WO2001008066A1 - Electronic purchase of goods over a communication network including physical delivery while securing private and personal information - Google Patents

Electronic purchase of goods over a communication network including physical delivery while securing private and personal information Download PDF

Info

Publication number
WO2001008066A1
WO2001008066A1 PCT/US2000/019888 US0019888W WO0108066A1 WO 2001008066 A1 WO2001008066 A1 WO 2001008066A1 US 0019888 W US0019888 W US 0019888W WO 0108066 A1 WO0108066 A1 WO 0108066A1
Authority
WO
WIPO (PCT)
Prior art keywords
party
information
proxy
computer
providing
Prior art date
Application number
PCT/US2000/019888
Other languages
French (fr)
Other versions
WO2001008066A9 (en
Inventor
Salvatore J. Stolfo
Yechiam Yemini
Leonard P. Shaykin
Original Assignee
Iprivacy Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iprivacy Llc filed Critical Iprivacy Llc
Priority to AU62290/00A priority Critical patent/AU6229000A/en
Publication of WO2001008066A1 publication Critical patent/WO2001008066A1/en
Publication of WO2001008066A9 publication Critical patent/WO2001008066A9/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3676Balancing accounts
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0613Third-party assisted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Definitions

  • the invention disclosed herein relates to transactions over a communications network
  • first and second parties including ordering of a good and/or delivery of the good
  • information may include the first party's identity, financial information (where a purchase is
  • the first party may be a consumer or retail customer and the second
  • the party may be a merchant or retailer.
  • the good may be delivered to a physical address or
  • Communication network is meant in a broad sense, and may include any suitable
  • Such a network may include a computer or computers associated with the first
  • Such a communications network may link
  • computers e.g., a LAN or WAN.
  • LAN local area network
  • WAN wide area network
  • invention is primarily directed to the ordering and/or purchase and physical delivery of goods
  • This information can be processed, for example, to electronically profile users, and used or
  • a first party customer in the transaction represented in Fig. 1 , a first party customer
  • the second party merchant in step 1.2 requests credit authorization for the
  • step 3 the merchant confirms the transaction
  • the customer provides credit card
  • the merchant passes the credit card
  • the merchant acquires information and the sum of the transaction to the credit card clearing entity.
  • first party which are both provided to the shipper. Additionally, underlying communication protocols and systems may provide
  • the customer's computer has an identifying
  • IP address used to route data packets to the merchant computers or servers. This IP address
  • Some of these tools enable Internet users to insert pseudonyms into Web forms, so that users
  • the substitute identifiers are site specific, and are consistently used so that a server site
  • the proxy system may perform all functions within a
  • peripheral proxy system e.g., at a user site
  • the proxy system may provide its own credit card number
  • U.S. Patent No. 5,794,221 discloses an Internet billing method in which an ISP
  • the customer browses in the usual way and the
  • first party's postal address can be sufficiently revealing of personal identity that without some
  • shipping involves at least three participating entities: a
  • sender an entity that wishes to deliver a good, who can be a merchant, vendor, retailer or
  • a recipient a target entity to receive the good— who can be a
  • the sender provides identification of the recipient and the recipient's address to the shipper in
  • This data may
  • a recipient can use a post-office box (POB), or its variants.
  • POB post-office box
  • POB operator e.g., the post-office (shipper), or private operators
  • a POB requires the recipient to first arrange for a mailbox with the POB provider. This restrictive requirement discourages use by persons or entities who occasionally desire privacy. POB is typically used for other reasons and for mass market privacy-protected distribution applications.
  • Pre-allocated space the provider of a POB service pre-allocates storage space for the mailbox owner and charges each mailbox owner a storage fee. This restrictive requirement also discourages use by persons or entities who occasionally want privacy.
  • a POB provides one-way privacy protection. If the recipient wishes to return the good in a verifiable way, the recipient must disclose his, her or its identity and association with the POB.
  • Non-provability of delivery in a dispute concerning a lost package, the shipper cannot prove that a package was actually delivered to the recipient.
  • Single-failure compromisability the privacy of a POB owner can be compromised through a single incident of correlating the identity of the owner with the mailbox number.
  • object of the invention to provide the operator or provider a fee for this service.
  • network users e.g., first party purchasers, etc.
  • network users e.g., first party purchasers, etc.
  • deliverable including a physical good, an electronic or virtual good and a service which
  • second party to the electronic transaction.
  • first party and/or the device or computer used by the first party means preventing other parties (who may or may not be parties to a transaction or communication involving the first
  • information may include: an identity which may be a true physical and/or true electronic
  • Such information may be derived from multiple collections stored and provided by multiple
  • a communications network such as the Internet
  • communications and/or a transaction can be
  • a user or first party typically a consumer, or a prospective or actual
  • a good is ordered, and/or purchased and/or paid for and/or delivered, while securing such information of the first party with respect at least to the second party.
  • invention provides methods, systems and software for doing this and other things.
  • the parties may request the communications network.
  • the parties may request the communications network.
  • a gate array though not technically a computer may be considered to be a computer or the
  • delivery of a physical good may be made to a
  • the first party has private information of the first party at least with respect to the second party.
  • any appropriate physical address e.g., residence or business
  • an appropriate physical address e.g., residence or business
  • an electronic good may be delivered to an electronic address designated by the first party while securing the private and personal information of
  • a user or first party may communicate over the network with a
  • the proxy may provide a different identity for a user for a set of
  • the proxy may use a unique session number (#F) generated by the proxy for
  • the proxy party is anonymized or privatized vis a vis the second party.
  • the proxy may provide the same identity for a user for all
  • the proxy can provide a user name
  • a user history may be
  • the proxy may also alter information from the first party directed to the network or
  • the proxy may also provide for payment and/or delivery of an ordered
  • the proxy may or may not know the true identity of the first party, or any private or
  • a proxy is not required, unlike the proxy system disclosed in
  • first party appear to others to be from a party with an identity of the transacting identifier.
  • credit clearing entity stores information linking the true identity of the user and the
  • This embodiment may also provide for altering information from the
  • a retailer provides the bank or credit card clearing entity with a transacting identity, they link
  • the transacting identity to browse, subscribe to an ISP and/or to obtain telephone service for
  • the bank or credit card company performs some of
  • a proxy may be provided for the
  • the proxy may expire identifiers and/or user names similar to the manner in
  • the expiration cycle for the identifiers and user names may be linked to (e.g., the
  • a first party having information of a personal or
  • a delivery address to which the good can be delivered is provided over the network to the second party while securing said
  • the first and second parties communicate with each other over the network using
  • the proxy may be any proxy or computer, e.g., PCs.
  • the proxy may be any proxy or computer.
  • the proxy may be any proxy.
  • proxy device typically a computer or computers, and/or proxy software
  • a user device typically a computer (PC) and/or a proxy device, typically a
  • Proxy software includes software executed by devices or computers used by the first
  • a proxy may be any proxy
  • system includes the proxy software, one or more devices or computers for executing the proxy software
  • proxy software may include other elements as disclosed herein.
  • Proxy software and
  • network is altered using software associated with a first device used by the first party or a
  • this software provides the delivery address to the
  • the proxy software may be executed by a central proxy device to provide the
  • the delivery address is provided by the first party device.
  • the good may be a physical good and the delivery address is a physical
  • the delivery address may be that of a depot, where the good may be made available for pick up by or on behalf of
  • secure said information of the first party, designated by the first party may be provided for by
  • a first physical address e.g., a depot
  • the first physical address, given to the second party, does not
  • the delivery address may be a proxy address that
  • Shipment to the first delivery address may be referred to as a
  • Second hop or “last hop” shipment.
  • the good may also be an electronically transmittable file and the delivery address an
  • the file is electronically transmitted to the proxy or the first party. If the file is electronically
  • the file is then transmitted to an electronic address of the first party, which may not secure said information of the first party, and which is available to the proxy,
  • the electronic address is a
  • Provision may be made, with or without a delivery provision, for approval or
  • provision may be
  • Approval or disapproval may comprise another party providing for approval or
  • payment (e.g., crediting an account) may be provided to the second party, if the purchase is
  • the other party may
  • the other party may arrange with at least a third party to provide for approval or
  • the other party may be the proxy, or a bank or
  • the other party may be a proxy party and
  • proxy software associated with the first party's first device or a proxy device, or
  • the proxy both, to provide for payment to the second party and debiting of the first party.
  • Approval or disapproval by a third party may be provided using a third device
  • transacting identity may be a bank or credit card company which may also provide the first
  • bank or credit card company which has a database linking true identities and true accounts to
  • the bank or credit card company credits the
  • first party provides a delivery address to the second party, and delivery is otherwise treated as
  • the invention is applicable to payment via a credit card or other means, e.g., e-cash or
  • a transaction fee or service charge may be levied
  • Netting and settling among the first, second, proxy and other parties involves crediting and debiting various accounts for the purchase price of the good and all or parts of
  • the fee may alternatively be a subscription or sign-up fee which enables
  • the fee may be periodic and fixed for each period, or
  • a third party approves the credit of the first party purchaser
  • proxy may or may not have an account with the third party, and the proxy need not be
  • two parties in addition to a proxy party are involved in the
  • a third party approves the credit of a first
  • fourth party approves credit of the proxy party and electronically debits the proxy party
  • the third party approves the credit of
  • the first party and the fourth party approves the credit of the third party.
  • the first party and the fourth party approves the credit of the third party.
  • the accounts can be credit card accounts, and also a fee is paid to the proxy party,
  • a system implementing the invention described above may be
  • the first party's private information is withheld from the second
  • the first party's credit card company (a third or
  • fourth party could be provided with price information only, with price and good information
  • the last hop delivery may be made by a shipper who is
  • the first party's identity and credit card number are not transmitted between parties,
  • the first party's account information is not
  • the proxy transmits proxy account information to the second party, not first party account information.
  • the proxy need not have the true account
  • the invention allows private and personal information to be withheld from the
  • invention provides to Internet users should allay their fear of conducting e-commerce over
  • the invention is implemented on the Internet (although
  • the invention is not so limited), and comprises information-processing modules (hardware,
  • the user's identity may be known
  • the browsing behavior the items purchased, the identity of the vendor, and the
  • the user's financial information are secured or withheld from the ISP.
  • the user's credit card is secured or withheld from the ISP.
  • the transaction database or a similar database may also be used to measure
  • the invention acts as an information buffer between the user and the goods, etc.
  • a proxy transaction database may be provided in
  • the proxy transaction database indexes and links the
  • unique session number may be used as an index to the transaction to route messages from
  • the proxy transaction database or another secured address mapping (SAM) database
  • Second party vendors typically include identifying information on
  • the proxy computer software may transmit to second party vendors
  • the NAME field, or some other field, of the second party vendor's form-based web page may
  • the unique shopping session number (#F) may be a tracking number and/or linked to
  • a tracking number may be stored in the SAM database and/or provided
  • Third and other parties may also provide transaction databases to store transaction
  • first party private and personal information is secured at least
  • first parties can selectively be made available to parties other than the second party such as
  • the proxy need not know the true identity of the
  • proxy any private or personal information of the first party. Regardless, a proxy
  • the proxy party may be any other party.
  • the proxy party may be any other party.
  • the proxy party may be any other party.
  • the proxy party may be any other party.
  • proxy
  • consistent user name may be provided for a particular user to a particular vendor.
  • the invention provides for reconfiguration of the software on a party by party basis to
  • the invention utilizes a proxy and is
  • proxy software executed on user or first party computers and on one or more
  • the software may be provided to users by way of a download or
  • the software on the user's computer operates in conjunction with the user computer's browser, such as Microsoft Internet
  • proxy software on the user's computer and the proxy computer(s) cause all communications
  • a unique proxy identifier is assigned to each copy of
  • proxy software provided to a user.
  • the proxy system need not
  • the proxy identifier is withheld from the user so the user cannot link their true identity with
  • the proxy system can use the proxy identifier to automatically apply preferences to a
  • proxy system may store in a secure way the user's credit card information linked with the
  • the proxy may not have the user's true name and
  • proxy system operator proxy party
  • the transaction i.e., provide for payment to a second party and debit a first party directly.
  • proxy party may be paid a transaction fee for each transaction (or on some other basis).
  • the user's bank provides
  • the proxy identifier identifies one user.
  • sub-accounts may be set
  • the sub-account may, for example, be identified by a field or fields in the proxy
  • the proxy system In conjunction with the user's credit card issuing company or bank, the proxy system
  • proxy software with its unique proxy identifier may be considered as a distinct plastic credit
  • the proxy system can expire the user's proxy software
  • proxy software and proxy identifier can be made unauthorized
  • proxy software (with a new proxy identifier) whenever the user is provided with a new credit
  • proxy identifiers selectable by the user for his, her or its purchases, or a copy
  • a user may store his, her or
  • proxy credit card on more than one computer, e.g., a palm top and a desktop PC.
  • a user may provide the proxy system with more that one credit card number for each
  • the proxy system allows the user (first party) to be represented not as an individual
  • a user may allow someone else to make an e-commerce purchase
  • transactor is known only to the user when the user allows someone else to use the user's
  • the proxy system essentially provides an electronic means to
  • the proxy system may provide security against unauthorized use of a
  • proxy identifier by requiring secret information such as a PIN or password or a biometric be
  • the proxy software alters a variety of information about the user and his, her or its
  • the user simply follows the vendor site's usual procedures, selects the good to be ordered,
  • the proxy computer may substitute its own set of procedures for the vendor's
  • the user may supply proxy information by clicking a menu of
  • the invention provides comprehensive multi-layer privacy protection, examining
  • IP and future protocols address information of the client computer is replaced with a proxy address.
  • the transport protocol layer e.g., HTTP and future protocols
  • client computer information of the transport protocol layer e.g., HTTP and future protocols
  • the invention also provides for replacement of compromising procedures, e.g.,
  • the invention replaces compromising active code (e.g., Java applets and
  • XML Active X
  • XML is a new extension of HTML which allows services to
  • a proxy computer provides the user's credit card company
  • bank with the user's unique proxy identifier which the bank correlates with the user's credit
  • credit card information is not known to the proxy and is not transmitted to or by the proxy.
  • the user's true credit card information is not transmitted at all on the network.
  • Information other than the purchase price may or may not be transmitted to the user's bank depending upon the arrangement between the proxy system operator and the bank.
  • information about the vendor, the good(s) being purchased or the shipper may also be included.
  • the user's bank authorizes (or declines to authorize) the purchase, and conveys such
  • proxy computer enters the order with the online vendor using the proxy system operator's
  • the proxy system may implement the credit function with a bank or banks in different ways.
  • a single bank is involved in a transaction, which authorizes a
  • the bank may be provided with a description of the good, and of course has
  • the single bank can be provided with all details of
  • two banks are involved: one as the credit card
  • the vendor charges the purchase price to the proxy system operator's bank and the
  • proxy system charges the purchase price to user's credit card, and netting provides the two
  • the proxy system provides shipping instructions to the second
  • the proxy system may
  • proxy computer(s) can be referred to as privacy protection computers to distinguish
  • the first party user transmits the transacting identity and account to
  • the second party vendor who requests approval from the bank.
  • the first party vendor who requests approval from the bank.
  • the first party vendor who requests approval from the bank.
  • party acting on behalf of the bank may handle shipping (depot operation, label-switching,
  • the invention provides privacy-protected shipping
  • Two-way Privacy The recipient of a good ordered using the invention, i.e., a user of the proxy system, can not only have the good delivered, but can return the good as well, while assuring that his, her or its identity is disclosed only to the proxy party or a party authorized by the proxy party and remains completely anonymous with respect to any distrusted participant in the shipping chain (i.e., the second party vendor, and possibly the shipper, if the shipper is not authorized by the proxy party to receive private information. The second party cannot identify the recipient from any data available to it either for shipping or for returns).
  • Two-way verifiabilitv T e second party vendor and shipper can verify with the proxy party or a party authorized by the proxy party without compromising privacy that the recipient received or returned the package in a manner that can allocate responsibility for loss.
  • One-time transaction privacy Privacy is provided for each individual shipping transaction independently of other shipping transactions. In particular, it does not require long term per-recipient allocation of space or other resources; furthermore, should privacy be compromised by one transaction, it does not enable compromising additional transactions.
  • the invention provides two techniques to accomplish privacy-protected shipping: label-
  • ODM virtual mailbox agent
  • label switching involves switching the labels on a package.
  • label switching may be provided
  • the second party vendor provides the package with the ordered good for shipping
  • the label-switching agent authorized by the proxy party to handle private information.
  • trans-shipper then delivers the relabeled package.
  • the authorized label- switching agent reverses the process and relabels the package with the respective transaction
  • Label-switching also applies to electronically delivered goods.
  • electronically delivered goods For example,
  • a file delivered to an electronic depot with the depot's electronic address may be
  • Label-switched shipping may include the following. A recipient concludes a transaction
  • the proxy party generates the
  • the unique transaction identifier may be applied in machine readable form using any suitable
  • the unique transaction identifier serves to
  • identifier may therefore serve as a data key to the entire transaction and may be used to store
  • transaction data such as recipient name, address, second party vendor, credit card
  • the unique transaction identifier may be, or may be
  • the proxy party provides the unique identifier and the respective recipient identity and
  • the package is delivered via a shipper to the recipient.
  • the package is delivered via a shipper to the recipient.
  • OVM operates as follows. The second party vendor labels the package containing the
  • the recipient provide two pieces of identifying data.
  • identifying data may be secret information such as a confidential code or a pass word or
  • the shipping instructions include the unique transaction identifier which is associated
  • the unique transaction identifier is such that the user's
  • the OVM agent releases the shipment based on a presentation of the unique transaction
  • trans-shipper may know the identity and
  • the trans-shipper does not know the contents of the package or the price
  • the identity of the second party vendor and the good may be printed
  • the package delivered to the authorized label-switching agent may be repackaged, i.e., placed into another package or
  • An OVM agent may also be required to repackage or wrap a package
  • the user remain anonymous to the second party vendor, and no third party has all information
  • shipping, labeling, depot operation and trans-shipping may be handled by the bank or a party
  • the proxy system includes or uses the following.
  • the user proxy software is stored on a user's PC or other device capable of accessing a network-based information systems or communications networks such as the Internet/World Wide Web. Each copy of the user proxy software is registered and is assigned a unique and secured proxy identifier (I). The proxy identifier is preferably withheld from the user to enhance security as indicated above. For example, the proxy identifier is embedded in the user proxy software so that a typical user can not access it.
  • the user proxy software is "registered" with the proxy system operator which serves as a privacy protection agent. As described above, multiple related users of the same registered copy of user proxy software can be accommodated in one or more fields of the proxy identifier, or otherwise. Also, multiple copies for multiple users may reside on the same computer.
  • the user proxy software can be distributed by the proxy system operator or a bank or credit card company affiliated with the proxy system operator, or the proxy system operator may be a bank or credit card company.
  • Proxy computer software is stored on one or more proxy computers and identifies registered user proxy software, indexes or links to a user's bank account (or debit account, or electronic check account, or credit card account) or some other account used for transacting business or purchasing items. (This user financial information is not made available to the proxy system operator, who only has information to index to the user financial information.) Proxy computer software also performs shipping, label generating and switching functions, and tracking status (during shipping and return) and shipping status.
  • the proxy software (user prosy software and/or proxy computer software) includes filtering software, preferably the filtering software described herein
  • Proxy computer(s) One or more proxy computers are owned and/or operated by the proxy system operator, and operate in conjunction with the proxy computer software to control transactions, including a secured address mapping (SAM) database that links purchase information with user's shipping address, and a transaction database for purchase, shipping and transaction information.
  • SAM secured address mapping
  • Different proxy computers or software modules may perform different functions. For example, separate computers or modules may be used to perform privacy functions (e.g., handling communications between an on-line second party vendor and a first party user while maintaining user anonymity), transaction logging, shipping, label-switching, transaction inquiry handling and confirmation (e.g., linking the proxy system database and a shippers tracking database), etc.
  • privacy functions e.g., handling communications between an on-line second party vendor and a first party user while maintaining user anonymity
  • transaction logging shipping, label-switching
  • transaction inquiry handling and confirmation e.g., linking the proxy system database and a shippers tracking database
  • a browser program Software or some other means of accessing the communications network stored on a user's PC or other appliance.
  • Bank authorization software Software stored on the proxy computer(s) and/or on one or more computers of one or more banks for submitting transaction information to the bank and receiving in return authorization or denial information.
  • Proxy party credit system In some embodiments, a credit card account or other credit arrangement by which credit of the proxy system operator is involved in the purchase of the goods from retailers.
  • a user must have a credit card account, or other account information
  • the proxy system may operate as
  • the user must provide information such as his, her or its credit card
  • a copy of the user proxy software is given, mailed or shipped to the user, who
  • the user proxy loads it on his, her or its PC, e.g., as a plug-in to the browser on the PC.
  • the user proxy e.g., as a plug-in to the browser on the PC.
  • proxy system computer or prompt the user to access the proxy system, and can complete
  • the registration process automatically or in response to prompts, or a combination thereof.
  • the registration process may require input by a user of secret information such as a PIN or
  • the user proxy software may set private shopping as a default, whenever the
  • the user proxy software may first issue a request to the user to enter secret
  • information such as a PIN, password, biometric, key or some other identifying information to
  • Proxy system creates a session: The proxy computer software creates a
  • #F unique identifier
  • the user proxy software transmits to the proxy computer software unique and
  • the proxy system may appear "wrapped” or "framed” within a window, frame or panel
  • the proxy system or as largely provided by the second party vendor but with a
  • the proxy system When a user browses through the proxy system, the proxy system
  • the proxy system may provide banner messages, or scrolling or pop up messages
  • the proxy system communicates with the second party vendor: The user
  • proxy software on the user's PC provides menus called, for example, by right mouse button
  • the user may then right click the mouse to reveal a pop-up menu of
  • NAME NAME
  • the user proxy software provides the proxy system's
  • proxy computer software alone or in conjunction with the user
  • proxy software provides the proxy system's identity.
  • the proxy system's identity may be
  • proxy system to fill out the form entirely with the proxy system's own identity information.
  • the clicking actions by the user essentially directs the proxy computer software to transmit
  • the proxy computer software does not have and does not transmit the user's credit
  • check account information or some other information that provides for a billing, or charge
  • the proxy computer software also transmits as part of the identifying information the
  • proxy system's shipping (e.g., depot) address The user's real shipping address has either been
  • the proxy computer software for further processing.
  • the proxy system additionally removes and replaces any identifying, private and
  • the proxy temporarily stores transaction information until a transaction is completed.
  • the proxy system completes the transaction with the second party vendor:
  • the proxy computer software also completes the
  • the second party vendor obtains authorization from the proxy system operator's bank
  • the proxy computer software waits for and receives from the second party vendor
  • confirmation information (e.g., a confirmation page) that the proxy computer software stores
  • This archived confirmation information includes all identifying
  • proxy computer in a transaction database
  • the shipping information may be stored in a secured address
  • SAM mapping mapping
  • #F unique session number
  • Information supplied by a second party vendor and proxy system supplied information may be down ⁇
  • the proxy system submits a transaction to the bank:
  • server software now transmits purchasing information to a bank as if a customer (the user)
  • the proxy system passes to the bank the user's
  • proxy identifier that allows the bank to identify the user as a bank customer and access the
  • the proxy system database may store user
  • the proxy system may transmit
  • the proxy system enables
  • the proxy system notes transaction, as well as the transaction amount that includes at
  • the proxy system may charge for use of its service.
  • system may thus charge the user an amount that is displayed to the user with confirmation
  • This information may be directly displayed to the user who may still be
  • browsing or it may be transmitted by some other means at a later time, for example email.
  • the bank returns or communicates to the proxy system sufficient authorization
  • the second party vendor is
  • the user credits the proxy system for the purchase of goods and pays the proxy system part of
  • the correspondent bank matches the transaction with the user's credit card bank, nets the
  • the user's bank and the proxy system operator's bank may be any type of financial institution.
  • the proxy system operator's bank may be any type of financial institution.
  • the authorization and other transaction information with the bank is also stored in the
  • the proxy system may first submit
  • the user's bank may have pre-authorized the user's transactions by
  • proxy system e.g., by a proxy shipping computer from the secured address mapping (SAM)
  • the proxy system can not be linked to the user by the second party vendor.
  • SAM mapping mapping
  • the packaged goods can simply be stored
  • the packaged goods can be relabeled with other information
  • the packaged goods may also be referred to as the packaged goods.
  • the proxy system notifies the user of shipment by the second party vendor, receipt
  • the proxy system may provide the user and the depot with information
  • proxy computer(s) can be by e-mail, as can certain communications between the proxy
  • proxy software the user may register by e-mail (encrypted).
  • the proxy may capture the
  • registration data and forward it by e-mail to a database (e.g., the transaction database).
  • a database e.g., the transaction database
  • the proxy may capture the information and e-mail it to the database (e.g., the
  • information may also be sent by e-mail as well as in response to requests transmitted by the
  • Fig. 1 is a block and flow diagram representing a conventional multi-party e-
  • Fig. 2 is a block and flow diagram of a conventional shipping transaction involving a
  • Fig. 3 is a block diagram of an embodiment of a system incorporating the invention
  • Fig. 3 A is a block diagram of an alternate embodiment of system depicted in Fig. 3
  • Fig. 3B is a block diagram of an embodiment of a system which provides for purchase
  • Fig. 3C is a block diagram of a portion of system depicted in Fig. 3 showing an
  • Figs. 3D is a block diagram of alternate on embodiment of a system incorporating the
  • Figs. 3E-3H are flow diagrams showing credit approval and crediting/debiting of the
  • Fig. 4 is a block and flow diagram illustrating an electronic purchase made using the
  • FIG. 3B Figs. 4A-4Q illustrate specific steps and data flows carried out using the system
  • Fig. 5 is a diagram illustrating transaction authorization and netting procedures carried
  • Fig. 6 is data diagram representing data generated in a transaction using the system
  • Fig. 7 is a data diagram representing data generated in a transaction using the system
  • Fig. 8 is a table showing data generated during a transaction and the parties who have
  • Fig. 9 is a diagram showing IP protocol layers of IP packets processed by first party
  • Fig. 10 is a flow chart illustrating an algorithm for filtering outgoing information from
  • Fig. 11 is a flow chart illustrating an algorithm for filtering incoming information
  • Fig. 12 is a flow chart illustrating authorization of a purchase from a first party
  • Fig. 13 is a block and flow chart illustrating shipping, relabeling and delivery of a
  • Fig. 14 is a block and flow chart illustrating operation of depot pick-up of a good
  • the invention provides methods and systems which enable users
  • a communications network such as the Internet to communicate, and/or order, and/or
  • Embodiments of the invention may or may

Abstract

A method and system which enable a first party computers (106), and a second party merchants, represented by a second party computers (110) through a proxy server computer (108) and a proxy software (114). The computer (108) represents a proxy party or proxy system operator. A third party, represented by a third party computer (116), pays (credits) second party merchants for respective goods purchased by first party customers and debits the accounts of respective first party customers.

