EP1027661A1 - Elektronischer handel mit anonymem einkauf und anonymem versand durch den verkäufer - Google Patents

Elektronischer handel mit anonymem einkauf und anonymem versand durch den verkäufer

Info

Publication number
EP1027661A1
EP1027661A1 EP99949595A EP99949595A EP1027661A1 EP 1027661 A1 EP1027661 A1 EP 1027661A1 EP 99949595 A EP99949595 A EP 99949595A EP 99949595 A EP99949595 A EP 99949595A EP 1027661 A1 EP1027661 A1 EP 1027661A1
Authority
EP
European Patent Office
Prior art keywords
customer
computer
vendor
web site
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99949595A
Other languages
English (en)
French (fr)
Other versions
EP1027661A4 (de
Inventor
Harry Brener
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Impower Inc
Original Assignee
Impower Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Impower Inc filed Critical Impower Inc
Publication of EP1027661A1 publication Critical patent/EP1027661A1/de
Publication of EP1027661A4 publication Critical patent/EP1027661A4/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • the present invention relates to a method and system of conducting electronic commerce which allows a customer to anonymously visit vendor web sites, anonymously purchase goods and anonymously receive goods without disclosing the customer's identification and home address information to the web site vendor.
  • Internet billing systems are known that maintains the confidentiality of the customer information by an Internet access provider vis-a-vis a vendor web site.
  • the Internet access provider creates access to the Internet through the secure provider's web site for the user.
  • the provider then bills the customer's account with the provider or another specified account for transactions with outside vendors, without the need for the customer to send his bank account number or credit card information to the vendor.
  • the problem with these billing systems is that they do not provide complete privacy. While customers using such a billing system do not have to reveal their bank account numbers or credit card numbers to outside vendors, they do need to reveal their home addresses to the vendor so that the vendor can mail or ship the customer their order.
  • a computer- implemented method of delivering goods whereby good are purchased from a vendor having a vendor web site accessible over a computer network by a plurality of customers at physical locations.
  • the customers have customer computers connected to the computer network for accessing the vendor web site and electronically purchasing goods therefrom.
  • the method includes: (a) associating the identity and the physical location of each customer with a respective customer object via linking information; (b) storing the linking information at a secure computer at a location remote from the vendor web site; (c) anonymously connecting to the vendor web site by the customer computer using the identity of the customer object without revealing the identity and physical location of the customer; (d) ordering goods at the vendor web site by the customer using the customer computer, and upon initiation of an order by the customer, (i) automatically generating a transaction identifier by the vendor computer, (ii) encoding a package of the goods ordered by the customer with the transaction identifier by the vendor and (iii) sending the transaction identifier together with the customer object to the secure computer by the vendor computer; (e) associating the transaction identifier sent by the vendor computer with the identity and physical address of the customer at the secure computer using the linking information and automatically forwarding the transaction identifier and associated identity and physical address of the customer to a computer of a common carrier; (f) delivering the encoded
  • the computer-implemented method of delivering goods comprises (a) associating the identity and the physical location of each customer with a respective customer object via linking information; (b) storing the linking information at a secure computer at a location remote from the vendor web site; (c) anonymously connecting to the vendor web site by the customer computer using the identity of the customer object without revealing the identity and physical location of the customer; (d) ordering goods at the vendor web site by the customer using the customer computer, and upon initiation of an order by the customer, encoding a package of the goods ordered by the customer with the customer object; (e) delivering the encoded package to the common carrier by the vendor; (f) providing the linking information to the common carrier; and (g) reading the customer object by the common carrier, retrieving the identity and the physical location of the customer associated with the customer object and physically delivering the package to the physical location of the customer.
  • the above methods further comprise sending information representing the cost of the goods ordered by the customer and the customer object from the vendor computer to a financial institution computer via the computer network for credit approval, ascertaining the credit status of the customer object, and automatically sending a message approving or declining credit to the customer to the vendor computer from the financial institution computer.
  • Ascertaining the credit status of the customer object can also include ascertaining the identity of the customer based on the linking information obtained by the financial institution from the secure provider.
  • the step of anonymously connecting to the vendor web site may include revealing one or more customer characteristics to the vendor web site by the customer object so as to allow the vendor web site to use such customer characteristics to customize information and goods presented to the customer upon return to the vendor web site using the customer object.
  • the step of anonymously connecting to the vendor web site is preferably performed automatically without customer interaction on at least some occasions by the customer object programmed to shop for the customer in accordance with directions specified by the customer.
  • the customer object may be personified to the customer via the customer computer through the display of audio and/or visual display.
  • the secure computer may comprise a secure provider computer allowing the customers to anonymously connect to the vendor web site therethrough, or alternatively, the secure computer can comprise the financial institution computer.
  • a computer character generating system is provided in the context of a computer system for offering goods, services and/or information from a vendor computer providing access to a vendor web site over a computer network including a plurality of customer computers connected to the network for accessing the vendor web site.
  • the computer character generating system includes (a) a character generation program executable on the vendor computer and containing instructions for causing the vendor computer to generate an interactive vendor character which represents the vendor and interactively guides a customer through the vendor computer site, (b) the character generation program being operative to send character display commands to the customer computer when the customer computer has accessed the vendor web site causing the customer computer to display on a display device associated with the customer computer the interactive vendor character, (c) the interactive vendor character providing a trademark function for the vendor such that the interactive vendor character is identified with the vendor by customers who desire to acquire goods, services and/or information over the computer network from the vendor web site, the interactive vendor character further having a persona such that the vendor character will respond to inputs from a customer computer representing communications by a customer in a manner representative of a human having particular personality traits acting in a representative capacity.
  • the vendor computer records the identities of customer computers which interact with the vendor web site and records historical data representing transactions of each customer computer with the vendor computer, and the vendor character responds to inputs from each customer computer based partially on the inputs and partially on the historical data in conjunction with the personality traits.
  • the vendor character preferably has an artificial intelligence function which allows the vendor character to predict responses which would tend to elicit an acquisition by each customer computer based upon the historical data associated with such customer computer, and the interactive vendor character bases responses at least in part upon such predictions.
