 2014-11-25 | 2021-04-27 | Visa International Service Association | System communications with non-sensitive identifiers |
US10558975B2 (en) | 2016-08-17 | 2020-02-11 | Mastercard International Incorporated | Systems and methods for use in facilitating transactions |
US11250142B1 (en) * | 2018-09-05 | 2022-02-15 | Jianqing Wu | System and method for protecting data in business transactions |
Also Published As
Publication number | Publication date |
---|---|
US20170161736A1 (en) | 2017-06-08 |
US7376629B1 (en) | 2008-05-20 |
US20080222046A1 (en) | 2008-09-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7376629B1 (en) | Method of and system for effecting anonymous credit card purchases over the internet | |
US7647278B1 (en) | Method for facilitating a transaction between a merchant and a buyer | |
US7693283B2 (en) | Methods and apparatus for providing user anonymity in online transactions | |
US6363357B1 (en) | Method and apparatus for providing authorization to make multiple copies of copyright protected products purchased in an online commercial transaction | |
US20060178994A1 (en) | Method and system for private shipping to anonymous users of a computer network | |
US7318047B1 (en) | Method and apparatus for providing electronic refunds in an online payment system | |
EP0734556B1 (en) | Network based payment system and method for using such system | |
US5903652A (en) | System and apparatus for monitoring secure information in a computer network | |
US20030120608A1 (en) | Secure method for purchasing and payment over a communication network and method for delivering goods anonymously | |
US20010044785A1 (en) | Method and system for private shipping to anonymous users of a computer network | |
US20040148254A1 (en) | Method for performing a secure cash-free payment transaction and a cash-free payment system | |
US20050114218A1 (en) | Third party privacy system | |
US20110246593A1 (en) | Anonymous Email Address Management | |
US20070244831A1 (en) | System and method for secure online transaction | |
US20150052062A1 (en) | E-commerce shopping and payment process | |
WO2001075744A1 (en) | Method of and system for effecting anonymous credit card purchases over the internet | |
US20210133736A1 (en) | Method of electronic payment by means of a Uniform Resource Identifier (URI) | |
US20070027820A1 (en) | Methods and systems for securing electronic transactions | |
KR100481152B1 (en) | On-line gift card system and method of providing the gift card | |
US20040093277A1 (en) | Method and system for secure electronic purchase transactions | |
US20040167826A1 (en) | Anonymous electronic funds transfer system and method, and anonymous shipping system and method | |
WO2001048658A1 (en) | Selling a digital content product in an online transaction | |
KR100444372B1 (en) | System and method for paying money electric commerce | |
ZA200309142B (en) | A transaction facilitation system. | |
JP2002157481A (en) | Electronic commerce system and method and recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EINZEK SOFTWARE AG L.L.C., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INCOGNO CORPORATION;REEL/FRAME:021866/0695 Effective date: 20080619 |
|
AS | Assignment |
Owner name: OL SECURITY LIMITED LIABILITY COMPANY, DELAWARE Free format text: MERGER;ASSIGNOR:EINZEK SOFTWARE AG L.L.C.;REEL/FRAME:037346/0752 Effective date: 20150826 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |
|
AS | Assignment |
Owner name: ADVANCED TRANSACTIONS, LLC, GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 172 LLC;REEL/FRAME:058537/0809 Effective date: 20210825 |