Description

ELECTRONIC PURCHASE OF GOODS OVER A COMMUNICATION NETWORK INCLUDING PHYSICAL DELIVERY WHILE SECURING PRIVATE AND PERSONAL INFORMATION.
BACKGROUND OF THE INVENTION
The invention disclosed herein relates to transactions over a communications network
between first and second parties, including ordering of a good and/or delivery of the good
and/or payment for the good while securing private and personal information specific to the
first party or the network device used by the first party with respect to the second party and
unauthorized parties, i.e., others who may or may not be parties to the transaction. Such
information may include the first party's identity, financial information (where a purchase is
involved) and address. The first party may be a consumer or retail customer and the second
party may be a merchant or retailer. The good may be delivered to a physical address or
electronic address designated by the first party or to a physical depot for pick-up by the first
party, while providing complete anonymity of the first party with respect to the second party.
"Communications network" is meant in a broad sense, and may include any suitable
technology for information transmission, including electrical, electromagnetic and optical
technologies. Such a network may include a computer or computers associated with the first
party, a computer or computers associated with the second party and/or a computer or
computers associated with the network. Such a communications network may link
computers, e.g., a LAN or WAN. Although the invention has particular application to an
open network such as the Internet, it may also be used in other networks, internets and
intranets. Therefore, while much of the following description makes specific reference to the Internet, it is to be understood that there is no intention to limit application of the invention to
the Internet and that the invention has application to any suitable network. Further, while the
invention is primarily directed to the ordering and/or purchase and physical delivery of goods
from retailers selling electronically over a network, it also applies to the ordering and/or .
purchase of goods that may be delivered electronically and to the purchase and delivery of
services that result in a deliverable.
The growth of electronic commerce (e-commerce) over the Internet has been
explosive, and expectations are that such growth will continue. However, the Internet as an
open network provides opportunities to legally and illegally collect and use vast amounts of
information which people consider private and personal, and concerns over privacy, fraud
and security online could inhibit the continued explosive growth of business-to-consumer
electronic commerce. Currently, shopping, browsing or other information-sharing activities
on the Internet exposes users to unwanted collection of their private and personal
information, from which their identities, activities, behaviors and preferences can be
ascertained. Many people are fearful that someone may be watching their every move when
they interact on the Internet, and that somehow information collected by such persons will be
used to their disadvantage, from outright theft using credit card information to unwanted
intrusions from marketers in the form of "spam" email, and other intrusive activities. (See,
e.g., 1999 National Consumer League: Consumers and the 21st Century, New York: Louis
Harris & Associates, Inc., 1999).
In fact, information on the Internet is currently being captured from mouse clicks
made on a Web browser by a user, and from information transmitted by a user to a Web site. This information can be processed, for example, to electronically profile users, and used or
sold, depending upon the data collector's privacy policy. Internet users are becoming aware
of the relative ease with which parties may obtain their private and personal information and
are concerned about the gathering of such information and the potential for its distribution.
They are also concerned about interception of credit card numbers and other financially
related data.
As a result, many people, fearful of providing their private and personal information,
are restricting their use of the World Wide Web. This may be manifested by potential users
seldomly accessing the Internet, by users cautiously not submitting or clicking anything of a
private or personal nature, and by users not entering into e-commerce transactions, any of
which of course inhibits e-commerce and development of the full potential of the e-
commerce marketplace.
Since most business-to-consumer transactions conducted over the Internet involve the
use of credit or debit cards, and consumers are protected by the legal limits on liability for the
unauthorized use by third parties of their cards, the parties most concerned about security and
fraud prevention have naturally been the banks, credit card companies and merchants which
must bear the cost of fraudulent transactions for which their card holders are not legally
liable. Encryption of credit card and other data transmitted over the Internet helps banks and
credit card companies protect against unauthorized use of credit cards.
Nonetheless, despite the limitations on their legal liability described above, a great
number of consumers remain hesitant about electronic commerce. Their concerns include
questions about whether the merchants doing business in electronic commerce actually exist outside of "cyberspace," whether they will misuse credit card, private and personal
information provided to them, whether they will correctly and honestly fulfill orders, honor
product warranties and return-for-credit guarantees, and the like. (See G. Gray and R.
Debreceny, The Electronic Frontier, 185 Journal of Accountancy 32-37, May 1998.)
To complete an electronic transaction in current and emerging e-commerce, one or
more of the parties to the transaction must pass private and/or personal information to
another party. For example, in the transaction represented in Fig. 1 , a first party customer
(consumer) submits an order for a good in step 1.1 to a second party merchant (retailer) using
a WWW form. The second party merchant in step 1.2 requests credit authorization for the
transaction with a respective credit card clearing entity. Upon authorization of the
transaction by the credit card clearing entity (step 3), the merchant confirms the transaction
with the customer (step 1.4) and then provides for transfer of the good to a shipper (step 1.5)
who delivers it to the customer (step 1.6). These different steps involve transfer of private
and/or personal information among the parties. The customer provides credit card
information and a shipping address to the merchant. The merchant passes the credit card
information and the sum of the transaction to the credit card clearing entity. The merchant
may also pass identification of the purchased good or service to the credit card clearing
entity, at least in cases where the credit card clearing entity provides or extends product
warranties or another service which require an identification of the good. The merchant
provides for transfer of the good to a first party's shipping address usually in the name of the
first party which are both provided to the shipper. Additionally, underlying communication protocols and systems may provide
additional private and/or personal information. The customer's computer has an identifying
IP address used to route data packets to the merchant computers or servers. This IP address
is often monitored by unknown parties and merchant systems, and incorporated in databases
to enable the merchant and others to identify the customer as soon as the customer accesses
services in the future. Over time, merchants (and others) collect such private information and
share it with various entities compromising consumer privacy.
These databases are provided or bought and sold among organizations and companies
who may then correlate this information along with other information producing larger
databases that store very detailed history of the user's activities and behaviors, often without
user's being aware of this activity. Users' histories are thus correlated over time often using
their transactions that are linked to their true identity.
Tools have been developed to address privacy and security concerns of Internet users.
(See, for example, the February, 1999 issue of Communications of the ACM, Vol. 42. No. 2.)
One approach developed to help protect the identity of Internet users which allows them to
surf the Web anonymously utilizes anonymizing agents, which prevent a user's IP address
from reaching a Web site. This approach requires that the users trust the anonymizing agent.
Some of these tools enable Internet users to insert pseudonyms into Web forms, so that users
can anonymously return to the same site as the same user. Different pseudonyms can be
provided for different Web sites. Examples of anonymizing (and pseudonym) agents
include: "The Anonymizer" (www.anonymizer.com); "Lucent Personalized Web Assistant"
(LPWA) (www.bell-labs.com/project/lwpa); Novell Directory Services (NDS) "digitalme"; Zero Knowledge System's "Freedom" (www.zeroknowledge.com); PrivaSeek's
"PersonaXpress" (www.privaseek.com and www.personaxpress.com).
Another approach, which does not require an anonymizing agent, randomly routes
requests to a Web site through numerous users without shielding the IP address of any of the
users so that neither the destination Web site nor any user (or intermediate node) through
which the request was routed can determine the IP address of the originating user. Examples
of tools which provide anonymity in this way include: "Crowds"
(www.research.att.com/projects/crowds); and "Onion Routing" (www.onion-router.net).
In addition, a privacy seal program has been instituted by a non-profit organization,
TRUSTe. Display of the TRUSTe "trustmark" by member Web sites requires that they
adhere to established privacy principles and agree to comply with ongoing TRUSTe
oversight and consumer resolution procedures, including: adoption and implementation of a
privacy policy that takes into account consumer anxiety over sharing personal information
online; notice and disclosure of the Web site's information collection and use practices; and
the opportunity for users to exercise control over their information.
European Patent Application Publication EP 0 855 659 Al of Lucent Technologies
Inc. describes a proxy system that allows anonymous browsing on the Internet. The proxy
system substitutes identifiers in browsing commands received from a user which would
identify the user, and filters other information (e.g., HTTP Header fields) associated with
browsing commands that would allow server sites to determine the true identity of users.
The substitute identifiers are site specific, and are consistently used so that a server site
recognizes a returning user and may provide personalized service, and so that the proxy system is transparent to server sites. The proxy system may perform all functions within a
central proxy system, or some functions in a peripheral proxy system (e.g., at a user site) and
some in a central proxy system. The proxy system may provide its own credit card number
or an alias credit card number to a requesting site and collect money from its users.
U.S. Patent No. 5,794,221 discloses an Internet billing method in which an ISP
through agreement with customers and vendors pays vendors and collects from customers for
products and services purchased by the customer over the Internet without the need for the
customer to transmit credit information to the vendor. While the method improves security
of the financial aspect of a transaction, the customer browses in the usual way and the
method does not provide for customer anonymity.
Examples of systems and methods for anonymous and/or secure Internet
communications and transactions are disclosed in U.S. Patent Nos. 5,420,926, 5,557,518,
5,729,594 and 5,815,665, Japanese Patent Application Publication 10-320646 dated April 12,
1998, and WIPO International Publication No. WO 97/26612.
As shown in Fig. 1 and discussed above, purchase of a good over the Internet requires
delivery of the good, which in turn requires a postal address. Postal addresses today are
maintained on numerous databases, many of which are available from a number of
commercial sources. Address matching software is likewise commercially available. Hence, a
first party's postal address can be sufficiently revealing of personal identity that without some
means of hiding address information from a second party, any effort by a first party to remain
anonymous or unknown to the second party cannot be guaranteed. Although this problem
has been recognized, to the knowledge of the inventors it has not been addressed, and there is no e-commerce system which allows a first party to electronically purchase a good from a
second party while not only securing the identity of the first party, but also the first party's
postal address. The use of post office boxes, discussed below, is an improvement, but not a
solution.
As represented in Fig. 2, shipping involves at least three participating entities: a
sender —an entity that wishes to deliver a good, who can be a merchant, vendor, retailer or
provider of the good; a recipient — a target entity to receive the good— who can be a
customer or purchaser or orderer of the good; and a shipper — an entity that transports the
good from the sender to the recipient. In a typical Internet transaction involving shipping,
the sender provides identification of the recipient and the recipient's address to the shipper in
order for the shipper to deliver the good to the recipient. The recipient must initially provide
data on his, her or its identity and address to the sender or the shipper or both. This data may
be collected, analyzed and correlated with other data to compromise the privacy of the
recipient.
The need for private shipping has been known for a long time and is currently
addressed through the use of a post-office box (POB), or its variants. A recipient can use a
POB to hide his, her or its identity from a sender. A recipient must however disclose his, her
or its identity to the POB operator (e.g., the post-office (shipper), or private operators) —
which functions as a trusted entity— once, and then uses the POB to protect the recipient's
identity from the sender.
There are several drawbacks to the use of POB techniques in providing privacy-protected
shipping for electronic commerce. 1. Pre-arranfied relationship: a POB requires the recipient to first arrange for a mailbox with the POB provider. This restrictive requirement discourages use by persons or entities who occasionally desire privacy. POB is typically used for other reasons and for mass market privacy-protected distribution applications.
2. Pre-allocated space: the provider of a POB service pre-allocates storage space for the mailbox owner and charges each mailbox owner a storage fee. This restrictive requirement also discourages use by persons or entities who occasionally want privacy.
3. Inability to handle returns: a POB provides one-way privacy protection. If the recipient wishes to return the good in a verifiable way, the recipient must disclose his, her or its identity and association with the POB.
4. Non-provability of delivery: in a dispute concerning a lost package, the shipper cannot prove that a package was actually delivered to the recipient.
5. Coordinated comprehensive privacy protection: shipping is only part of a commerce transaction through which a purchaser exchanges information with a vendor to purchase and obtain the good. To protect privacy, one needs to assure that no private data is transmitted through the entire transaction. POB shipping does not accommodate simple or obvious mechanisms that may be coordinated with other elements of the transaction to assure privacy.
6. Single-failure compromisability: the privacy of a POB owner can be compromised through a single incident of correlating the identity of the owner with the mailbox number.
There is thus a need to protect private and personal information, particularly of first party
users (purchasers, consumers, etc.) and provide security in e-commerce transactions,
particularly where delivery and/or purchase of a good is involved.
OBJECTS AND SUMMARY OF THE INVENTION
It is an object of the invention to provide communication over a communications
network, particularly an open network, with improved privacy protection for users of the
network. It is another object of the invention to reduce the unwanted collection and/or
dissemination of information related to users of a communications network, particularly an
open communications network.
It is another object of the invention to provide for the electronic order or purchase of a
good over a communications network by a first party from a second party while securing the
private and personal information of the first party with respect to the second party and
unauthorized parties, i.e., others who may or many not be parties to the transaction. It is
another object to provide for the delivery of the good while securing the private and personal
information of the first party with respect to second party and unauthorized parties. It is
another object to provide for return of the good while securing the private and personal
information of the first party with respect to the second party and unauthorized parties. It is
another object to provide for payment of the good while securing the private and personal
information of the first party with respect to the second party and unauthorized parties. It is
another object to also provide for electronic tracking of delivery while securing the first
party's private and personal information from unauthorized parties.
It is another object of the invention to reduce fraudulent purchases in e-commerce
transactions which use a communications network.
It is another object of the invention to provide for the credit processing aspects of an
e-commerce transaction conducted over a communications network while securing private
and personal information of the purchaser with respect to unauthorized parties (e.g., identity,
address and bank and credit account information, etc.). It is another object of the invention to provide for shipping of a good ordered
electronically over a communications network to the party that ordered the good while
securing private and personal information of the party that ordered the good with respect to
unauthorized parties.
It is another object of the invention to share information relating to electronic
purchases of goods by purchasers from vendors, retailers or merchants and provide a
database for the purpose of determining the performance of the vendors, retailers and
vendors.
It is another object of the invention to gather information about electronic transactions
and purchases that does not include private and personal information of purchasers, but
includes other information about the transaction, including information about the good, its
price, and the identity of the electronic vendor. It is another object to provide a database
which stores such information such that purchasers are anonymous in the database.
It is another object of the invention to provide a system and software for the electronic
purchase of a good over a communications network which secures private and personal
information of the purchaser with respect to unauthorized parties, and provides for electronic
payment to the electronic vendor without an operator or provider of the system and/or
software being liable to the merchant for payment on behalf of the purchaser. It is another
object of the invention to provide the operator or provider a fee for this service.
It is another object of the invention to provide such a system and software for the
electronic purchase of a good over a communications network which can be selectively
configured to provide certain transaction information to parties of the transaction while securing the first party's private and personal information with respect to the second party
and unauthorized parties.
It is another object of the invention to provide improved filtering of information from
network users (e.g., first party purchasers, etc.) to prevent others on a network from obtaining
private and personal information of users.
It is another object of the invention to protect private and personal information of
network users making electronic purchases over a network while providing flexibility to
accommodate multiple users per network device and per bank or credit card account.
It is another object of the invention to protect private and personal information of
network users making electronic purchases over a network while providing flexibility to
accommodate one, or more than one, bank or credit card entity, and to permit such flexibility
on a per user or per transaction basis.
Unless otherwise indicated expressly or by context, "good" encompasses a
deliverable, including a physical good, an electronic or virtual good and a service which
provides a physical, electronic or virtual deliverable. The terms "user", "purchaser",
"customer", "consumer", "recipient" and "orderer" are used interchangeably unless indicated
otherwise expressly or by context, and are encompassed by the term "first party" (to an
electronic transaction). Similarly, the terms "vendor", "retailer", "merchant" or "provider"
or "sender" of a good, are used interchangeably unless indicated otherwise expressly or by
context, and are encompassed by the term "second party" (to the electronic transaction).
Securing information of a private or personal nature of a first party or specific to a
first party and/or the device or computer used by the first party means preventing other parties (who may or may not be parties to a transaction or communication involving the first
party), typically at least the second party, from obtaining such information as may be
generated, transmitted, stored or collected in a transaction and from which another party may
learn the private or personal information of the first party. Such private or personal
information may include: an identity which may be a true physical and/or true electronic
identity of the first party and/or a computer or device used by the first party; an address
which may be a true physical and/or true electronic address of the first party or the computer
or device used by the first party; and/or other information relating to the first party such as
social security number, driver's license number and bank and/or credit account information.
Such information may be derived from multiple collections stored and provided by multiple
parties and shared, linked and/or merged to reveal personal and private information and
behavior of the user over time.
The invention disclosed herein achieves the above and other objects, and provides for
users of a communications network, such as the Internet, to communicate, and/or order,
and/or obtain and/or receive, and/or purchase and/or charge or electronically pay for
deliverables using the network, while securing such information of a private or personal
nature of the users with respect to unauthorized parties, and providing improved protection
against fraud. In accordance with the invention, communications and/or a transaction can be
carried out between a user or first party, typically a consumer, or a prospective or actual
purchaser or customer, and a second party, typically a merchant, retailer or vendor, over a
communications network linking the first and second parties, in which information is
provided and/or a good is ordered, and/or purchased and/or paid for and/or delivered, while securing such information of the first party with respect at least to the second party. The
invention provides methods, systems and software for doing this and other things.
The terms "provides for" and "providing for" are meant in a broad sense, and
encompass a party or device directly or indirectly, alone or with or through one or more other
parties or devices, effecting the specified action(s), function(s), task(s), etc.
Depending upon the embodiment and the communications network, the parties may
use computers or other devices to communicate and provide for payment and physical or
electronic delivery. (The term "computer" is also used in a broad sense, and includes devices
which operate or include a component that operates in accordance with a stored set of
instructions, including PCs, microcomputers, microcontrollers. A hard-wired device such as
a gate array though not technically a computer may be considered to be a computer or the
equivalent of a computer as that term is used herein depending upon the function(s)
performed by the hard- wired device. For ease of description and claiming, "computer"
should be interpreted to include such other devices and instruments and such hard-wired
devices.)
In accordance with the invention, delivery of a physical good may be made to a
physical address of a physical facility designated by the first party which may be a depot for
pick-up anonymously by or on behalf of first party, or a second or last address while securing
private information of the first party at least with respect to the second party. The first party
may designate any appropriate physical address (e.g., residence or business), including an
address related to another party, e.g., a friend or a party to whom the good is delivered as a
gift. In accordance with the invention, an electronic good may be delivered to an electronic address designated by the first party while securing the private and personal information of
the first party with respect to other parties.
In one embodiment, a user or first party may communicate over the network with a
second party, using a proxy. The proxy may provide a different identity for a user for a set of
communications (e.g., browsing) or for each transaction. Thus, the user has a different
identity each time it establishes communication with a second party or for each transaction.
For example, the proxy may use a unique session number (#F) generated by the proxy for
each transaction to provide a unique alphanumeric name that is supplied to the second party
vendors. In a sense, the proxy party is anonymized or privatized vis a vis the second party.
Also, vendors will not be able to compile any use history on any user since new or unique
proxy identities generated automatically cannot be linked with other transactions over time.
Alternatively, the proxy may provide the same identity for a user for all
communications and transactions. In this embodiment, the proxy can provide a user name
which is a function of a unique name or proxy identifier (I) of each user and the proxy's
identity (public identity) (P) for each transaction. This user name is the same for each user
for all transactions and communications for all vendors. This, a user history may be
compiled by vendors and others for a user who is anonymous to them.
The proxy may also alter information from the first party directed to the network or
the second party so that the second party can not ascertain the first party's private and
personal information. The proxy may also provide for payment and/or delivery of an ordered
identity. The proxy may or may not know the true identity of the first party, or any private or
personal information of the first party. The proxy provided by the embodiments of the invention described immediately
above differ from the proxy system disclosed in the European patent application of Lucent
referenced above (EP 0 855 651 Al) because in one case the identity of the user changes with
each transaction or browsing or shopping session so that each transaction appears to involve
a different party without a repeat transaction from any party, and in another case the identity
of a particular user is the same for all transactions (browsing, shopping, etc.) with all
vendors, while in the published Lucent European patent application the identity of a
particular user with a particular Web site is the same for all communications and transactions
with that Web site and different for other Web sites.
In another embodiment a proxy is not required, unlike the proxy system disclosed in
the referenced Lucent European patent publication. In this embodiment, the user (first party)
is provided a transacting (or communicating) identity not the true identity of the user, which
is revealed to the second party but from which the second party (and unauthorized parties)
can not ascertain private or personal information of the first party. Second parties and others
can not link the true identity or other private or personal information to the first party (or the
first party's equipment) with the transacting identity. Thus, all communications from the
first party appear to others to be from a party with an identity of the transacting identifier.
Only the party providing the first party with the transacting identity can link the true identity
of the first party with the transacting identity. Where a purchase is involved, the bank or
credit clearing entity stores information linking the true identity of the user and the
transacting identity. This embodiment may also provide for altering information from the
first party directed to the network or the second party to prevent the second party from ascertaining the first party's private and personal information. The bank or credit card
clearing entity generates these transacting identities for all customers who use the inventive
system and method, and provides a database linking the transacting and true identities. When
a retailer provides the bank or credit card clearing entity with a transacting identity, they link
to the true identity to process the transaction. For an Internet application, users may also use
the transacting identity to browse, subscribe to an ISP and/or to obtain telephone service for
accessing the Internet. Thus, only the bank or credit card clearing entity will know the true
identity of the user. In this embodiment, the bank or credit card company performs some of
the functions of the proxy described in other embodiments.
In the embodiment which does not require a proxy, a proxy may be provided for the
purpose of collecting and storing transaction information for safe keeping and possible later
use, e.g., in the case of non-receipt or return of an ordered good, or a dispute on payment or
price, etc. The proxy may expire identifiers and/or user names similar to the manner in
which credit card company's expire credit cards. This will terminate the history that a vendor
has with a particular user and prevent vendors from maintaining long term preferences for
any user. The expiration cycle for the identifiers and user names may be linked to (e.g., the
same as) the expiration date of a user's credit card. Expiring identifiers and user names on
the same cycle as user credit card numbers, or more frequently such as after each transaction
may be also used as a fraud prevention measure.
In the preferred embodiments, a first party, having information of a personal or
private nature specific to the first party or a first device used by the first party, orders a good
from a second party over a communications network. A delivery address to which the good can be delivered is provided over the network to the second party while securing said
information of the first party with respect to the second party. Information from the first
party directed to the second party for communicating with the second party or to order a good
is provided while securing said information of the first party as indicated above.
The first and second parties communicate with each other over the network using
devices or computers, e.g., PCs. In the embodiment which uses a proxy, the proxy may be
or utilize a proxy device, typically a computer or computers, and/or proxy software
associated with a user device typically a computer (PC) and/or a proxy device, typically a
computer server.
Proxy software includes software executed by devices or computers used by the first
parties and/or software executed by one or more proxy devices or computers. A proxy
system includes the proxy software, one or more devices or computers for executing the
proxy software, and may include other elements as disclosed herein. "Proxy software" and
"proxy system" sometimes overlap and are sometimes used interchangeably as the context
will indicate. Preferably, information from the first party directed to the second party or the
network is altered using software associated with a first device used by the first party or a
proxy device, or both. In this embodiment, this software provides the delivery address to the
second party. The proxy software may be executed by a central proxy device to provide the
delivery address to the second party from stored information. In the embodiment that does
not require a proxy, the delivery address is provided by the first party device.
As mentioned, the good may be a physical good and the delivery address is a physical
address of a physical facility, where the good is physically delivered. The delivery address may be that of a depot, where the good may be made available for pick up by or on behalf of
the first party in a manner which does not require said information of the first party to be
revealed at the physical facility. Alternatively, delivery to a physical address, which may not
secure said information of the first party, designated by the first party may be provided for by
delivering first to a first physical address (e.g., a depot), without revealing the private and
personal information of the first party to the second party and unauthorized parties, and then
trans-shipping to a second or last physical address designated by the first party but not
revealed to the second party. The first physical address, given to the second party, does not
reveal the private and personal information of the first party. Although the second physical
address may reveal such information, it is made known at the first physical address and not
given to the second party. Alternatively, the delivery address may be a proxy address that
does not reveal the true physical address of the first party and that may be converted or
mapped by a shipper to the true physical address to which the good is to be delivered as
designated by the first party. Shipment to the first delivery address may be referred to as a
"first hop" shipment, and shipment to the second physical address designated by the first
party may be referred to as a "second hop" or "last hop" shipment.
The good may also be an electronically transmittable file and the delivery address an
electronic address of a proxy, or an electronic address of a first party having a transacting
identity that does not reveal said private and personal information of the first party. In either
case, electronic delivery to the respective electronic address does not reveal said information.
The file is electronically transmitted to the proxy or the first party. If the file is electronically
transmitted to the proxy, the file is then transmitted to an electronic address of the first party, which may not secure said information of the first party, and which is available to the proxy,
but not to the second party. If transmitted to the first party, the electronic address is a
transacting address which does not reveal the private or personal information of the first
party, as discussed above with respect to a transacting identity.
Provision may be made, with or without a delivery provision, for approval or
disapproval of a purchase of a good by a first party from a second party based on financial
information relating to the first party, and if the purchase is approved, provision may be
made for payment to the second party while securing said information of the first party with
respect to the second party. Information from the first party directed to the network or the
second party is secured as described above.
Approval or disapproval may comprise another party providing for approval or
disapproval of the purchase based on financial information relating to the first party, and
payment (e.g., crediting an account) may be provided to the second party, if the purchase is
approved, by other party who also provides for debiting the first party. The other party may
be a third party who approves or disapproves of the purchase based on financial information
relating to the first party, and who also pays (credits) the second party and debits the first
party if the purchase is approved.
The other party may arrange with at least a third party to provide for approval or
disapproval of the purchase based on the financial information relating to the first party, and
if approved the other party arranging with at least the third party to provide for payment to
the second party and debiting of the first party. In the embodiments described herein, the other party may be the proxy, or a bank or
credit clearing entity. In the proxy embodiment, the other party may be a proxy party and
may use proxy software associated with the first party's first device or a proxy device, or
both, to provide for payment to the second party and debiting of the first party. The proxy
can do this directly, or through at least one third party.
Approval or disapproval by a third party may be provided using a third device
communicating with the proxy software which also provides for crediting the second party
and debiting the first party if the purchase is approved.
In the embodiment that does not require use of a proxy, the party providing the
transacting identity may be a bank or credit card company which may also provide the first
user with an account which also can not be linked to the true identity of the first party. A
second party merchant simply forwards the transacting identity and account number to the
bank or credit card company, which has a database linking true identities and true accounts to
the transacting identities and accounts. The bank or credit card company credits the
merchant and debits the true account of the transacting first party. In this embodiment, the
first party provides a delivery address to the second party, and delivery is otherwise treated as
described above.
The invention is applicable to payment via a credit card or other means, e.g., e-cash or
other component of an electronic wallet. A transaction fee or service charge may be levied
for the transaction, similar to the fee levied in a credit card transaction. Part of the fee may
be paid to a proxy operating or otherwise associated with use of the invention or a proxy
system, etc. Netting and settling among the first, second, proxy and other parties involves crediting and debiting various accounts for the purchase price of the good and all or parts of
the service charge. The fee may alternatively be a subscription or sign-up fee which enables
a party to participate in purchases. The fee may be periodic and fixed for each period, or
based on the volume or dollar amount of purchases, etc.
In one embodiment, a third party approves the credit of the first party purchaser,
credits the second party vendor and debits the first party purchaser. In this embodiment, the
proxy may or may not have an account with the third party, and the proxy need not be
actively involved in credit approval and need not be financially responsible for payment to
the second party and collection from the first party.
In another embodiment, two parties in addition to a proxy party are involved in the
approval and payment processes. For example, a third party approves the credit of a first
party and electronically credits a proxy party and electronically debits the first party, and a
fourth party approves credit of the proxy party and electronically debits the proxy party and
electronically credits the second party. Here the fourth party approves or disapproves the
transaction based on the proxy party's account with the fourth party, and the proxy party
undertakes financial responsibility. Alternatively, the proxy party's participation (and
financial liability) in settling the transactions may be eliminated, and the third party debits
the first party and credits the fourth party, who debits the third party and credits the second
party. The approvals in this variation are as follows. The third party approves the credit of
the first party and the fourth party approves the credit of the third party. In this embodiment,
as above, the accounts can be credit card accounts, and also a fee is paid to the proxy party,
which can come from both the third party and the fourth party. In one embodiment, a system implementing the invention described above may be
configurable, e.g., on a user or other party basis or on a transaction basis, for operation using
a third party, or a third party and a fourth party in addition to the proxy party for the financial
procedures described above. In still another embodiment, systems implementing the
invention described above may be configurable for operation with various parties having
access to or being provided with various information, with the exception that the first party's
private information remains secured with respect to the second party.
As pointed out above, the first party's private information is withheld from the second
party and from any unauthorized party, but may be provided to authorized parties. For
example, depending upon the embodiment, the first party's credit card company (a third or
fourth party) could be provided with price information only, with price and good information
only, or with price, good and second party vendor information. A shipper making a last hop
delivery of a good to a first party would of course know the delivery address and perhaps the
identity of the first party. The identities of the good and the second party where these appear
on the outside of a package containing the good or in a shipping record may also be known to
the shipper. However, in those cases, which are expected to be minimal, the shipped good
can be repackaged or wrapped, or the last hop delivery may be made by a shipper who is
authorized by proxy software or is part of the proxy system.
The first party's identity and credit card number are not transmitted between parties,
and therefore such information is protected and not available to unauthorized parties as part
of the transaction. In the proxy embodiment, the first party's account information is not
transmitted to the proxy, and the proxy transmits proxy account information to the second party, not first party account information. The proxy need not have the true account
information of the first party, but identifying information by which a third party can link to
the first party's account. In the embodiment that does not require a proxy, a transacting
account, not a true account is transmitted to the second party.
Thus, the invention allows private and personal information to be withheld from the
second party, and allows the first party to communicate with the second party via the
communications network without revealing the user's identity and location or address. This
provides complete anonymity to the first party vis a vis the second party. With specific
respect to the Internet, given the existing capability in the communication, transaction
processing and credit processing chains for accumulating and distributing information
relating to an Internet user's identity, preferences, etc., the complete anonymity that use of the
invention provides to Internet users should allay their fear of conducting e-commerce over
the Internet, or any open computer network. Further, authorized parties who use the
invention, for example credit card companies and banks, will have a powerful tool to expand
use of their credit cards and to attract new members, and prevent fraudulent use.
In the preferred embodiment, the invention is implemented on the Internet (although
the invention is not so limited), and comprises information-processing modules (hardware,
and software) which permit Internet users (first parties) to browse and search the Internet
anonymously, order or purchase goods from second parties online anonymously, and have
them delivered anonymously (at least with respect to the second parties providing the goods)
to their homes or offices or other designated address, or to a depot for pick-up by the user. The user's anonymity is preserved as against (i) proprietors of the Web sites that the