  • the vendor character can also check for available goods, services and/or information requested by each customer computer and also checks for goods or services which are different from those requested by the customer computer but which are likely to be of interest to such customer computer based upon the historical data.
  • the vendor character can be displayed with facial expressions, movement characteristics and voice accents associated with the personality traits.
  • an interactive computer-implemented method of offering goods, services and/ or information is provided with a vendor computer providing access to a vendor web site over a computer network to a plurality of customer computers connected to the network for accessing the vendor web site.
  • the method includes (a) providing a plurality of customer objects representing individuals who desire to acquire goods, services and/or information from the vendor sites, each customer object being provided with a set of user characteristics representing personal preferences and information about the individual; (b) providing a vendor persona object representing the vendor, the vendor persona object being provided with a set of vendor characteristics representing information about the goods, services and/or information offered by the vendor; and (c) visiting the vendor computer site via the network with a customer object such that the customer object and the vendor persona object dynamically interact with one another to exchange one or more subsets of the set of user characteristics and vendor characteristics for determining whether the goods, services and/or information offered by the vendor computer site are of interest to the user persona object.
  • the method desirably includes targeting a sales offer by a vendor computer to at least one customer computer via the secure provider computer based upon the purchasing interest and demographic information collected for at least one customer computer by the secure provider computer and provided to the vendor, wherein the customer object is configured by the customer to determine whether the sales offer will be presented to the customer computer.
  • a method for providing advertising on the web site of a secure provider computer comprising (a) providing a secure provider computer to allow customer computers connected to the secure provider computer to have access to authorized vendor offers on the secure provider web site; and (b) posting one or more vendor offers on the secure provider web site, wherein the offers are only viewable by the customer computers.
  • a computer- implemented method for knowingly monitoring network navigation and purchasing history of a plurality of customers by a secure provider comprising: (a) requiring each customer to first establish an account with the secure provider by requiring each customer to agree to have the customer's demographic information and purchasing history tracked by the secure provider; (b) providing on-line access to a computer network to computers of customers who have established an account via a secure provider computer of the secure provider; and (c) tracking and storing the customers' demographic information and purchasing history by the secure provider computer as the customers update and change their demographic information and make purchases via their customer computers.
  • At least one customer computer is presented with an item to be purchased selected by the secure provider computer based on the customer's demographic information and purchasing history tracked by the secure provider.
  • a sales offer can be targeted by a vendor computer to at least one customer computer via the secure provider computer based on the customer's demographic information and purchasing history collected by the secure provide computer and provided to the vendor in a modified form which does not include the customers' identity information, wherein the customer object is configured by the customer to determine whether the sales offer will be presented to the customer computer.
  • a method of providing outside vendor offers on a web site of a secure provider computer including (a) establishing a secure provider web site allowing member customer computers to have access to an area on the web site that posts outside vendor offers; and
  • FIG. 1 is a schematic diagram of a preferred embodiment of a computer system according to the present invention.
  • FIG. 2 is a flow chart of the steps followed in a preferred method according to the present invention.
  • FIG. 3 is a depiction of a sample secure provider web site.
  • FIG. 4 is a depiction of a sample vendor web site. BEST MODES FOR CARRYING OUT THE INVENTION
  • the computer system of the present invention comprises a network of interconnected computers connected via a global communications network such as the Internet 50.
  • the network of computers comprise plurality of customer computers 100, a secure provider computer 110, a plurality of vendor computers 140, a plurality of bank computers 150 and a plurality of third party carrier or shipping computers
  • Each computer comprises the typical components needed to connect to the Internet and World Wide Web, such as RAM and ROM memory, mass storage, microprocessor(s), display device, user input devices, etc.
  • the secure provider computer 110 and vendor computers 140 also will typically include one or more server computers to allow provision of web sites such as a secure provider web site and vendor web sites, which offer goods, services and other information desired.
  • the present invention desirably allows a customer to shop on-line at vendor web sites in an anonymous fashion.
  • a customer uses his customer computer 100 (such as a home computer with dial-up connectivity to the Internet) to connect the secure provider computer 110 and login with a certificate based ID and password.
  • customer computer 100 such as a home computer with dial-up connectivity to the Internet
  • the customer Prior to conducting on-line shopping, the customer creates a customer object or on-line personna that represents the preferences of the customer. This is discussed in further detail below.
  • the customer object which can be represented by a name (such as "GOLFO") and the customer's personal information, such as the customer's name and address, are matched up with linking information.
  • This linking information is stored, in one embodiment, in a linking table stored in the database 130 of the secure provider computer 110.
  • This linking table matches up each customer object with the customer's personal information which the customer wants shielded from the vendor web sites.
  • the linking information can be stored in the database 170 of bank computer 150 so that only the bank, and not the secure provider, actually knows the true identity and address of the customer. In either case, the linking information is stored in a secure computer so as to shield the linking information from third parties, including the vendor.
  • the secure provider computer 110 or the bank computer 150 can determine which customer a given customer object represents.
  • a secure connection pipeline 120 is provided between the customer computer 100 and the secure provider computer 110 in order to prevent transmissions between the customer computer 100 and the secure provider computer 110 from being monitored.
  • the customer computer 100 is preferably provided with software by the secure provider computer 110. This software enables the customer computer 100 to connect directly to the secure provider computer 110, along a known, fixed node-to-node route, without having to connect to the vendor web site through a different node-to-node network each time as is common over the Internet.
  • the customer computers 100 are preferably connected to the secure provider computer 110 through a virtual personal network ("VPN") which provides a private passageway or tunnel through the Internet.
  • VPN virtual personal network
  • computers communicate with each other through firewall computers, so that the only addresses known are those of the firewall computers.
  • This secure pipeline 120 allows the customer to connect directly, node-to-node, with a VPN, when there is communications between the secure provider computer and the vendor computer, so the only address that is revealed to the vendor is the address of the firewall computer.
  • This allows customer computers 100 to communicate from within a network to vendor computers 140 without having their addresses revealed or access to any peripherals or devices on customer computer 100.
  • the customer computer 100 can anonymously connect to the web sites of various vendor computers 140 using the Internet via the secure provider's proxy servers.
  • the customer computer 100 can browse for the web sites of vendor computers 140 of interest using various different search methods known in the art.
  • the vendor computer 140 is provided only with the customer object, which identifies the customer as a fictitious entity without revealing personal information about the customer such as real name or address.