user may visit, (ii) the online second party vendors from whom the user orders or purchases
goods, and (iii) shippers except for the last-hop shipper that delivers a good to an address
designated by the user. Although in the proxy embodiment the user's identity may be known
to the ISP, the browsing behavior, the items purchased, the identity of the vendor, and the
user's financial information are secured or withheld from the ISP. The user's credit card
issuer or company (a third or fourth party) is notified that that the user wishes to make a
purchase for a given sum, and information necessary for authorization of the purchase is
provided in a way which prevents fraud and protects the user's credit card information as
well. Information about what the user has bought (or ordered if a purchase is not involved),
and where that purchase is ultimately being shipped can be withheld from the credit card
company as well as from other parties in the chain of commerce, except for the last-hop
shipper who delivers to the address designated by the user. Measures discussed herein may
also be taken to limit the information available to the last hop shipper. In cases where the
credit card company has a need for information identifying the good or service purchased, as
for example where the credit card company provides or extends a warranty, or provides a
promotion, etc., such information will be supplied to the credit card company. Special
arrangements may also be made so that this information is routinely given to the credit card
company. The transaction database, or a similar database may also be used to measure
vendor performance by logging data such as returns, complaints, delivery times, damaged
goods, etc. Thus, the invention acts as an information buffer between the user and the
Internet and/or certain parties in the transaction. In processing transactions, a proxy transaction database may be provided in
accordance with the invention to store information generated in the transactions. In an
embodiment having a proxy system, the proxy transaction database indexes and links the
second party vendor supplied confirmation, order or purchase information, with a unique
session or transaction identifier (#F) generated by the proxy system for each transaction. The
unique session number may be used as an index to the transaction to route messages from
second party vendor computers to the respective first party computer involved in the
transaction represented by the unique session number. This linkage also allows the proxy
system to route shipped goods to the user's address if so requested by the user, and to enable
return of the goods to the vendor.
The proxy transaction database or another secured address mapping (SAM) database
(which may be part of or separate from the proxy transaction database) may be used to link
user's and their addresses. Second party vendors typically include identifying information on
shipping labels with sufficient detail to uniquely identify purchase or order information
received from customers. This information is linked with the unique session or transaction
identifier created by the proxy computer software working in conjunction with the user proxy
software. Optionally, the proxy computer software may transmit to second party vendors
sufficient identity information that includes the unique session identifier #F. For example,
the NAME field, or some other field, of the second party vendor's form-based web page may
be an automatically generated symbol including as a portion the unique session identifier #F
or a number from which #F may be determined. Automated readers of shipping labels would
therefore read the unique session identifier #F to allow for automated lookup of the user's actual shipping address where the good is to be delivered directly to a user designated
address.
The unique shopping session number (#F) may be a tracking number and/or linked to
a tracking number used to track physical delivery through a shipper's existing tracking
system. Alternatively, a tracking number may be stored in the SAM database and/or provided
to the first party to track the delivery without disclosing the tracking number to the second
party.
Third and other parties may also provide transaction databases to store transaction
information that they are provided with or generate.
As pointed out above, first party private and personal information is secured at least
with respect to second parties. While credit card companies received all of the transactional
information when the first party customers dealt direct with second party vendors, use of the
invention can result in the credit card companies receiving only that transactional information
that is necessary to perform the credit function. In accordance with an aspect of the
invention, information in the proxy database containing private and personal information of
first parties can selectively be made available to parties other than the second party such as
credit card companies. As mention above, the proxy need not know the true identity of the
first party or any private or personal information of the first party. Regardless, a proxy
database can be provided which does not contain any private or personal information of first
parties, and such information made available to any other party. Optionally, the proxy party
can be compensated or otherwise rewarded for supplying such information. Stated another
way, access by banks and credit card companies to transaction information they previously received can be selectively restricted by the invention.
One way that the invention implements selective passing of transaction information is
for the proxy party to present itself as the vendor to the credit card company in place of the
true vendor, and pay the vendor. In order to prevent the credit card company or any other
party from matching transactions to obtain certain transaction information, the invention
provides for a proxy party to use the credit card of another credit card company for the
transaction.
In addition, rather than selectively supplying such information to credit card
companies or other parties to the transaction (other than the second party vendors), proxy
software can provide for passing selected information during the transaction, i.e., the
software can be selectively configured to pass selected information depending upon the
relationships and arrangements the proxy party has with third and fourth parties and other
parties to the transaction. Some non-private information can also be provided to second
party vendors so that they can maintain an historical preference database. For example, a
consistent user name may be provided for a particular user to a particular vendor.
The invention provides for reconfiguration of the software on a party by party basis to
achieve the above-described selectivity.
Internet Embodiments
In the preferred Internet embodiment, the invention utilizes a proxy and is
implemented by proxy software executed on user or first party computers and on one or more
proxy computers. The software may be provided to users by way of a download or
preferably on a tangible medium like a CD-ROM. The software on the user's computer operates in conjunction with the user computer's browser, such as Microsoft Internet
Explorer ® or Netscape Navigator ®, either by a default or upon selection by the user. The
proxy software on the user's computer and the proxy computer(s) cause all communications
for second parties to be routed through a proxy computer.
In the preferred Internet embodiment, all browsing by the user is done anonymously
through the proxy system using a protected proxy identifier (I) or persona unique to the user
and known only to the proxy system. A unique proxy identifier is assigned to each copy of
user proxy software provided to a user. The relationship of the proxy identifier and the user
is maintained secret by the proxy system. As mentioned above, the proxy system need not
know the user's true identity. To reduce the risk of unintended disclosure of this relationship,
the proxy identifier is withheld from the user so the user cannot link their true identity with
the proxy identifier.
The proxy system can use the proxy identifier to automatically apply preferences to a
transaction, such as shipping mode, delivery name and address (or depot pick up), etc. The
proxy system may store in a secure way the user's credit card information linked with the
user's proxy identifier, and charge the user's credit card for the purchase made by the proxy
system on behalf of the user. Alternatively, the proxy may not have the user's true name and
account information, and the user's bank (a third or fourth party) may link the user's account
with the user's proxy identifier and either credit the proxy system operator (proxy party) for a
purchase made on behalf of the user or eliminate the proxy party from the financial aspects of
the transaction, i.e., provide for payment to a second party and debit a first party directly.
Regardless of whether the proxy party is in the payment and responsibility chain, it may be paid a transaction fee for each transaction (or on some other basis). The user's bank provides
for payment to the second party merchant of the purchase price less a service charge, and
provides part of the service charge to the proxy party as the transaction fee.
Typically, the proxy identifier identifies one user. However, sub-accounts may be set
up for other users (e.g., family or business unit members authorized by the registered user) in
a household or business unit who use the same computer and the same copy of the user proxy
software. The sub-account may, for example, be identified by a field or fields in the proxy
identifier, or in any suitable way. Alternatively, more than one registered copy of user proxy
software by be stored on the same computer.
In conjunction with the user's credit card issuing company or bank, the proxy system
generates the unique proxy identifier I and provides it as part of the proxy software provided
to a user, without disclosing the proxy identifier to the user. Each registered copy of user
proxy software with its unique proxy identifier may be considered as a distinct plastic credit
card. For security and fraud reduction, the proxy system can expire the user's proxy software
and proxy identifier with the expiration of the user's credit card to which the user has
authorized the proxy system to charge for purchases made on behalf of the user. Thereby,
user proxy software and proxy identifiers will be on the same expiration cycle as the user's
credit card. Similarly, a user's proxy software and proxy identifier can be made unauthorized
(or expired) if a user's proxy identifier or proxy software is lost, stolen, corrupted, etc., or
when the user's credit card is lost or stolen. Users can be supplied with a new copy of user
proxy software (with a new proxy identifier) whenever the user is provided with a new credit
card. Further, users may register multiple credit cards issued by multiple banks (third or
fourth parties), but each would require the download of a unique copy of user proxy software
with a unique proxy identifier. Alternatively, a single copy of the user proxy software can
store multiple proxy identifiers, selectable by the user for his, her or its purchases, or a copy
of the user proxy software can be provided with the same proxy identifier indexed into the
same credit card account for multiple users of the same credit card account. This is akin to
issuing additional credit cards on the same credit card account. A user may store his, her or
its single "proxy credit card" on more than one computer, e.g., a palm top and a desktop PC.
A user may provide the proxy system with more that one credit card number for each
copy of the user proxy software, and designate credit card choice as part of the transaction or
otherwise.
The proxy system allows the user (first party) to be represented not as an individual
transaction with a true identity, but rather as an anonymous transaction with a proxy
identifier. For example, a user may allow someone else to make an e-commerce purchase
with the user's proxy identifier, just like a person today may allow a spouse or child to make
purchases on that person's credit card account. Use of the same proxy identifier by
authorized persons is under the control of the user and the issuing bank (third or fourth
party), and the true identity of any of the users of the same proxy identifier (e.g., spouse,
child) can be maintained by the user's bank. However, the true identity of the actual
transactor is known only to the user when the user allows someone else to use the user's
unique proxy identifier. The proxy system essentially provides an electronic means to
transact exactly as it is now done with plastic credit cards, but without disclosing the true name on the card. The proxy system may provide security against unauthorized use of a
proxy identifier by requiring secret information such as a PIN or password or a biometric be
used whenever anyone wants to transact using the proxy system. This provides a level of
security above what is available today using credit cards.
The proxy software alters a variety of information about the user and his, her or its
location from the information transmitted from the user to a proxy computer, and provides
information which enables a Web site to respond to that proxy computer, and that proxy
computer route the information supplied by the Web server to the proper user. Although
prior art filtering techniques may be used, the filtering described herein is preferred at least
because it is more comprehensive.
When a user wishes to purchase or order a good from an online second party vendor,
the user simply follows the vendor site's usual procedures, selects the good to be ordered,
enters purchase order information, etc., which the proxy software analyzes and, alters where
necessary. The user has the perception of placing the order directly with the online vendor.
Alternatively, the proxy computer may substitute its own set of procedures for the vendor's
procedures, and translate between the two sets of procedures while maintaining user
anonymity. Alternatively, the user may supply proxy information by clicking a menu of
choices or dragging and dropping proxy information into the field's of the vendor's
WebPages.
The invention provides comprehensive multi-layer privacy protection, examining
messages of user or client computers that are to be transmitted to server computers and
messages received from server computers. At the network protocol layer (e.g., IP and future protocols), address information of the client computer is replaced with a proxy address. At
the transport protocol layer (e.g., HTTP and future protocols), client computer information of
a private nature is replaced with information that anonymizes the client computer. Unlike
some approaches that only provide anonymizing of IP addresses, and other approaches, such
as disclosed in the European patent application of Lucent referenced above (EP 0 855 651
Al), which filter HTTP headers, the invention goes further and provides for anonymization
at the application layer, capturing and replacing all accesses to client computer system
information of a private nature, including cookies and other sources of information of a
private nature, with information that anonymizes the client computer.
The invention also provides for replacement of compromising procedures, e.g.,
procedures which collect data from a user's computer, or anonymization of the collected
data. For example, the invention replaces compromising active code (e.g., Java applets and
Active X) and/or XML forms . (XML is a new extension of HTML which allows services to
send pages to users marked with tags that activate local information collection routines that
can compromise user information.)
In the proxy embodiment, a proxy computer provides the user's credit card company
(bank) with the user's unique proxy identifier which the bank correlates with the user's credit
card account information, and authorizes or denies authorization for the purchase. In the
embodiment in which a bank gives a user a transacting identity and account, the user's true
credit card information is not known to the proxy and is not transmitted to or by the proxy.
Thus, the user's true credit card information is not transmitted at all on the network.
Information other than the purchase price may or may not be transmitted to the user's bank depending upon the arrangement between the proxy system operator and the bank. For
example, information about the vendor, the good(s) being purchased or the shipper may also
be provided to the user's bank.
The user's bank authorizes (or declines to authorize) the purchase, and conveys such
information back to the requesting party . Assuming the purchase has been authorized, a
proxy computer enters the order with the online vendor using the proxy system operator's
name and the proxy system's account number (thereby further masking the identity of the
user). The proxy system may implement the credit function with a bank or banks in different
ways. In one embodiment, a single bank is involved in a transaction, which authorizes a
vendor to charge the proxy system operator's credit card account, and then nets the
transaction by paying the vendor the price of the good less the transaction fee, charging the
user's credit card the price of the good, crediting the proxy system operator's account, and
paying the proxy system operator a percentage of the transaction fee (part of the service
charge). Here, the bank may be provided with a description of the good, and of course has
the identity of the vendor. Alternatively, the single bank can be provided with all details of
the transaction and eliminate the proxy operator from the liability and netting chains, except
for the percentage of the bank fee.
In another proxy embodiment, two banks are involved: one as the credit card
company of the proxy system operator and the other as the credit card company of the user.
Here, the vendor charges the purchase price to the proxy system operator's bank and the
proxy system charges the purchase price to user's credit card, and netting provides the two
banks and the proxy system with part of the bank fee. Depending upon the arrangement, identification of the good may be withheld from both banks and the identity of the vendor
may be withheld from the user's bank.
In either embodiment, the proxy system provides shipping instructions to the second
party vendor which do not include an address linked to the user. The proxy system may
include one or more proxy shipping computers to perform certain shipping functions. (The
other proxy computer(s) can be referred to as privacy protection computers to distinguish
between them and the shipping computer(s).)
In the embodiment that does not require a proxy, only a single bank or credit card
entity need be involved. The first party user transmits the transacting identity and account to
the second party vendor, who requests approval from the bank. In this embodiment, the first
party user transmits shipping information directly to the second party vendor. The bank or a
party acting on behalf of the bank may handle shipping (depot operation, label-switching,
transshipping) as described for the proxy embodiment.
As suggested above, e-commerce requires privacy-protected shipping techniques beyond
the scope of POB-like mechanisms. The invention provides privacy-protected shipping
techniques that offer the following features:
1. Two-way Privacy: The recipient of a good ordered using the invention, i.e., a user of the proxy system, can not only have the good delivered, but can return the good as well, while assuring that his, her or its identity is disclosed only to the proxy party or a party authorized by the proxy party and remains completely anonymous with respect to any distrusted participant in the shipping chain (i.e., the second party vendor, and possibly the shipper, if the shipper is not authorized by the proxy party to receive private information. The second party cannot identify the recipient from any data available to it either for shipping or for returns). 2. Two-way verifiabilitv: T e second party vendor and shipper can verify with the proxy party or a party authorized by the proxy party without compromising privacy that the recipient received or returned the package in a manner that can allocate responsibility for loss.
3. One-time transaction privacy: Privacy is provided for each individual shipping transaction independently of other shipping transactions. In particular, it does not require long term per-recipient allocation of space or other resources; furthermore, should privacy be compromised by one transaction, it does not enable compromising additional transactions.
4. Coordinated comprehensive privacy-protection of e-commerce transactions: Shipping can be easily coordinated with shopping and purchasing to provide fully assured comprehensive privacy protection.
POB privacy-protection substantially fails to support any of these four features. The
invention as it relates to the problem of privacy-protected shipping provides shipping
techniques that accomplish these four features.
The invention provides two techniques to accomplish privacy-protected shipping: label-
switching and one-time virtual mailbox agent (OVM), e.g., depot pick-up. Label-switching
involves switching the labels on a package. Alternatively, label switching may be provided
by using devices that scan computer readable information or codes printed or otherwise
placed on packages which may generate a new electronic label, e.g., by reading a remote
database, and that display an address on a device without printing a physical paper-based
label. The second party vendor provides the package with the ordered good for shipping
labeled with a unique transaction identifier (e.g., #F) and the address of a label switching
agent authorized by the proxy party to handle private information. The label-switching agent
uses this transaction identifier to generate a label with the recipient's identity and address. A
trans-shipper then delivers the relabeled package. In case of return, the authorized label- switching agent reverses the process and relabels the package with the respective transaction
identifier. Label-switching also applies to electronically delivered goods. Thus, for example,
a file delivered to an electronic depot with the depot's electronic address may be
retransmitted from the electronic depot with the user-designated electronic address.
Label-switched shipping may include the following. A recipient concludes a transaction
with a second party using the services of the proxy party. The proxy party generates the
unique transaction identifier and provides it to the second party vendor and the recipient.
The unique transaction identifier may be applied in machine readable form using any suitable
technology, e.g., bar codes, glyphs, OCR, etc. The unique transaction identifier serves to
hide the true identity of the recipient and indexes the transaction. The unique transaction
identifier may therefore serve as a data key to the entire transaction and may be used to store
and access transaction data such as recipient name, address, second party vendor, credit card
information, good information, etc. The unique transaction identifier may be, or may be
linked to, a tracking number.
The proxy party provides the unique identifier and the respective recipient identity and
shipping address to the label-switching agent authorized to handle private information. The
package, labeled with the unique identifier is passed to the authorized label-switching agent
where a new shipping label is generated with the unique transaction identifier and address of
the recipient. The package is delivered via a shipper to the recipient. To handle a return, the
authorized label-switching agent reverses the process, replacing the label with a unique
transaction identifier and notifying the proxy party of the relabeled shipment. Multiple
different media for communications and/or label switching may be used. OVM operates as follows. The second party vendor labels the package containing the
good with the unique transaction identifier as described above, and the address of an OVM
depot, for example, OVM77432572980975, 10 Main Street, Any Town, USA 12345. The
shipper delivers the package to the OVM depot at the address. The recipient claims the
package by providing at least the unique transaction identifier (or some number or code from
which the transaction identifier (#F) may be determined) on the package to the OVM depot.
However, it is preferred that the recipient provide two pieces of identifying data. Other
identifying data may be secret information such as a confidential code or a pass word or
biometric known to the recipient and the OVM agent.
The shipping instructions include the unique transaction identifier which is associated
with the shipment so that the shipment can be identified for later trans-shipment to the user or
for later depot pick-up by the user. The unique transaction identifier is such that the user's
identity and address are not revealed to the second party vendor. In the case of depot pick¬
up, the OVM agent releases the shipment based on a presentation of the unique transaction
identifier, and perhaps some other information which does not reveal the identity and address
of the user to the shipper or depot. In the case of trans-shipment, the users name and address
are associated with the package after delivery to a trans-shipment point (authorized label-
switching agent) on the basis of the unique transaction identifier, and the good is delivered
from there directly to the user's address. While the trans-shipper may know the identity and
address of the user, the trans-shipper does not know the contents of the package or the price
of the good. However, the identity of the second party vendor and the good may be printed
upon or otherwise evident from the package. In such cases, the package delivered to the authorized label-switching agent may be repackaged, i.e., placed into another package or
wrapped in some way. An OVM agent may also be required to repackage or wrap a package
so that the clerk who hands the package over to the recipient can not associate the good with
the appearance of the recipient.
Thus, at each step of the transaction, the identity and other sensitive information about
the user remain anonymous to the second party vendor, and no third party has all information
identifying the user, the product, the second party vendor and the user's financial
information.
In the embodiment that does not require a proxy, the functions of the proxy relating to
shipping, labeling, depot operation and trans-shipping may be handled by the bank or a party
or parties authorized by the bank.
In a preferred Internet embodiment, the proxy system includes or uses the following.
1. User proxy software: The user proxy software is stored on a user's PC or other device capable of accessing a network-based information systems or communications networks such as the Internet/World Wide Web. Each copy of the user proxy software is registered and is assigned a unique and secured proxy identifier (I). The proxy identifier is preferably withheld from the user to enhance security as indicated above. For example, the proxy identifier is embedded in the user proxy software so that a typical user can not access it. The user proxy software is "registered" with the proxy system operator which serves as a privacy protection agent. As described above, multiple related users of the same registered copy of user proxy software can be accommodated in one or more fields of the proxy identifier, or otherwise. Also, multiple copies for multiple users may reside on the same computer. The user proxy software can be distributed by the proxy system operator or a bank or credit card company affiliated with the proxy system operator, or the proxy system operator may be a bank or credit card company.
2. Proxy computer software: Proxy computer software is stored on one or more proxy computers and identifies registered user proxy software, indexes or links to a user's bank account (or debit account, or electronic check account, or credit card account) or some other account used for transacting business or purchasing items. (This user financial information is not made available to the proxy system operator, who only has information to index to the user financial information.) Proxy computer software also performs shipping, label generating and switching functions, and tracking status (during shipping and return) and shipping status.
The proxy software (user prosy software and/or proxy computer software) includes filtering software, preferably the filtering software described herein
3. Proxy computer(s): One or more proxy computers are owned and/or operated by the proxy system operator, and operate in conjunction with the proxy computer software to control transactions, including a secured address mapping (SAM) database that links purchase information with user's shipping address, and a transaction database for purchase, shipping and transaction information. Different proxy computers or software modules may perform different functions. For example, separate computers or modules may be used to perform privacy functions (e.g., handling communications between an on-line second party vendor and a first party user while maintaining user anonymity), transaction logging, shipping, label-switching, transaction inquiry handling and confirmation (e.g., linking the proxy system database and a shippers tracking database), etc.
4. A browser program: Software or some other means of accessing the communications network stored on a user's PC or other appliance.
5. Bank authorization software: Software stored on the proxy computer(s) and/or on one or more computers of one or more banks for submitting transaction information to the bank and receiving in return authorization or denial information.
6. Proxy party credit system: In some embodiments, a credit card account or other credit arrangement by which credit of the proxy system operator is involved in the purchase of the goods from retailers.
In addition, a user must have a credit card account, or other account information
(debit, electronic check, etc.), which is authorized to be charged for goods ordered by a user.
In the context of the Internet/World Wide Web, the proxy system may operate as
follows.
I. Registration procedure: A prospective user applies to the proxy system
operator or to his, her or its credit card company to become a proxy system user. Upon
approval by the proxy system operator and/or the credit card company (or as part of the initial application), the user must provide information such as his, her or its credit card
number(s) and expiration date(s), shipping preferences, and services depot and user
address(es). A copy of the user proxy software is given, mailed or shipped to the user, who
loads it on his, her or its PC, e.g., as a plug-in to the browser on the PC. The user proxy
software, in cooperation with the browser on the user's computer, can automatically go online
to a proxy system computer or prompt the user to access the proxy system, and can complete
the registration process automatically or in response to prompts, or a combination thereof.
The registration process may require input by a user of secret information such as a PIN or
pass word or biometric or other secret information that the user downloads or selects.
Loading and downloading menus and procedures are providing to facilitate loading of the
user proxy software on the user's PC.
II. User accesses the proxy system: The user elects to shop privately by
actively clicking an icon, button, book mark or "favorites" or by some other typical means
provided on the browser of the computer being used by the now loaded user proxy software.
Alternatively, the user proxy software may set private shopping as a default, whenever the
browser is active so that a user must click an icon, etc. to browse conventionally.
The user proxy software may first issue a request to the user to enter secret
information such as a PIN, password, biometric, key or some other identifying information to
determine that the user is authorized to transact with the user proxy software. (Since, the
active participation of the user in initiating the privacy feature provides direct evidence of the
user's wish to remain anonymous to second party vendors, users directly control their own
personal information.) III. Proxy system creates a session: The proxy computer software creates a
unique session for each transaction, (or browsing session with a vendor) to identify
transactions initiated by users in cooperation with the user proxy software. The unique
session is assigned a unique identifier (e.g., #F) for identification and control purposes.
The user proxy software transmits to the proxy computer software unique and
encrypted or secured numbers that are used by the proxy computer software to uniquely
identify and index the user's unique proxy identifier (I) for the registered client software,
current shopping activity, current order, if any, and user shipping address.
With the proxy system active, the second party vendor's WebPage provided through
the proxy system may appear "wrapped" or "framed" within a window, frame or panel
provided by the proxy system, or as largely provided by the second party vendor but with a
banner, unique cursor icon, or other indication that the proxy system is active but not
appearing in full view. When a user browses through the proxy system, the proxy system
acts as a portal to Web sites. Alternatively, if the user is currently visiting the second party
vendor's WebPage independently of the proxy system and the user wants to now shop
privately, the user accesses the proxy system, and the second party vendor's WebPage cached
on the user's PC then appears in the proxy system's window, etc.
The proxy system may provide banner messages, or scrolling or pop up messages
within its WebPage to remind and direct the user of certain actions the user must or may take
to hide their identity and personal information from the second party vendor, and may
provide a final message asking whether all information on the screen is correct. The second party vendor's WebPage, now embedded within the proxy system's
"wrapping" WebPage or "bannered" by the proxy system, includes form-based fields
requesting the name, address, salutation, shipping address and credit card information from
the user, as well as perhaps other identifying, private or personal information.
IV. The proxy system communicates with the second party vendor: The user
proxy software on the user's PC provides menus called, for example, by right mouse button
clicking on the user's mouse. (Alternatively, icons, buttons, or other easily accessible means
that may be clicked or invoked can be provided, e.g., dragging and dropping information into
fields of the WebPage. When the user first clicks in the NAME field of the second party
vendor's WebPage form, the user may then right click the mouse to reveal a pop-up menu of
choices, one of which may be NAME, for example. When the user chooses the NAME item
from the right mouse button menu, the user proxy software provides the proxy system's
identity. Alternatively, the proxy computer software, alone or in conjunction with the user
proxy software, provides the proxy system's identity. The proxy system's identity may be
transmitted immediately or when a final submit action is made by the user. The user's true
identity is therefore not transmitted to the second party vendor.
For each field of the second party vendor's WebPage form that requests identifying
information, right mouse button menus and clicks on the menu choices are provided by the
proxy system to fill out the form entirely with the proxy system's own identity information.
The clicking actions by the user essentially directs the proxy computer software to transmit
the appropriate identity information of the proxy system. One such piece of information is
credit card account information that is used by the second party vendor to charge and receive payment. The proxy computer software does not have and does not transmit the user's credit
card information, but rather the proxy's system's credit card information, which need not and
preferably is not disclosed to the user. Other account information used by the proxy system
in the transaction may be transmitted instead, e.g., debit account information, electronic
check account information, or some other information that provides for a billing, or charge
and payment transaction between the second party vendor and the proxy system.
The proxy computer software also transmits as part of the identifying information the
proxy system's shipping (e.g., depot) address. The user's real shipping address has either been
previously stored or on file with the proxy system when the user registered, or the user may
be asked to select shipping information from the proxy computer software while shopping
and filling out the second party vendor's web form. In the latter case, the selected shipping
address is transmitted to the proxy computer software for further processing. The proxy
system does not forward the user's shipping address to the second party vendor. Hence, the
information provided to the second party vendor indicates that the second party vendor
transacted with the proxy system, and the user's identity, account information and address is
entirely unknown to the second party vendor in the transaction.
The proxy system additionally removes and replaces any identifying, private and
personal information from all data transmitted to the retailer as discussed herein.
The proxy temporarily stores transaction information until a transaction is completed.
V. The proxy system completes the transaction with the second party vendor:
When the user initiates completion of the order by clicking the appropriate button or
icon in the second party vendor's WebPage (e.g., using the right mouse button menus provided by the user proxy software) the proxy computer software also completes the
transaction by submitting the now completed form but with the proxy system's identifying
information which has been inserted by the proxy software.
The second party vendor obtains authorization from the proxy system operator's bank
(which may be the same as the first party user's bank) to charge the transaction to a credit
card. The proxy computer software waits for and receives from the second party vendor
confirmation information (e.g., a confirmation page) that the proxy computer software stores
for future reference. This archived confirmation information includes all identifying
information transmitted to the second party vendor as well as typically a complete list of
items ordered from the second party vendor and credit card information. This transaction
information may be stored on the proxy computer (in a transaction database) for later
retrieval by the first party. The shipping information may be stored in a secured address
mapping (SAM) database.
The second party vendor also supplies a confirmation or order number or symbol
(e.g., H) used to identify the purchase information displayed in the confirmation page. The
unique session number (#F) is indexed to this confirmation or order information for future
processing and completion of shipping instructions to direct goods to their final destination
(the user's shipping address or the proxy system's depot). This information (unique session
number #F, any confirmation numbers or symbols H returned by the second party vendor,
and other possible information produced by the proxy computer software working in
conjunction with the user proxy software) is stored in the transaction database and may
optionally be transmitted to the user's PC for local storage and future reference. Information supplied by a second party vendor and proxy system supplied information may be down¬
loaded to a user's PC to enable the user to contact the second party vendor anonymously to
check on order status, or to arrange for return, or to report damage, etc. The down-loaded
information must be sufficient to enable a user to contact a second party vendor and identify
the concerned transaction while maintaining user anonymity.
VI. The proxy system submits a transaction to the bank: The proxy system's
server software now transmits purchasing information to a bank as if a customer (the user)
were purchasing from the proxy system. The proxy system passes to the bank the user's
proxy identifier that allows the bank to identify the user as a bank customer and access the
customer's account. In an alternative embodiment, the proxy system database may store user
bank account information linked to the proxy identifier, and the proxy system may transmit
this account information (encrypted or secured) to the bank.
The interactions between the proxy system and the bank are protected by
authentication and encryption of all information communicated. The proxy system enables
the bank to configure these protection mechanisms in a way that enables only the bank to
validate the identity of the user and to decode the information transmitted.
The proxy system notes transaction, as well as the transaction amount that includes at
least the transaction amount charged by second party vendor for the selected goods plus,
optionally, additional fees that the proxy system may charge for use of its service. The proxy
system may thus charge the user an amount that is displayed to the user with confirmation
information that the user's order and credit card transaction have been completed and authorized. This information may be directly displayed to the user who may still be
browsing, or it may be transmitted by some other means at a later time, for example email.
The bank returns or communicates to the proxy system sufficient authorization
information to allow the transaction to complete. The bank-supplied authorization
information may optionally be linked with the previously stored confirmation information
received from the second party vendor. In the normal course of business functions, the
second party vendor charges the correspondent bank or credit card company of the proxy
system for the proxy system's apparent purchase of goods. The second party vendor is
charged a fee by the correspondent bank for the transaction, just as in non- anonymous
transactions.
However, hidden from the second party vendor, the credit card company or bank of
the user credits the proxy system for the purchase of goods and pays the proxy system part of
the fee charged to the second party vendor by correspondent bank as the proxy system fee.
The correspondent bank matches the transaction with the user's credit card bank, nets the
transaction and pays the proxy system its fee. As discussed herein, a different fee
arrangement may be provided to compensate the proxy system operator.
As also discussed herein, the user's bank and the proxy system operator's bank may be
different or the same.
The authorization and other transaction information with the bank is also stored in the
transaction database.
V. and VI. Reversed: Alternatively, the proxy system may first submit
transaction information to the user's bank, wait for authorization and then complete the order with the second party vendor and complete its communication with the user. If the bank
denies the transaction, then the proxy system would not send confirmation or completion
orders to the second party vendor and the user would be informed that their purchase is
denied. Alternatively, the user's bank may have pre-authorized the user's transactions by
providing certificates, or certified electronic cash and thus the user's bank need not be
contacted during the transaction process.
VII. Shipping: The second party vendor ships to the address provided by the
proxy system (e.g., by a proxy shipping computer from the secured address mapping (SAM)
database), which can not be linked to the user by the second party vendor. The proxy system
previously indexed the user's shipping information with the previously stored confirmation
information and unique shopping session or transaction identifier in the secured address
mapping (SAM) database. This shipping information will include either the user's shipping
address or information designating user pick-up and/or tracking numbers. Where the user
designated delivery to a shipping address, that address, indexed to the confirmation
information, is used to generate a new shipping label. The packaged goods are then relabeled
(or repackaged or wrapped if the identity of the good or the second party vendor is to be
shielded) with the user-designated shipping address and shipped to the user.
Where the user designated depot pick-up, the packaged goods can simply be stored
for pick-up indexed by the shopping session or transaction identifier, or with some other
information. Alternatively, the packaged goods can be relabeled with other information
useful in facilitating pick-up by the user. (As discussed above, the packaged goods may also
be repackaged or wrapped to hide the identity of the good and the identity of the second party vendor.) The proxy system notifies the user of shipment by the second party vendor, receipt
at the depot, or both. The proxy system may provide the user and the depot with information
other than the session identifier (#F) by which the user's package is identified and indexed at
the depot.
The procedure described above provides for communication over the Internet using
the TC/IP protocol. However, certain communications between the first party users and the
proxy computer(s) can be by e-mail, as can certain communications between the proxy
computer(s) and third party computer. For example, after successful installation of the user
proxy software, the user may register by e-mail (encrypted). The proxy may capture the
registration data and forward it by e-mail to a database (e.g., the transaction database).
Similarly, after an order has been successfully entered and stored, for example, in a
temporary file, the proxy may capture the information and e-mail it to the database (e.g., the
transaction database). Appropriate information may also be captured and e-mailed to the
bank(s). In addition, confirmations, order information, tracking information and good receipt
information may also be sent by e-mail as well as in response to requests transmitted by the
browser. Thus, a user may access the order information and track order processing and
shipping.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is illustrated in the figures of the accompanying drawings which are
meant to be exemplary and not limiting. The description herein, including the appended
claims, identifies various elements by specific names for convenience. These names are intended to be generic in their application unless otherwise indicated. In the accompanying
drawings:
Fig. 1 is a block and flow diagram representing a conventional multi-party e-
commerce transaction involving a first party consumer, a second party merchant, a shipper
and a credit card clearing entity;
Fig. 2 is a block and flow diagram of a conventional shipping transaction involving a
sender, a recipient and a shipper;
Fig. 3 is a block diagram of an embodiment of a system incorporating the invention
for the purchase of goods over the Internet and payment for the goods;
Fig. 3 A is a block diagram of an alternate embodiment of system depicted in Fig. 3
showing a delivery facility as part of the system;
Fig. 3B is a block diagram of an embodiment of a system which provides for purchase
and payment and delivery of goods over the Internet;
Fig. 3C is a block diagram of a portion of system depicted in Fig. 3 showing an
additional party (fourth party) as part of the system depicted in Fig. 3B;
Figs. 3D is a block diagram of alternate on embodiment of a system incorporating the
invention for the purchase of goods over the Internet without a proxy;
Figs. 3E-3H are flow diagrams showing credit approval and crediting/debiting of the
parties involved in a transaction for various embodiments;
Fig. 4 is a block and flow diagram illustrating an electronic purchase made using the
system depicted in Fig. 3B; Figs. 4A-4Q illustrate specific steps and data flows carried out using the system
depicted in Fig. 3B;
Fig. 5 is a diagram illustrating transaction authorization and netting procedures carried
out by the system depicted in Fig. 3B;
Fig. 6 is data diagram representing data generated in a transaction using the system
depicted in Fig. 3B stored by the third party bank;
Fig. 7 is a data diagram representing data generated in a transaction using the system
depicted in Fig. 3B stored by the proxy;
Fig. 8 is a table showing data generated during a transaction and the parties who have
access to the data;
Fig. 9 is a diagram showing IP protocol layers of IP packets processed by first party
(user) computers, proxy party computers and second party computers in the system depicted
in Fig. 3C;
Fig. 10 is a flow chart illustrating an algorithm for filtering outgoing information from
first party computers to the WWW in the system depicted in Fig. 3B;
Fig. 11 is a flow chart illustrating an algorithm for filtering incoming information
from the WWW to first party computers in the system depicted in Fig. 3B;
Fig. 12 is a flow chart illustrating authorization of a purchase from a first party
computer in the system depicted in Fig. 3B;
Fig. 13 is a block and flow chart illustrating shipping, relabeling and delivery of a
good purchased, for example, using the system depicted in Fig. 3B; and Fig. 14 is a block and flow chart illustrating operation of depot pick-up of a good
purchased, for example, using the system depicted in Fig. 3B.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
As mentioned above, the invention provides methods and systems which enable users
of a communications network such as the Internet to communicate, and/or order, and/or
obtain or receive, and/or charge or electronically pay for deliverables over the network, while
securing private and personal information of the users with respect to unauthorized parties
and providing improved protection against fraud. Embodiments of the invention may or may
not include a proxy, as discussed above.
In the presently preferred embodiment, the methods and systems include a central
proxy, and a system including a proxy is described below.
The overall architecture of systems with a central proxy incorporating the invention
can be implemented in different ways, some of which are illustrated in Figs. 3, 3A, 3B and
3C which depict a system 100, 100a, 100b, 100c linked by the Internet 102 and optionally by
one or more secure transmission links 104 for conducting e-commerce over the Internet and
World Wide Web between first party customers, represented by first party computers 106,
and second party merchants, represented by second party computers 110 through a proxy
system 112, 112a which includes proxy computer(s) 108 and proxy software 114. The proxy
computer(s) 108 represent a proxy party or proxy system operator. A third party, represented
by third party computer(s) 116, pays (credits) second party merchants for respective goods
purchased by first party customers and debits the accounts of respective first party customers. Referring to Fig. 3, the proxy system 112 may include one or more databases for
storing transaction data. For example, a transaction database 115 that stores transaction data
(e.g., as shown in Fig. 7) may be provided that links transaction data, as described below.
Other parties such as the third party bank 116 may also have a database such as a transaction
database 117 that stores transaction data (e.g., as shown in Fig. 6). As pointed out above, by
logging data such as returns, complaints, delivery times, damaged goods, etc. in the proxy
transaction data base, or in another database maintained by the proxy, vendor performance
can be measured.
The first party can elect to communicate and transact directly with the second party
conventionally, as in Fig. 1, or through the proxy system 112 represented in Fig. 3. If
privacy is wanted, communicating or transacting with a second party is handled through the
proxy system 112. The proxy software 114 secures the first party's private and personal
information with respect to unauthorized parties and provides information necessary for an e-
commerce transaction which routes the transaction through the proxy system 112 and
identifies the proxy party (i.e., the proxy system operator) as the transactor.
The proxy software 114 may be executed by the proxy computer(s) 108, or distributed
and executed by both first party computers 106 and proxy computer(s) 108. Fig. 3 depicts an
embodiment in which the proxy software 114 is distributed, part 114a being executed by user
computers 106 and part 114b being executed by proxy computer(s) 108. The first party
computers 106 may function as client computers, and the proxy party computer(s) 108 and
the third party computers 106 may function as server computers. For convenience, and to
more easily differentiate the proxy software parts, proxy software 114a executed by first party computers 106 is referred to as user proxy software 114a, and proxy software 1 14b
executed by a proxy computer 108 is referred to proxy computer software 114b.
A system 112a which may provide for delivery of physical goods, and as illustrated in
Fig. 3 A, includes a physical or virtual delivery facility 118 to which a good ordered by a first
party customer is delivered while securing the identity of the first party. The delivery facility
118 may be linked to a proxy computer 108 through the Internet or a secure link 120, and
may include one or more proxy computers 108. A secured address mapping (SAM) database
119 may be provided to link users with their physical or electronic shipping addresses. The
SAM 119 database may be located within a proxy computer 108 that communicates with first
party computers or at a delivery facility 118, or at another location accessible over the
Internet (preferably over a secured channel).
Thus, Figs. 3 and 3A respectively represent embodiments in which payment for
purchase of a good is achieved over the Internet while securing the private and personal
information of the purchaser with respect to unauthorized parties, and in which physical
delivery of a good ordered over the Internet is achieved while securing the private and
personal information of the purchaser with respect to unauthorized parties. In the preferred
embodiment, the system 100b show in Fig. 3B provides for both payment and delivery and is
represented by combining Figs. 3 and 3 A, i.e., Fig. 3B includes the delivery facility 118 and
the SAM database 119 at the delivery facility and/or the proxy computer(s) and/or at another
location.
In the systems 100, 100b depicted in Figs. 3 and 3B, both first parties and the proxy
party have accounts with the third party 116 (bank or credit card company, etc.), and third party 116 performs credit clearing and provides for payment (credit) to a second party and
debiting of a first party involved in a particular transaction, and also crediting the proxy party
with a part of the service charge, as described in more detail below. Fig. 3C illustrates a
system 100c which includes two parties, third party 116a and fourth party 124, involved in
credit clearing and payment for a purchase, and represents an alternate embodiment of the
system 100b depicted in Fig. 3B. The third party 116a may be a bank or credit card
company, etc., as in Fig. 3B, with which a first party has an account, and the fourth party 124
may be another bank or credit card company with which the proxy party has an account.
Third party 116a clears credit card transactions with respect to the first party and fourth party
124 clears credit card transactions with respect to the proxy party. The third and fourth
parties settle, where, generally, the fourth party pays the second party, and debits the proxy
party's account with the fourth party, and the third party pays the proxy party by crediting the
proxy party's account with the fourth party and debits the first party's account with the third
party, as described in more detail below.
Fig. 3D shows the embodiment that does not require a proxy. System lOOd includes
first party computers 106 which include a browser 122 and altering software 114c which
performs the filtering described in connection with the proxy software. System lOOd also
includes a delivery facility similar to delivery facility 118 but operated by the third party 116.
Second party computers 110 and a third party computer 116b are similar to those in system
100b shown in Fig. 3B. System lOOd may also include a central transaction or proxy
database 115a which stores transaction data for safe keeping and later retrieval by the parties
in the event of a return, or a dispute, etc. Referring to Fig. 3B, each first party computer 106 accesses the Internet and navigates
the World Wide Web with browser software 122 (e.g., Internet Explorer® and Netscape
Navigator®). A first party computer 106 may access the Internet and navigate directly
without using the proxy system 112, or through proxy computer(s) 108 using the proxy
system 112, as described below.
Operation of the system 100b is described with reference to Fig. 3B and Fig. 4. In the
flow diagram of Fig. 4, the first party is referred to as "Customer C", or simply "the
customer", the second party as "Retailer R", or simply "the retailer", the proxy party as
"iPrivacy", the third party as "Bank B", or simply "the bank", and the delivery facility 118 as
"A: Shipping Depot/Transship", or simply as "the depot". In Fig. 4, the customer block is
referenced by 106 consistent with the first party computer(s) 106 in Fig. 3, the iPrivacy block
by 108 consistent with the proxy computer(s) 108 in Fig. 3, the retailer block by 110
consistent with the second party computer(s) 110 in Fig. 3, the bank block 116 consistent
with the third party computer(s) 116 in Fig. 3, and the depot block by 118 consistent with the
delivery facility 118 in Fig. 3 A.
Referring to Figs. 3B and 4, the proxy software 114 extends an API (the WWW
browser 122) with software to monitor, filter and reroute interactions between the browser
122 and second party computers 110 (e.g., WWW servers). The proxy software 114 provides
anonymizing transformations of these interactions to assure the customer's privacy, and
eliminates from the transaction all explicit and implicit information identifying the customer
and issues transaction information to the retailer with the proxy system's own identifying
information, including financial charging information and a "first hop" shipping address from which the ordered good may be trans-shipped or held for customer pick up. The proxy
software 114 monitors and filters all data exchanged between the customer computer 106 and
the merchant computer 110 and removes any data that may compromise customer privacy.
For example, cookies and agents dispatched by merchant computers 110 to customer
computers 106 are eliminated.
Referring to Fig. 4, the customer computer 106 has a physical address G and an IP
address G', and user proxy software 114a by which the computer 106 accesses the Internet
through a proxy computer 108 for anonymous WWW browsing and e-commerce. The user
proxy software 114a is registered to Customer C under proxy identifier I, and can be invoked
with PINs, passwords, biometrics, etc. The proxy identifier may have one or more fields or
other means to identify such users, and the proxy computer software may store data relating
to such users. Also, more than one copy of user proxy software 114a may be loaded on the
same PC and registered to different users, or loaded on different computers and registered to
the same user.
Assume that the browser and the user proxy software are active on the customer
computer 106 at Time T. Referring to Figs. 4 and 4A, in step 1, the Customer C provides or
clicks a URL R of a WebPage that he or she wants to visit, which is transmitted (step 2, Fig.
4B) to a proxy computer 108 having a physical shipping address (Depot) A and an IP address
A', a public proxy system identifier P, and a credit card account D with the bank B. As
discussed herein, the user proxy software 114a strips at least the Customer C's IP address G'
from the message and substitutes the proxy computer's IP address A'. However, further
filtering may be carried out by the user proxy software 114a and/or the proxy computer software 114b, as described below.
Referring to Figs. 4 and 4C, in step 3, the proxy computer 108 transmits the altered
message from the customer computer 106 to the retailer R, providing the retailer with the
proxy system identifier P. The retailer responds in step 4 (Fig. 4D) with a return message to
the proxy computer 108. The proxy computer 108 analyzes the message, and may filter or
alter the message depending upon content before forwarding it to the customer computer 106
in step 5 (Fig. 4D). Assume that the message forwarded in step 5 includes a form portion,
i.e., a portion which requests that the customer supply information such as order information,
name, address, credit card information, etc. In one embodiment, the proxy computer
software 114b on the proxy computer 108 may filter out form portions requesting private
information and forward only the order portions of the form, which the user fills in (step 6,
Fig. 4E). In another embodiment, the proxy computer 108 may forward the entire message
and rely on user proxy software 114a on the user computer 106 or software transmitted with
the message to warn or prevent a user from entering private information. In either case, a
filled out form is returned (step 7, Fig. 4E) to the proxy computer 108, which generates a
unique session number #F and provides it to the user computer 106 in step 7.5 (Fig. 4E).
A final shipping address designated by the first party and the shopping session
number is stored in the secured address mapping (SAM) database 119 (Fig. 3B) along with
tracking numbers and used later by the trans-shipper and depot to route the physical delivery
correctly.
The total purchase price is determined from the good(s) ordered on the form (Fig. 4F),
and the proxy computer 108 generates the ordered item(s) X and the price amount $Y. The proxy system has now generated "Item X, "Amount $Y", "Proxy I" and "Session #F". At this
point, the proxy system operator obtains authorization to charge the user's credit card prior to
forwarding order information to the retailer. In step 8 (Fig. 4G), the proxy computer 108
forwards to the bank B a secured message including the customer's proxy identifier I, the
proxy's identity P, the amount of the requested transaction $Y, and the session (transaction)
identifier #F, and requests credit authorization for the transaction. Depending upon business
relationships, the retailer's identity R may have to be supplied (e.g., as a fraud prevention
measure). The bank B already has the customer's account information which is accessed
from the customer's proxy identifier I. (The customer's credit card number is not transmitted
over the Internet, and is not subject to theft or misuse, thereby reducing fraud.) If
authorization is denied (Fig. 4H), the session is ended, preferably by requesting the user to
contact his, her or its bank.
In another embodiment (Figs. 4G and 4K), the proxy identifier I and the customer's
credit card number Z are held by the proxy system, and are sent to the bank B for credit
authorization. The proxy system transacts with the retailer using the proxy system's credit
card D. If the proxy system sends customer transaction information to the customer's bank
B, and the proxy system sends transaction information to the proxy system's bank B', then the
proxy system will need a credit line with B' (fourth party 124 in Fig. 3C) in advance of
transacting.
If authorization is provided, the bank B in step 9 (Fig. 41) authorizes credit for the
concerned transaction and forwards authorization information W to the proxy computer 108,
adds the following (Fig. 4J) to the previously generated order information (item identification X and amount $Y): the proxy system operator's proxy identifier P, the session identifier #F,
the proxy system operator's credit card number D, the proxy system operator's depot shipping
address for delivery A. The user's identity transmitted to the retailer R is P#F, a unique
proxy identity preventing the retailer from linking this transaction with any other
transactions. In step 10 (Fig. 4J), the proxy computer 108 forwards this information to the
retailer R. The proxy (depot) delivery address A is linked to the user's delivery address G in
the secured address mapping (SAM) database 119 (Fig. 3B).
In step 11 (Fig. 4K), the retailer R requests authorization to charge the proxy system
operator's credit card D. This request is made after the bank B approved the customer's credit
in step 9 (Fig. 41), which is represented in Fig. 4K by the request taking place at Time T + μ.
If the proxy party and the first party have accounts with the same bank B, this request is
made to bank B, as shown in Fig. 4. If not, the request is made to another bank B' (Fig. 4K)
with which the proxy party has an account. If the proxy party's credit is approved, in step 12
(Fig. 4L) the bank B (or B') provides the authorization Q to the retailer.
At this point (Fig. 4M), all authorizations have been provided, and the retailer in step
13 provides the proxy computer 108 with shipper tracking number J for the shipment from
the retailer to the shipping depot (the first hop), and/or the order number O, which the proxy
computer 108 forwards to the user computer 106 in step 13.5. The tracking number J is also
stored in the SAM 119 and linked to the user's address G and shopping session number #F.
The retailer then ships the good in step 14 to the proxy system operator's shipping depot
address A with labeling containing the proxy system operator's proxy identifier P and the
session identifier #F. In step 15 (Fig. 4N), the shipping depot A acknowledges receipt of the shipment and forwards to the proxy computer 108 acknowledgement of receipt of the
shipped good identified by the session number #F, and a second hop tracking number or
pick-up number J', also stored in the SAM database 119, and the proxy computer 108
forwards this information to the user computer 106 in step 15.5. Depending upon
arrangements with shippers and the proxy shipping depot A, the same tracking number J may
be used for both the first hop shipment to the proxy shipping depot A and the second hop
shipment to the customer.
The proxy computer 108 in step 16 (Fig. 4 O) directs the depot A (a) to ship the good
to customer address G designated by the first user to the proxy system if the good is to be
trans-shipped or (b) to hold it for pick-up ("C Picks Up"). The information needed for trans¬
shipping is contained in the SAM database 119 (Fig. 3B), which may be located at the
delivery facility 118 or elsewhere. If the good is not to be trans-shipped, it is held at the
depot A for pick-up, otherwise it is transshipped to the customer address G in step 17 (Fig. 4
O). If the good is held for pick-up, the proxy computer is informed when the good is picked
up. If it is transshipped, in step 18 (Fig. 4P) confirmation of receipt (H) by the customer is
provided to the shipping depot A , which informs (provides H plus #F to) the proxy computer
108 in step 19.
The proxy computer 108 confirms to the bank B in step 20 (Fig. 4Q) that the good
was shipped by providing the session identifier #F and the confirmation H. In step 21, the
bank B nets the transactions as illustrated in Fig. 5, including payment of a fee to the proxy
party, as follows: the Customer C is charged $Y; and settles with the bank B; the retailer R is
paid $Y less the customary transaction fee by the bank B; and the proxy party (iPrivacy) is paid a percentage of the transaction fee by the bank B. The bank B's transaction data, stored
in a transaction database 117 (Fig. 3B), is shown in Fig. 7, where time T indicates
transactions relating to the Customer C, and time "T + μ" indicates transactions relating to
the proxy party (iPrivacy). Fig. 7 shows the data generated by the transaction which the
proxy party can store in the transaction database 115 (Fig. 3B), and where appropriate, make
available to others.
The proxy tracking numbers J and J' are provided via the SAM database 119 (Fig. 3B)
and to the user through the proxy system or via email to the user for the user to track the
delivery. The retailer R does not receive the second hop tracking number J'.
In the embodiment described above, the session identifier #F is the data key to the
data record for the transaction.
Variations of the transaction represented in Fig. 4 are possible and contemplated. As
discussed above, in another embodiment represented in Fig. 3C, two banks are involved: one
as the credit card company of the user (third party) and the other as the credit card company
of the proxy (fourth party) .
Fig. 3B shows the authorization, crediting and debiting steps where one bank in
involved, and Fig. 3C where two banks are involved. Fig. 3F shows authorization, crediting
and debiting where two banks are involved and the proxy party is eliminated from the
authorization, crediting, debiting and liability chains. Fig. 3G shows authorization, crediting
and debiting where no proxy is involved.
Referring to Fig. 4, the authorization steps 11, 12 are between the second party vendor
and the proxy system operator's bank, and the authorization steps 8 and 9 are between the proxy system and the user's bank. The order of the authorizations 8, 9 and 11, 12 may be
reversed if desired. The vendor charges the purchase price to the proxy system operator's
bank and the proxy system charges the purchase price to user's bank, and netting provides the
two banks and the proxy system with part of the bank fee. Depending upon the
arrangement, identification of the good may be withheld from both banks and the identity of
the vendor may be withheld from the user's bank.
The table in Fig. 8 summarizes the transaction data available to various parties.
Variations are possible regarding data available to the various parties to a transaction, some
of which are indicated in the table shown in Fig. 8. The table in Fig. 8 is meant to be
exemplary.
Referring to Figs. 3, 3A-3C, the user proxy software 114a extends a user's WWW
browser to monitor, filter and reroute interactions between the browser and WWW servers
(retailers R). The user proxy software 114a and/the proxy computer software 114b provide
anonymizing transformations of these interactions to assure user's privacy, as briefly
discussed above and in more detail below.
Fig. 9 depicts the various protocol layers of IP packets processed by first party (user)
computers, proxy party computers and second party computers. With the user proxy
software 114a active, the proxy computer software 114a strips the user computer's IP address
G' (Fig. 4) in cooperation with the user proxy software and substitutes the proxy computer's
IP address (identifier A'), which redirects the messages to the respective destination WWW
server (second party retailer computer 110). (The user computer's IP address G' is needed by
the proxy computer. Therefore, stripping is performed by the proxy computer software.) The TCP protocol layer does not present privacy risks and the proxy computer software does
not intervene in its processing. The HTTP protocol layer has various header fields that
provide identification of the source browser system. The proxy computer software 114b
replaces all information in these fields with headers that represent the proxy system that do
not disclose private information about the customer's browser system.
In addition, the proxy computer 108 monitors and filters private information in
HTML documents. In particular, when a form is presented to the customer computer that
includes identifying fields, the user can select a private channel mode on the customer
computer browser and have the respective fields filled with information that identifies the
proxy system instead, and does not compromise the user's information. The proxy computer
also protects the user's system against access by Java agents to private data.
For example, the HTTP header may be replaced and the header contents filtered. As
part of the content filtering, the user proxy software and/or proxy computer software also
removes private past history from the content portion of the message to be transmitted to the
designated WebPage. The level of filtering may be made user selectable.
Content filtering may be accomplished as follows, for example.
1. Filtering cookie data: Various transactions with WWW servers deposit
cookie data on user's PC's. This cookie data is used to simplify access by users to various
services and to maintain status of transactions between a WWW server and a browser.
However, cookie data is often used to identify the user and correlate access to multiple
services, thus compromising private data. The proxy software manages the cookie data to
limit access to the data by external software. The proxy software allows access to cookies only to the owner system that created it. Thus, a given WWW server can only access cookie
data that it deposited but not other cookie data generated by others.
2. Filtering data collected by active code: Some web pages may include
active code such as Java applets (or Java scripts), or Active X. This code may access various
files and data of the user's computer. The proxy system creates a protective shell around the
interpreters of these active procedures (e.g., a Java virtual machine) that routes all accesses to
such data to respective anonymizing data sources.
There are alternate means of accomplishing the filtering of communications at the various
layers in the protocol stack, from IP addresses on up to the HTTP layer and beyond. The
filtering function that secures the user's private information can be implemented at the
operating system layer, or as modules that are callable by existing operating system software,
or as complete changes to the browser at the application level. For example, the client proxy
software may be implemented as a completely new downloaded browser modified to filter
and secure the user's private information, or as "plug in" software modules that are directly
called by the user's browser to perform the filter function, or as direct revisions of the
underlying operating system modules (in the case of windows, rewriting and installing newer
versions of Window's dynamic link library modules otherwise known as DLLs), or as device
drivers that sit on top of the TCP/IP, software and filter the communications that flow to and
from the protocol processing software, or "packet sniffing" software packages that capture
communications packets that flow into and out of the PC client and that then may be used to
filter the contents of those packets, or as wrapper technology, software that captures any
interactions with the operating system modules that filters the communication between these modules. The latter technique is the preferred embodiment since the wrapper technology
allows access to user private information to filter it while communicating via a transport
protocol such as TCP/IP, and as well allows access to the operating system's file system so
that cookies and privacy compromising code such as cgi scripts, or Java code, etc., may be
accessed and filtered. Robert Balzar of the University of Southern California Information
Science Institute has made available information on Windows OS wrapper technology that
intercepts Windows DLL calls.
3. Replacing compromising procedures: With XML, information pages
loaded by a server into a user PC may incorporate marks that activate compromising
procedures. The meaning of such marks is defined by XSL and DTD files, processed by a
local XML interpreter at the browser. The XSL files bind a mark to its meaning. The proxy
system replaces compromising procedures defined by XSL files, with alternative XSL files
that assign non-compromising procedures to retrieve anonymized data instead. This
mechanism is not strictly necessary because the filtering described in 2 above will prevent
access to compromising data anyway; the main purpose of replacing XSL libraries is to
accelerate and simplify filtering whenever possible.
The proxy system 112 (Figs. 3, 3A-3C) runs two protection algorithms, one for
outgoing information and one for incoming information. The algorithm for outgoing
information is illustrated in the flow chart depicted in Fig. 10. In step 10.1 the outgoing
information to be sent by a browser, or any code activated by the browser, is captured and
analyzed by the user proxy software 114a (Figs. 3, 3A-3C). This information is analyzed in
step 10.2 to determine whether it includes private information; for example, user name and password or a transaction form. If so, the private information is replaced with proxy system
information (step 10.3) and the entire data is sent to the proxy computer 108 (step 10.4)
where it is further processed. In step 5, all data is routed through the proxy computer 104 to
hide the IP source address. Tunneling may be used to forward packets from the user proxy
software 114a in the customer computers 106 to the proxy computer software 114b in the
proxy computer 108.
The flow chart in Fig. 11 illustrates the proxy system algorithm to handle incoming
data arriving at a browser, or code activated by the browser. After accepting the data (step
11.1), the user proxy software 114a (Figs. 3, 3A-3C) analyzes its contents to identify code
that may be used to compromise the user private information. Such code can include HTML
forms, or Java applets/scripts. If such code is found, the user proxy software 114a activates a
protection wrapper to monitor and filter all interactions between this code and local resources
(step 11.3). The wrapper will, depending on privacy selection by the user, prevent code from
accessing local resources that may compromise private information. Additionally, if such
code requires user input of private information, the protection display activated in step 11.4
enables the user to enter proxy system data instead of private information.
The proxy computer(s) 108 (Figs. 3, 3A-3C) perform two major functions. First, the
proxy computer route IP packets between customer computers 106 (proxy clients) and
second party vendor computers 110 (WWW servers) via respective tunnels that hide the IP
source identity. This function is performed at the network protocol layer by respective
routers/switches. Upon activation of the user proxy software 114a, the proxy computer
software 114b and user proxy software 114a authenticate each other and then establish a tunnel between them. The proxy computer strips the source IP envelope produced by the
user proxy software and forwards the internal IP packets to the destination. This internal IP
packet is configured with a proxy computer address as the source address. When an IP packet
is returned to this source address, the proxy computer tunnels it to the respective user proxy
software.
Second, the proxy computer software 114b (Figs. 3, 3A-3C) interacts with the user
proxy software 114a to privatize transactions between user computers 106 and respective
transaction servers (second party vendor computers) 110. The user proxy software captures
forms used by user computers to handle transactions. The fields of these forms are replaced
by the user proxy software with data identifying the proxy computer as the transacting entity.
The proxy computer uses this data to obtain authorization from a respective credit card
clearing service for the transaction amount and then to submit a respective privatized
transaction to the vendor computer, which sees only data identifying the proxy computer as
the source of the transaction.
The proxy computer algorithm that handles this credit processing is depicted in Fig.
12. In step 12.1 the proxy computer obtains transaction data created by the user proxy
software 114a (Figs. 3, 3A, 3B), and uses this data to extract the financial data needed to
execute the transaction (step 12.2) and pursue clearing of the financial transaction with a
credit card clearing entity (bank B, Fig. 4) (step 12.3). If the credit card entity approves the
transaction (step 12.4) the proxy computer transacts on behalf of the user computer 106 with
the retailer server 110 (step 12.5), the proxy computer becoming a proxy client to the retailer
service. For example, the proxy computer will submit the transaction form of the retailer filled with financial data and shipping address identifying the proxy computer as the client.
In step 12.6 the proxy computer instructs the user proxy software on the transaction status
(e.g., completed or denied) and the user proxy software presents the results to the respective
user computer.
A retailer transacting with a customer (user) through the proxy system will produce
deliverable goods that need to be sent to the customers. In order to hide a customer's shipping
address, the packaged goods are labeled with a code, preferably machine readable such as a
bar code, that identifies a proxy authorized, associated or owned shipping facility as the
delivery address. In a label-switching embodiment, the proxy system shipping depot scans
these labels and produces respective labels with the destination address designated by the
customer. The package is relabeled (or repackaged or wrapped) and then sent to the
customer-designated address. In a first hop, the shipper delivers the package sent by the
retailer labeled with the unique session identifier #F to the proxy shipping depot 118 (Figs.
3A-3B). The proxy shipping depot A, uses this session identifier to generate a label with the
customer designated address, and the customer's name. In case of return, the proxy shipping
depot A reverses the process and relabels the package with the respective identifier. This
information is stored in the SAM database 119 (Fig. 3B), which may be located at the
delivery facility.
Fig. 13 illustrates label switching and depicts the sender (retailer), recipient
(customer), shippers and two proxy system entities (Fig. 3B, proxy software 114 and proxy
shipping depot 118) within the box who are responsible for protecting the private information
of the recipient/customer by creating a privacy protection barrier separating the sender/retailer from the recipient/customer. The proxy software brokers transactions
between sender/retailer and recipient/ customer (e.g., for passing credit card payment) while
protecting private information. The proxy shipping depot 118 performs label switching, and
protects private information of the recipient customer through shipping and/or return.
These roles of privacy protection may be provided by the same party or by different parties.
For example, a shipper may provide the proxy shipping depot functions and the proxy party
may provide the other functions, or the proxy party may provide all of the functions.
Referring to Fig. 13, a transaction with label-switched shipping proceeds as follows.
A recipient/customer concludes a transaction with a sender/retailer using the proxy software.
The proxy software generates a unique (session) identifier (#F) of the transaction and in step
13.1 provides it to the sender/retailer and recipient/customer. In step 13.2, the proxy software
provides the unique identifier and the respective recipient identity and shipping address to the
proxy shipping depot 118. In step 13.3, a package containing the ordered good labeled with
the unique identifier is delivered to the proxy shipping depot 118, where a new shipping label
is generated with the identifier and address of the recipient/customer and applied to the
package (or the package is repackaged or wrapped etc. with the new label). In step 13.4, the
relabeled package is delivered via a shipper to the address designated by the
recipient/customer. To return a good while securing the recipient/customer's private
information, in step 13.5, the proxy shipping depot 118 reverses the process, replacing the
label with a unique identifier and notifying the proxy software of the relabeled shipment.
The above steps may involve multiple different media for communications and/or
label switching. Specifically, in step 13.1, handling a transaction that results in shipping may be conducted electronically (indicated by broken lines) over a computer network such as the
Internet. Alternatively, it may be handled via a telephone call for a catalogue order; a fax
transmission of an order; or any other form of communications. Step 13.2 may be conducted
through transmission of a message to the label-switching provider or by providing actual
labels. In step 13.3, label-switching may too be handled in many ways. The unique identifier
of a package may be coded in a bar code printed on a shipping label; alternatively it may be
supplied as a number or a string of characters or any other form that uniquely identifies the
package. The proxy shipping depot 118 will typically use special equipment to read the label
and identify the recipient name and address. It may print this data on a new label to be placed
on the package. Alternatively, it may provide the shipper with a file that can be used to
generate the shipping address on a computer screen by scanning the label. This enables the
shipper to deliver the package directly based on the original identifier.
Label-switched shipping accomplishes the following: (a) two way privacy protection;
(b) two-way verifiability through complete tracing of each shipping stage; (c) one-time per-
shipping privacy; and (d) full coordination and exchange of data with all entities participating
in a transaction. Thus, label-switched privacy-protection accomplishes the primary goals
identified above. There is, however, an extra cost in the transaction for handling the label
switching. Such costs are scalable and are incurred per shipment not per recipient or sender
as with the costs of POB-based techniques. The alternative method of delivery, depot pick-
up, does not introduce additional costs and, in fact, can result in cost savings compared to
current shipping. One-time Virtual Mailbox (OVM) technique for privacy-protected shipping operates as
follows. This technique is called one-time virtual mailbox because the OVM provider (e.g.,
the proxy shipping depot 118) functions as if a virtual mailbox has been opened and
terminated for a package and the recipient must use a secret key to retrieve its contents.
Referring to Fig. 14, step 14.1 is the same as step 13.1 described above for label-switched
shipping. In steps 14.2 and 14.3, the sender/retailer ships the package via a shipper to the
address of an OVM provider depot (e.g., the proxy shipping depot 118) with a unique
identifier printed on the package. For example, OVM77432572980975, 10 Main Street, Any
Town, USA 12345. The shipper (step 14.3) delivers the package to the OVM depot at the
depot's address. The recipient claims the package (step 14.4) by providing the OVM depot
with the unique session identifier #F on the package, and optionally other information such
as the order number. Preferably, a second form of authorization is required, for example,
secret information such as a biometric or a confidential code or password known to the
recipient and the OVM provider. A return is accomplished in step 14.5, where the process is
reversed and simplified. The recipient/customer ships the return package directly to the
sender/retailer with the respective OVM delivery identifier.
Tracking of the user's delivery is accomplished easily by the SAM database 119 (Fig. 3B)
and the trans-shipper's tracking system. By providing a tracking number to the Retailer R that
only reveals the depot address, or another proxy address, the user's true address is secured
from the retailer, who cannot determine the true address from the tracking system. The true
tracking number provided to the user provides the means of tracking the shipment. The OVM and the proxy tracking number technique accomplishes privacy-protected
shipping, which may be implemented using various media, communications and transactions.
Although the invention has been described and illustrated in connection with
preferred embodiments, many variations and modifications, as will be apparent to those of
skill in the art, may be made without departing from the spirit and scope of the invention.
The invention as set forth in the appended clams is thus not limited to the precise details of
construction set forth above as such variations and modifications are intended to be included
within the spirit and scope of the invention as set forth in the claims.