  • the customer computer 100 notifies the vendor computer 140 that the customer computer 100 would like to make a purchase, the vendor computer 140 contacts a bank computer 150 through the Internet to verify that the customer object on the customer computer 100 has sufficient funds to make the purchase.
  • the vendor computer 140 forwards the customer object to the bank computer.
  • the bank computer 150 obtains or is already provided with the linking information to link the customer object with personal information about the customer, including customer account information. Once the bank computer 150 determines whether the customer object has sufficient funds to make the purchase, the bank computer 150 notifies the vendor computer 140 whether the customer has sufficient funds to make the purchase. In an alternate embodiment, the vendor computer 140 need not contact a bank but can simply bill the secure provider computer 110 for the transaction, who will in turn bill the customer.
  • the vendor arranges for the package to be picked up by a third party carrier.
  • the package must be labeled with information that the shipper can use to ship the package to the correct address, but cannot contain the actual address of the customer, since it is to be shielded from the vendor.
  • the vendor computer 140 provides the third party carrier computer 180 with a transaction identifier and the customer object through the Internet to shipper computer 180. The vendor also places the transaction identifier only on the package. Once the shipper comes to the vendor to pickup the package, the shipper, who is provided with or can ascertain the linking information, knows the address to match up with the transaction identifier.
  • the vendor can simply attach the customer object to the package, such as in the form of a bar code or a label.
  • the third party shipper computer 180 can then contact the secure provider computer 110 directly through a secure pipeline or through the Internet, to retrieve the customer's address from the database 130 or is provided ahead of time with the linking information to match up the customer object with the customer's actual name and address.
  • the shipper can retrieve or be provided with the linking information for the transaction identifier and/or the customer object from the bank.
  • FIG. 2 illustrates a preferred method in accordance with the present invention.
  • a customer computer 100 first connects to the web site of the secure provider computer 110, illustrated in FIG. 3, and joins the secure provider's service by filling out a standard form on the web site of the secure provider computer 110.
  • the customer is prompted to create a "persona" or customer object to be stored on a database 130 on the secure provider computer 110.
  • this object may have both a public and private segment to a digital certificate or key.
  • a linking table is also stored on the database 130 of the secure provider computer 110 which provides the link between the customer's personal information, such as the customer's name and shipping address, and the customer's object such as a public key, but not the synonym, or name of the object.
  • the linking table is stored only by banking computer and is not known by the secure provider.
  • the information about the customer object is stored by the secure provider, in the case where the customer wishes to remain anonymous to the secure provider, the linking information to link customer object to the actual customer is given only to the bank by the customer.
  • the linking table is ultimately used to provide the bank computer with the account number or private key authorization of the customer and to provide the third party carriers with the actual name and address of a customer once the package has been labeled by the vendor with the customer object or transaction identifier.
  • the customer can create and modify his customer object via a personalized home page stored on the web site of the secure provider computer 110.
  • the customer might create the persona or customer object named "GOLFO, " which object can then be used to navigate anonymously on the Internet.
  • the customers can, for example, select an available name (such as GOLFO) and enter in detailed personal information about himself.
  • GOLFO persona thus functions as the customer's anonymous alter-ego and will contain personal information such as age, sex, interests, hobbies, shirt size, shoe size, likes, dislikes, merchandise the customer has an interest in, etc.
  • This persona, GOLFO, along with all other customers' personas is stored on the database 130 of the secure provider computer 110, which may or may not store the linking information as explained above.
  • the customer joins the web site of the secure provider computer 110, the customer is provided with a customer object identifier number or certificate, also stored on database 130.
  • the customer's object identifier number or certificate but not their bank account information, credit card numbers or home address, is preferably stored on a "cookie" or database at the customer computer 100, and is also stored on secure provider computer 110.
  • the customer object identifier number or certificate can be used by the secure provider computer 110 to identify the user as a customer of the web site of the secure provider computer 110.
  • the customer computer 100 can then access the Internet through the web site of the secure provider computer 110 and begin to securely browse, as shown in step 210.
  • the customer computer 100 decides on a web site from which the customer would like to make a purchase, such as the vendor web site illustrated in FIG. 4, the customer computer 100 enters the web site of the vendor computer 140 as shown in step 220, as his "GOLFO" object or persona.
  • the vendor computer 140 is provided only with GOLFO 's persona information that is authorized for release.
  • the GOLFO persona or object provides detailed demographic and psychographic information about the customer so that the vendor computer 140, if desired, can develop a relationship with the customer through his persona.
  • the golf merchant's vendor computer 140 could store a profile of the GOLFO persona.
  • the vendor computer 140 sees that GOLFO has returned to the web site, the vendor computer 140 can present the customer, through his GOLFO persona, with shirts the vendor may think GOLFO might like based upon the previous purchases of GOLFO, as seen by display 400 on the vendor web site.
  • the customer when a customer logs into a vendor web site, the customer will log in with a customer object that does not reveal the actual customer who is linked to the object.
  • the information that is revealed to the vendor would simply be GOLFO at the address of the web site of the secure provider computer 110. In this manner, safe and private visitation of web sites can be achieved through the customer object.
  • the customer object can also be programmed to navigate the Internet on its own, gather relevant information and then report back to the actual customer the information gathered based on the task(s) assigned to the customer object.
  • the customer object is provided with a credit rating or credit history such that the vendor can determine whether to sell the goods to the customer.
  • the customer object is provided with its own credit facility, which could include, for example, a virtual credit card.
  • a virtual credit card is preferably given a name and icon representation so that the customer can easily purchase goods on-time by clicking on the credit card name or icon displayed at the participating vendor's web site.
  • Use of such virtual credit card enables the customer object to readily purchase goods or services on credit.
  • Credit card transactions, when authorized by the customer or customer object identifier, are preferably done through secure transaction protocols, such as digital signature and digital certificates. In such a case, the customer object itself can be provided with the digital signature and certificate information for use in purchasing items.
  • the customer preferably clicks on an icon, such as icon 410 shown in FIG. 4, representing the virtual credit card on the secure provider web site, as shown in step 230.
  • An icon such as icon 410 shown in FIG. 4, representing the virtual credit card on the secure provider web site, as shown in step 230.
  • a list of items selected can also be displayed in a "shopping cart" such as shown at display 430 on the vendor web site.
  • the vendor then forwards the customer's object, vendor number, transaction identifier, and the amount of the purchase to bank computer 150.
  • the customer object comprises a public key and a private key authorization code.
  • bank computer 150 is provided with a database 170 of the linking information of customer object or public key and customer information that allows the bank computer 150 or credit card company computer to determine who the actual customer is.