Claims

1. A method for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the method providing for a delivery address to which the good can
be delivered while securing said information of the first party with respect to the second
party, comprising the steps of:
the first and second parties communicating over the network using respective devices;
providing information from the first device directed to the second device for
communicating with the second device or to order a good while securing said information of
the first party; and
providing a delivery address to the second party to which the good is to be delivered,
the delivery address not enabling the second party to determine said information of the first
party.
2. The method of claim 1 wherein the step of providing information from the first
device directed to the second device while securing said information comprises providing
proxy identifying information specific to the first party or the first device but from which the
second party can not determine said information.
3. The method of claim 1 wherein the step of providing information from the first
device directed to the second device while securing said information comprises the step of
altering information from the first device directed to the second device while securing said
information of the first party.
4. The method of claim 3 wherein the step of the first and second parties
communicating with each other over the network comprises the first party using a first
computer and the second party using a second computer.
5. The method of claim 4 wherein the step of altering said information from the
first device comprises altering said information from the first computer using proxy software
associated with the first computer or a proxy computer, or both.
6. The method of claim 5 wherein the step of providing the delivery address
comprises using the proxy software to provide the delivery address.
7. The method of claim 4 wherein the step of providing the delivery address
comprises using proxy software associated with a proxy computer.
8. The method of claim 1, 2, 3, 4, 5, 6 or 7 including the step of providing for
delivery of the good to the delivery address.
9. The method of claim 8 wherein the good is a physical good and the delivery
address is the address of a physical facility, and wherein the step of providing for delivery of
the good to the delivery address includes the second party providing for physical shipment of
the good to the physical facility.
10. The method of claim 9 including the step of making the good available at the
physical facility for pick up by or on behalf of the first party in a manner which does not
require said information of the first party to be revealed at the physical facility.
11. The method of claim 10 including the step of providing a physical address,
which may not secure said information of the first party, designated by the first party to the
physical facility but not to the second party.
12. The method of claim 11 including the step of providing for shipment of the
good from the physical facility to the physical address.
13. The method of claim 7 wherein the good is an electronically transmittable file
and the delivery address is an electronic address of a proxy computer, the step of providing
for delivery of the good to the delivery address including the second party providing for
electronic transmission of the file to the proxy computer.
14. The method of claim 13 including the step of the proxy computer transmitting
the file to an electronic address of the first party, which may not secure said information of
the first party, which is available to the proxy computer but not to the second party.
15. The method of clam 2 wherein the good is an electronically transmittable file
and the delivery address is an electronic address associated with the proxy identifying
information of the first device, the step of providing for delivery of the good to the delivery
address including the second party providing for electronic transmission of the file to the
electronic address of the first device.
16. The method of claim 3 wherein the step of altering information from the first
device comprises altering at least a content protocol layer of the information.
17. The method of claim 3 wherein the communications network is the Internet,
the step of the first and second parties communicating with each other over the network
comprises the first party using a first computer and the second party using a second
computer, and the step of altering information from the first computer comprises altering at
least a content protocol layer of the information.
18. The method of claim 17 wherein altering the information at least at a content
layer comprises filtering cookie data.
19. The method of claim 17 wherein altering the information at least at a content
layer comprises filtering active code.
20. The method of claim 17 wherein altering the information at least at a content
layer comprises filtering compromising procedures.
21. The method of claim 1 wherein the communications network is the Internet
and the identifying information is an identity associated with the first party, and wherein the
step of providing identifying information specific to the first party or the first device but from
which the second party can not determine said information comprises providing a proxy
identity for the first party.
22. A method for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the method providing for payment to the second party and a delivery
address to which the good can be delivered while securing said information of the first party
with respect to the second party, comprising the steps of:
the first and second parties communicating over the network using respective devices;
providing information from the first device directed to the second device for
communicating with the second device or to order a good while securing said information of
the first party; providing for approval or disapproval of the purchase of the good by the first party
from the second party based on financial information relating to the first party, and if the
purchase is approved, providing for payment to the second party while securing said
information of the first party with respect to the second party; and
providing a delivery address to the second party to which the good is to be delivered,
the delivery address not enabling the second party to determine said information of the first
party.
23. The method of claim 22 wherein the step of providing for approval or
disapproval comprises another party providing for approval or disapproval of the purchase
based on financial information relating to the first party, and wherein the step of providing
for payment if the purchase is approved comprises the other party providing for payment to
the second party and providing for debiting of the first party.
24. The method of claim 23 wherein the step of providing for approval or
disapproval comprises the other party being a third party who approves or disapproves of the
purchase based on financial information relating to the first party, and wherein the step of
providing for payment if the purchase is approved comprises the third party paying the
second party and debiting the first party.
25. The method of claim 23 wherein the step providing for approval or disapproval
comprises the other party arranging with at least a third party to provide for approval or
disapproval of the purchase based on the financial information relating to the first party, and
wherein the step of providing for payment comprises the other party arranging with at least
the third party to provide for payment to the second party and debiting of the first party.
26. The method of claim 23 wherein the step of the first and second parties
communicating with each other over the network comprises the first party using a first
computer and the second party using a second computer, and wherein the step of providing
for approval or disapproval comprises the other party being a proxy party and using proxy
software associated with the first computer or a proxy computer, or both, and wherein the
step of providing for payment if the purchase is approved comprises the proxy party using
the proxy software to provide for payment to the second party and debiting of the first party.
27. The method of claim 26 wherein the step of providing for approval or
disapproval comprises the proxy party arranging with at least a third party to provide for
approval or disapproval of the purchase based on the financial information relating to the first
party, and wherein the step of providing for payment comprises the proxy party arranging
with the third party to provide for payment to the second party and debiting of the first party.
28. The method of claim 27 wherein the step of providing for approval or
disapproval comprises the third party using a third computer communicating with the proxy
computer to approve or disapprove the purchase based on financial information relating to
the first party available to the third party, and wherein the step of providing for payment if
the purchase is approved comprises the third party electronically crediting the second party
and electronically debiting the first party.
29. The method of claim 28 wherein the step of debiting includes debiting a credit
card account of the first party.
30. The method of claim 28 or 29 comprising the step of providing for payment of
a fee to the proxy party for the proxy party's participation in purchases in which the third party also participates.
31. The method of claim 30 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for each purchase by a first party from a
second party in which the third party participates.
32. The method of claim 30 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for each first party enabled to purchase from a
second party.
33. The method of claim 30 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for enabling the third party to participate in
purchases made by first parties from second parties.
34. The method of claim 26 wherein the step of providing for approval or
disapproval comprises the proxy party arranging with a third party using a third computer to
provide for approval or disapproval of the purchase based on financial information relating to
the first party and a fourth party using a fourth computer to provide for approval or
disapproval of the purchase based on financial information relating to the proxy party,
wherein the step of providing for payment to the second party includes the fourth party
electronically crediting an account of the second party and electronically debiting an account
of the proxy party, and the third party electronically crediting an account of the proxy party
and electronically debiting an account of the first party.
35. The method of claim 34 wherein the step of debiting the account of the first
party includes debiting a credit card account of the first party.
36. The method of claim 34 or 35 comprising the step of providing for payment of
a fee to the proxy party for the proxy party's participation in purchases in which the third
party or the fourth party also participates.
37. The method of claim 36 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for each purchase by a first party from a
second party in which the third party or the fourth party participates.
38. The method of claim 36 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for each first party enabled to purchase from a
second party.
39. The method of claim 36 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for enabling the third party or the fourth party
to participate in purchases made by first parties from second parties.
40. The method of claim 28 wherein the step of providing for payment to the
second party comprises the third party assuming all responsibility and financial liability for
paying the second party and collecting from the first party, and including the step of the third
party paying a fee to the proxy party.
41. The method of claim 28 wherein the proxy party receives information
concerning transactions between first parties and second parties including said information of
the first party, the method including the step of the proxy party providing certain of said
information of the first party to the third party beyond information required by the third party
to carry out the approval and disapproval step and the payment step.
42. The method of claim 28 wherein the proxy party associated with the proxy
software and the first party both have accounts with the third party, and wherein the step of
providing payment to the second party includes the proxy software providing the second
party with information of the proxy party's account with the third party, and if the third party
authorizes payment, the third party paying the second party and debiting the first party.
43. The method of claim 42 wherein the step of providing payment includes the
third party electronically debiting a credit card account of the first party.
44. The method of claim 42 or 43 comprising the step of the third party providing
payment of a fee to the proxy party.
45. The method of claim 22 wherein the step of providing information from the
first device directed to the second device while securing said information comprises
providing identifying information specific to the first party or the first device but from which
the second party can not determine said information.
46. The method of claim 22 wherein the step of providing information from the
first device directed to the second device while securing said information comprises the step
of altering information from the first device directed to the second device.
47. The method of claim 46 wherein the step of altering information from the first
device comprises altering at least a content protocol layer of said information.
48. The method of claim 46 wherein the step of the first and second parties
communicating with each other over the network comprises the first party using a first
computer and the second party using a second computer.
49. The method of claim 48 wherein the step of altering information from the first
device comprises altering said information from the first computer using proxy software
associated with the first computer or a proxy computer, or both.
50. The method of claim 46 wherein the communications network is the Internet,
the step of the first and second parties communicating with each other over the network
comprises the first party using a first computer and the second party using a second
computer, and the step of altering information from the first computer comprises altering at
least a content protocol layer the information.
51. The method of claim 50 wherein altering information at least at a content layer
comprises filtering cookie data.
52. The method of claim 50 wherein altering information at least at a content layer
comprises filtering active code.
53. The method of claim 50 wherein altering said information at least at a content
layer comprises filtering compromising procedures.
54. The method of claim 26 wherein the step of providing the delivery address
comprises using the proxy software.
55. The method of claim 22 wherein the step of providing the delivery address
comprises using proxy software associated with a proxy computer.
56. The method of claim 22, 54 or 55 including the step of providing for delivery
of the good to the delivery address.
57. The method of claim 56 wherein the good is a physical good and the delivery
address is the address of a physical facility, and wherein the step of providing for delivery of the good to the delivery address includes the second party providing for physical shipment of
the good to the physical facility.
58. The method of claim 57 including the step of making the good available at the
physical facility for pick up by or on behalf of the first party in a manner which does not
require said information of the first party to be revealed at the physical facility.
59. The method of claim 57 including the step of providing for the shipment of the
good from the physical facility to a physical address, which may not secure said information
of the first party, designated by the first party which is made available at the physical facility
but not to the second party.
60. The method of claim 56 wherein the good is an electronically transmittable file
and the delivery address is an electronic address of a proxy computer, the step of providing
for delivery of the good to the delivery address including the second party providing for
electronic transmission of the file to the proxy computer.
61. The method of claim 60 including the step of the proxy computer transmitting
the file to an electronic address of the first party which is available at the proxy computer but
not to the second party.
62. The method of clam 45 wherein the good is an electronically transmittable file
and the delivery address is an electronic address associated with the identifying information
of the first device, which may not secure said information of the first party, and wherein the
step of providing for delivery of the good to the delivery address includes the second party
providing for electronic transmission of the file to the electronic address associated with the
identifying information of the first device.
63. The method of claim 45 wherein the communications network is the Internet
and the identifying information is an identity associated with the first party, and wherein the
step of providing identifying information specific to the first party or the first device from
which the second party can not determine said information comprises providing a proxy
identity for the first party.
64. A method for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the method providing payment to the second party while securing
said information of the first party with respect to the second party, comprising the steps of:
the first and second parties communicating over the network using respective devices;
providing information from the first device directed to the second device for
communicating with the second device or to order a good while securing said information of
the first party; and
another party providing for approval or disapproval by at least a third party of the
purchase of the good by the first party from the second party based on financial information
relating to the first party accessible by the third party, and if the purchase is approved,
providing for payment to the second party while securing said information of the first party
with respect to the second party.
65. The method of claim 64 wherein the step of providing for payment if the
purchase is approved comprises the other party providing for debiting of the first party.
66. The method of claim 65 wherein the step of providing for approval or
disapproval comprises the other party being a third party who approves or disapproves of the
purchase based on financial information relating to the first party, and wherein the step of
providing for payment if the purchase is approved comprises the third party paying the
second party and debiting the first party.
67. The method of claim 64 wherein the step providing for approval or disapproval
comprises arranging with at least a third party to provide for approval or disapproval of the
purchase based on the financial information relating to the first party, and wherein the step of
providing for payment comprises the other party arranging with at least the third party to
provide payment to the second party and debiting of the first party.
68. The method of claim 67 wherein the step of the first and second parties
communicating with each other over the network comprises the first party using a first
computer and the second party using a second computer, and wherein the step of providing
for approval or disapproval comprises the other party being a proxy party and using proxy
software associated with the first computer or a proxy computer, or both and wherein the step
of providing for payment if the purchase is approved comprises the other party using the
proxy software to provide for payment to the second party and debiting of the first party.
69. The method of claim 68 wherein the step of providing for approval or
disapproval comprises the proxy party arranging with a third party to provide for approval or
disapproval of the purchase based on the financial information relating to the first party, and
wherein the step of providing for payment comprises the proxy party arranging with a third
party to provide for payment to the second party and debiting of the first party.
70. The method of claim 69 wherein the step of providing for approval or
disapproval comprises the third party using a third computer communicating with the proxy
computer to approve or disapprove the purchase based on financial information relating to
the first party available to the third party, and wherein the step of providing for payment if
the purchase is approved comprises the third party electronically crediting the second party
and electronically debiting the first party.
71. The method of claim 70 wherein the step of debiting the account of the first
party includes debiting a credit card account of the first party.
72. The method of claim 70 or 71 comprising the step of providing for payment of
a fee to the proxy party for the proxy party's participation in purchases in which the third
party also participates.
73. The method of claim 72 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for each purchase by a first party from a
second party in which the third party participates.
74. The method of claim 72 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for each first party enabled to purchase from a
second party.
75. The method of claim 72 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for enabling the third party to participate in
purchases made by first parties from second parties.
76. The method of claim 68 wherein the step of providing for approval or
disapproval comprises the proxy party arranging with a third party using a third computer to provide for approval or disapproval of the purchase based on financial information relating to
the first party and a fourth party using a fourth computer to provide for approval or
disapproval of the purchase based on financial information relating to the proxy party,
wherein the step of providing for payment to the second party includes the fourth party
electronically crediting an account of the second party and electronically debiting an account
of the proxy party, and the third party electronically crediting an account of the proxy party
and electronically debiting an account of the first party.
77. The method of claim 76 wherein the step of debiting the account of the first
party includes debiting a credit card account of the first party.
78. The method of claim 76 or 77 comprising the step of providing for payment of
a fee to the proxy party for the proxy party's participation in purchases in which the third
party or the fourth party also participates.
79. The method of claim 78 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for each purchase by a first party from a
second party in which the third party or the fourth party participates.
80. The method of claim 78 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for each first party enabled to purchase from a
second party.
81. The method of claim 78 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for enabling the third party or the fourth party
to participate in purchases made by first parties from second parties.
82. The method of claim 70 wherein the step of providing for payment to the
second party comprises the third party assuming all responsibility and financial liability for
paying the second party and collecting from the first party, and including the step of the third
party paying a fee to the proxy party.
83. The method of claim 82 wherein the proxy party receives information
concerning transactions between first parties and second parties including said information of
the first party, the method including the step of the proxy party providing certain of said
information of the first party to the third party beyond information required by the third party
to carry out the approval and disapproval step and the payment step.
84. The method of claim 70 wherein the proxy party and the first party both have
accounts with the third party, and wherein the step of providing payment to the second party
includes the proxy software providing the second party with information of the proxy party's
account with the third party, and if the third party authorizes payment, the third party paying
the second party and debiting the first party.
85. The method of claim 84 wherein the step of providing payment includes the
third party electronically debiting a credit card account of the first party.
86. The method of claim 84 or 85 comprising the step of the third party providing
payment of a fee to the proxy party.
87. The method of claim 64 wherein the step of providing information from the
first device directed to the second device while securing said information comprises
providing identifying information specific to the first party or the first device but from which
the second party can not determine said information.
88. The method of claim 64 wherein the step of providing information from the
first device directed to the second device while securing said information comprises the step
of altering information from the first device directed to the second device.
89. The method of claim 88 wherein the step of altering said information from the
first device comprises altering at least a content protocol layer of said information.
90. The method of claim 88 wherein the step of the first and second parties
communicating with each other over the network comprises the first party using a first
computer and the second party using a second computer.
91. The method of claim 90 wherein the step of altering said information from the
first device comprises altering said information from the first computer using proxy software
associated with the first computer or a proxy computer, or both.
92. The method of claim 88 wherein the communications network is the Internet,
the step of the first and second parties communicating with each other over the network
comprises the first party using a first computer and the second party using a second
computer, and the step of altering said information from the first computer comprises altering
at least a content protocol layer said information.
93. The method of claim 92 wherein altering said information at least at a content
layer comprises filtering cookie data.
94. The method of claim 92 wherein altering said information at least at a content
layer comprises filtering active code.
95. The method of claim 92 wherein altering said information at least at a content
layer comprises filtering compromising procedures.
96. The method of claim 87 wherein the communications network is the Internet
and the identifying information is an identity associated with the first party, and wherein the
step of providing identifying information specific to the first party or the first device from
which the second party can not determine said information comprises providing a proxy
identity for the first party.
97. A method for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the method providing payment to the second party while securing
said information of the first party with respect to the second party, comprising the steps of:
the first and second patties communicating over the network using respective devices;
altering said information from the first device directed to the second device to prevent
the second party from determining said information of the first party; and
providing for approval or disapproval of the purchase by a first party from a second
party based on (a) an account that the first party has with a third party and (b) an account that
a proxy party has with a fourth party while securing said information with respect to the
second party, the third party approving or disapproving the purchase based on account
information relating to the first party, and the fourth party approving or disapproving the
purchase based on and account information relating to the proxy party with the fourth party,
and if the third and fourth parties approve the purchase, the fourth party electronically
crediting the second party and electronically debiting the proxy party, and the third party
electronically crediting the account of the proxy party and electronically debiting the first party.
98. The method of claim 97 wherein the step of the first and second parties
communicating with each other over the network comprises the first party using a first
computer, the second party using a second computer and the proxy party using a proxy
computer, and wherein the step of the third party approving or disapproving the purchase
comprises the third computer communicating with the proxy computer, and wherein the step
of the fourth party approving or disapproving the purchase comprises a fourth computer
communicating with the proxy computer and the second computer.
99. The method of claim 98 wherein the step of debiting the first party comprises
debiting a credit card account of the first party.
100. The method of claim 98 or 99 wherein the step of debiting the proxy party
comprises debiting a credit card account of the proxy party. j
101. The method of claim 100 including the step of providing for payment of the
fee to the proxy party.
102. The method of claim 101 wherein the step of providing for payment of a fee to
the proxy party comprises payment of a fee for each purchase by a first party from a second
party in which the third party or the fourth party participates.
103. The method of claim 101 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for each first party enabled to purchase from a
second party.
104. The method of claim 101 wherein the step of providing for payment of the fee
to the proxy party comprises payment of a fee for enabling the third party or the fourth party to participate in purchases made by first parties from second parties.
105. The method of claim 97 wherein the step of altering said information from the
first device comprises altering at least a content protocol layer of said information.
106. The method of claim 97 wherein the step of the first and second parties
communicating with each other over the network comprises the first party using a first
computer and the second party using a second computer.
107. The method of claim 105 wherein the step of altering said information from
the first device comprises altering said information from the first computer using proxy
software associated with the first computer or a proxy computer, or both.
108. The method of claim 97 wherein the communications network is the Internet,
the step of the first and second parties communicating with each other over the network
comprises the first party using a first computer and the second party using a second
computer, and the step of altering said information from the first computer comprises altering
at least a content protocol layer said information.
109. The method of claim 108 wherein altering said information at least at a content
layer comprises filtering cookie data.
110. The method of claim 108 wherein altering said information at least at a content
layer comprises filtering active code.
111. The method of claim 108 wherein altering said information at least at a content
layer comprises filtering compromising procedures.
112. A system for a first party using a first computer to order a good from a second
party using a second computer over a communications network linking the first and second computers, the first party having information of a personal or private nature specific to the
first party or the first computer, the system providing for a delivery address to which the
good can be delivered while securing said information of the first party with respect to the
second party, comprising:
the first computer having proxy identifying information which does not reveal said
information of the first party;
the first computer having software which
alters information from the first computer directed to the second computer to prevent
the second party from determining said information of the first party, and
provides a delivery address to the second party to which the good is to be delivered,
the delivery address not enabling the second party to determine said information of the first
party.
113. The system of claim 112 comprising a delivery means for delivering the good
to the delivery address.
114. The system of claim 113 wherein the good is a physical good and the delivery
address is the address of a physical facility, and wherein the delivery means comprises means
for physically shipping the good to the physical facility.
115. The system of claim 114 including means for making the good available at the
physical facility for pick up by or on behalf of the first party in a manner which does not
require said information of the first party to be revealed at the physical facility.
116. The system of claim 114 including means for physically shipping the good
from the physical facility to a physical address designated by the first party which is made available at the physical facility but not to the second party.
117. The system of claim 1 16 including a database storing the physical address
designated by the first party, at least part of said information of the first party, or information
relating to the purchase by the first party, or both, and means for accessing the database using
information relating to the purchase or said information of the first party stored in the
database to obtain the physical address of the first party to which the good is to be shipped.
118. The system of claim 112 wherein the good is an electronically transmittable
file and the delivery address is an electronic address associated with the proxy identifying
information of the first computer which does not reveal said information, and wherein the
delivery means comprises means for electronically transmitting the file to the first computer.
1 19. The system of claim 115 including means for providing a first label for
association with the good, the first label having the delivery address and unique information
relating the good and the first party from which a physical address designated by the first
party to which the good is to be reshipped can be identified, and means for providing a
second label that has the physical address designated by the first party and which can replace
the first label.
120. The system of claim 119 wherein the means for providing a second label
includes a database mapping the unique information and the physical address designated by
the first party.
121. The system of claim 119 including means for providing a label for association
with the good, the label having the delivery address and unique information relating the good
and the first party, and wherein the first computer software provides the unique information to the second party.
122. The system of claim 112 wherein the first computer software alters at least a
content protocol layer of the information.
123. The system of claim 1 12 wherein the network is the Internet and the first
computer software alters at least a content protocol layer of the information.
124. The system of claim 123 wherein the first computer software filters cookie
data.
125. The system of claim 123 wherein the first computer software filters active
code.
126. The system of claim 123 wherein the first computer software filters
compromising procedures.
127. A system for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the system providing for a delivery address to which the good can be
delivered while securing said information of the first party with respect to the second party,
comprising:
a proxy device altering said information from the first device directed to the second
device to prevent the second party from determining said information of the first party; and
the proxy device providing a delivery address to the second party to which the good is
to be delivered, the delivery address not enabling the second party to determine said
information of the first party.
128. The system of claim 127 wherein the first device comprises a first computer
and the second device comprises a second computer.
129. The system of claim 127 wherein the proxy device comprises a proxy
computer and proxy software associated with the first computer or the proxy computer, or
both, which alters information from the first computer.
130. The system of claim 129 wherein the proxy software provides the delivery
address to the second party.
131. The system of claim 127, 128, 129 or 130 comprising a delivery means for
delivering the good to the delivery address.
132. The system of claim 131 wherein the good is a physical good and the delivery
address is the address of a physical facility, and wherein the delivery means comprises means
for physically shipping the good to the physical facility.
133. The system of claim 132 including means for making the good available at the
physical facility for pick up by or on behalf of the first party in a manner which does not
require said information of the first party to be revealed at the physical facility.
134. The system of claim 132 including means for physically shipping the good
from the physical facility to a physical address designated by the first party which is made
available at the physical facility but not to the second party.
135. The system of claim 131 wherein the good is an electronically transmittable
file and the delivery address is an electronic address of a proxy computer, and wherein the
delivery means comprises means for electronically transmitting the file to the proxy
computer.
136. The system of claim 135 including means for transmitting the file to an
electronic address of the first party which is available at the proxy computer but not to the
second party.
137. The system of claim 127 wherein the proxy device either redirects the good to
a physical address designated by the first party using a proxy party who does not provide the
second party with access to the address designated by the first party, or allows the good to be
picked up by or on behalf of the first party anonymously.
138. The system of claim 137 including a database storing the physical address
designated by the first party, at least part of said information of the first party, or information
relating to the purchase by the first party, or both, and means for accessing the database using
information relating to the purchase or said information of the first party stored in the
database to obtain the physical address of the first party to which the good is to be shipped.
139. The system of claim 137 including means for providing a first label for
association with the good, the first label having the delivery address and unique information
relating the good and the first party with which the proxy party at the delivery address can
identify a physical address designated by the first party to which the good is to be reshipped,
and means for providing a second label that has the address designated by the first party and
which can replace the first label.
140. The system of claim 139 wherein the means for providing a second label
includes a database mapping the unique information and the physical address designated by
the first party.
141. The system of claim 139 including means for providing a label for association
with the good, the label having the delivery address and unique information relating the good
and the first party, and wherein the proxy software provides the unique information to the
second party.
142. The system of claim 127 wherein the proxy device alters at least a content
protocol layer of said information.
143. The system of claim 127 wherein the communications network is the Internet,
the first device comprises a first computer and the second device comprises a second
computer, and wherein the proxy device comprises proxy software which alters at least a
content protocol layer of said information.
144. The system of claim 143 wherein the proxy software filters cookie data.
145. The system of claim 143 wherein the proxy software filters active code.
146. The method of claim 143 wherein the proxy software filters compromising
procedures.
147. A system for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the system providing for payment to the second party and a delivery
address to which the good can be delivered while securing said information of the first party
with respect to the second party, comprising:
the first computer having identifying information which does not reveal said
information of the first party; the first computer having software which
alters information from the first computer directed to the second computer to prevent
the second party from determining said information of the first party, and
provides a delivery address to the second party to which the good is to be delivered,
the delivery address not enabling the second party to determine said information of the first
party; and
a third party computer providing for approval or disapproval of the purchase of the
good by the first party from the second party based on financial information relating to the
first party, and if the purchase is approved, providing for payment to the second party while
securing said information of the first party with respect to the second party.
148. A system for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the system providing for payment to the second party and a delivery
address to which the good can be delivered while securing said information of the first party
with respect to the second party, comprising:
a proxy device altering information from the first device directed to the second device
to prevent the second party from determining said information of the first party;
the proxy device providing for approval or disapproval of the purchase of the good by
the first party from the second party based on financial information relating to the first party,
and if the purchase is approved, providing for payment to the second party while securing
said information of the first party with respect to the second party; and the proxy device providing a delivery address to the second party to which the good is
to be delivered, the delivery address not enabling the second party to determine said
information of the first party.
149. The system of claim 148 wherein the first device comprises a first computer
5 and the second device comprises a second computer.
150. The system of claim 149 wherein the proxy device comprises a proxy
computer and proxy software associated with the first computer or the proxy computer, or
both for providing for approval or disapproval of the purchase based on financial information
of the first party, and if the purchase is approved, for providing for payment to the second
l o party and debiting of the first party.
151. The system of claim 150 comprising at least a third computer communicating
with the proxy computer for approving or disapproving the purchase based on financial
information of the first party available to the third party, and if the purchase is approved, for
electronically crediting the second party and electronically debiting the first party.
15 152. The system of claim 151 - comprising the third computer providing for
payment of a fee to the proxy computer for the proxy computer's participation in purchases in
which the third computer also participates.
153. The system of claim 151 comprising the third computer providing for payment
of a fee to the proxy computer for each first computer enabled to purchase from a second
20 computer.
154. The system of claim 151 comprising the third computer providing for payment
of a fee to the proxy computer for enabling the third computer to participate in purchases made by first computers from second computers.
155. The system of claim 147 comprising a third computer communicating with the
proxy computer to provide for approval or disapproval of the purchase based on financial
information relating to the first party and a fourth computer to provide for approval or
disapproval of the purchase based on financial information relating to the proxy computer,
and if the purchase is approved, the fourth computer electronically crediting of the second
party and electronically debiting the proxy computer, and the third computer electronically
crediting the proxy computer and electronically debiting of the first party.
156. The system of claim 155 wherein the third computer debits a credit card
account of the first party.
157. The system of claim 155 comprising the third computer or the fourth
computer, or both, providing for payment of a fee to the proxy computer for he proxy
computer's participation in purchases in which the third computer or the fourth computer also
participates.
158. The system of claim 155 comprising the third computer or the fourth
computer, or both, providing for payment of the fee to the proxy computer for each purchase
by a first party from a second party in which the third party or the fourth party participates.
159. The system of claim 155 comprising the third computer providing for payment
of a fee to the proxy computer for each first computer enabled to purchase from a second
computer.
160. The system of claim 155 comprising the third computer providing for payment
of a fee to the proxy computer for enabling the third computer to participate in purchases made by first computers from second computers.
161. The system of claim 155 comprising the fourth computer providing for
payment of a fee to the proxy computer for enabling the fourth computer to participate in
purchases made by first computers from second computers.
162. The system of claim 151 wherein a proxy computer receives information
concerning transactions between first parties and second parties including said information of
the first party, the proxy computer providing certain of said information of the first party to
the third computer or the fourth computer, or both, beyond information required to provide
for approval and disapproval of the purchase.
163. The system of claim 148 wherein the proxy device alters at least a content
protocol layer of said information.
164. The method of claim 148 wherein the communications network is the Internet,
the first device comprises a first computer and the second device comprises a second
computer, and wherein the proxy device comprises proxy software which alters at least a
content protocol layer of the information.
165. The system of claim 164 wherein the proxy software filters cookie data.
166. The system of claim 164 wherein the proxy software filters active code.
167. The system of claim 164 wherein the proxy software filters compromising
procedures.
168. The system of claim 149 wherein the proxy device comprises a proxy
computer and proxy software associated with the first computer or the proxy computer, or
both, which alters said information from the first computer.
169. The system of claim 168 wherein the proxy software provides the delivery to
the second party.
170. The system of claim 148, 149, 168 or 169 comprising a delivery means for
delivering the good to the delivery address.
171. The system of claim 170 wherein the good is a physical good and the delivery
address is the address of a physical facility, and wherein the delivery means comprises means
for physically shipping the good to the physical facility.
172. The system of claim 170 including means for making the good available at the
physical facility for pick up by or on behalf of the first party in a manner which does not
require said information of the first party to be revealed at the physical facility.
173. The system of claim 170 including means for physically shipping the good
from the physical facility to a physical address designated by the first party which is made
available at the physical facility but not to the second party.
174. The system of claim 173 including a database storing the physical address
designated by the first party, at least part of said information of the first party, or information
relating to the purchase by the first party, or both, and means for accessing the database using
information relating to the purchase or said information of the first party stored in the
database to obtain the physical address of the first party to which the good is to be shipped.
175. The system of claim 169 wherein the good is an electronically transmittable
file and the delivery address is an electronic address of a proxy computer, and wherein the
delivery means comprises means for electronically transmitting the file to the proxy
computer.
176. The system of claim 175 including means for transmitting the file to an
electronic address of the first party which is available at the proxy computer but not to the
second party.
177. The system of claim 148 wherein the proxy device either redirects the good to
an address designated by the first party using a proxy party who does not provide the second
party with access to the address designated by the first party, or allows the good to be picked
up by or on behalf of the first party anonymously.
178. The system of claim 177 including means for providing a first label for
association with the good, the first label having the delivery address and unique information
relating the good and the first party with which the proxy party at the delivery address can
identify an address designated by the first party to which the good is to be reshipped, and
means for providing a second label that has the address designated by the first party and
which can replace the first label.
179. The system of claim 178 wherein the means for providing a second label
includes a database mapping the unique information and the address designated by the first
party.
180. The system of claim 178 including means for providing a label for association
with the good, the label having the delivery address and unique information relating the good
and the first party, and wherein the proxy software provides the unique information to the
second party.
181. A system for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second devices, the first party having information of a personal or private nature specific to the first
party or the first device, the system providing for payment to the second party and a delivery
address to which the good can be delivered while securing said information of the first party
with respect to the second party, comprising:
the first computer having identifying information which does not reveal said
information of the first party;
the first computer having software which alters information from the first computer
directed to the second computer to prevent the second party from determining said
information of the first party; and
a third party computer providing for approval or disapproval of the purchase of the
good by the first party from the second party based on financial information relating to the
first party, and if the purchase is approved, providing for payment to the second party while
securing said information of the first party with respect to the second party.
182. A system for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the system providing for payment to the second party and a delivery
address to which the good can be delivered while securing said information of the first party
with respect to the second party, comprising:
a proxy device altering information from the first device directed to the second device
to prevent the second party from determining said information of the first party; the proxy device providing for approval or disapproval of the purchase of the good by
the first party from the second party based on financial information relating to the first party,
and if the purchase is approved, providing for payment to the second party while securing
said information of the first party with respect to the second party.
183. The system of claim 182 wherein the first device comprises a first computer
and the second device comprises a second computer.
184. The system of claim 183 wherein the proxy device comprises a proxy
computer and proxy software associated with the first computer or the proxy computer, or
both for providing for approval or disapproval of the purchase based on financial information
of the first party, and if the purchase is approved, for providing for payment to the second
party and debiting of the first party.
185. The system of claim 184 comprising at least a third computer communicating
with the proxy computer for approving or disapproving the purchase based on financial
information of the first party available to the third party, and if the purchase is approved, for
electronically crediting the second party and electronically debiting the first party.
186. The system of claim 185 comprising the third computer providing for payment
of a fee to the proxy computer for the proxy computer's participation in purchases in which
the third computer also participates.
187. The system of claim 185 comprising the third computer providing for payment
of a fee to the proxy computer for each first computer enabled to purchase from a second
computer.
188. The system of claim 185 comprising the third computer providing for payment
of a fee to the proxy computer for enabling the third computer to participate in purchases
made by first computers from second computers.
189. The system of claim 184 comprising a third computer communicating with the
proxy computer to provide for approval or disapproval of the purchase based on financial
information relating to the first party and a fourth computer to provide for approval or
disapproval of the purchase based on financial information relating to the proxy computer,
and if the purchase is approved, the fourth computer electronically crediting of the second
party and electronically debiting the proxy computer, and the third computer electronically
crediting of the proxy computer and electronically debiting of the first party.
190. The system of claim 189 wherein the third computer debits a credit card
account of the first party.
191. The system of claim 189 comprising the third computer or the fourth
computer, or both, providing for payment of a fee to the proxy computer for he proxy
computer's participation in purchases in which the third computer or the fourth computer also
participates.
192. The system of claim 189 comprising the third computer or the fourth
computer, or both, providing for payment of the fee to the proxy computer for each purchase
by a first party from a second party in which the third party or the fourth party participates.
193. The system of claim 189 comprising the third computer providing for payment
of a fee to the proxy computer for each first computer enabled to purchase from a second
computer.
194. The system of claim 189 comprising the third computer providing for payment
of a fee to the proxy computer for enabling the third computer to participate in purchases
made by first computers from second computers.
195. The system of claim 189 comprising the fourth computer providing for
payment of a fee to the proxy computer for enabling the fourth computer to participate in
purchases made by first computers from second computers.
196. The system of claim 195 wherein a proxy computer receives information
concerning transactions between first parties and second parties including said information of
the first party, the proxy computer providing certain of said information of the first party to
the third computer or the fourth computer, or both, beyond information required to provide
for approval and disapproval of the purchase.
197. The system of claim 182 wherein the proxy device alters at least a content
protocol layer of the information.
198. The system of claim 182 wherein the communications network is the Internet,
the first device comprises a first computer and the second device comprises a second
computer, and wherein the proxy device comprises proxy software which alters at least a
content protocol layer of said information.
199. The system of claim 198 wherein the proxy software filters cookie data.
200. The system of claim 198 wherein the proxy software filters active code.
201. The system of claim 198 wherein the proxy software filters compromising
procedures.
202. The system of claim 183 wherein the proxy device comprises a proxy
computer and proxy software associated with the first computer or the proxy computer, or
both, which alters information from the first computer.
203. A system for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the system providing for payment to the second party and a delivery
address to which the good can be delivered while securing said information of the first party
with respect to the second party, comprising:
a proxy device altering information from the first device directed to the second device
to prevent the second party from determining said information of the first party;
at least a third device communicating with the proxy device for approving or
disapproving the purchase based on financial information of the first party available to the
third device, and if the purchase is approved, for electronically crediting the second party and
electronically debiting the first party and electronically crediting the proxy device with a
transaction fee.
204. The system of claim 203 wherein the first device comprises a first computer,
the second device comprises a second computer, the proxy device comprises a proxy
computer and proxy software associated with the first computer or the proxy computer, and
the third device comprises a third computer, the proxy software and the third computer
cooperating to provide for approval or disapproval of the purchase based on financial
information of the first party, and if the purchase is approved, the third computer for providing for payment to the second party and debiting of the first party.
205. A system for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the system providing for payment to the second party and a delivery
address to which the good can be delivered while securing said information of the first party
with respect to the second party, comprising:
a proxy device altering information from the first device directed to the second device
to prevent the second party from determining said information of the first party; and
(a) a third device communicating with the proxy device to provide for approval or
disapproval of the purchase based on financial information relating to the first party, and if
the purchase is approved, the third device electronically crediting the second party and
electronically debiting the first party; and
(b) a fourth device communicating with the proxy device to provide for approval or
disapproval of the purchase based on financial information relating to the first party, and a
fifth device to provide for approval or disapproval of the purchase based on financial
information relating to the proxy device, and if the purchase is approved, the fifth device
electronically crediting the second party and electronically debiting the proxy device, and the
fourth device electronically crediting the proxy device and electronically debiting the first
party;
the system being configurable for operation with (a) or with (b).
I l l
206. The system of claim 205 wherein the first device comprises a first computer,
the second device comprises a second computer, the third device comprises a third computer,
the fourth device comprises a fourth computer, the fifth device comprises a fifth computer,
and the proxy device comprises a proxy computer and proxy software associated with the
first computer or the proxy computer, the proxy software cooperating at least with the third
computer to approve and disapprove the purchase.
207. The system of claim 206 comprising the third computer or the fourth
computer, or both, providing for payment of a fee to the proxy computer for the proxy
computer's participation in purchases in which the third computer or the fourth computer also
participates.
208. A system for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the system providing for payment to the second party and a delivery
address to which the good can be delivered while securing said information of the first party
with respect to the second party, comprising:
a proxy device altering information from the first device directed to the second device
to prevent the second party from determining said information of the first party;
at least a third device communicating with the proxy device for approving or
disapproving the purchase based on financial information of the first party available to the
third device, and if the purchase is approved, for electronically crediting the second party and
electronically debiting the first party while securing said information of the first party with respect to the second party;
and wherein the system is configurable to provide certain of said information of the
first party to the third device beyond information required to provide for approval and
disapproval of the purchase.
209. The system of claim 208 wherein the proxy device provides for a delivery
address to the second party while securing said information of the first party, and including
means including a shipping device for providing for delivery of the good to the delivery
address, and wherein the system is configurable to provide certain of said information of the
first party to the shipping device beyond information required to provide for delivery of the
good to the delivery address.
210. In a communications system using the Internet which includes client
computers that access the Internet and transmit and receive messages, the client computers
and users thereof having information of a personal or private nature specific to a respective
user or respective client computer, server computers coupled to the Internet accessible by the
client computers for electronic exchange of information, and at least one proxy computer
coupled to the network which receives and transmits messages over the network and
communicates with client computers and server computers over the Internet, and proxy
software associated with the client computers, the proxy computer or both, the method of
securing said information with respect to server computers comprising the steps of examining
messages of client computers to be transmitted to server computers and messages received
from server computers and altering at least a content protocol layer of the messages to
prevent server computers from obtaining said information.
211. The method of claim 210 comprising the steps of altering the network protocol
layer and the transport protocol layer to prevent server computers from obtaining said
information.
212. The method of claim 210 wherein altering said information at least at a content
layer comprises filtering cookie data.
213. The method of claim 210 wherein altering said information at least at a content
layer comprises filtering active code.
214. The method of claim 210 wherein altering said information at least at a content
layer comprises filtering compromising procedures.
215. In a communications system using the Internet which includes client
computers that access the Internet and transmit and receive messages, the client computers
and users thereof having information of a personal or private nature specific to a respective
user or respective client computer, server computers coupled to the Internet accessible by the
client computers for electronic exchange of information, the improvement comprising at least
one proxy computer coupled to the network which receives and transmits messages over the
network and communicates with client computers and server computers over the Internet,
and proxy software associated with the client computers, the proxy computer or both, the
proxy software examining messages of client computers to be transmitted to server
computers and messages received from server computers and altering at least a content
protocol layer of the messages to prevent server computers from obtaining said information.
216. The system of claim 215 wherein the proxy software alters the network
protocol layer and the transport protocol layer to prevent server computers from obtaining said information.
217. The system of claim 215 wherein the proxy software filters cookie data.
218. The method of claim 215 wherein the proxy software filters active code.
219. The method of claim 215 wherein the proxy software filters compromising
procedures.
220. A method for providing a database of a first party's transactions using a first
device with a second party using a second device to purchase a good over a communications
network linking the first and second devices, the first party having information of a personal
or private nature specific to the first party or the first device, the method providing payment
to the second party while securing said information of the first party with respect to the
second party, comprising the steps of:
the first and second parties communicating over the network using respective devices;
altering information from the first device directed to the second device to prevent the
second party from determining said information of the first party;
providing for approval or disapproval by at least a third party of the purchase of the
good by the first party from the second party based on financial information relating to the
first party accessible by the third party, and if the purchase is approved, providing for
payment to the second party while securing said information of the first party with respect to
the second patty;
providing at least certain communications between the first and the second parties to a
third device and collecting said data at the third device while securing said information with
respect to the second party; and providing a database with the collected data which is not accessible by the second
device or the third party.
221. A system for providing a database of a first party's transactions using a first
device with a second party using a second device to purchase a good over a communications
network linking the first and second devices, the first party having information of a personal
or private nature specific to the first party or the first device, the system also providing
payment to the second party while securing said information of the first party with respect to
the second party, comprising:
proxy software associated with first device or a proxy device or both altering
information from the first device directed to the second device to prevent the second party
from determining said information of the first party;
a third device coupled to the network providing for approval or disapproval by at least
a third party of the purchase of the good by the first party from the second party based on
financial information relating to the first party accessible by the third party, and if the
purchase is approved, providing for payment to the second party while securing said
information of the first party with respect to the second party;
means for receiving at least certain communications between the first and the second
devices and means for collecting data while securing said information with respect to the
second party; and
means providing a database with the collected data which is not accessible by the
second device or the third party.
222. A method for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the method providing for a delivery address to which the good can
be delivered while securing said information of the first party with respect to the second
party, comprising the steps of:
the first and second parties communicating over the network using respective devices;
using a proxy device altering information from the first device directed to the second
device to prevent the second party from determining said information of the first party; and
using a proxy device providing for approval or disapproval of the purchase of the
good by the first party from the second party based on financial information relating to the
first party, and if the purchase is approved, providing for payment to the second party while
securing said information of the first party with respect to the second party; and
allowing more than one first party having unique said information to use the same
first device and carrying out the altering step and the approval or disapproval and payment
steps for purchases by each first party using the same first device while securing the unique
information of each first party.
223. The method of claim 222 wherein one of the first parties using the same first
device has an account with a third party, and wherein the step of allowing more than one first
party to use the same first device comprises providing a subaccount within the first party
account for each other first party using the same first device.
224. The method of claim 223 wherein each first party is identified by different
secret information, and including the step of the requiring a first party to provide secret
information specific to that first party to the proxy device before allowing a transaction to
complete.
225. A system for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the method providing for a delivery address to which the good can
be delivered while securing said information of the first party with respect to the second
party, comprising:
a proxy device altering information from the first device directed to the second device
to prevent the second party from determining said information of the first party;
the proxy device providing for approval or disapproval of the purchase of the good by
the first party from the second party based on financial information relating to the first party,
and if the purchase is approved, providing for payment to the second party while securing
said information of the first party with respect to the second party and allowing more than
one first party having unique said information to use the same first device and carrying out
the altering step and the approval or disapproval and payment steps for purchases by each
first party using the same first device while securing the unique information of each first
party.
226. The system of claim 225 wherein one of the first parties using the same first
device has an account with a third party and each other first party using the same first device has a subaccount within the first party account, and wherein each first party is identified by
different secret information, the proxy device requiring verification of secret information
from a first party specific to that first party before allowing a transaction to complete.
227. A method for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the method providing for delivery of the good and for return of a
delivered good, if authorized, while securing said information of the first party with respect
to the second party, comprising the steps of:
the first and second parties communicating over the network using respective devices;
providing information from the first device directed to the second device for
communicating with the second device or to order a good while securing said information of
the first party;
providing a delivery address to the second party to which the good is to be delivered,
the delivery address not enabling the second party to determine said information of the first
party;
providing for delivery of the good to the delivery address; and
where authorized, providing for return of the good from the delivery address or
another address while securing said information from the second party.
228. The method of claim 227 wherein the step of providing information from the
first device directed to the second device while securing said information comprises
providing proxy identifying information specific to the first party or the first device from which the second party can not determine said information.
229. The method of claim 227 wherein the step of providing information from the
first device directed to the second device while securing said information comprises the step
of altering information from the first device directed to the second device.
230. The method of claim 229 wherein the step of the first and second parties
communicating with each other over the network comprises the first party using a first
computer and the second party using a second computer.
231. The method of claim 230 wherein the step of altering information from the
first device comprises altering information from the first computer using proxy software
associated with the first computer or a proxy computer, or both.
232. The method of claim 230 wherein the step of providing the delivery address
comprises using the proxy software to provide the delivery address.
233. The method of claim 230 wherein the good is a physical good and the delivery
address is the address of a physical facility, and wherein the step of providing for delivery of
the good to the delivery address includes the second party providing for physical shipment of
the good to the physical facility.
234. The method of claim 233 including the step of making the good available at
the physical facility for pick up by or on behalf of the first party in a manner which does not
require said information of the first party to be revealed at the physical facility.
235. The method of claim 234 including the step of returning the good from the
physical facility to a delivery address designated by the second party while not enabling the
second party to determine said information of the first party.
236. The method of claim 234 including the step of providing a physical address
designated by the first party to the physical facility but not to the second party.
237. The method of claim 236 including the step of providing for shipment of the
good from the physical facility to the physical address.
238. The method of claim 237 including the steps of returning the good to the
physical facility and from there to a delivery address designated by the second party while
not enabling the second party to determine said information of the first party.
239. The method of claim 230 wherein the good is an electronically transmittable
file and the delivery address is an electronic address of a proxy computer, the step of
providing for delivery of the good to the delivery address including the second party
providing for electronic transmission of the file to the proxy computer.
240. The method of claim 239 including the step of returning the good from the
electronic address of the proxy computer to an electronic address designated by the second
party, or alternatively destroying the file, while not enabling the second party to determine
said information of the first party.
241. The method of claim 239 including the step of the proxy computer transmitting
the file to an electronic address of the first party which is available to the proxy computer but
not to the second party.
242. The method of claim 241 including the steps of returning the good to the
electronic address of the proxy computer and from there to an electronic address designated
by the second party, or alternatively destroying the file, while not enabling the second party
to determine said information of the first party.
243. The method of clam 228 wherein the good is an electronically transmittable
file and the delivery address is an electronic address associated with the proxy identifying
information of the first device, the step of providing for delivery of the good to the delivery
address including the second party providing for electronic transmission of the file to the
electronic address of the first device.
244. The method of claim 227 including the step of providing for approval or
disapproval of the purchase of the good by the first party from the second party based on
financial information relating to the first party, and if the purchase is approved, providing for
payment to the second party while securing said information of the first party with respect to
the second party.
245. The method of claim 244 the good is a physical good and the delivery address
is the address of a physical facility, and wherein the step of providing for delivery of the
good to the delivery address includes the second party providing for physical shipment of the
good to the physical facility.
246. The method of claim 245 including the step of making the good available at
the physical facility for pick up by or on behalf of the first party in a manner which does not
require said information of the first party to be revealed at the physical facility.
247. The method of claim 246 including the step of returning the good from the
physical facility to a delivery address designated by the second party and crediting the first
party for the return while not enabling the second party to determine said information of the
first party.
248. The method of claim 246 including the step of providing a physical address
designated by the first party to the physical facility but not to the second party.
249. The method of claim 248 including the step of providing for shipment of the
good from the physical facility to the physical address.
250. The method of claim 249 including the steps of returning the good to the
physical facility and from there to a delivery address designated by the second party and
crediting the first party for the return while not enabling the second party to determine said
information of the first party.
251. The method of claim 244 wherein the good is an electronically transmittable
file and the delivery address is an electronic address of a proxy computer, the step of
providing for delivery of the good to the delivery address including the second party
providing for electronic transmission of the file to the proxy computer.
252. The method of claim 251 including the step of returning the good from the
electronic address of the proxy computer to an electronic address designated by the second
party, or alternatively destroying the file, while not enabling the second party to determine
said information of the first party.
253. The method of claim 251 including the step of the proxy computer transmitting
the file to an electronic address of the first party which is available to the proxy computer but
not to the second party.
254. The method of claim 253 including the steps of returning the good to the
electronic address of the proxy computer and from there to an electronic address designated
by the second party, or alternatively destroying the file, and crediting the first party for the return while not enabling the second party to determine said information of the first party.
255. A system for a first party using a first device to order a good from a second
party using a second device over a communications network linking the first and second
devices, the first party having information of a personal or private nature specific to the first
party or the first device, the system providing for a delivery address to which the good can be
delivered while securing said information of the first party with respect to the second party,
comprising:
a proxy device altering information from the first device directed to the second device
to prevent the second party from determining said information of the first party; and
the proxy device providing a delivery address to the second party to which the good is
to be delivered, the delivery address not enabling the second party to determine said
information of the first party.
means for providing for delivery of the good to the delivery address; and
where authorized, means for providing for return of the good from the delivery
address or another address while securing said information from the second party.
256. The method of claim 1 or 22 including the steps of providing for physical
delivery of a physical good to the delivery address and providing for tracking of the good
during delivery.
257. The system of claim 112 or 127 including means for providing for physical
delivery of a physical good to the delivery address and means for providing for tracking of
the good during delivery.
258. The method of claim 227 including the step of providing for tracking of the
good during delivery.
259. The method of claim 227 or 258 including the step of providing for tracking of
the good during return.
PCT/US2000/019888 1999-07-26 2000-07-20 Electronic purchase of goods over a communication network including physical delivery while securing private and personal information WO2001008066A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU62290/00A AU6229000A (en) 1999-07-26 2000-07-20 Electronic purchase of goods over a communication network including physical delivery while securing private and personal information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US36081299A 1999-07-26 1999-07-26
US09/360,812 1999-07-26

Publications (2)

Publication Number Publication Date
WO2001008066A1 true WO2001008066A1 (en) 2001-02-01
WO2001008066A9 WO2001008066A9 (en) 2002-07-18

Family

ID=23419497

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/019888 WO2001008066A1 (en) 1999-07-26 2000-07-20 Electronic purchase of goods over a communication network including physical delivery while securing private and personal information

Country Status (3)

Country Link
US (2) US7069249B2 (en)
AU (1) AU6229000A (en)
WO (1) WO2001008066A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002063526A1 (en) * 2001-02-05 2002-08-15 Eun-Sook Park Method and system for providing a proxy payment service for wireless communication charges
FR2837643A1 (en) * 2002-03-25 2003-09-26 France Telecom Credit card transaction securing method in which transactions between a cardholder and supplier over a telecommunications network are conducted via a third party intermediary
EP1480147A3 (en) * 2003-05-20 2006-09-20 NTT DoCoMo, Inc. Method of delivering an article of commerce, deliverer-side server, and customer-side client computer
AU2003250226B2 (en) * 2002-08-30 2007-08-09 Sap Ag Method and software application for electronic bill presentment and payment
EP2329438A1 (en) * 2008-09-16 2011-06-08 Alibaba Group Holding Limited Real-time settling of payment for logistics company
EP2752798A1 (en) * 2009-03-30 2014-07-09 Yuh-Shen Song Privacy protected anti-identity theft and payment network
CN113486157A (en) * 2021-08-13 2021-10-08 上海壹优速信息科技有限公司 Method for decrypting encrypted mobile phone number
US11605045B2 (en) 2012-09-07 2023-03-14 MapMyld, Inc. Address exchange systems and methods