  • the bank computer 150 or credit card company can retrieve the customer object or public key from the secure provider computer 110 and therefore need not be in physical possession of the linking information.
  • the bank computer 150 determines whether or not to authorize the transaction. Preferably, it is desired that the bank not know the transactional information of the customer so that it cannot determine purchasing history and preferences of the actual customer.
  • the bank can agree not to use or sell the customer's transactional information for solicitations or the like or, if possible, the bank need not know what is being purchased and from where, only that the customer has the money or credit to cover the transaction.
  • the secure provider is not provided with the linking information, the customer is assured that the bank is not monitoring his or her transactional information and that the secure provider, who is monitoring the transactional information, cannot link the customer's actual identity to the customer object.
  • vendor computers 140 can contact the secure provider computer 110 instead of bank computer 150 to authorize payment.
  • the secure provider computer 110 can either bill the customer, or the customer can create a credit/debit account with the secure provider computer 110.
  • the vendor computer 140 can send the secure provider computer 110 a bill for the purchases of the customer computer 100.
  • the secure provider computer 110 in turn, can send a bill to the customer computer 100, or, if the customer computer 100 has a credit or debit account established with the secure provider computer 110, the secure provider computer 110 could adjust the customer's account accordingly.
  • the secure provider computer 110 can engage in electronic bill presentation to customer computer 100, and transmit information about the request for payment to bank computer 150.
  • the bank computer 150 Once the bank computer 150 has authorized the purchase, as shown in step 250, the bank computer 150 returns the vendor number, the transaction identifier and/or the customer object or public key, and the approval of the transaction back to the vendor computer 140 or to the secure provider computer 110, depending upon which computer transmitted information about the request for payment to bank computer 150.
  • the vendor Upon approval of the transaction, the vendor readies the goods for anonymous shipment as explained below.
  • a key aspect of the present invention is the secure and anonymous shipping protocol used.
  • This secure and anonymous method is provided whereby the customer can have the vendor ship the items ordered to the customer without revealing the customer's name, address or other information about the customer to the vendor.
  • the present invention uses the transaction identifier that is generated once the customer object decides to purchase given items.
  • the vendor computer 140 once ready to ship the items, contacts an authorized shipper (e.g. , a carrier who has previously contracted with the secure provider) such as carrier computer 180 and discloses only the transaction identifier to the carrier computer 180.
  • the vendor computer 140 provides the carrier computer 180 with the customer object (such as "GOLFO").
  • the carrier computer 180 then contacts the secure provider computer 110 or the bank computer 150 as the case may be, which then matches up the transaction identifier with the customer.
  • the customer information is then relayed by the secure provider computer 110 or bank computer 150 to the carrier computer 180 who can then ship the items directly to the customer now knowing the address of the customer.
  • the secure provider and/or the bank and the shipping company know who the customer is, advantageously, the customer's actual identity is shielded from the vendor.
  • the customer object can also be used for various other purposes.
  • the customer object or persona can gather information on behalf of the customer and then can communicate with the customer interactively, through visual and/or aural means, by using interactive computer techniques such as video playback and voice synthesis to allow the persona to verbally and/or textual describe what information was found.
  • information can also be provided in traditional formats such as text on the computer screen.
  • vendor/customer object interaction can occur through e-mail and e-mail systems can be used to further vendor /customer relationships at the object or persona level.
  • the secure provider can make direct offerings to the customer whether or not the secure provider knows the actual identity of the customer.
  • vendors and the secure provider can send offerings by e-mail to customer objects provided with their own e-mail addresses and the customer object can respond to such e-mails with return e-mail or by visiting the vendor or secure provider web site.
  • the present invention can use different encryption methods to provide users with anonymity, and to prevent third parties from improperly obtaining a user's credit card number or bank account number.
  • the system uses an RSA public key encryption.
  • RSA key technology has two main attributes. First, it can be the basis of a digital signature system. Second, it can be used for storing encryption information.
  • the public key is used to verify the digital signature.
  • the private key is used to sign one's signature for a block of data.
  • Holder's of public keys can verify a purchase by requesting that the purchaser digitally sign the block of data. If the signature matches up with the public key, the identity of the purchaser has been confirmed, and the seller can go forward and arrange for the shipment of the device with a third party shipper.
  • the customer computer 100 is preferably provided with a private key, while the public key is stored on the database 130.
  • the public key will contain information such as a customer object and a customer bank account or credit card number. Most importantly, the public key will not include information such as the customer shipping address, as is required in prior art electronic commerce systems.
  • the vendor computer 140 When a customer computer 100 enters the web site of the vendor computer 140, the vendor computer 140 is provided with the public key. When a customer computer 100 notifies the vendor computer 140 that the customer would like to make a purchase from the vendor web site 140, the public key, the transaction number and the amount of the purchase is then forwarded by the vendor computer 140 to a bank computer 150.
  • bank computer 150 will be provided with access to a database 170 of all public keys. The bank computer 150 can then request that the customer computer 100, using the private key, "sign" for the purchase. Based upon the response from the customer computer 100, and upon the customer's credit history, the bank computer 150 decides whether or not the transaction will be approved. Once the transaction is approved, the vendor computer 140 is notified.
  • the vendor computer 140 can then forward the item purchased by the customer with a transaction number or customer object to a third party carrier as explained above. Using this transaction number or customer object, the carrier computer 180 will be able to retrieve the customer's name and home address from the secure provider computer 110, or the bank computer 150, and can then deliver the package to the customer.
  • customers can opt into having the secure provider track their on-line surfing activities and their preferences. This is in contrast to web sites which track surfing activity unbeknownst to the user. With the present invention, the customer knows ahead of time, by signing up with the secure provider, that the secure provider will be tracking surfing and transactional habits so as to better serve the customer.
  • the secure provider computer 110 can determine commonly purchased items or popular vendors. Additionally, the monitoring of browsing habits can aid the secure provider computer 110 in predicting future purchases or services required by the customer object. Using this information, the secure provider can purchase large quantities of items commonly purchased by its members, and act as a wholesaler for its members, making special deals with the vendors.
  • the customer is encouraged by the secure provider to use and educate the customer object so that the secure provider can have real-time information to provide just- in-time or just-ahead-of-time product offerings to the customer or customer object.
  • the secure provider computer 110 which will have access to all of the customer data, but not necessarily to the customer's identity or address information, can also provide the stored demographic and preference information to vendor computers 140 without compromising the identity of the customer. In this manner, the provider could allow vendors to send information to targeted object groups which would not be bothersome to the customer since his or her object could make the decision whether to accept the offering from the vendor and/or present the offering back to the customer based on the preferences set by the customer.
  • the customer object identifier can be, in effect, a screener of "unsolicited" offerings from vendor computers 140.
  • the secure provider computer 110 can conduct market research with a depth unavailable using traditional methods.
  • the secure provider computer 110 would have access to data about the entire buying habits of its customers.
  • the secure provider database 130 would include information indicating that particular consumers like BMW automobiles and golf sweaters, whereas other consumers like Audi automobiles and cycling jerseys.
  • the secure provider computer 110 could conduct statistical studies to uncover correlations that would identify potential marketing and buying opportunities. For example, without breaching its obligation of confidence with respect to individual consumer information, the secure provider could conduct a market research study for a manufacturer of golf sweaters and advise the manufacturer to focus on BMW owners rather than Audi owners.
  • vendor computers In another preferred embodiment of the present invention, vendor computers are provided.
  • the secure provider computer 110 can provide special offers to be displayed on the web site of the secure provider computer 110.
  • the secure provider computer 110 can provide a web page which vendor computers 140 can log onto with a standardized form for the vendors to fill out.
  • the secure provider computer 110 can then post each of the standardized forms onto a virtual bulletin board to a web site available only to customer computers 100.
  • the advantage this embodiment provides is that customers need not shop on a non-secure web site to receive the special offers, since the offers will come via the secure provider computer 110. These offers can be posted for all customer computers 100 to see, or can be directed to specific customer computers 100. Further, customers will have the option of deciding whether or not they wish to even see the offer.
  • the vendor advertisements are preferably posted to an area of the web site of the secure provider computer 110 that is only accessible to customer computers 100. Accordingly, vendor computers 140 will not be able to view the offers coming from other vendor computers 140. Alternatively, authorized vendor computers 140 (i.e. , vendors signing up with the secured provider to reach the secure provider's customers) may be allowed to see one another's offers but unauthorized vendors cannot see the offers of authorized vendors.
  • an interactive, intelligent virtual vendor representative object (such as a virtual salesperson object) is provided as a guide to a given web site.
  • the vendor object when accessing a web site of a vendor computer 140, the vendor object can be provided with a persona such that instead of passively navigating through the site, an animated character or vendor persona is encountered by the customer.
  • the vendor persona then takes on the role of a virtual salesperson, asking questions of the customer and making recommendations based on the responses by the customer.
  • the vendor object By interaction with the customer object identifier, the vendor object becomes cumulatively knowledgeable, can store customer preferences and history and proactively pursue the vendor/ vendee relationship.
  • Notoriety of the vendor character or persona apart from the web site is desirable and is preferably enhanced through advertising (such as through print media, TV, radio, etc.) such that the persona becomes "branded" or closely associated with the vendor company and serves as a trademark or service mark of the company.
  • the perception by the customer that the vendor character represents the company as a trademark is desirable for a number of reasons, such as to impart a feeling of familiarity with the character when encountered, create a desire on the customer's part to initially visit the web site to interact with the character, and enhance the customer's comfort level in interacting with the character. All of these benefits will then ultimately help the vendor increase traffic to the web site and raise the comfort level of the customer when he or she visits the web site.
  • intelligent, virtual customer objects are desirably provided so that the customer need not search the Internet on his own, interact with vendor objects or personae encountered, or deal with the everyday hassles of the Internet (expired URLs, slow connections, information overload, etc.).
  • the customer can be a customer persona which can be visually displayed on the computer screen and be customized or designed to physically resemble the customer's human characteristics or resemble a caricature of the customer, a familiar character, an animal, or any other visible object.
  • the customer object identifier may be nonvisual or simply represented by a file, icon, programming object, etc.
  • a customer can set up a customer object with all of the characteristics, personal information, history and demographic information about the customer such that the object identifier, and not the customer, can expend the "effort" of searching the Internet, shopping and gather information useful or desired by the customer.
  • a customer object or persona can be provided with individualized characteristics about the customer, such as that the customer is male, 32 years old, a cigar smoker, a wine enthusiast, a tennis player, drives a sedan, owns a house, likes gardening, etc.
  • the more information supplied to the persona the more the persona takes on the full characteristics of the customer and enables a "smarter" persona when the persona is searching for information.
  • the persona may collect possible sweaters to buy including unwanted red sweaters.
  • the customer upon discovering that red sweaters were located by his persona, can add a new characteristic to the persona that he does not like red sweaters for future search purposes. The more information supplied to the persona, the more intelligent it becomes.
  • the software provided to both the vendors and customer computers can also allow generation of interactive characters.
  • the browser of the customer computer could be provided with the necessary "plug-ins" (such as a Java plug-in or ActiveX control) to allow the rendering of an interactive character on the video screen of the customer computer.
  • the customer object or persona can be programmed to learn desired and undesired characteristics of the customer based on continued interaction between the persona and the customer and based on existing preferences.
  • Al artificial intelligence
  • the persona can "learn” through Al techniques that the customer likely does not like the color red for clothing items and thus, when sufficiently confident in its assessment, will no longer shop for red clothing.
  • the more and more the customer interacts with his persona the "smarter" the persona becomes and interaction between customer and persona is highly encouraged by the present invention.
  • the vendor objects can interact with the customer objects in a virtual shopping encounter, as if the customer wandered into the store of the vendor and was approached by a salesperson.
  • the customer object would relate his preferences (or a subset thereof) to the vendor object who may have the items desired by the customer object. If the vendor object, however, does not have such an item in stock, it may use the information of the customer object to intelligently recommend a different item. For instance, if the customer object is looking to buy a
  • German-made cars If the customer object did not specify that it did not like Audi's, it mat accept the recommendation from the vendor object.
  • the more often the vendor object interacts with the customer object the more each knows or learns of the other's preferences, needs and offerings. Such an ever-growing object interrelationship can greatly enhance the vendor-customer relationship.
  • the present invention is applicable to the retail industry or elsewhere where vendors may wish to display their goods or services at a web site on the Internet and allow customers to browse and make purchases from a vendor web site anonymously.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
EP99949595A 1998-09-04 1999-09-03 Elektronischer handel mit anonymem einkauf und anonymem versand durch den verkäufer Withdrawn EP1027661A4 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US9916298P 1998-09-04 1998-09-04
US99162P 1998-09-04
PCT/US1999/020348 WO2000014648A1 (en) 1998-09-04 1999-09-03 Electronic commerce with anonymous shopping and anonymous vendor shipping

Publications (2)

Publication Number Publication Date
EP1027661A1 true EP1027661A1 (de) 2000-08-16
EP1027661A4 EP1027661A4 (de) 2003-05-14

Family

ID=22273237

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99949595A Withdrawn EP1027661A4 (de) 1998-09-04 1999-09-03 Elektronischer handel mit anonymem einkauf und anonymem versand durch den verkäufer

Country Status (18)

Country Link
EP (1) EP1027661A4 (de)
JP (1) JP2002524797A (de)
KR (1) KR20010031840A (de)
CN (1) CN1277693A (de)
AU (1) AU752770B2 (de)
BR (1) BR9906990A (de)
CA (1) CA2308759A1 (de)
CZ (1) CZ20001481A3 (de)
EA (1) EA200000390A1 (de)
HU (1) HUP0004158A2 (de)
ID (1) ID24712A (de)
IL (1) IL135579A0 (de)
NO (1) NO20002128L (de)
PL (1) PL343631A1 (de)
SK (1) SK5962000A3 (de)
TR (1) TR200001205T1 (de)
WO (1) WO2000014648A1 (de)
ZA (1) ZA200002013B (de)

Families Citing this family (105)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7177429B2 (en) 2000-12-07 2007-02-13 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects
US6529885B1 (en) 1999-03-18 2003-03-04 Oracle Corporation Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts
US6898577B1 (en) 1999-03-18 2005-05-24 Oracle International Corporation Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts
US6941282B1 (en) * 1999-03-18 2005-09-06 Oracle International Corporation Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts
US7664264B2 (en) 1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
WO2000063855A1 (en) * 1999-04-19 2000-10-26 Barton Peter R Improved system and method for anonymous transactions
WO2001035355A1 (en) * 1999-11-09 2001-05-17 First Data Resources Systems and methods for anonymous payment transactions
AU729758B3 (en) * 1999-11-12 2001-02-08 Nagel, Carlyle Electronic commerce system and method
WO2001048628A2 (en) * 1999-12-23 2001-07-05 Barton Peter R System and method for anonymous transactions and disguised mailings
US7853481B1 (en) 2000-01-24 2010-12-14 Oracle International Corporation eDropship: methods and systems for anonymous eCommerce shipment
EP1264287A1 (de) * 2000-03-17 2002-12-11 First Financial Internet, Inc. System für bezahlung im voraus und verfahren für anonyme einkaufstransaktionen
JP2001338253A (ja) * 2000-03-23 2001-12-07 Nec Corp 電子商取引方法および装置
JP2001283111A (ja) * 2000-03-30 2001-10-12 Oki Electric Ind Co Ltd コーディネーションサービスシステム
JP2001283026A (ja) * 2000-03-31 2001-10-12 Fujitsu Fip Corp 連合ショッピングモールシステム,小売ショッピングモールシステム,卸売ショッピングモールシステム,モールサーバ,連合ショッピングモール運営方法および連合ショッピングモール運営プログラムを記載した記録媒体
AU5724401A (en) 2000-04-26 2001-11-07 Oracle Corp Many-to-many correspondance: methods and systems for replacing interbank funds transfers
EP1150227A1 (de) * 2000-04-28 2001-10-31 Lucent Technologies Inc. Anonymer und sicherer elektronischer Handel
US7246315B1 (en) 2000-05-10 2007-07-17 Realtime Drama, Inc. Interactive personal narrative agent system and method
JP2001325480A (ja) * 2000-05-17 2001-11-22 Sharp Corp 商取引仲介システム、及び商取引仲介システムプログラムを記録した記録媒体
WO2001090994A2 (en) * 2000-05-19 2001-11-29 Ishopsecure.Com, Inc. System and method for simplifying and/or securing transactions over a network
US7225169B1 (en) 2000-05-26 2007-05-29 International Business Machines Corporation Method and system for commerce with full anonymity
JP2004503875A (ja) 2000-06-13 2004-02-05 ルーセント テクノロジーズ インコーポレーテッド 分散型データネットワークにおいて使用するための方法および装置および製造物
JP2002024718A (ja) * 2000-07-07 2002-01-25 Nec Commun Syst Ltd オンラインショッピング方法
JP2002032596A (ja) * 2000-07-19 2002-01-31 Fujitsu Ltd 電子商取引方法および電子商取引に用いられるプロフィール変換装置
JP2002049866A (ja) * 2000-08-02 2002-02-15 Teruya:Kk 双方向通信メディアにおける顧客管理及びサービス方法
JP2002074040A (ja) * 2000-09-05 2002-03-12 Nec Corp ネットワークを利用した商品販売方式及びその方法
JP4538927B2 (ja) * 2000-09-05 2010-09-08 ソニー株式会社 受注管理システムおよびその方法、並びに記録媒体
WO2002027588A1 (fr) * 2000-09-28 2002-04-04 James Jay Skinner Système de commerce électronique
JP2002117264A (ja) * 2000-10-10 2002-04-19 Hitachi Capital Corp 電子商取引の仲介サーバーおよび仲介方法
JP2002117358A (ja) * 2000-10-11 2002-04-19 Shinichiro Ando 通信販売方法
JP5142237B2 (ja) * 2000-10-17 2013-02-13 豊 塚本 個人情報保護システム、処理装置および記録媒体
US8171556B2 (en) 2000-10-17 2012-05-01 Mieko Ishii Personal information protection method, personal information protection system, processing device, portable transmitter/receiver, and program
US20020107804A1 (en) * 2000-10-20 2002-08-08 Kravitz David William System and method for managing trust between clients and servers
JP2002175432A (ja) * 2000-12-06 2002-06-21 Gala Inc 配信仲介サービス装置の介在によりコンセプトメールを多数のターゲットに配信する方法およびその配信仲介サービス装置
JP2002183433A (ja) * 2000-12-08 2002-06-28 Kyocera Corp 電子商取引システムおよび電子商取引方法
JP2002197390A (ja) * 2000-12-25 2002-07-12 Nec Corp 取引仲介システム及び取引仲介方法
JP3741264B2 (ja) * 2001-01-17 2006-02-01 株式会社ステラクラフト 電子商取引システム
JP2002216048A (ja) * 2001-01-23 2002-08-02 Nri & Ncc Co Ltd アドレス情報保護方法及びそのシステム
JP2002230437A (ja) * 2001-02-02 2002-08-16 Vision Arts Kk クレジット決済システム、クレジット決済のプログラム及びこれを記録した媒体、並びに決済情報画像ファイルを記録した媒体、決済システム、決済のプログラム及びこれを記録した媒体
GB2372344A (en) 2001-02-17 2002-08-21 Hewlett Packard Co System for the anonymous purchase of products or services online
JP2002245369A (ja) * 2001-02-20 2002-08-30 Toyo Commun Equip Co Ltd 商品の配送を手配する方法及び装置
JP2002245386A (ja) * 2001-02-21 2002-08-30 Nec Corp 決済・配送システム及びそれに用いる決済・配送方法
US7237117B2 (en) 2001-03-16 2007-06-26 Kenneth P. Weiss Universal secure registry
CA2442136A1 (en) 2001-03-30 2002-10-10 United Parcel Service Of America, Inc. Electronic shipping system for package pickup and anywhere to anywhere delivery
DE10154546B4 (de) * 2001-11-07 2005-06-23 E-Plus Mobilfunk Gmbh & Co.Kg Verfahren zum Zugänglichmachen von Diensten in Telekommunikationsnetzen, zum Beispiel im Internet
US7240035B1 (en) * 2001-05-31 2007-07-03 Hall Aluminum Llc Method and apparatus for masking private mailing address information by manipulating delivery transactions
IES20010524A2 (en) * 2001-06-01 2002-12-11 Mainline Corporate Holdings A secure on-line payment system
GB2382421A (en) * 2001-11-26 2003-05-28 Bybox Holdings Ltd Collection and delivery system
US20030120660A1 (en) * 2001-12-07 2003-06-26 Maritzen L. Michael Consumer-centric context-aware switching model
NL1019671C2 (nl) * 2001-12-27 2003-07-01 Eliverit B V Werkwijze en systeem voor het bestellen en afleveren van goederen.
US7287275B2 (en) 2002-04-17 2007-10-23 Moskowitz Scott A Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
US9286457B2 (en) 2004-06-14 2016-03-15 Rodney Beatson Method and system for providing password-free, hardware-rooted, ASIC-based authentication of a human to a mobile device using biometrics with a protected, local template to release trusted credentials to relying parties
JP2006012107A (ja) * 2004-06-28 2006-01-12 Toshiharu Seo インターネットショッピングの商品選択→代金決済→サービスの提供の一連の取引のシームレス化モデル
US8762263B2 (en) 2005-09-06 2014-06-24 Visa U.S.A. Inc. System and method for secured account numbers in proximity devices
US11227676B2 (en) 2006-02-21 2022-01-18 Universal Secure Registry, Llc Universal secure registry
US8234220B2 (en) 2007-02-21 2012-07-31 Weiss Kenneth P Universal secure registry
WO2008066212A1 (en) * 2006-11-29 2008-06-05 Korea Institute Of Science And Technology Electronic commerce system and recording medium for storing program of mobile terminals using personal area network
EP2118838A4 (de) 2007-02-27 2012-01-11 Emigrant Bank Verfahren und system zur einfachen transaktion zwischen einem käufer und verkäufer
DE102007025867A1 (de) * 2007-06-01 2008-07-03 Siemens Ag Verfahren und Vorrichtung zum anonymisierten Transport eines Gegenstands
EP2061002A1 (de) * 2007-11-15 2009-05-20 Swisscom AG Computerimplementiertes Verfahren zur Generierung und Übermittlung von Gegenstands- und/oder Dienstleistungslieferungsaufträgen, sowie das entsprechende System und die entsprechende Vorrichtung
CA2706593A1 (en) * 2007-11-21 2009-05-28 Kiz Toys, Inc. Systems and methods for providing a virtual world commodity device
CN102365650A (zh) * 2009-02-03 2012-02-29 史蒂芬·亚历山大·莫里斯 一种安全的电子金融资金转账系统
US10846683B2 (en) 2009-05-15 2020-11-24 Visa International Service Association Integration of verification tokens with mobile communication devices
US9105027B2 (en) 2009-05-15 2015-08-11 Visa International Service Association Verification of portable consumer device for secure services
US10140598B2 (en) 2009-05-20 2018-11-27 Visa International Service Association Device including encrypted data for expiration date and verification value creation
US10255591B2 (en) 2009-12-18 2019-04-09 Visa International Service Association Payment channel returning limited use proxy dynamic value
WO2012037479A1 (en) 2010-09-17 2012-03-22 Universal Secure Registry, Llc Apparatus, system and method employing a wireless user-device
EP2718890A4 (de) * 2011-06-06 2014-11-05 Nfluence Media Inc Verbrauchergesteuertes werbesystem
US10282724B2 (en) 2012-03-06 2019-05-07 Visa International Service Association Security system incorporating mobile device
AU2013315510B2 (en) 2012-09-11 2019-08-22 Visa International Service Association Cloud-based Virtual Wallet NFC Apparatuses, methods and systems
CN104009955B (zh) * 2013-02-21 2015-10-28 腾讯科技(深圳)有限公司 一种联系人信息的处理方法、装置和系统
US9978062B2 (en) 2013-05-15 2018-05-22 Visa International Service Association Mobile tokenization hub
US10366387B2 (en) 2013-10-29 2019-07-30 Visa International Service Association Digital wallet system and method
US9922322B2 (en) 2013-12-19 2018-03-20 Visa International Service Association Cloud-based transactions with magnetic secure transmission
CN115082065A (zh) 2013-12-19 2022-09-20 维萨国际服务协会 基于云的交易方法和系统
US10433128B2 (en) 2014-01-07 2019-10-01 Visa International Service Association Methods and systems for provisioning multiple devices
WO2015149032A1 (en) 2014-03-28 2015-10-01 Brian Roundtree Beacon based privacy centric network communication, sharing, relevancy tools and other tools
CN104980467B (zh) * 2014-04-09 2019-05-24 腾讯科技(深圳)有限公司 联系信息管理方法及装置、系统
CN105096129A (zh) * 2014-05-15 2015-11-25 华为技术有限公司 一种数据处理系统及方法
EP3146747B1 (de) 2014-05-21 2020-07-01 Visa International Service Association Offline-authentifizierung
US10484345B2 (en) 2014-07-31 2019-11-19 Visa International Service Association System and method for identity verification across mobile applications
US9775029B2 (en) 2014-08-22 2017-09-26 Visa International Service Association Embedding cloud-based functionalities in a communication device
US10115141B1 (en) * 2014-09-24 2018-10-30 Amazon Technologies, Inc. Secure proxy service
RU2019124722A (ru) 2014-09-26 2019-10-01 Виза Интернэшнл Сервис Ассосиэйшн Система и способы предоставления зашифрованных данных удаленного сервера
GB201419016D0 (en) 2014-10-24 2014-12-10 Visa Europe Ltd Transaction Messaging
SG11201706576TA (en) 2015-04-10 2017-09-28 Visa Int Service Ass Browser integration with cryptogram
CN113542293B (zh) 2015-12-04 2023-11-07 维萨国际服务协会 用于令牌验证的方法及计算机
US11386421B2 (en) 2016-04-19 2022-07-12 Visa International Service Association Systems and methods for performing push transactions
US11250424B2 (en) 2016-05-19 2022-02-15 Visa International Service Association Systems and methods for creating subtokens using primary tokens
EP3466017B1 (de) 2016-06-03 2021-05-19 Visa International Service Association Subtoken-managementsystem für angeschlossene vorrichtungen
US11068899B2 (en) 2016-06-17 2021-07-20 Visa International Service Association Token aggregation for multi-party transactions
CN115187242A (zh) 2016-06-24 2022-10-14 维萨国际服务协会 唯一令牌认证验证值
BR112018076196A2 (pt) 2016-07-11 2019-03-26 Visa International Service Association método, e, dispositivos de comunicação portátil e de acesso.
CN109478287B (zh) 2016-07-19 2023-08-15 维萨国际服务协会 分发令牌和管理令牌关系的方法
KR101688419B1 (ko) * 2016-08-11 2016-12-21 (주)케이클라우드 가상개인정보를 이용한 보안 운송장 발급관리 시스템 및 방법
WO2018098492A1 (en) 2016-11-28 2018-05-31 Visa International Service Association Access identifier provisioning to application
US11494765B2 (en) 2017-05-11 2022-11-08 Visa International Service Association Secure remote transaction system using mobile devices
EP3762844A4 (de) 2018-03-07 2021-04-21 Visa International Service Association Sichere entfernte token-freigabe mit online-authentifizierung
US10742646B2 (en) 2018-05-10 2020-08-11 Visa International Service Association Provisioning transferable access tokens
US11256789B2 (en) 2018-06-18 2022-02-22 Visa International Service Association Recurring token transactions
CN112805737A (zh) 2018-10-08 2021-05-14 维萨国际服务协会 用于令牌邻近交易的技术
US11004076B2 (en) 2019-02-06 2021-05-11 Visa International Service Association Camera device enabled identification and disambiguation system and method
US10909533B2 (en) 2019-03-13 2021-02-02 Stream Source Technologies System and methods of securely matching a buyer to a seller
US11636537B2 (en) 2019-03-26 2023-04-25 StreamSource Technologies System and methods of providing point-of-need financing
US11849042B2 (en) 2019-05-17 2023-12-19 Visa International Service Association Virtual access credential interaction system and method
US20210383444A1 (en) * 2020-06-04 2021-12-09 Privatedeal Sa Automated negotiation method and computer program product for implementing such method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2167543A1 (en) * 1996-01-18 1997-07-19 James Durward Process for conducting secure electronic transactions over electronic media
EP0791901A2 (de) * 1996-02-21 1997-08-27 Card Call Service Co., Ltd. Netzwerktransaktionssystem
US5790677A (en) * 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
US5799298A (en) * 1995-08-07 1998-08-25 International Business Machines Corporation Method of indirect specification of user preferences
US5802296A (en) * 1996-08-02 1998-09-01 Fujitsu Software Corporation Supervisory powers that provide additional control over images on computers system displays to users interactings via computer systems

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5884272A (en) * 1996-09-06 1999-03-16 Walker Asset Management Limited Partnership Method and system for establishing and maintaining user-controlled anonymous communications
US5913203A (en) * 1996-10-03 1999-06-15 Jaesent Inc. System and method for pseudo cash transactions
US5970475A (en) * 1997-10-10 1999-10-19 Intelisys Electronic Commerce, Llc Electronic procurement system and method for trading partners

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5790677A (en) * 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
US5799298A (en) * 1995-08-07 1998-08-25 International Business Machines Corporation Method of indirect specification of user preferences
CA2167543A1 (en) * 1996-01-18 1997-07-19 James Durward Process for conducting secure electronic transactions over electronic media
EP0791901A2 (de) * 1996-02-21 1997-08-27 Card Call Service Co., Ltd. Netzwerktransaktionssystem
US5802296A (en) * 1996-08-02 1998-09-01 Fujitsu Software Corporation Supervisory powers that provide additional control over images on computers system displays to users interactings via computer systems

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GREHAN R: "CLOAK AND DATA" , BYTE, MCGRAW-HILL INC. ST PETERBOROUGH, US, VOL. 15, NR. 6, PAGE(S) 311-312,314,316,318,320,322,324 XP001109532 ISSN: 0360-5280 * page 318 * *
See also references of WO0014648A1 *

Also Published As

Publication number Publication date
AU6243599A (en) 2000-03-27
HUP0004158A2 (hu) 2001-05-28
JP2002524797A (ja) 2002-08-06
PL343631A1 (en) 2001-08-27
KR20010031840A (ko) 2001-04-16
ID24712A (id) 2000-08-03
CZ20001481A3 (cs) 2001-10-17
NO20002128D0 (no) 2000-04-26
ZA200002013B (en) 2000-11-02
AU752770B2 (en) 2002-09-26
CA2308759A1 (en) 2000-03-16
EA200000390A1 (ru) 2001-10-22
IL135579A0 (en) 2001-05-20
BR9906990A (pt) 2000-09-26
CN1277693A (zh) 2000-12-20
TR200001205T1 (tr) 2000-11-21
SK5962000A3 (en) 2001-12-03
WO2000014648A1 (en) 2000-03-16
EP1027661A4 (de) 2003-05-14
NO20002128L (no) 2000-05-03

Similar Documents

Publication Publication Date Title
AU752770B2 (en) Electronic commerce with anonymous shopping and anonymous vendor shipping
Liu et al. Web sites of the Fortune 500 companies: Facing customers through home pages
US8266007B2 (en) Methods and systems for delivering customized advertisements
US7657458B2 (en) Vendor-driven, social-network enabled review collection system and method
US8285589B2 (en) Referring-site based recommendations
US8332277B2 (en) Method, system and computer readable medium for facilitating a transaction between a customer, a merchant and an associate
US20140372176A1 (en) Method and apparatus for anonymous data profiling
US20020178166A1 (en) Knowledge by go business model
US8341025B2 (en) E-mail based gift delivery
TW200849131A (en) A system and device for social shopping on-line
MX2012004106A (es) Sistemas y metodos para proporcionar y explotar comercialmente validacion de persona en linea.
US20110184804A1 (en) Method and apparatus for queuing user action prior to authentication
CA2753977A1 (en) Systems and methods for using verified information cards in a communications network
US20020128933A1 (en) Interactive method and apparatus for product customization and purchase
KR20020059212A (ko) 광고 콘텐츠 제공과 보상을 제공하는 방법
KR20020007163A (ko) 컴퓨터 네트워크를 통한 쇼핑을 보조하기 위한 가상 희망리스트 생성 시스템 및 방법
KR100699138B1 (ko) 지능형 의상 대여 및 판매 서비스 시스템 및 그 방법
Rahman et al. Internet commerce and software agents: cases, technologies, and opportunities
MXPA00004384A (en) Electronic commerce with anonymous shopping and anonymous vendor shipping
JP5221865B2 (ja) ネットワークシステム及びネットワーク制御方法
WO2001045011A1 (en) A method and system for conducting electronic commerce by using an intelligent direct marketing engine
Dodrajka Online Marketing: Measuring Indian Urban Customer Perception towards Online Shopping Sites
Singhsathitsukh Herrmann suits online
KR20020014924A (ko) 인터넷을 이용한 광고표시 방법 및 시스템

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20000426

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: MK PAYMENT 20000426;SI PAYMENT 20000426

A4 Supplementary search report drawn up and despatched

Effective date: 20030401

RIC1 Information provided on ipc code assigned before grant

Ipc: 7G 06F 17/60 A

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20030402