Families Citing this family (417)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7610224B2 (en) 2001-11-02 2009-10-27 Amazon Technologies, Inc. Delivering ordered items to an appropriate address
US20010044785A1 (en) * 2000-01-05 2001-11-22 Stolfo Salvatore J. Method and system for private shipping to anonymous users of a computer network
US7797543B1 (en) 1999-09-30 2010-09-14 United States Postal Service Systems and methods for authenticating an electronic message
JP4853694B2 (en) 1999-09-30 2012-01-11 ユナイテッド ステイツ ポスタル サーヴィス System and method for authenticating electronic messages
GB9923804D0 (en) * 1999-10-08 1999-12-08 Hewlett Packard Co Electronic commerce system
WO2001037180A1 (en) * 1999-11-19 2001-05-25 Ecognito, Inc. System, method, and computer program product for maintaining consumer privacy and security in electronic commerce transactions
AU2105001A (en) * 1999-12-15 2001-06-25 E-Scoring, Inc. Systems and methods for providing consumers anonymous pre-approved offers from aconsumer-selected group of merchants
AU2774901A (en) * 2000-01-06 2001-07-16 L90, Inc. Method and apparatus for selecting and delivering internet based advertising
JP2001202437A (en) * 2000-01-20 2001-07-27 Kyocera Communication Systems Co Ltd Service system
US7853481B1 (en) * 2000-01-24 2010-12-14 Oracle International Corporation eDropship: methods and systems for anonymous eCommerce shipment
AU2001249230A1 (en) * 2000-03-17 2001-10-03 United States Postal Service Methods and systems for establishing an electronic account for a customer
AU2001257280C1 (en) * 2000-04-24 2009-01-15 Visa International Service Association Online payer authentication service
US8903950B2 (en) * 2000-05-05 2014-12-02 Citrix Systems, Inc. Personalized content delivery using peer-to-peer precaching
US6805288B2 (en) * 2000-05-15 2004-10-19 Larry Routhenstein Method for generating customer secure card numbers subject to use restrictions by an electronic card
US20020016726A1 (en) * 2000-05-15 2002-02-07 Ross Kenneth J. Package delivery systems and methods
US7092398B2 (en) * 2000-06-12 2006-08-15 Amdocs (Israel) Ltd. System, method and computer program product for charging for competitive IP-over-wireless service
US8515860B2 (en) * 2000-06-12 2013-08-20 Amdocs (Israel) Ltd. System, method and computer program product for prepaid and wireless voice communication and IP
WO2001099005A1 (en) * 2000-06-19 2001-12-27 United States Postal Service System, method, and article of manufacture for shipping a package privately to a customer
US8204082B2 (en) 2000-06-23 2012-06-19 Cloudshield Technologies, Inc. Transparent provisioning of services over a network
US7003555B1 (en) * 2000-06-23 2006-02-21 Cloudshield Technologies, Inc. Apparatus and method for domain name resolution
US6829654B1 (en) * 2000-06-23 2004-12-07 Cloudshield Technologies, Inc. Apparatus and method for virtual edge placement of web sites
US7032031B2 (en) * 2000-06-23 2006-04-18 Cloudshield Technologies, Inc. Edge adapter apparatus and method
US9444785B2 (en) 2000-06-23 2016-09-13 Cloudshield Technologies, Inc. Transparent provisioning of network access to an application
WO2002001429A2 (en) * 2000-06-27 2002-01-03 Siemens Dematic Ag Method for consigning ordered commodities
US20080215472A1 (en) * 2000-06-27 2008-09-04 Nicholas Ahthony Lindsay Brown Variable use advanced messaging system and method
WO2002001592A1 (en) * 2000-06-28 2002-01-03 Intertainer, Inc. Intelligent media targeting system and method
WO2002001447A1 (en) * 2000-06-29 2002-01-03 Jonathan Ferrier An e-commerce system
US7380007B1 (en) * 2000-06-30 2008-05-27 Aol Llc, A Delaware Limited Liability Company Automatic user session
US7729957B2 (en) * 2000-07-25 2010-06-01 United States Postal Service Item attribute preverification
US7302467B2 (en) * 2000-08-07 2007-11-27 Sony Corporation Information processing device and information processing method, service providing system, and computer-executable program for the same
JP4257023B2 (en) * 2000-08-10 2009-04-22 日本電気株式会社 Product sales support system and method
US6807569B1 (en) * 2000-09-12 2004-10-19 Science Applications International Corporation Trusted and anonymous system and method for sharing threat data to industry assets
JP2002109409A (en) * 2000-09-29 2002-04-12 Fujitsu Ltd Method of electronic commerce in electronic commerce system
US7386456B2 (en) * 2000-11-06 2008-06-10 Symbol Technologies, Inc. System and methods for transportation and delivery using bar codes
US20020073042A1 (en) * 2000-12-07 2002-06-13 Maritzen L. Michael Method and apparatus for secure wireless interoperability and communication between access devices
US7870592B2 (en) * 2000-12-14 2011-01-11 Intertainer, Inc. Method for interactive video content programming
US20020083006A1 (en) * 2000-12-14 2002-06-27 Intertainer, Inc. Systems and methods for delivering media content
US8015600B2 (en) 2000-12-22 2011-09-06 Oracle International Corporation Employing electronic certificate workflows
US7213249B2 (en) * 2000-12-22 2007-05-01 Oracle International Corporation Blocking cache flush requests until completing current pending requests in a local server and remote server
US7581011B2 (en) * 2000-12-22 2009-08-25 Oracle International Corporation Template based workflow definition
US7802174B2 (en) 2000-12-22 2010-09-21 Oracle International Corporation Domain based workflows
US7475151B2 (en) * 2000-12-22 2009-01-06 Oracle International Corporation Policies for modifying group membership
US7363339B2 (en) * 2000-12-22 2008-04-22 Oracle International Corporation Determining group membership
US7415607B2 (en) * 2000-12-22 2008-08-19 Oracle International Corporation Obtaining and maintaining real time certificate status
US7085834B2 (en) * 2000-12-22 2006-08-01 Oracle International Corporation Determining a user's groups
US7711818B2 (en) * 2000-12-22 2010-05-04 Oracle International Corporation Support for multiple data stores
US7937655B2 (en) * 2000-12-22 2011-05-03 Oracle International Corporation Workflows with associated processes
US7380008B2 (en) * 2000-12-22 2008-05-27 Oracle International Corporation Proxy system
US8396810B1 (en) * 2000-12-29 2013-03-12 Zixit Corporation Centralized authorization and fraud-prevention system including virtual wallet for network-based transactions
GB2372344A (en) * 2001-02-17 2002-08-21 Hewlett Packard Co System for the anonymous purchase of products or services online
US20020116337A1 (en) * 2001-02-20 2002-08-22 Ariel Peled System for anonymous distribution and delivery of digital goods
US6925469B2 (en) 2001-03-30 2005-08-02 Intertainer, Inc. Digital entertainment service platform
US7640187B1 (en) * 2001-03-30 2009-12-29 Novell, Inc. Anonymous shopping transactions on a network through information broker services
US20020143647A1 (en) * 2001-03-30 2002-10-03 Intertainer, Inc. Subscriber management system
US20020144283A1 (en) * 2001-03-30 2002-10-03 Intertainer, Inc. Content distribution system
US20020147690A1 (en) * 2001-04-04 2002-10-10 Tam Richard K. E-commerce using an identifier
US7779481B2 (en) * 2001-04-12 2010-08-17 United States Postal Service Systems and methods for electronic postmarking of data including location data
US7003497B2 (en) * 2001-05-23 2006-02-21 International Business Machines Corporation System and method for confirming electronic transactions
US7805378B2 (en) * 2001-07-10 2010-09-28 American Express Travel Related Servicex Company, Inc. System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions
US7716086B2 (en) * 2001-08-31 2010-05-11 Gateway, Inc. Electronic retail order communication
US8255235B2 (en) * 2001-09-07 2012-08-28 United States Postal Service Item tracking and anticipated delivery confirmation system method
US7103576B2 (en) * 2001-09-21 2006-09-05 First Usa Bank, Na System for providing cardless payment
JP3749468B2 (en) * 2001-10-16 2006-03-01 富士通株式会社 Address data management method and address data management system
NZ532200A (en) * 2001-10-23 2007-08-31 Finestyle Holdings Pty Ltd Method and system for effecting payment for goods and/or services to be performed by facilitator
US7225256B2 (en) 2001-11-30 2007-05-29 Oracle International Corporation Impersonation in an access system
US20030120660A1 (en) * 2001-12-07 2003-06-26 Maritzen L. Michael Consumer-centric context-aware switching model
US7904360B2 (en) * 2002-02-04 2011-03-08 Alexander William EVANS System and method for verification, authentication, and notification of a transaction
JP2003248780A (en) * 2002-02-25 2003-09-05 Fujitsu Ltd Purchase information management system, purchase information anonymization server, and purchase information management method
US20030163413A1 (en) * 2002-02-28 2003-08-28 Wiczkowski Frank T. Method of conducting anonymous transactions over the internet
US7840658B2 (en) * 2002-05-15 2010-11-23 Oracle International Corporation Employing job code attributes in provisioning
US7216163B2 (en) * 2002-05-15 2007-05-08 Oracle International Corporation Method and apparatus for provisioning tasks using a provisioning bridge server
US9400589B1 (en) 2002-05-30 2016-07-26 Consumerinfo.Com, Inc. Circular rotational interface for display of consumer credit information
US9569797B1 (en) 2002-05-30 2017-02-14 Consumerinfo.Com, Inc. Systems and methods of presenting simulated credit score information
US8370420B1 (en) 2002-07-11 2013-02-05 Citrix Systems, Inc. Web-integrated display of locally stored content objects
US7238164B2 (en) * 2002-07-19 2007-07-03 Baxter International Inc. Systems, methods and apparatuses for pumping cassette-based therapies
US7212991B2 (en) 2002-08-27 2007-05-01 Manish Chowdhary Method for optimizing a business transaction
SG152061A1 (en) * 2002-09-10 2009-05-29 Visa Int Service Ass Data authentication and provisioning method and system
EP1408704A1 (en) * 2002-10-09 2004-04-14 Nokia Corporation Method and arrangement for concealing true identity of user in communications system
US20040158526A1 (en) * 2003-02-06 2004-08-12 David Bogart Dort Contingency network access for accounts or information
US20090076967A1 (en) * 2003-04-24 2009-03-19 Fields Helen B Completely anonymous purchasing of goods on a computer network
EP1631935A4 (en) 2003-06-09 2008-10-15 Univ Singapore System and method for providing a service
US7844497B2 (en) * 2003-06-18 2010-11-30 Ebay Inc. Method and system for facilitating shipping via a third-party payment service
US7895129B2 (en) * 2003-06-18 2011-02-22 Ebay Inc. Method and system for facilitating shipping via third-party payment service
US7735122B1 (en) * 2003-08-29 2010-06-08 Novell, Inc. Credential mapping
US7904487B2 (en) 2003-10-09 2011-03-08 Oracle International Corporation Translating data access requests
US7882132B2 (en) 2003-10-09 2011-02-01 Oracle International Corporation Support for RDBMS in LDAP system
US7653602B2 (en) 2003-11-06 2010-01-26 Visa U.S.A. Inc. Centralized electronic commerce card transactions
US7206758B2 (en) * 2003-11-12 2007-04-17 International Business Machines Corporation Method, system and computer program product for identifying and implementing collected privacy policies as aggregate privacy policies in electronic transactions
US8321946B2 (en) * 2003-12-05 2012-11-27 Hewlett-Packard Development Company, L.P. Method and system for preventing identity theft in electronic communications
AR042707A1 (en) * 2004-01-05 2005-06-29 Salva Calcagno Eduardo Luis PROCEDURE AND MULTI CARD - KEY TO AVOID FRAUDS BY INTERNET
US20140019352A1 (en) 2011-02-22 2014-01-16 Visa International Service Association Multi-purpose virtual card transaction apparatuses, methods and systems
US20050246187A1 (en) * 2004-04-30 2005-11-03 Reed Maltzman System and method to facilitate differentiated levels of service in a network-based marketplace
US8762283B2 (en) * 2004-05-03 2014-06-24 Visa International Service Association Multiple party benefit from an online authentication service
US7467380B2 (en) * 2004-05-05 2008-12-16 Microsoft Corporation Invoking applications with virtual objects on an interactive display
CN101385044A (en) * 2004-06-09 2009-03-11 美国银行和许可股份有限公司 Transaction processing with core and distributor processor implementations
US20080294559A1 (en) * 2004-06-28 2008-11-27 Gary Wield Transmission of Anonymous Information Through a Communication Network
US8458783B2 (en) * 2004-06-30 2013-06-04 Citrix Systems, Inc. Using application gateways to protect unauthorized transmission of confidential data via web applications
US7512953B1 (en) * 2004-08-31 2009-03-31 Sap Ag System and method for smart proxy creation and management within a distributed object-oriented architecture
US8732004B1 (en) 2004-09-22 2014-05-20 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US7496761B2 (en) * 2004-09-29 2009-02-24 Microsoft Corporation Method and system for batch task creation and execution
JP4768979B2 (en) * 2004-10-19 2011-09-07 株式会社東芝 Anonymous order system, device and program
US8086546B2 (en) * 2004-12-17 2011-12-27 Amazon Technologies, Inc. Method and system for anticipatory package shipping
US7817293B2 (en) * 2005-01-07 2010-10-19 Infoprint Solutions Company, Llc Trace and debug tool for high speed printer systems
US7647249B2 (en) * 2005-02-25 2010-01-12 United Parcel Service Of America, Inc. Method for providing a shipping label via an intermediary's website
CN1828658A (en) * 2005-03-31 2006-09-06 阿里巴巴公司 Self-possessed resource interacting method and electronic transaction information processing method
US7630938B2 (en) * 2005-03-31 2009-12-08 United Parcel Service Of America, Inc. Flexible billing adjustment system
JP5036140B2 (en) * 2005-06-10 2012-09-26 日本電気株式会社 Personal information distribution management system, personal information distribution management method, personal information provision program, and personal information utilization program
US7707119B2 (en) * 2005-06-19 2010-04-27 Frederick Foster System and method for identity protected secured purchasing
US7676418B1 (en) * 2005-06-24 2010-03-09 Experian Information Solutions, Inc. Credit portfolio benchmarking system and method
US7610345B2 (en) 2005-07-28 2009-10-27 Vaporstream Incorporated Reduced traceability electronic message system and method
US9282081B2 (en) 2005-07-28 2016-03-08 Vaporstream Incorporated Reduced traceability electronic message system and method
US8762263B2 (en) 2005-09-06 2014-06-24 Visa U.S.A. Inc. System and method for secured account numbers in proximity devices
US8566928B2 (en) * 2005-10-27 2013-10-22 Georgia Tech Research Corporation Method and system for detecting and responding to attacking networks
US9183533B2 (en) * 2005-11-01 2015-11-10 Hewlett-Packard Development Company, L.P. Providing a path-based identifier
US8185819B2 (en) * 2005-12-12 2012-05-22 Google Inc. Module specification for a module to be incorporated into a container document
US8612569B2 (en) 2005-12-12 2013-12-17 Ebay Inc. Method and system for proxy tracking of third party interactions
US7527192B1 (en) * 2005-12-15 2009-05-05 At&T Corp. Network based method of providing access to information
US20070143178A1 (en) * 2005-12-20 2007-06-21 Gloto Corp. Methods and systems for facilitating communications between parties
US7730424B2 (en) * 2005-12-20 2010-06-01 Gloto Corporation Methods and systems for displaying information on a graphical user interface
US20070143438A1 (en) * 2005-12-20 2007-06-21 Gloto Corp. Methods and systems for facilitating asymmetric communications between parties
US7711636B2 (en) 2006-03-10 2010-05-04 Experian Information Solutions, Inc. Systems and methods for analyzing data
US7984169B2 (en) * 2006-06-28 2011-07-19 Microsoft Corporation Anonymous and secure network-based interaction
US8185830B2 (en) 2006-08-07 2012-05-22 Google Inc. Configuring a content document for users and user groups
US20090327133A1 (en) * 2006-08-10 2009-12-31 Seergate Ltd. Secure mechanism and system for processing financial transactions
US20080077704A1 (en) * 2006-09-24 2008-03-27 Void Communications, Inc. Variable Electronic Communication Ping Time System and Method
US7895121B2 (en) * 2006-10-31 2011-02-22 Hewlett-Packard Development Company, L.P. Method and system for tracking conversions in a system for targeted data delivery
KR100989477B1 (en) * 2007-01-23 2010-10-22 도시바 솔루션 가부시끼가이샤 Storage medium and apparatus for storing program for anonymous order
US8108266B2 (en) * 2007-01-29 2012-01-31 Hewlett-Packard Development Company, L.P. Methods for providing secure eCommerce transactions
GB2446179B (en) * 2007-02-01 2011-08-31 Monitise Group Ltd Methods and a System for Providing Transaction Related Information
WO2008098163A2 (en) * 2007-02-09 2008-08-14 Hopton Robert M Method to facilitate confidential network sales
WO2008101165A2 (en) * 2007-02-15 2008-08-21 Void Communications, Inc. Electronic messaging recordlessness warning and routing system and method
AU2008221420B2 (en) * 2007-02-27 2013-12-05 Emigrant Bank A method and system of facilitating a purchase between a buyer and a seller
US8301787B2 (en) * 2007-03-22 2012-10-30 Red Hat, Inc. Selective use of anonymous proxies
US8763136B2 (en) * 2007-03-22 2014-06-24 Red Hat, Inc. Privacy enhanced browser
US20080263645A1 (en) * 2007-04-23 2008-10-23 Telus Communications Company Privacy identifier remediation
US7970649B2 (en) * 2007-06-07 2011-06-28 Christopher Jay Wu Systems and methods of task cues
US8121942B2 (en) 2007-06-25 2012-02-21 Visa U.S.A. Inc. Systems and methods for secure and transparent cardless transactions
US7739169B2 (en) 2007-06-25 2010-06-15 Visa U.S.A. Inc. Restricting access to compromised account information
US8468168B2 (en) 2007-07-25 2013-06-18 Xobni Corporation Display of profile information based on implicit actions
US7937324B2 (en) 2007-09-13 2011-05-03 Visa U.S.A. Inc. Account permanence
US9690820B1 (en) 2007-09-27 2017-06-27 Experian Information Solutions, Inc. Database system for triggering event notifications based on updates to database records
WO2009044473A1 (en) * 2007-10-04 2009-04-09 Canon Anelva Corporation High frequency sputtering device
WO2009058900A2 (en) * 2007-10-29 2009-05-07 Black Ledger, Inc. Networks, methods, and systems for encouraging timely fulfillment of periodic obligations
US9584343B2 (en) 2008-01-03 2017-02-28 Yahoo! Inc. Presentation of organized personal and public data using communication mediums
US20090288012A1 (en) 2008-05-18 2009-11-19 Zetawire Inc. Secured Electronic Transaction System
US20100011073A1 (en) * 2008-06-10 2010-01-14 True Commerce, Inc. User-deployable data transformation and exchange platform including on-demand item synchronization and user-deployable order management system
US8219489B2 (en) 2008-07-29 2012-07-10 Visa U.S.A. Inc. Transaction processing using a global unique identifier
US10027688B2 (en) * 2008-08-11 2018-07-17 Damballa, Inc. Method and system for detecting malicious and/or botnet-related domain names
US9256904B1 (en) 2008-08-14 2016-02-09 Experian Information Solutions, Inc. Multi-bureau credit file freeze and unfreeze
CN101655948A (en) 2008-08-20 2010-02-24 阿里巴巴集团控股有限公司 Online trading method and online trading system
US8447669B2 (en) 2008-08-26 2013-05-21 Visa U.S.A. Inc. System and method for implementing financial assistance programs
BRPI0921124A2 (en) 2008-11-06 2016-09-13 Visa Int Service Ass system for authenticating a consumer, computer implemented method, computer readable medium, and server computer.
US20100174638A1 (en) 2009-01-06 2010-07-08 ConsumerInfo.com Report existence monitoring
US8423457B1 (en) * 2009-04-13 2013-04-16 Amazon Technologies, Inc. Anonymous mobile payments
US9715681B2 (en) 2009-04-28 2017-07-25 Visa International Service Association Verification of portable consumer devices
US10846683B2 (en) 2009-05-15 2020-11-24 Visa International Service Association Integration of verification tokens with mobile communication devices
US8534564B2 (en) 2009-05-15 2013-09-17 Ayman Hammad Integration of verification tokens with mobile communication devices
US9105027B2 (en) 2009-05-15 2015-08-11 Visa International Service Association Verification of portable consumer device for secure services
US8602293B2 (en) 2009-05-15 2013-12-10 Visa International Service Association Integration of verification tokens with portable computing devices
US8893967B2 (en) 2009-05-15 2014-11-25 Visa International Service Association Secure Communication of payment information to merchants using a verification token
US7891560B2 (en) 2009-05-15 2011-02-22 Visa International Service Assocation Verification of portable consumer devices
US9038886B2 (en) 2009-05-15 2015-05-26 Visa International Service Association Verification of portable consumer devices
US10140598B2 (en) 2009-05-20 2018-11-27 Visa International Service Association Device including encrypted data for expiration date and verification value creation
WO2010141216A2 (en) 2009-06-02 2010-12-09 Xobni Corporation Self populating address book
US9721228B2 (en) 2009-07-08 2017-08-01 Yahoo! Inc. Locally hosting a social network using social data stored on a user's computer
US8984074B2 (en) 2009-07-08 2015-03-17 Yahoo! Inc. Sender-based ranking of person profiles and multi-person automatic suggestions
US8990323B2 (en) 2009-07-08 2015-03-24 Yahoo! Inc. Defining a social network model implied by communications data
US7930430B2 (en) 2009-07-08 2011-04-19 Xobni Corporation Systems and methods to provide assistance during address input
US9443253B2 (en) 2009-07-27 2016-09-13 Visa International Service Association Systems and methods to provide and adjust offers
US9841282B2 (en) 2009-07-27 2017-12-12 Visa U.S.A. Inc. Successive offer communications with an offer recipient
US10546332B2 (en) 2010-09-21 2020-01-28 Visa International Service Association Systems and methods to program operations for interaction with users
US8266031B2 (en) 2009-07-29 2012-09-11 Visa U.S.A. Systems and methods to provide benefits of account features to account holders
US20110035294A1 (en) * 2009-08-04 2011-02-10 Authernative, Inc. Multi-tier transaction processing method and payment system in m- and e- commerce
US20110035280A1 (en) 2009-08-04 2011-02-10 Visa U.S.A. Inc. Systems and Methods for Targeted Advertisement Delivery
US20110035278A1 (en) 2009-08-04 2011-02-10 Visa U.S.A. Inc. Systems and Methods for Closing the Loop between Online Activities and Offline Purchases
US9392110B2 (en) * 2009-09-17 2016-07-12 Motorola Solutions, Inc. Facilitating interoperability among communication systems via inter- and intra-agency communications using a shared network
US9031860B2 (en) 2009-10-09 2015-05-12 Visa U.S.A. Inc. Systems and methods to aggregate demand
US9342835B2 (en) 2009-10-09 2016-05-17 Visa U.S.A Systems and methods to deliver targeted advertisements to audience
US9087323B2 (en) * 2009-10-14 2015-07-21 Yahoo! Inc. Systems and methods to automatically generate a signature block
US8595058B2 (en) 2009-10-15 2013-11-26 Visa U.S.A. Systems and methods to match identifiers
US20110093324A1 (en) 2009-10-19 2011-04-21 Visa U.S.A. Inc. Systems and Methods to Provide Intelligent Analytics to Cardholders and Merchants
US8676639B2 (en) 2009-10-29 2014-03-18 Visa International Service Association System and method for promotion processing and authorization
US8626705B2 (en) 2009-11-05 2014-01-07 Visa International Service Association Transaction aggregator for closed processing
US9514466B2 (en) * 2009-11-16 2016-12-06 Yahoo! Inc. Collecting and presenting data including links from communications sent to or from a user
US20110119190A1 (en) * 2009-11-18 2011-05-19 Magid Joseph Mina Anonymous transaction payment systems and methods
US20110125565A1 (en) 2009-11-24 2011-05-26 Visa U.S.A. Inc. Systems and Methods for Multi-Channel Offer Redemption
US9760866B2 (en) 2009-12-15 2017-09-12 Yahoo Holdings, Inc. Systems and methods to provide server side profile information
US10255591B2 (en) 2009-12-18 2019-04-09 Visa International Service Association Payment channel returning limited use proxy dynamic value
US20120084151A1 (en) * 2009-12-30 2012-04-05 Kozak Frank J Facilitation of user management of unsolicited server operations and extensions thereto
US20120084349A1 (en) * 2009-12-30 2012-04-05 Wei-Yeh Lee User interface for user management and control of unsolicited server operations
US20120078727A1 (en) * 2009-12-30 2012-03-29 Wei-Yeh Lee Facilitation of user management of unsolicited server operations via modification thereof
US20120084348A1 (en) * 2009-12-30 2012-04-05 Wei-Yeh Lee Facilitation of user management of unsolicited server operations
US8578497B2 (en) 2010-01-06 2013-11-05 Damballa, Inc. Method and system for detecting malware
CA3045817A1 (en) 2010-01-12 2011-07-21 Visa International Service Association Anytime validation for verification tokens
US8826438B2 (en) 2010-01-19 2014-09-02 Damballa, Inc. Method and system for network-based detecting of malware from behavioral clustering
US8924956B2 (en) 2010-02-03 2014-12-30 Yahoo! Inc. Systems and methods to identify users using an automated learning process
US9020938B2 (en) * 2010-02-03 2015-04-28 Yahoo! Inc. Providing profile information using servers
US8595134B2 (en) * 2010-02-12 2013-11-26 Mastercard International Incorporated Apparatus and method for bill presentment and payment
US9424413B2 (en) 2010-02-24 2016-08-23 Visa International Service Association Integration of payment capability into secure elements of computers
US10255601B2 (en) 2010-02-25 2019-04-09 Visa International Service Association Multifactor authentication using a directory server
US9245267B2 (en) 2010-03-03 2016-01-26 Visa International Service Association Portable account number for consumer payment account
US8738418B2 (en) 2010-03-19 2014-05-27 Visa U.S.A. Inc. Systems and methods to enhance search data with transaction based data
US8639567B2 (en) 2010-03-19 2014-01-28 Visa U.S.A. Inc. Systems and methods to identify differences in spending patterns
US9697520B2 (en) 2010-03-22 2017-07-04 Visa U.S.A. Inc. Merchant configured advertised incentives funded through statement credits
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
JP6006907B2 (en) * 2010-04-05 2016-10-12 カーディナルコマース コーポレーション Processing method and system for debit transaction with PIN
US9202230B2 (en) * 2010-04-06 2015-12-01 Intel Corporation Techniques for monetizing anonymized context
US9471926B2 (en) 2010-04-23 2016-10-18 Visa U.S.A. Inc. Systems and methods to provide offers to travelers
US8982053B2 (en) 2010-05-27 2015-03-17 Yahoo! Inc. Presenting a new user screen in response to detection of a user motion
US8620935B2 (en) 2011-06-24 2013-12-31 Yahoo! Inc. Personalizing an online service based on data collected for a user of a computing device
US8972257B2 (en) 2010-06-02 2015-03-03 Yahoo! Inc. Systems and methods to present voice message information to a user of a computing device
US8359274B2 (en) 2010-06-04 2013-01-22 Visa International Service Association Systems and methods to provide messages in real-time with transaction processing
US8781896B2 (en) 2010-06-29 2014-07-15 Visa International Service Association Systems and methods to optimize media presentations
US9760905B2 (en) 2010-08-02 2017-09-12 Visa International Service Association Systems and methods to optimize media presentations using a camera
US9972021B2 (en) 2010-08-06 2018-05-15 Visa International Service Association Systems and methods to rank and select triggers for real-time offers
US9516058B2 (en) 2010-08-10 2016-12-06 Damballa, Inc. Method and system for determining whether domain names are legitimate or malicious
US9342832B2 (en) 2010-08-12 2016-05-17 Visa International Service Association Securing external systems with account token substitution
US9679299B2 (en) 2010-09-03 2017-06-13 Visa International Service Association Systems and methods to provide real-time offers via a cooperative database
US9477967B2 (en) 2010-09-21 2016-10-25 Visa International Service Association Systems and methods to process an offer campaign based on ineligibility
US10055745B2 (en) 2010-09-21 2018-08-21 Visa International Service Association Systems and methods to modify interaction rules during run time
AU2011316955B2 (en) 2010-10-20 2016-12-01 Playspan Inc. Flexible monetization service apparatuses, methods and systems
US8930262B1 (en) 2010-11-02 2015-01-06 Experian Technology Ltd. Systems and methods of assisted strategy design
US9558502B2 (en) 2010-11-04 2017-01-31 Visa International Service Association Systems and methods to reward user interactions
US9147042B1 (en) 2010-11-22 2015-09-29 Experian Information Solutions, Inc. Systems and methods for data verification
US10007915B2 (en) 2011-01-24 2018-06-26 Visa International Service Association Systems and methods to facilitate loyalty reward transactions
US8631489B2 (en) 2011-02-01 2014-01-14 Damballa, Inc. Method and system for detecting malicious domain names at an upper DNS hierarchy
WO2012106655A2 (en) 2011-02-05 2012-08-09 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
WO2012109628A2 (en) 2011-02-10 2012-08-16 Visa International Service Assocation Electronic coupon issuance and redemption apparatuses, methods and systems
US10586227B2 (en) 2011-02-16 2020-03-10 Visa International Service Association Snap mobile payment apparatuses, methods and systems
CN103765453B (en) 2011-02-16 2018-08-14 维萨国际服务协会 Snap mobile payment device, method and system
BR112013021057A2 (en) 2011-02-22 2020-11-10 Visa International Service Association universal electronic payment devices, methods and systems
AU2012223415B2 (en) * 2011-02-28 2017-05-18 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
WO2012122060A1 (en) 2011-03-04 2012-09-13 Visa International Service Association Cloud service facilitator apparatuses, methods and systems
US10438299B2 (en) 2011-03-15 2019-10-08 Visa International Service Association Systems and methods to combine transaction terminal location data and social networking check-in
US9280765B2 (en) 2011-04-11 2016-03-08 Visa International Service Association Multiple tokenization for authentication
US9558519B1 (en) 2011-04-29 2017-01-31 Consumerinfo.Com, Inc. Exposing reporting cycle information
US9646291B2 (en) 2011-05-11 2017-05-09 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
CN103797500A (en) 2011-06-03 2014-05-14 维萨国际服务协会 Virtual wallet card selection apparatuses, methods and systems
US9363327B2 (en) 2011-06-15 2016-06-07 Juniper Networks, Inc. Network integrated dynamic resource routing
US8504723B2 (en) * 2011-06-15 2013-08-06 Juniper Networks, Inc. Routing proxy for resource requests and resources
US9571566B2 (en) 2011-06-15 2017-02-14 Juniper Networks, Inc. Terminating connections and selecting target source devices for resource requests
US10078819B2 (en) 2011-06-21 2018-09-18 Oath Inc. Presenting favorite contacts information to a user of a computing device
US9747583B2 (en) 2011-06-30 2017-08-29 Yahoo Holdings, Inc. Presenting entity profile information to a user of a computing device
US9355393B2 (en) 2011-08-18 2016-05-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US10121129B2 (en) 2011-07-05 2018-11-06 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US9582598B2 (en) 2011-07-05 2017-02-28 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
US9161249B1 (en) * 2011-07-07 2015-10-13 Symantec Corporation Systems and methods for performing internet site security analyses
US10438176B2 (en) 2011-07-17 2019-10-08 Visa International Service Association Multiple merchant payment processor platform apparatuses, methods and systems
GB201112665D0 (en) * 2011-07-22 2011-09-07 Vodafone Ip Licensing Ltd Data anonymisation
US9704155B2 (en) 2011-07-29 2017-07-11 Visa International Service Association Passing payment tokens through an hop/sop
US9710807B2 (en) 2011-08-18 2017-07-18 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods and systems
US10318941B2 (en) 2011-12-13 2019-06-11 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US10825001B2 (en) 2011-08-18 2020-11-03 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US10223707B2 (en) 2011-08-19 2019-03-05 Visa International Service Association Systems and methods to communicate offer options via messaging in real time with processing of payment transaction
US9165294B2 (en) 2011-08-24 2015-10-20 Visa International Service Association Method for using barcodes and mobile devices to conduct payment transactions
US9117225B2 (en) 2011-09-16 2015-08-25 Visa International Service Association Apparatuses, methods and systems for transforming user infrastructure requests inputs to infrastructure design product and infrastructure allocation outputs
US9466075B2 (en) 2011-09-20 2016-10-11 Visa International Service Association Systems and methods to process referrals in offer campaigns
US20130080249A1 (en) * 2011-09-22 2013-03-28 Jacqueline R. Dias Pay Per Insert System
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
US10380617B2 (en) 2011-09-29 2019-08-13 Visa International Service Association Systems and methods to provide a user interface to control an offer campaign
US20130117126A1 (en) * 2011-11-07 2013-05-09 Apriva, Llc System and method for secure management of customer data in a loyalty program
US10290018B2 (en) 2011-11-09 2019-05-14 Visa International Service Association Systems and methods to communicate with users via social networking sites
US9953378B2 (en) 2012-04-27 2018-04-24 Visa International Service Association Social checkout widget generation and integration apparatuses, methods and systems
WO2013090611A2 (en) 2011-12-13 2013-06-20 Visa International Service Association Dynamic widget generator apparatuses, methods and systems
US10475142B2 (en) 2011-12-30 2019-11-12 Elwha Llc Evidence-based healthcare information management protocols
US20130173296A1 (en) 2011-12-30 2013-07-04 Elwha LLC, a limited liability company of the State of Delaware Evidence-based healthcare information management protocols
US10340034B2 (en) 2011-12-30 2019-07-02 Elwha Llc Evidence-based healthcare information management protocols
US10679309B2 (en) 2011-12-30 2020-06-09 Elwha Llc Evidence-based healthcare information management protocols
US10559380B2 (en) 2011-12-30 2020-02-11 Elwha Llc Evidence-based healthcare information management protocols
US10552581B2 (en) 2011-12-30 2020-02-04 Elwha Llc Evidence-based healthcare information management protocols
US10528913B2 (en) 2011-12-30 2020-01-07 Elwha Llc Evidence-based healthcare information management protocols
CN109508983A (en) 2012-01-05 2019-03-22 维萨国际服务协会 Data protection is carried out with conversion
US10223710B2 (en) 2013-01-04 2019-03-05 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
US10262148B2 (en) 2012-01-09 2019-04-16 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US11308227B2 (en) 2012-01-09 2022-04-19 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US10497022B2 (en) 2012-01-20 2019-12-03 Visa International Service Association Systems and methods to present and process offers
WO2013113004A1 (en) 2012-01-26 2013-08-01 Visa International Service Association System and method of providing tokenization as a service
AU2013214801B2 (en) 2012-02-02 2018-06-21 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems
US20130204776A1 (en) * 2012-02-08 2013-08-08 F. Charles King E-commerce Payment and Delivery System and Method
WO2013121079A1 (en) * 2012-02-16 2013-08-22 E-Lombard Oy Method for providing a transaction
US10282724B2 (en) 2012-03-06 2019-05-07 Visa International Service Association Security system incorporating mobile device
US10672018B2 (en) 2012-03-07 2020-06-02 Visa International Service Association Systems and methods to process offers via mobile devices
US10977285B2 (en) 2012-03-28 2021-04-13 Verizon Media Inc. Using observations of a person to determine if data corresponds to the person
US20130262559A1 (en) * 2012-03-28 2013-10-03 Diy Media, Inc. System and method for tracking use of portable objects
US20130297501A1 (en) 2012-05-04 2013-11-07 Justin Monk System and method for local data conversion
US10043148B1 (en) 2012-05-21 2018-08-07 Formula Labs, Llc System and method for identifying and co-ordinating an alternate delivery of one or more selected items
US20130325743A1 (en) * 2012-06-01 2013-12-05 Northwest Research, Inc. Systems and methods for tracking packages
US9524501B2 (en) 2012-06-06 2016-12-20 Visa International Service Association Method and system for correlating diverse transaction data
KR101847370B1 (en) * 2012-06-15 2018-05-24 알까뗄 루슨트 Architecture of privacy protection system for recommendation services
US20130346245A1 (en) * 2012-06-26 2013-12-26 Ebay, Inc. System and Method for Conducting Delegated Payments
US20130346318A1 (en) * 2012-06-26 2013-12-26 Incapsula Inc. Secure transaction systems and methodologies
WO2014008403A1 (en) 2012-07-03 2014-01-09 Visa International Service Association Data protection hub
US9846861B2 (en) 2012-07-25 2017-12-19 Visa International Service Association Upstream and downstream data conversion
US9256871B2 (en) 2012-07-26 2016-02-09 Visa U.S.A. Inc. Configurable payment tokens
US9665722B2 (en) 2012-08-10 2017-05-30 Visa International Service Association Privacy firewall
AU2013216657A1 (en) * 2012-08-15 2014-03-06 Anita Jadeja An information system
US10547674B2 (en) 2012-08-27 2020-01-28 Help/Systems, Llc Methods and systems for network flow analysis
US9785990B2 (en) 2012-08-28 2017-10-10 Chris Folayan Online shopping system and method facilitating foreign transactions
US10084806B2 (en) 2012-08-31 2018-09-25 Damballa, Inc. Traffic simulation to identify malicious activity
US9680861B2 (en) 2012-08-31 2017-06-13 Damballa, Inc. Historical analysis to identify malicious activity
US9894088B2 (en) 2012-08-31 2018-02-13 Damballa, Inc. Data mining to identify malicious activity
US9166994B2 (en) 2012-08-31 2015-10-20 Damballa, Inc. Automation discovery to identify malicious activity
WO2014043278A1 (en) 2012-09-11 2014-03-20 Visa International Service Association Cloud-based virtual wallet nfc apparatuses, methods and systems
US10176478B2 (en) 2012-10-23 2019-01-08 Visa International Service Association Transaction initiation determination system utilizing transaction data elements
US10013672B2 (en) 2012-11-02 2018-07-03 Oath Inc. Address extraction from a communication
US9911118B2 (en) 2012-11-21 2018-03-06 Visa International Service Association Device pairing via trusted intermediary
US10192200B2 (en) 2012-12-04 2019-01-29 Oath Inc. Classifying a portion of user contact data into local contacts
US10255598B1 (en) 2012-12-06 2019-04-09 Consumerinfo.Com, Inc. Credit card account data extraction
US10304047B2 (en) 2012-12-07 2019-05-28 Visa International Service Association Token generating component
US10360627B2 (en) 2012-12-13 2019-07-23 Visa International Service Association Systems and methods to provide account features via web based user interfaces
US10740731B2 (en) 2013-01-02 2020-08-11 Visa International Service Association Third party settlement
US9741051B2 (en) 2013-01-02 2017-08-22 Visa International Service Association Tokenization and third-party interaction
US9697263B1 (en) 2013-03-04 2017-07-04 Experian Information Solutions, Inc. Consumer data request fulfillment system
US9870589B1 (en) 2013-03-14 2018-01-16 Consumerinfo.Com, Inc. Credit utilization tracking and reporting
US20140274153A1 (en) * 2013-03-15 2014-09-18 Hook Me Mobile, Inc. Location controlled communication system
US11055710B2 (en) 2013-05-02 2021-07-06 Visa International Service Association Systems and methods for verifying and processing transactions using virtual currency
WO2014186635A1 (en) 2013-05-15 2014-11-20 Visa International Service Association Mobile tokenization hub
US9571511B2 (en) 2013-06-14 2017-02-14 Damballa, Inc. Systems and methods for traffic classification
US10878422B2 (en) 2013-06-17 2020-12-29 Visa International Service Association System and method using merchant token
CN103400276A (en) * 2013-07-24 2013-11-20 北京小米科技有限责任公司 Receiving information processing method and device
US9928538B2 (en) 2013-07-24 2018-03-27 Xiaomi Inc. Method and apparatus for processing user information
AU2014292980A1 (en) 2013-07-24 2016-02-04 Visa International Service Association Systems and methods for interoperable network token processing
AU2014294613B2 (en) 2013-07-26 2017-03-16 Visa International Service Association Provisioning payment credentials to a consumer
CN114819961A (en) 2013-08-08 2022-07-29 维萨国际服务协会 Method and system for provisioning payment credentials for mobile devices
US10496986B2 (en) 2013-08-08 2019-12-03 Visa International Service Association Multi-network tokenization processing
US10275824B2 (en) 2013-09-10 2019-04-30 United Parcel Service Of America, Inc. Concepts for transacting e-commerce
US9978094B2 (en) 2013-10-11 2018-05-22 Visa International Service Association Tokenization revocation list
EP3078156A4 (en) 2013-10-11 2017-07-12 Visa International Service Association Network token system
US10515358B2 (en) 2013-10-18 2019-12-24 Visa International Service Association Contextual transaction token methods and systems
US10489779B2 (en) 2013-10-21 2019-11-26 Visa International Service Association Multi-network token bin routing with defined verification parameters
US10366387B2 (en) 2013-10-29 2019-07-30 Visa International Service Association Digital wallet system and method
US10489754B2 (en) 2013-11-11 2019-11-26 Visa International Service Association Systems and methods to facilitate the redemption of offer benefits in a form of third party statement credits
US10163148B1 (en) 2013-11-13 2018-12-25 Square, Inc. Wireless beacon shopping experience
AU2014353151B2 (en) 2013-11-19 2018-03-08 Visa International Service Association Automated account provisioning
US9922322B2 (en) 2013-12-19 2018-03-20 Visa International Service Association Cloud-based transactions with magnetic secure transmission
US9972005B2 (en) 2013-12-19 2018-05-15 Visa International Service Association Cloud-based transactions methods and systems
US10433128B2 (en) 2014-01-07 2019-10-01 Visa International Service Association Methods and systems for provisioning multiple devices
US9846878B2 (en) 2014-01-14 2017-12-19 Visa International Service Association Payment account identifier system
US10419379B2 (en) 2014-04-07 2019-09-17 Visa International Service Association Systems and methods to program a computing system to process related events via workflows configured using a graphical user interface
US10026087B2 (en) 2014-04-08 2018-07-17 Visa International Service Association Data passed in an interaction
US9942043B2 (en) 2014-04-23 2018-04-10 Visa International Service Association Token security on a communication device
AU2015253182B2 (en) 2014-05-01 2019-02-14 Visa International Service Association Data verification using access device
SG10202007850WA (en) 2014-05-05 2020-09-29 Visa Int Service Ass System and method for token domain control
US10354268B2 (en) 2014-05-15 2019-07-16 Visa International Service Association Systems and methods to organize and consolidate data for improved data storage and processing
CN106465112A (en) 2014-05-21 2017-02-22 维萨国际服务协会 Offline authentication
US11023890B2 (en) 2014-06-05 2021-06-01 Visa International Service Association Identification and verification for provisioning mobile application
US10650398B2 (en) 2014-06-16 2020-05-12 Visa International Service Association Communication systems and methods to transmit data among a plurality of computing systems in processing benefit redemption
US20150371183A1 (en) * 2014-06-20 2015-12-24 United Parcel Service Of America, Inc. Systems and methods for confidential shipping
US9780953B2 (en) 2014-07-23 2017-10-03 Visa International Service Association Systems and methods for secure detokenization
US10438226B2 (en) 2014-07-23 2019-10-08 Visa International Service Association Systems and methods of using a communication network to coordinate processing among a plurality of separate computing systems
US10484345B2 (en) 2014-07-31 2019-11-19 Visa International Service Association System and method for identity verification across mobile applications
US9775029B2 (en) 2014-08-22 2017-09-26 Visa International Service Association Embedding cloud-based functionalities in a communication device
US10140615B2 (en) 2014-09-22 2018-11-27 Visa International Service Association Secure mobile device credential provisioning using risk decision non-overrides
WO2016049636A2 (en) 2014-09-26 2016-03-31 Visa International Service Association Remote server encrypted data provisioning system and methods
US11257074B2 (en) 2014-09-29 2022-02-22 Visa International Service Association Transaction risk based token
US10015147B2 (en) 2014-10-22 2018-07-03 Visa International Service Association Token enrollment system and method
US11210669B2 (en) 2014-10-24 2021-12-28 Visa International Service Association Systems and methods to set up an operation at a computer system connected with a plurality of computer systems via a computer network using a round trip communication of an identifier of the operation
GB201419016D0 (en) 2014-10-24 2014-12-10 Visa Europe Ltd Transaction Messaging
US10325261B2 (en) 2014-11-25 2019-06-18 Visa International Service Association Systems communications with non-sensitive identifiers
US11620643B2 (en) 2014-11-26 2023-04-04 Visa International Service Association Tokenization request via access device
US10257185B2 (en) 2014-12-12 2019-04-09 Visa International Service Association Automated access data provisioning
SG11201703526VA (en) 2014-12-12 2017-05-30 Visa Int Service Ass Provisioning platform for machine-to-machine devices
CN104507060A (en) * 2014-12-23 2015-04-08 广州市久邦数码科技有限公司 Anonymous short message realization method
US10187363B2 (en) 2014-12-31 2019-01-22 Visa International Service Association Hybrid integration of software development kit with secure execution environment
US10096009B2 (en) 2015-01-20 2018-10-09 Visa International Service Association Secure payment processing using authorization request
US11250391B2 (en) 2015-01-30 2022-02-15 Visa International Service Association Token check offline
US11176554B2 (en) 2015-02-03 2021-11-16 Visa International Service Association Validation identity tokens for transactions
US11216468B2 (en) 2015-02-08 2022-01-04 Visa International Service Association Converged merchant processing apparatuses, methods and systems
US10977657B2 (en) 2015-02-09 2021-04-13 Visa International Service Association Token processing utilizing multiple authorizations
US10164996B2 (en) 2015-03-12 2018-12-25 Visa International Service Association Methods and systems for providing a low value token buffer
US9930065B2 (en) 2015-03-25 2018-03-27 University Of Georgia Research Foundation, Inc. Measuring, categorizing, and/or mitigating malware distribution paths
US10333921B2 (en) 2015-04-10 2019-06-25 Visa International Service Association Browser integration with Cryptogram
US9998978B2 (en) 2015-04-16 2018-06-12 Visa International Service Association Systems and methods for processing dormant virtual access devices
US9691085B2 (en) 2015-04-30 2017-06-27 Visa International Service Association Systems and methods of natural language processing and statistical analysis to identify matching categories
US10552834B2 (en) 2015-04-30 2020-02-04 Visa International Service Association Tokenization capable authentication framework
US10380608B2 (en) * 2015-09-14 2019-08-13 Adobe Inc. Marketing data communication control
US9886656B2 (en) 2015-09-22 2018-02-06 International Business Machines Corporation Managing privacy of information during shipments
WO2017066792A1 (en) 2015-10-15 2017-04-20 Visa International Service Association Instant token issuance system
US11410230B1 (en) 2015-11-17 2022-08-09 Consumerinfo.Com, Inc. Realtime access and control of secure regulated data
US10757154B1 (en) 2015-11-24 2020-08-25 Experian Information Solutions, Inc. Real-time event-based notification system
US10664843B2 (en) 2015-12-04 2020-05-26 Visa International Service Association Unique code for token verification
DK3188036T3 (en) * 2015-12-30 2019-08-12 Legalxtract Aps PROCEDURE AND SYSTEM FOR PROVIDING AN EXTRACT DOCUMENT
EP3400696B1 (en) 2016-01-07 2020-05-13 Visa International Service Association Systems and methods for device push provisioning
GB201601796D0 (en) 2016-02-01 2016-03-16 Comcarde Ltd Payment handling apparatus and method
US11080696B2 (en) 2016-02-01 2021-08-03 Visa International Service Association Systems and methods for code display and use
US11501288B2 (en) 2016-02-09 2022-11-15 Visa International Service Association Resource provider account token provisioning and processing
US10313321B2 (en) 2016-04-07 2019-06-04 Visa International Service Association Tokenization of co-network accounts
CN109074578A (en) 2016-04-19 2018-12-21 维萨国际服务协会 System and method for executing push transaction
US11250424B2 (en) 2016-05-19 2022-02-15 Visa International Service Association Systems and methods for creating subtokens using primary tokens
KR102508836B1 (en) 2016-06-03 2023-03-10 비자 인터네셔널 서비스 어소시에이션 Sub-token management system for connected devices
US11068899B2 (en) 2016-06-17 2021-07-20 Visa International Service Association Token aggregation for multi-party transactions
US10853872B1 (en) * 2016-06-20 2020-12-01 Amazon Technologies, Inc. Advanced item associations in an item universe
WO2017223525A1 (en) 2016-06-24 2017-12-28 Visa International Service Association Unique token authentication cryptogram
US10460279B2 (en) 2016-06-28 2019-10-29 Wing Aviation Llc Interactive transport services provided by unmanned aerial vehicles
SG11201808998RA (en) 2016-07-11 2018-11-29 Visa Int Service Ass Encryption key exchange process using access device
CA3026224A1 (en) 2016-07-19 2018-01-25 Visa International Service Association Method of distributing tokens and managing token relationships
US10509779B2 (en) 2016-09-14 2019-12-17 Visa International Service Association Self-cleaning token vault
SG11201903468RA (en) 2016-11-28 2019-05-30 Visa Int Service Ass Access identifier provisioning to application
US11227001B2 (en) 2017-01-31 2022-01-18 Experian Information Solutions, Inc. Massive scale heterogeneous data ingestion and user resolution
US10915899B2 (en) 2017-03-17 2021-02-09 Visa International Service Association Replacing token on a multi-token user device
US10902418B2 (en) 2017-05-02 2021-01-26 Visa International Service Association System and method using interaction token
US11494765B2 (en) 2017-05-11 2022-11-08 Visa International Service Association Secure remote transaction system using mobile devices
US10735183B1 (en) 2017-06-30 2020-08-04 Experian Information Solutions, Inc. Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network
US10491389B2 (en) 2017-07-14 2019-11-26 Visa International Service Association Token provisioning utilizing a secure authentication system
WO2019027488A1 (en) * 2017-08-02 2019-02-07 Wepay, Inc. Systems and methods for instant merchant activation for secured in-person payments at point of sale
WO2019171163A1 (en) 2018-03-07 2019-09-12 Visa International Service Association Secure remote token release with online authentication
US11256789B2 (en) 2018-06-18 2022-02-22 Visa International Service Association Recurring token transactions
SG11202101587SA (en) 2018-08-22 2021-03-30 Visa Int Service Ass Method and system for token provisioning and processing
US20200074541A1 (en) 2018-09-05 2020-03-05 Consumerinfo.Com, Inc. Generation of data structures based on categories of matched data items
CN113015992B (en) 2018-11-14 2023-02-17 维萨国际服务协会 Cloud token provisioning of multiple tokens
WO2020146667A1 (en) 2019-01-11 2020-07-16 Experian Information Solutions, Inc. Systems and methods for secure data aggregation and computation
JP7297196B2 (en) * 2019-03-04 2023-06-26 トヨタ自動車株式会社 shopping support system
SG11202108626QA (en) 2019-05-17 2021-09-29 Visa Int Service Ass Virtual access credential interaction system and method
US11694148B2 (en) * 2019-09-03 2023-07-04 United States Postal Service Systems and methods for delivering items having encoded delivery points
US20210256511A1 (en) * 2020-02-14 2021-08-19 SOS Solutions, lnc. Systems and methods for facilitating transactions
US11880850B2 (en) * 2021-05-28 2024-01-23 Ncr Voyix Corporation Cross-entity channel integration services

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5715314A (en) * 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
US5768391A (en) * 1995-12-22 1998-06-16 Mci Corporation System and method for ensuring user privacy in network communications
US5809144A (en) * 1995-08-24 1998-09-15 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5255182A (en) * 1992-01-31 1993-10-19 Visa International Service Association Payment card point-of-sale service quality monitoring system, apparatus, and method
JP3367675B2 (en) * 1993-12-16 2003-01-14 オープン マーケット インコーポレイテッド Open network sales system and method for real-time approval of transaction transactions
US20050033659A1 (en) * 1996-01-17 2005-02-10 Privacy Infrastructure, Inc. Third party privacy system
US5963915A (en) * 1996-02-21 1999-10-05 Infoseek Corporation Secure, convenient and efficient system and method of performing trans-internet purchase transactions
US5815665A (en) * 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network
US5913203A (en) * 1996-10-03 1999-06-15 Jaesent Inc. System and method for pseudo cash transactions
US5953710A (en) * 1996-10-09 1999-09-14 Fleming; Stephen S. Children's credit or debit card system
US7003480B2 (en) * 1997-02-27 2006-02-21 Microsoft Corporation GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions
US7324972B1 (en) * 1997-03-07 2008-01-29 Clickshare Service Corporation Managing transactions on a network: four or more parties
US6292789B1 (en) * 1997-08-26 2001-09-18 Citibank, N.A. Method and system for bill presentment and payment
EP0917119A3 (en) * 1997-11-12 2001-01-10 Citicorp Development Center, Inc. Distributed network based electronic wallet
US6453306B1 (en) * 1998-01-26 2002-09-17 Ict Software S.A. Internet commerce method and apparatus
US6422462B1 (en) * 1998-03-30 2002-07-23 Morris E. Cohen Apparatus and methods for improved credit cards and credit card transactions
US6006200A (en) * 1998-05-22 1999-12-21 International Business Machines Corporation Method of providing an identifier for transactions
US6807530B1 (en) * 1998-08-05 2004-10-19 International Business Machines Corporation Method and apparatus for remote commerce with customer anonymity
US20020004900A1 (en) * 1998-09-04 2002-01-10 Baiju V. Patel Method for secure anonymous communication
EP1125419B1 (en) * 1998-10-30 2009-08-26 VirnetX Inc. An agile network protocol for secure communications with assured system availability
US20010014878A1 (en) * 1998-11-09 2001-08-16 Nilotpal Mitra Transaction method and apparatus
CA2291920A1 (en) * 1998-12-11 2000-06-11 Karuna Ganesan Technique for conducting secure transactions over a network
US6654724B1 (en) * 1999-02-12 2003-11-25 Adheris, Inc. System for processing pharmaceutical data while maintaining patient confidentially
DE60024697T2 (en) * 1999-03-04 2006-09-28 Pitney Bowes Inc., Stamford Apparatus and method for anonymous access to the Internet
US6779111B1 (en) * 1999-05-10 2004-08-17 Telefonaktiebolaget Lm Ericsson (Publ) Indirect public-key encryption
US6675153B1 (en) * 1999-07-06 2004-01-06 Zix Corporation Transaction authorization system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5715314A (en) * 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
US5809144A (en) * 1995-08-24 1998-09-15 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network
US5768391A (en) * 1995-12-22 1998-06-16 Mci Corporation System and method for ensuring user privacy in network communications

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002063526A1 (en) * 2001-02-05 2002-08-15 Eun-Sook Park Method and system for providing a proxy payment service for wireless communication charges
FR2837643A1 (en) * 2002-03-25 2003-09-26 France Telecom Credit card transaction securing method in which transactions between a cardholder and supplier over a telecommunications network are conducted via a third party intermediary
WO2003081547A1 (en) * 2002-03-25 2003-10-02 France Telecom Method and system of securing a credit card payment
AU2003250226B2 (en) * 2002-08-30 2007-08-09 Sap Ag Method and software application for electronic bill presentment and payment
EP1480147A3 (en) * 2003-05-20 2006-09-20 NTT DoCoMo, Inc. Method of delivering an article of commerce, deliverer-side server, and customer-side client computer
EP2329438A1 (en) * 2008-09-16 2011-06-08 Alibaba Group Holding Limited Real-time settling of payment for logistics company
EP2329438A4 (en) * 2008-09-16 2012-07-11 Alibaba Group Holding Ltd Real-time settling of payment for logistics company
EP2752798A1 (en) * 2009-03-30 2014-07-09 Yuh-Shen Song Privacy protected anti-identity theft and payment network
US11605045B2 (en) 2012-09-07 2023-03-14 MapMyld, Inc. Address exchange systems and methods
CN113486157A (en) * 2021-08-13 2021-10-08 上海壹优速信息科技有限公司 Method for decrypting encrypted mobile phone number

Also Published As

Publication number Publication date
US7536360B2 (en) 2009-05-19
US20060247982A1 (en) 2006-11-02
AU6229000A (en) 2001-02-13
US20040002903A1 (en) 2004-01-01
WO2001008066A9 (en) 2002-07-18
US7069249B2 (en) 2006-06-27

Similar Documents

Publication Publication Date Title
US7536360B2 (en) Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party
US6944669B1 (en) Sharing the personal information of a network user with the resources accessed by that network user
AU2001251286B2 (en) System, method and apparatus for international financial transactions
US7536353B2 (en) Secure transaction processing system and method
US20030120608A1 (en) Secure method for purchasing and payment over a communication network and method for delivering goods anonymously
US8296405B2 (en) Internet strawman and user interface therefor
US20060178994A1 (en) Method and system for private shipping to anonymous users of a computer network
US20040083184A1 (en) Anonymous card transactions
US20020052853A1 (en) Transportation system for on-line transactions
US20010037290A1 (en) Method and system for secured web-based escrowed transactions
US20040260653A1 (en) Anonymous transactions
US20010029485A1 (en) Systems and methods enabling anonymous credit transactions
US20050027618A1 (en) Third party privacy system
AU2001251286A1 (en) System, method and apparatus for international financial transactions
CA2319919A1 (en) On-line payment system
JP2003531447A (en) Methods and systems for virtual safety
EP1170690A1 (en) Shared and collaborative on-line shopping cart
EP1938257A2 (en) Secure internet e-commerce
HU227081B1 (en) Computer data processing method and system for on-line payment transactions, as well as payment processing system
CA2335689A1 (en) Third party privacy system
WO2002029508A2 (en) Broker-mediated online shopping system and method
KR20010077123A (en) A package payment and delivery method using a common shopping cart in a computer network shopping
US20030105723A1 (en) Method and system for disclosing information during online transactions
KR19980080070A (en) E-commerce methods
JP2001265972A (en) Agent system in transaction on internet

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

AK Designated states

Kind code of ref document: C2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: C2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

COP Corrected version of pamphlet

Free format text: PAGES 1/35-35/35, DRAWINGS, REPLACED BY NEW PAGES 1/36-36/36; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP