EP1027661A1 - Elektronischer handel mit anonymem einkauf und anonymem versand durch den verkäufer - Google Patents
Elektronischer handel mit anonymem einkauf und anonymem versand durch den verkäuferInfo
- Publication number
- EP1027661A1 EP1027661A1 EP99949595A EP99949595A EP1027661A1 EP 1027661 A1 EP1027661 A1 EP 1027661A1 EP 99949595 A EP99949595 A EP 99949595A EP 99949595 A EP99949595 A EP 99949595A EP 1027661 A1 EP1027661 A1 EP 1027661A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- customer
- computer
- vendor
- web site
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
Definitions
- the present invention relates to a method and system of conducting electronic commerce which allows a customer to anonymously visit vendor web sites, anonymously purchase goods and anonymously receive goods without disclosing the customer's identification and home address information to the web site vendor.
- Internet billing systems are known that maintains the confidentiality of the customer information by an Internet access provider vis-a-vis a vendor web site.
- the Internet access provider creates access to the Internet through the secure provider's web site for the user.
- the provider then bills the customer's account with the provider or another specified account for transactions with outside vendors, without the need for the customer to send his bank account number or credit card information to the vendor.
- the problem with these billing systems is that they do not provide complete privacy. While customers using such a billing system do not have to reveal their bank account numbers or credit card numbers to outside vendors, they do need to reveal their home addresses to the vendor so that the vendor can mail or ship the customer their order.
- a computer- implemented method of delivering goods whereby good are purchased from a vendor having a vendor web site accessible over a computer network by a plurality of customers at physical locations.
- the customers have customer computers connected to the computer network for accessing the vendor web site and electronically purchasing goods therefrom.
- the method includes: (a) associating the identity and the physical location of each customer with a respective customer object via linking information; (b) storing the linking information at a secure computer at a location remote from the vendor web site; (c) anonymously connecting to the vendor web site by the customer computer using the identity of the customer object without revealing the identity and physical location of the customer; (d) ordering goods at the vendor web site by the customer using the customer computer, and upon initiation of an order by the customer, (i) automatically generating a transaction identifier by the vendor computer, (ii) encoding a package of the goods ordered by the customer with the transaction identifier by the vendor and (iii) sending the transaction identifier together with the customer object to the secure computer by the vendor computer; (e) associating the transaction identifier sent by the vendor computer with the identity and physical address of the customer at the secure computer using the linking information and automatically forwarding the transaction identifier and associated identity and physical address of the customer to a computer of a common carrier; (f) delivering the encoded
- the computer-implemented method of delivering goods comprises (a) associating the identity and the physical location of each customer with a respective customer object via linking information; (b) storing the linking information at a secure computer at a location remote from the vendor web site; (c) anonymously connecting to the vendor web site by the customer computer using the identity of the customer object without revealing the identity and physical location of the customer; (d) ordering goods at the vendor web site by the customer using the customer computer, and upon initiation of an order by the customer, encoding a package of the goods ordered by the customer with the customer object; (e) delivering the encoded package to the common carrier by the vendor; (f) providing the linking information to the common carrier; and (g) reading the customer object by the common carrier, retrieving the identity and the physical location of the customer associated with the customer object and physically delivering the package to the physical location of the customer.
- the above methods further comprise sending information representing the cost of the goods ordered by the customer and the customer object from the vendor computer to a financial institution computer via the computer network for credit approval, ascertaining the credit status of the customer object, and automatically sending a message approving or declining credit to the customer to the vendor computer from the financial institution computer.
- Ascertaining the credit status of the customer object can also include ascertaining the identity of the customer based on the linking information obtained by the financial institution from the secure provider.
- the step of anonymously connecting to the vendor web site may include revealing one or more customer characteristics to the vendor web site by the customer object so as to allow the vendor web site to use such customer characteristics to customize information and goods presented to the customer upon return to the vendor web site using the customer object.
- the step of anonymously connecting to the vendor web site is preferably performed automatically without customer interaction on at least some occasions by the customer object programmed to shop for the customer in accordance with directions specified by the customer.
- the customer object may be personified to the customer via the customer computer through the display of audio and/or visual display.
- the secure computer may comprise a secure provider computer allowing the customers to anonymously connect to the vendor web site therethrough, or alternatively, the secure computer can comprise the financial institution computer.
- a computer character generating system is provided in the context of a computer system for offering goods, services and/or information from a vendor computer providing access to a vendor web site over a computer network including a plurality of customer computers connected to the network for accessing the vendor web site.
- the computer character generating system includes (a) a character generation program executable on the vendor computer and containing instructions for causing the vendor computer to generate an interactive vendor character which represents the vendor and interactively guides a customer through the vendor computer site, (b) the character generation program being operative to send character display commands to the customer computer when the customer computer has accessed the vendor web site causing the customer computer to display on a display device associated with the customer computer the interactive vendor character, (c) the interactive vendor character providing a trademark function for the vendor such that the interactive vendor character is identified with the vendor by customers who desire to acquire goods, services and/or information over the computer network from the vendor web site, the interactive vendor character further having a persona such that the vendor character will respond to inputs from a customer computer representing communications by a customer in a manner representative of a human having particular personality traits acting in a representative capacity.
- the vendor computer records the identities of customer computers which interact with the vendor web site and records historical data representing transactions of each customer computer with the vendor computer, and the vendor character responds to inputs from each customer computer based partially on the inputs and partially on the historical data in conjunction with the personality traits.
- the vendor character preferably has an artificial intelligence function which allows the vendor character to predict responses which would tend to elicit an acquisition by each customer computer based upon the historical data associated with such customer computer, and the interactive vendor character bases responses at least in part upon such predictions.
- the vendor character can also check for available goods, services and/or information requested by each customer computer and also checks for goods or services which are different from those requested by the customer computer but which are likely to be of interest to such customer computer based upon the historical data.
- the vendor character can be displayed with facial expressions, movement characteristics and voice accents associated with the personality traits.
- an interactive computer-implemented method of offering goods, services and/ or information is provided with a vendor computer providing access to a vendor web site over a computer network to a plurality of customer computers connected to the network for accessing the vendor web site.
- the method includes (a) providing a plurality of customer objects representing individuals who desire to acquire goods, services and/or information from the vendor sites, each customer object being provided with a set of user characteristics representing personal preferences and information about the individual; (b) providing a vendor persona object representing the vendor, the vendor persona object being provided with a set of vendor characteristics representing information about the goods, services and/or information offered by the vendor; and (c) visiting the vendor computer site via the network with a customer object such that the customer object and the vendor persona object dynamically interact with one another to exchange one or more subsets of the set of user characteristics and vendor characteristics for determining whether the goods, services and/or information offered by the vendor computer site are of interest to the user persona object.
- the method desirably includes targeting a sales offer by a vendor computer to at least one customer computer via the secure provider computer based upon the purchasing interest and demographic information collected for at least one customer computer by the secure provider computer and provided to the vendor, wherein the customer object is configured by the customer to determine whether the sales offer will be presented to the customer computer.
- a method for providing advertising on the web site of a secure provider computer comprising (a) providing a secure provider computer to allow customer computers connected to the secure provider computer to have access to authorized vendor offers on the secure provider web site; and (b) posting one or more vendor offers on the secure provider web site, wherein the offers are only viewable by the customer computers.
- a computer- implemented method for knowingly monitoring network navigation and purchasing history of a plurality of customers by a secure provider comprising: (a) requiring each customer to first establish an account with the secure provider by requiring each customer to agree to have the customer's demographic information and purchasing history tracked by the secure provider; (b) providing on-line access to a computer network to computers of customers who have established an account via a secure provider computer of the secure provider; and (c) tracking and storing the customers' demographic information and purchasing history by the secure provider computer as the customers update and change their demographic information and make purchases via their customer computers.
- At least one customer computer is presented with an item to be purchased selected by the secure provider computer based on the customer's demographic information and purchasing history tracked by the secure provider.
- a sales offer can be targeted by a vendor computer to at least one customer computer via the secure provider computer based on the customer's demographic information and purchasing history collected by the secure provide computer and provided to the vendor in a modified form which does not include the customers' identity information, wherein the customer object is configured by the customer to determine whether the sales offer will be presented to the customer computer.
- a method of providing outside vendor offers on a web site of a secure provider computer including (a) establishing a secure provider web site allowing member customer computers to have access to an area on the web site that posts outside vendor offers; and
- FIG. 1 is a schematic diagram of a preferred embodiment of a computer system according to the present invention.
- FIG. 2 is a flow chart of the steps followed in a preferred method according to the present invention.
- FIG. 3 is a depiction of a sample secure provider web site.
- FIG. 4 is a depiction of a sample vendor web site. BEST MODES FOR CARRYING OUT THE INVENTION
- the computer system of the present invention comprises a network of interconnected computers connected via a global communications network such as the Internet 50.
- the network of computers comprise plurality of customer computers 100, a secure provider computer 110, a plurality of vendor computers 140, a plurality of bank computers 150 and a plurality of third party carrier or shipping computers
- Each computer comprises the typical components needed to connect to the Internet and World Wide Web, such as RAM and ROM memory, mass storage, microprocessor(s), display device, user input devices, etc.
- the secure provider computer 110 and vendor computers 140 also will typically include one or more server computers to allow provision of web sites such as a secure provider web site and vendor web sites, which offer goods, services and other information desired.
- the present invention desirably allows a customer to shop on-line at vendor web sites in an anonymous fashion.
- a customer uses his customer computer 100 (such as a home computer with dial-up connectivity to the Internet) to connect the secure provider computer 110 and login with a certificate based ID and password.
- customer computer 100 such as a home computer with dial-up connectivity to the Internet
- the customer Prior to conducting on-line shopping, the customer creates a customer object or on-line personna that represents the preferences of the customer. This is discussed in further detail below.
- the customer object which can be represented by a name (such as "GOLFO") and the customer's personal information, such as the customer's name and address, are matched up with linking information.
- This linking information is stored, in one embodiment, in a linking table stored in the database 130 of the secure provider computer 110.
- This linking table matches up each customer object with the customer's personal information which the customer wants shielded from the vendor web sites.
- the linking information can be stored in the database 170 of bank computer 150 so that only the bank, and not the secure provider, actually knows the true identity and address of the customer. In either case, the linking information is stored in a secure computer so as to shield the linking information from third parties, including the vendor.
- the secure provider computer 110 or the bank computer 150 can determine which customer a given customer object represents.
- a secure connection pipeline 120 is provided between the customer computer 100 and the secure provider computer 110 in order to prevent transmissions between the customer computer 100 and the secure provider computer 110 from being monitored.
- the customer computer 100 is preferably provided with software by the secure provider computer 110. This software enables the customer computer 100 to connect directly to the secure provider computer 110, along a known, fixed node-to-node route, without having to connect to the vendor web site through a different node-to-node network each time as is common over the Internet.
- the customer computers 100 are preferably connected to the secure provider computer 110 through a virtual personal network ("VPN") which provides a private passageway or tunnel through the Internet.
- VPN virtual personal network
- computers communicate with each other through firewall computers, so that the only addresses known are those of the firewall computers.
- This secure pipeline 120 allows the customer to connect directly, node-to-node, with a VPN, when there is communications between the secure provider computer and the vendor computer, so the only address that is revealed to the vendor is the address of the firewall computer.
- This allows customer computers 100 to communicate from within a network to vendor computers 140 without having their addresses revealed or access to any peripherals or devices on customer computer 100.
- the customer computer 100 can anonymously connect to the web sites of various vendor computers 140 using the Internet via the secure provider's proxy servers.
- the customer computer 100 can browse for the web sites of vendor computers 140 of interest using various different search methods known in the art.
- the vendor computer 140 is provided only with the customer object, which identifies the customer as a fictitious entity without revealing personal information about the customer such as real name or address.
- the customer computer 100 notifies the vendor computer 140 that the customer computer 100 would like to make a purchase, the vendor computer 140 contacts a bank computer 150 through the Internet to verify that the customer object on the customer computer 100 has sufficient funds to make the purchase.
- the vendor computer 140 forwards the customer object to the bank computer.
- the bank computer 150 obtains or is already provided with the linking information to link the customer object with personal information about the customer, including customer account information. Once the bank computer 150 determines whether the customer object has sufficient funds to make the purchase, the bank computer 150 notifies the vendor computer 140 whether the customer has sufficient funds to make the purchase. In an alternate embodiment, the vendor computer 140 need not contact a bank but can simply bill the secure provider computer 110 for the transaction, who will in turn bill the customer.
- the vendor arranges for the package to be picked up by a third party carrier.
- the package must be labeled with information that the shipper can use to ship the package to the correct address, but cannot contain the actual address of the customer, since it is to be shielded from the vendor.
- the vendor computer 140 provides the third party carrier computer 180 with a transaction identifier and the customer object through the Internet to shipper computer 180. The vendor also places the transaction identifier only on the package. Once the shipper comes to the vendor to pickup the package, the shipper, who is provided with or can ascertain the linking information, knows the address to match up with the transaction identifier.
- the vendor can simply attach the customer object to the package, such as in the form of a bar code or a label.
- the third party shipper computer 180 can then contact the secure provider computer 110 directly through a secure pipeline or through the Internet, to retrieve the customer's address from the database 130 or is provided ahead of time with the linking information to match up the customer object with the customer's actual name and address.
- the shipper can retrieve or be provided with the linking information for the transaction identifier and/or the customer object from the bank.
- FIG. 2 illustrates a preferred method in accordance with the present invention.
- a customer computer 100 first connects to the web site of the secure provider computer 110, illustrated in FIG. 3, and joins the secure provider's service by filling out a standard form on the web site of the secure provider computer 110.
- the customer is prompted to create a "persona" or customer object to be stored on a database 130 on the secure provider computer 110.
- this object may have both a public and private segment to a digital certificate or key.
- a linking table is also stored on the database 130 of the secure provider computer 110 which provides the link between the customer's personal information, such as the customer's name and shipping address, and the customer's object such as a public key, but not the synonym, or name of the object.
- the linking table is stored only by banking computer and is not known by the secure provider.
- the information about the customer object is stored by the secure provider, in the case where the customer wishes to remain anonymous to the secure provider, the linking information to link customer object to the actual customer is given only to the bank by the customer.
- the linking table is ultimately used to provide the bank computer with the account number or private key authorization of the customer and to provide the third party carriers with the actual name and address of a customer once the package has been labeled by the vendor with the customer object or transaction identifier.
- the customer can create and modify his customer object via a personalized home page stored on the web site of the secure provider computer 110.
- the customer might create the persona or customer object named "GOLFO, " which object can then be used to navigate anonymously on the Internet.
- the customers can, for example, select an available name (such as GOLFO) and enter in detailed personal information about himself.
- GOLFO persona thus functions as the customer's anonymous alter-ego and will contain personal information such as age, sex, interests, hobbies, shirt size, shoe size, likes, dislikes, merchandise the customer has an interest in, etc.
- This persona, GOLFO, along with all other customers' personas is stored on the database 130 of the secure provider computer 110, which may or may not store the linking information as explained above.
- the customer joins the web site of the secure provider computer 110, the customer is provided with a customer object identifier number or certificate, also stored on database 130.
- the customer's object identifier number or certificate but not their bank account information, credit card numbers or home address, is preferably stored on a "cookie" or database at the customer computer 100, and is also stored on secure provider computer 110.
- the customer object identifier number or certificate can be used by the secure provider computer 110 to identify the user as a customer of the web site of the secure provider computer 110.
- the customer computer 100 can then access the Internet through the web site of the secure provider computer 110 and begin to securely browse, as shown in step 210.
- the customer computer 100 decides on a web site from which the customer would like to make a purchase, such as the vendor web site illustrated in FIG. 4, the customer computer 100 enters the web site of the vendor computer 140 as shown in step 220, as his "GOLFO" object or persona.
- the vendor computer 140 is provided only with GOLFO 's persona information that is authorized for release.
- the GOLFO persona or object provides detailed demographic and psychographic information about the customer so that the vendor computer 140, if desired, can develop a relationship with the customer through his persona.
- the golf merchant's vendor computer 140 could store a profile of the GOLFO persona.
- the vendor computer 140 sees that GOLFO has returned to the web site, the vendor computer 140 can present the customer, through his GOLFO persona, with shirts the vendor may think GOLFO might like based upon the previous purchases of GOLFO, as seen by display 400 on the vendor web site.
- the customer when a customer logs into a vendor web site, the customer will log in with a customer object that does not reveal the actual customer who is linked to the object.
- the information that is revealed to the vendor would simply be GOLFO at the address of the web site of the secure provider computer 110. In this manner, safe and private visitation of web sites can be achieved through the customer object.
- the customer object can also be programmed to navigate the Internet on its own, gather relevant information and then report back to the actual customer the information gathered based on the task(s) assigned to the customer object.
- the customer object is provided with a credit rating or credit history such that the vendor can determine whether to sell the goods to the customer.
- the customer object is provided with its own credit facility, which could include, for example, a virtual credit card.
- a virtual credit card is preferably given a name and icon representation so that the customer can easily purchase goods on-time by clicking on the credit card name or icon displayed at the participating vendor's web site.
- Use of such virtual credit card enables the customer object to readily purchase goods or services on credit.
- Credit card transactions, when authorized by the customer or customer object identifier, are preferably done through secure transaction protocols, such as digital signature and digital certificates. In such a case, the customer object itself can be provided with the digital signature and certificate information for use in purchasing items.
- the customer preferably clicks on an icon, such as icon 410 shown in FIG. 4, representing the virtual credit card on the secure provider web site, as shown in step 230.
- An icon such as icon 410 shown in FIG. 4, representing the virtual credit card on the secure provider web site, as shown in step 230.
- a list of items selected can also be displayed in a "shopping cart" such as shown at display 430 on the vendor web site.
- the vendor then forwards the customer's object, vendor number, transaction identifier, and the amount of the purchase to bank computer 150.
- the customer object comprises a public key and a private key authorization code.
- bank computer 150 is provided with a database 170 of the linking information of customer object or public key and customer information that allows the bank computer 150 or credit card company computer to determine who the actual customer is.
- the bank computer 150 or credit card company can retrieve the customer object or public key from the secure provider computer 110 and therefore need not be in physical possession of the linking information.
- the bank computer 150 determines whether or not to authorize the transaction. Preferably, it is desired that the bank not know the transactional information of the customer so that it cannot determine purchasing history and preferences of the actual customer.
- the bank can agree not to use or sell the customer's transactional information for solicitations or the like or, if possible, the bank need not know what is being purchased and from where, only that the customer has the money or credit to cover the transaction.
- the secure provider is not provided with the linking information, the customer is assured that the bank is not monitoring his or her transactional information and that the secure provider, who is monitoring the transactional information, cannot link the customer's actual identity to the customer object.
- vendor computers 140 can contact the secure provider computer 110 instead of bank computer 150 to authorize payment.
- the secure provider computer 110 can either bill the customer, or the customer can create a credit/debit account with the secure provider computer 110.
- the vendor computer 140 can send the secure provider computer 110 a bill for the purchases of the customer computer 100.
- the secure provider computer 110 in turn, can send a bill to the customer computer 100, or, if the customer computer 100 has a credit or debit account established with the secure provider computer 110, the secure provider computer 110 could adjust the customer's account accordingly.
- the secure provider computer 110 can engage in electronic bill presentation to customer computer 100, and transmit information about the request for payment to bank computer 150.
- the bank computer 150 Once the bank computer 150 has authorized the purchase, as shown in step 250, the bank computer 150 returns the vendor number, the transaction identifier and/or the customer object or public key, and the approval of the transaction back to the vendor computer 140 or to the secure provider computer 110, depending upon which computer transmitted information about the request for payment to bank computer 150.
- the vendor Upon approval of the transaction, the vendor readies the goods for anonymous shipment as explained below.
- a key aspect of the present invention is the secure and anonymous shipping protocol used.
- This secure and anonymous method is provided whereby the customer can have the vendor ship the items ordered to the customer without revealing the customer's name, address or other information about the customer to the vendor.
- the present invention uses the transaction identifier that is generated once the customer object decides to purchase given items.
- the vendor computer 140 once ready to ship the items, contacts an authorized shipper (e.g. , a carrier who has previously contracted with the secure provider) such as carrier computer 180 and discloses only the transaction identifier to the carrier computer 180.
- the vendor computer 140 provides the carrier computer 180 with the customer object (such as "GOLFO").
- the carrier computer 180 then contacts the secure provider computer 110 or the bank computer 150 as the case may be, which then matches up the transaction identifier with the customer.
- the customer information is then relayed by the secure provider computer 110 or bank computer 150 to the carrier computer 180 who can then ship the items directly to the customer now knowing the address of the customer.
- the secure provider and/or the bank and the shipping company know who the customer is, advantageously, the customer's actual identity is shielded from the vendor.
- the customer object can also be used for various other purposes.
- the customer object or persona can gather information on behalf of the customer and then can communicate with the customer interactively, through visual and/or aural means, by using interactive computer techniques such as video playback and voice synthesis to allow the persona to verbally and/or textual describe what information was found.
- information can also be provided in traditional formats such as text on the computer screen.
- vendor/customer object interaction can occur through e-mail and e-mail systems can be used to further vendor /customer relationships at the object or persona level.
- the secure provider can make direct offerings to the customer whether or not the secure provider knows the actual identity of the customer.
- vendors and the secure provider can send offerings by e-mail to customer objects provided with their own e-mail addresses and the customer object can respond to such e-mails with return e-mail or by visiting the vendor or secure provider web site.
- the present invention can use different encryption methods to provide users with anonymity, and to prevent third parties from improperly obtaining a user's credit card number or bank account number.
- the system uses an RSA public key encryption.
- RSA key technology has two main attributes. First, it can be the basis of a digital signature system. Second, it can be used for storing encryption information.
- the public key is used to verify the digital signature.
- the private key is used to sign one's signature for a block of data.
- Holder's of public keys can verify a purchase by requesting that the purchaser digitally sign the block of data. If the signature matches up with the public key, the identity of the purchaser has been confirmed, and the seller can go forward and arrange for the shipment of the device with a third party shipper.
- the customer computer 100 is preferably provided with a private key, while the public key is stored on the database 130.
- the public key will contain information such as a customer object and a customer bank account or credit card number. Most importantly, the public key will not include information such as the customer shipping address, as is required in prior art electronic commerce systems.
- the vendor computer 140 When a customer computer 100 enters the web site of the vendor computer 140, the vendor computer 140 is provided with the public key. When a customer computer 100 notifies the vendor computer 140 that the customer would like to make a purchase from the vendor web site 140, the public key, the transaction number and the amount of the purchase is then forwarded by the vendor computer 140 to a bank computer 150.
- bank computer 150 will be provided with access to a database 170 of all public keys. The bank computer 150 can then request that the customer computer 100, using the private key, "sign" for the purchase. Based upon the response from the customer computer 100, and upon the customer's credit history, the bank computer 150 decides whether or not the transaction will be approved. Once the transaction is approved, the vendor computer 140 is notified.
- the vendor computer 140 can then forward the item purchased by the customer with a transaction number or customer object to a third party carrier as explained above. Using this transaction number or customer object, the carrier computer 180 will be able to retrieve the customer's name and home address from the secure provider computer 110, or the bank computer 150, and can then deliver the package to the customer.
- customers can opt into having the secure provider track their on-line surfing activities and their preferences. This is in contrast to web sites which track surfing activity unbeknownst to the user. With the present invention, the customer knows ahead of time, by signing up with the secure provider, that the secure provider will be tracking surfing and transactional habits so as to better serve the customer.
- the secure provider computer 110 can determine commonly purchased items or popular vendors. Additionally, the monitoring of browsing habits can aid the secure provider computer 110 in predicting future purchases or services required by the customer object. Using this information, the secure provider can purchase large quantities of items commonly purchased by its members, and act as a wholesaler for its members, making special deals with the vendors.
- the customer is encouraged by the secure provider to use and educate the customer object so that the secure provider can have real-time information to provide just- in-time or just-ahead-of-time product offerings to the customer or customer object.
- the secure provider computer 110 which will have access to all of the customer data, but not necessarily to the customer's identity or address information, can also provide the stored demographic and preference information to vendor computers 140 without compromising the identity of the customer. In this manner, the provider could allow vendors to send information to targeted object groups which would not be bothersome to the customer since his or her object could make the decision whether to accept the offering from the vendor and/or present the offering back to the customer based on the preferences set by the customer.
- the customer object identifier can be, in effect, a screener of "unsolicited" offerings from vendor computers 140.
- the secure provider computer 110 can conduct market research with a depth unavailable using traditional methods.
- the secure provider computer 110 would have access to data about the entire buying habits of its customers.
- the secure provider database 130 would include information indicating that particular consumers like BMW automobiles and golf sweaters, whereas other consumers like Audi automobiles and cycling jerseys.
- the secure provider computer 110 could conduct statistical studies to uncover correlations that would identify potential marketing and buying opportunities. For example, without breaching its obligation of confidence with respect to individual consumer information, the secure provider could conduct a market research study for a manufacturer of golf sweaters and advise the manufacturer to focus on BMW owners rather than Audi owners.
- vendor computers In another preferred embodiment of the present invention, vendor computers are provided.
- the secure provider computer 110 can provide special offers to be displayed on the web site of the secure provider computer 110.
- the secure provider computer 110 can provide a web page which vendor computers 140 can log onto with a standardized form for the vendors to fill out.
- the secure provider computer 110 can then post each of the standardized forms onto a virtual bulletin board to a web site available only to customer computers 100.
- the advantage this embodiment provides is that customers need not shop on a non-secure web site to receive the special offers, since the offers will come via the secure provider computer 110. These offers can be posted for all customer computers 100 to see, or can be directed to specific customer computers 100. Further, customers will have the option of deciding whether or not they wish to even see the offer.
- the vendor advertisements are preferably posted to an area of the web site of the secure provider computer 110 that is only accessible to customer computers 100. Accordingly, vendor computers 140 will not be able to view the offers coming from other vendor computers 140. Alternatively, authorized vendor computers 140 (i.e. , vendors signing up with the secured provider to reach the secure provider's customers) may be allowed to see one another's offers but unauthorized vendors cannot see the offers of authorized vendors.
- an interactive, intelligent virtual vendor representative object (such as a virtual salesperson object) is provided as a guide to a given web site.
- the vendor object when accessing a web site of a vendor computer 140, the vendor object can be provided with a persona such that instead of passively navigating through the site, an animated character or vendor persona is encountered by the customer.
- the vendor persona then takes on the role of a virtual salesperson, asking questions of the customer and making recommendations based on the responses by the customer.
- the vendor object By interaction with the customer object identifier, the vendor object becomes cumulatively knowledgeable, can store customer preferences and history and proactively pursue the vendor/ vendee relationship.
- Notoriety of the vendor character or persona apart from the web site is desirable and is preferably enhanced through advertising (such as through print media, TV, radio, etc.) such that the persona becomes "branded" or closely associated with the vendor company and serves as a trademark or service mark of the company.
- the perception by the customer that the vendor character represents the company as a trademark is desirable for a number of reasons, such as to impart a feeling of familiarity with the character when encountered, create a desire on the customer's part to initially visit the web site to interact with the character, and enhance the customer's comfort level in interacting with the character. All of these benefits will then ultimately help the vendor increase traffic to the web site and raise the comfort level of the customer when he or she visits the web site.
- intelligent, virtual customer objects are desirably provided so that the customer need not search the Internet on his own, interact with vendor objects or personae encountered, or deal with the everyday hassles of the Internet (expired URLs, slow connections, information overload, etc.).
- the customer can be a customer persona which can be visually displayed on the computer screen and be customized or designed to physically resemble the customer's human characteristics or resemble a caricature of the customer, a familiar character, an animal, or any other visible object.
- the customer object identifier may be nonvisual or simply represented by a file, icon, programming object, etc.
- a customer can set up a customer object with all of the characteristics, personal information, history and demographic information about the customer such that the object identifier, and not the customer, can expend the "effort" of searching the Internet, shopping and gather information useful or desired by the customer.
- a customer object or persona can be provided with individualized characteristics about the customer, such as that the customer is male, 32 years old, a cigar smoker, a wine enthusiast, a tennis player, drives a sedan, owns a house, likes gardening, etc.
- the more information supplied to the persona the more the persona takes on the full characteristics of the customer and enables a "smarter" persona when the persona is searching for information.
- the persona may collect possible sweaters to buy including unwanted red sweaters.
- the customer upon discovering that red sweaters were located by his persona, can add a new characteristic to the persona that he does not like red sweaters for future search purposes. The more information supplied to the persona, the more intelligent it becomes.
- the software provided to both the vendors and customer computers can also allow generation of interactive characters.
- the browser of the customer computer could be provided with the necessary "plug-ins" (such as a Java plug-in or ActiveX control) to allow the rendering of an interactive character on the video screen of the customer computer.
- the customer object or persona can be programmed to learn desired and undesired characteristics of the customer based on continued interaction between the persona and the customer and based on existing preferences.
- Al artificial intelligence
- the persona can "learn” through Al techniques that the customer likely does not like the color red for clothing items and thus, when sufficiently confident in its assessment, will no longer shop for red clothing.
- the more and more the customer interacts with his persona the "smarter" the persona becomes and interaction between customer and persona is highly encouraged by the present invention.
- the vendor objects can interact with the customer objects in a virtual shopping encounter, as if the customer wandered into the store of the vendor and was approached by a salesperson.
- the customer object would relate his preferences (or a subset thereof) to the vendor object who may have the items desired by the customer object. If the vendor object, however, does not have such an item in stock, it may use the information of the customer object to intelligently recommend a different item. For instance, if the customer object is looking to buy a
- German-made cars If the customer object did not specify that it did not like Audi's, it mat accept the recommendation from the vendor object.
- the more often the vendor object interacts with the customer object the more each knows or learns of the other's preferences, needs and offerings. Such an ever-growing object interrelationship can greatly enhance the vendor-customer relationship.
- the present invention is applicable to the retail industry or elsewhere where vendors may wish to display their goods or services at a web site on the Internet and allow customers to browse and make purchases from a vendor web site anonymously.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US9916298P | 1998-09-04 | 1998-09-04 | |
US99162P | 1998-09-04 | ||
PCT/US1999/020348 WO2000014648A1 (en) | 1998-09-04 | 1999-09-03 | Electronic commerce with anonymous shopping and anonymous vendor shipping |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1027661A1 true EP1027661A1 (de) | 2000-08-16 |
EP1027661A4 EP1027661A4 (de) | 2003-05-14 |
Family
ID=22273237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99949595A Withdrawn EP1027661A4 (de) | 1998-09-04 | 1999-09-03 | Elektronischer handel mit anonymem einkauf und anonymem versand durch den verkäufer |
Country Status (18)
Country | Link |
---|---|
EP (1) | EP1027661A4 (de) |
JP (1) | JP2002524797A (de) |
KR (1) | KR20010031840A (de) |
CN (1) | CN1277693A (de) |
AU (1) | AU752770B2 (de) |
BR (1) | BR9906990A (de) |
CA (1) | CA2308759A1 (de) |
CZ (1) | CZ20001481A3 (de) |
EA (1) | EA200000390A1 (de) |
HU (1) | HUP0004158A2 (de) |
ID (1) | ID24712A (de) |
IL (1) | IL135579A0 (de) |
NO (1) | NO20002128L (de) |
PL (1) | PL343631A1 (de) |
SK (1) | SK5962000A3 (de) |
TR (1) | TR200001205T1 (de) |
WO (1) | WO2000014648A1 (de) |
ZA (1) | ZA200002013B (de) |
Families Citing this family (105)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7177429B2 (en) | 2000-12-07 | 2007-02-13 | Blue Spike, Inc. | System and methods for permitting open access to data objects and for securing data within the data objects |
US6529885B1 (en) | 1999-03-18 | 2003-03-04 | Oracle Corporation | Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts |
US6898577B1 (en) | 1999-03-18 | 2005-05-24 | Oracle International Corporation | Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts |
US6941282B1 (en) * | 1999-03-18 | 2005-09-06 | Oracle International Corporation | Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts |
US7664264B2 (en) | 1999-03-24 | 2010-02-16 | Blue Spike, Inc. | Utilizing data reduction in steganographic and cryptographic systems |
WO2000063855A1 (en) * | 1999-04-19 | 2000-10-26 | Barton Peter R | Improved system and method for anonymous transactions |
WO2001035355A1 (en) * | 1999-11-09 | 2001-05-17 | First Data Resources | Systems and methods for anonymous payment transactions |
AU729758B3 (en) * | 1999-11-12 | 2001-02-08 | Nagel, Carlyle | Electronic commerce system and method |
WO2001048628A2 (en) * | 1999-12-23 | 2001-07-05 | Barton Peter R | System and method for anonymous transactions and disguised mailings |
US7853481B1 (en) | 2000-01-24 | 2010-12-14 | Oracle International Corporation | eDropship: methods and systems for anonymous eCommerce shipment |
EP1264287A1 (de) * | 2000-03-17 | 2002-12-11 | First Financial Internet, Inc. | System für bezahlung im voraus und verfahren für anonyme einkaufstransaktionen |
JP2001338253A (ja) * | 2000-03-23 | 2001-12-07 | Nec Corp | 電子商取引方法および装置 |
JP2001283111A (ja) * | 2000-03-30 | 2001-10-12 | Oki Electric Ind Co Ltd | コーディネーションサービスシステム |
JP2001283026A (ja) * | 2000-03-31 | 2001-10-12 | Fujitsu Fip Corp | 連合ショッピングモールシステム,小売ショッピングモールシステム,卸売ショッピングモールシステム,モールサーバ,連合ショッピングモール運営方法および連合ショッピングモール運営プログラムを記載した記録媒体 |
AU5724401A (en) | 2000-04-26 | 2001-11-07 | Oracle Corp | Many-to-many correspondance: methods and systems for replacing interbank funds transfers |
EP1150227A1 (de) * | 2000-04-28 | 2001-10-31 | Lucent Technologies Inc. | Anonymer und sicherer elektronischer Handel |
US7246315B1 (en) | 2000-05-10 | 2007-07-17 | Realtime Drama, Inc. | Interactive personal narrative agent system and method |
JP2001325480A (ja) * | 2000-05-17 | 2001-11-22 | Sharp Corp | 商取引仲介システム、及び商取引仲介システムプログラムを記録した記録媒体 |
WO2001090994A2 (en) * | 2000-05-19 | 2001-11-29 | Ishopsecure.Com, Inc. | System and method for simplifying and/or securing transactions over a network |
US7225169B1 (en) | 2000-05-26 | 2007-05-29 | International Business Machines Corporation | Method and system for commerce with full anonymity |
JP2004503875A (ja) | 2000-06-13 | 2004-02-05 | ルーセント テクノロジーズ インコーポレーテッド | 分散型データネットワークにおいて使用するための方法および装置および製造物 |
JP2002024718A (ja) * | 2000-07-07 | 2002-01-25 | Nec Commun Syst Ltd | オンラインショッピング方法 |
JP2002032596A (ja) * | 2000-07-19 | 2002-01-31 | Fujitsu Ltd | 電子商取引方法および電子商取引に用いられるプロフィール変換装置 |
JP2002049866A (ja) * | 2000-08-02 | 2002-02-15 | Teruya:Kk | 双方向通信メディアにおける顧客管理及びサービス方法 |
JP2002074040A (ja) * | 2000-09-05 | 2002-03-12 | Nec Corp | ネットワークを利用した商品販売方式及びその方法 |
JP4538927B2 (ja) * | 2000-09-05 | 2010-09-08 | ソニー株式会社 | 受注管理システムおよびその方法、並びに記録媒体 |
WO2002027588A1 (fr) * | 2000-09-28 | 2002-04-04 | James Jay Skinner | Système de commerce électronique |
JP2002117264A (ja) * | 2000-10-10 | 2002-04-19 | Hitachi Capital Corp | 電子商取引の仲介サーバーおよび仲介方法 |
JP2002117358A (ja) * | 2000-10-11 | 2002-04-19 | Shinichiro Ando | 通信販売方法 |
JP5142237B2 (ja) * | 2000-10-17 | 2013-02-13 | 豊 塚本 | 個人情報保護システム、処理装置および記録媒体 |
US8171556B2 (en) | 2000-10-17 | 2012-05-01 | Mieko Ishii | Personal information protection method, personal information protection system, processing device, portable transmitter/receiver, and program |
US20020107804A1 (en) * | 2000-10-20 | 2002-08-08 | Kravitz David William | System and method for managing trust between clients and servers |
JP2002175432A (ja) * | 2000-12-06 | 2002-06-21 | Gala Inc | 配信仲介サービス装置の介在によりコンセプトメールを多数のターゲットに配信する方法およびその配信仲介サービス装置 |
JP2002183433A (ja) * | 2000-12-08 | 2002-06-28 | Kyocera Corp | 電子商取引システムおよび電子商取引方法 |
JP2002197390A (ja) * | 2000-12-25 | 2002-07-12 | Nec Corp | 取引仲介システム及び取引仲介方法 |
JP3741264B2 (ja) * | 2001-01-17 | 2006-02-01 | 株式会社ステラクラフト | 電子商取引システム |
JP2002216048A (ja) * | 2001-01-23 | 2002-08-02 | Nri & Ncc Co Ltd | アドレス情報保護方法及びそのシステム |
JP2002230437A (ja) * | 2001-02-02 | 2002-08-16 | Vision Arts Kk | クレジット決済システム、クレジット決済のプログラム及びこれを記録した媒体、並びに決済情報画像ファイルを記録した媒体、決済システム、決済のプログラム及びこれを記録した媒体 |
GB2372344A (en) | 2001-02-17 | 2002-08-21 | Hewlett Packard Co | System for the anonymous purchase of products or services online |
JP2002245369A (ja) * | 2001-02-20 | 2002-08-30 | Toyo Commun Equip Co Ltd | 商品の配送を手配する方法及び装置 |
JP2002245386A (ja) * | 2001-02-21 | 2002-08-30 | Nec Corp | 決済・配送システム及びそれに用いる決済・配送方法 |
US7237117B2 (en) | 2001-03-16 | 2007-06-26 | Kenneth P. Weiss | Universal secure registry |
CA2442136A1 (en) | 2001-03-30 | 2002-10-10 | United Parcel Service Of America, Inc. | Electronic shipping system for package pickup and anywhere to anywhere delivery |
DE10154546B4 (de) * | 2001-11-07 | 2005-06-23 | E-Plus Mobilfunk Gmbh & Co.Kg | Verfahren zum Zugänglichmachen von Diensten in Telekommunikationsnetzen, zum Beispiel im Internet |
US7240035B1 (en) * | 2001-05-31 | 2007-07-03 | Hall Aluminum Llc | Method and apparatus for masking private mailing address information by manipulating delivery transactions |
IES20010524A2 (en) * | 2001-06-01 | 2002-12-11 | Mainline Corporate Holdings | A secure on-line payment system |
GB2382421A (en) * | 2001-11-26 | 2003-05-28 | Bybox Holdings Ltd | Collection and delivery system |
US20030120660A1 (en) * | 2001-12-07 | 2003-06-26 | Maritzen L. Michael | Consumer-centric context-aware switching model |
NL1019671C2 (nl) * | 2001-12-27 | 2003-07-01 | Eliverit B V | Werkwijze en systeem voor het bestellen en afleveren van goederen. |
US7287275B2 (en) | 2002-04-17 | 2007-10-23 | Moskowitz Scott A | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
US9286457B2 (en) | 2004-06-14 | 2016-03-15 | Rodney Beatson | Method and system for providing password-free, hardware-rooted, ASIC-based authentication of a human to a mobile device using biometrics with a protected, local template to release trusted credentials to relying parties |
JP2006012107A (ja) * | 2004-06-28 | 2006-01-12 | Toshiharu Seo | インターネットショッピングの商品選択→代金決済→サービスの提供の一連の取引のシームレス化モデル |
US8762263B2 (en) | 2005-09-06 | 2014-06-24 | Visa U.S.A. Inc. | System and method for secured account numbers in proximity devices |
US11227676B2 (en) | 2006-02-21 | 2022-01-18 | Universal Secure Registry, Llc | Universal secure registry |
US8234220B2 (en) | 2007-02-21 | 2012-07-31 | Weiss Kenneth P | Universal secure registry |
WO2008066212A1 (en) * | 2006-11-29 | 2008-06-05 | Korea Institute Of Science And Technology | Electronic commerce system and recording medium for storing program of mobile terminals using personal area network |
EP2118838A4 (de) | 2007-02-27 | 2012-01-11 | Emigrant Bank | Verfahren und system zur einfachen transaktion zwischen einem käufer und verkäufer |
DE102007025867A1 (de) * | 2007-06-01 | 2008-07-03 | Siemens Ag | Verfahren und Vorrichtung zum anonymisierten Transport eines Gegenstands |
EP2061002A1 (de) * | 2007-11-15 | 2009-05-20 | Swisscom AG | Computerimplementiertes Verfahren zur Generierung und Übermittlung von Gegenstands- und/oder Dienstleistungslieferungsaufträgen, sowie das entsprechende System und die entsprechende Vorrichtung |
CA2706593A1 (en) * | 2007-11-21 | 2009-05-28 | Kiz Toys, Inc. | Systems and methods for providing a virtual world commodity device |
CN102365650A (zh) * | 2009-02-03 | 2012-02-29 | 史蒂芬·亚历山大·莫里斯 | 一种安全的电子金融资金转账系统 |
US10846683B2 (en) | 2009-05-15 | 2020-11-24 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US9105027B2 (en) | 2009-05-15 | 2015-08-11 | Visa International Service Association | Verification of portable consumer device for secure services |
US10140598B2 (en) | 2009-05-20 | 2018-11-27 | Visa International Service Association | Device including encrypted data for expiration date and verification value creation |
US10255591B2 (en) | 2009-12-18 | 2019-04-09 | Visa International Service Association | Payment channel returning limited use proxy dynamic value |
WO2012037479A1 (en) | 2010-09-17 | 2012-03-22 | Universal Secure Registry, Llc | Apparatus, system and method employing a wireless user-device |
EP2718890A4 (de) * | 2011-06-06 | 2014-11-05 | Nfluence Media Inc | Verbrauchergesteuertes werbesystem |
US10282724B2 (en) | 2012-03-06 | 2019-05-07 | Visa International Service Association | Security system incorporating mobile device |
AU2013315510B2 (en) | 2012-09-11 | 2019-08-22 | Visa International Service Association | Cloud-based Virtual Wallet NFC Apparatuses, methods and systems |
CN104009955B (zh) * | 2013-02-21 | 2015-10-28 | 腾讯科技(深圳)有限公司 | 一种联系人信息的处理方法、装置和系统 |
US9978062B2 (en) | 2013-05-15 | 2018-05-22 | Visa International Service Association | Mobile tokenization hub |
US10366387B2 (en) | 2013-10-29 | 2019-07-30 | Visa International Service Association | Digital wallet system and method |
US9922322B2 (en) | 2013-12-19 | 2018-03-20 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
CN115082065A (zh) | 2013-12-19 | 2022-09-20 | 维萨国际服务协会 | 基于云的交易方法和系统 |
US10433128B2 (en) | 2014-01-07 | 2019-10-01 | Visa International Service Association | Methods and systems for provisioning multiple devices |
WO2015149032A1 (en) | 2014-03-28 | 2015-10-01 | Brian Roundtree | Beacon based privacy centric network communication, sharing, relevancy tools and other tools |
CN104980467B (zh) * | 2014-04-09 | 2019-05-24 | 腾讯科技(深圳)有限公司 | 联系信息管理方法及装置、系统 |
CN105096129A (zh) * | 2014-05-15 | 2015-11-25 | 华为技术有限公司 | 一种数据处理系统及方法 |
EP3146747B1 (de) | 2014-05-21 | 2020-07-01 | Visa International Service Association | Offline-authentifizierung |
US10484345B2 (en) | 2014-07-31 | 2019-11-19 | Visa International Service Association | System and method for identity verification across mobile applications |
US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US10115141B1 (en) * | 2014-09-24 | 2018-10-30 | Amazon Technologies, Inc. | Secure proxy service |
RU2019124722A (ru) | 2014-09-26 | 2019-10-01 | Виза Интернэшнл Сервис Ассосиэйшн | Система и способы предоставления зашифрованных данных удаленного сервера |
GB201419016D0 (en) | 2014-10-24 | 2014-12-10 | Visa Europe Ltd | Transaction Messaging |
SG11201706576TA (en) | 2015-04-10 | 2017-09-28 | Visa Int Service Ass | Browser integration with cryptogram |
CN113542293B (zh) | 2015-12-04 | 2023-11-07 | 维萨国际服务协会 | 用于令牌验证的方法及计算机 |
US11386421B2 (en) | 2016-04-19 | 2022-07-12 | Visa International Service Association | Systems and methods for performing push transactions |
US11250424B2 (en) | 2016-05-19 | 2022-02-15 | Visa International Service Association | Systems and methods for creating subtokens using primary tokens |
EP3466017B1 (de) | 2016-06-03 | 2021-05-19 | Visa International Service Association | Subtoken-managementsystem für angeschlossene vorrichtungen |
US11068899B2 (en) | 2016-06-17 | 2021-07-20 | Visa International Service Association | Token aggregation for multi-party transactions |
CN115187242A (zh) | 2016-06-24 | 2022-10-14 | 维萨国际服务协会 | 唯一令牌认证验证值 |
BR112018076196A2 (pt) | 2016-07-11 | 2019-03-26 | Visa International Service Association | método, e, dispositivos de comunicação portátil e de acesso. |
CN109478287B (zh) | 2016-07-19 | 2023-08-15 | 维萨国际服务协会 | 分发令牌和管理令牌关系的方法 |
KR101688419B1 (ko) * | 2016-08-11 | 2016-12-21 | (주)케이클라우드 | 가상개인정보를 이용한 보안 운송장 발급관리 시스템 및 방법 |
WO2018098492A1 (en) | 2016-11-28 | 2018-05-31 | Visa International Service Association | Access identifier provisioning to application |
US11494765B2 (en) | 2017-05-11 | 2022-11-08 | Visa International Service Association | Secure remote transaction system using mobile devices |
EP3762844A4 (de) | 2018-03-07 | 2021-04-21 | Visa International Service Association | Sichere entfernte token-freigabe mit online-authentifizierung |
US10742646B2 (en) | 2018-05-10 | 2020-08-11 | Visa International Service Association | Provisioning transferable access tokens |
US11256789B2 (en) | 2018-06-18 | 2022-02-22 | Visa International Service Association | Recurring token transactions |
CN112805737A (zh) | 2018-10-08 | 2021-05-14 | 维萨国际服务协会 | 用于令牌邻近交易的技术 |
US11004076B2 (en) | 2019-02-06 | 2021-05-11 | Visa International Service Association | Camera device enabled identification and disambiguation system and method |
US10909533B2 (en) | 2019-03-13 | 2021-02-02 | Stream Source Technologies | System and methods of securely matching a buyer to a seller |
US11636537B2 (en) | 2019-03-26 | 2023-04-25 | StreamSource Technologies | System and methods of providing point-of-need financing |
US11849042B2 (en) | 2019-05-17 | 2023-12-19 | Visa International Service Association | Virtual access credential interaction system and method |
US20210383444A1 (en) * | 2020-06-04 | 2021-12-09 | Privatedeal Sa | Automated negotiation method and computer program product for implementing such method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2167543A1 (en) * | 1996-01-18 | 1997-07-19 | James Durward | Process for conducting secure electronic transactions over electronic media |
EP0791901A2 (de) * | 1996-02-21 | 1997-08-27 | Card Call Service Co., Ltd. | Netzwerktransaktionssystem |
US5790677A (en) * | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
US5799298A (en) * | 1995-08-07 | 1998-08-25 | International Business Machines Corporation | Method of indirect specification of user preferences |
US5802296A (en) * | 1996-08-02 | 1998-09-01 | Fujitsu Software Corporation | Supervisory powers that provide additional control over images on computers system displays to users interactings via computer systems |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5884272A (en) * | 1996-09-06 | 1999-03-16 | Walker Asset Management Limited Partnership | Method and system for establishing and maintaining user-controlled anonymous communications |
US5913203A (en) * | 1996-10-03 | 1999-06-15 | Jaesent Inc. | System and method for pseudo cash transactions |
US5970475A (en) * | 1997-10-10 | 1999-10-19 | Intelisys Electronic Commerce, Llc | Electronic procurement system and method for trading partners |
-
1999
- 1999-09-03 CZ CZ20001481A patent/CZ20001481A3/cs unknown
- 1999-09-03 EA EA200000390A patent/EA200000390A1/ru unknown
- 1999-09-03 KR KR1020007004912A patent/KR20010031840A/ko not_active Application Discontinuation
- 1999-09-03 BR BR9906990-3A patent/BR9906990A/pt not_active IP Right Cessation
- 1999-09-03 WO PCT/US1999/020348 patent/WO2000014648A1/en not_active Application Discontinuation
- 1999-09-03 EP EP99949595A patent/EP1027661A4/de not_active Withdrawn
- 1999-09-03 AU AU62435/99A patent/AU752770B2/en not_active Ceased
- 1999-09-03 PL PL99343631A patent/PL343631A1/xx not_active Application Discontinuation
- 1999-09-03 CA CA002308759A patent/CA2308759A1/en not_active Abandoned
- 1999-09-03 ID IDW20000793A patent/ID24712A/id unknown
- 1999-09-03 HU HU0004158A patent/HUP0004158A2/hu unknown
- 1999-09-03 IL IL13557999A patent/IL135579A0/xx unknown
- 1999-09-03 JP JP2000569324A patent/JP2002524797A/ja active Pending
- 1999-09-03 TR TR2000/01205T patent/TR200001205T1/xx unknown
- 1999-09-03 SK SK596-2000A patent/SK5962000A3/sk not_active Application Discontinuation
- 1999-09-03 CN CN99801535A patent/CN1277693A/zh active Pending
-
2000
- 2000-04-25 ZA ZA200002013A patent/ZA200002013B/xx unknown
- 2000-04-26 NO NO20002128A patent/NO20002128L/no not_active Application Discontinuation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5790677A (en) * | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
US5799298A (en) * | 1995-08-07 | 1998-08-25 | International Business Machines Corporation | Method of indirect specification of user preferences |
CA2167543A1 (en) * | 1996-01-18 | 1997-07-19 | James Durward | Process for conducting secure electronic transactions over electronic media |
EP0791901A2 (de) * | 1996-02-21 | 1997-08-27 | Card Call Service Co., Ltd. | Netzwerktransaktionssystem |
US5802296A (en) * | 1996-08-02 | 1998-09-01 | Fujitsu Software Corporation | Supervisory powers that provide additional control over images on computers system displays to users interactings via computer systems |
Non-Patent Citations (2)
Title |
---|
GREHAN R: "CLOAK AND DATA" , BYTE, MCGRAW-HILL INC. ST PETERBOROUGH, US, VOL. 15, NR. 6, PAGE(S) 311-312,314,316,318,320,322,324 XP001109532 ISSN: 0360-5280 * page 318 * * |
See also references of WO0014648A1 * |
Also Published As
Publication number | Publication date |
---|---|
AU6243599A (en) | 2000-03-27 |
HUP0004158A2 (hu) | 2001-05-28 |
JP2002524797A (ja) | 2002-08-06 |
PL343631A1 (en) | 2001-08-27 |
KR20010031840A (ko) | 2001-04-16 |
ID24712A (id) | 2000-08-03 |
CZ20001481A3 (cs) | 2001-10-17 |
NO20002128D0 (no) | 2000-04-26 |
ZA200002013B (en) | 2000-11-02 |
AU752770B2 (en) | 2002-09-26 |
CA2308759A1 (en) | 2000-03-16 |
EA200000390A1 (ru) | 2001-10-22 |
IL135579A0 (en) | 2001-05-20 |
BR9906990A (pt) | 2000-09-26 |
CN1277693A (zh) | 2000-12-20 |
TR200001205T1 (tr) | 2000-11-21 |
SK5962000A3 (en) | 2001-12-03 |
WO2000014648A1 (en) | 2000-03-16 |
EP1027661A4 (de) | 2003-05-14 |
NO20002128L (no) | 2000-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU752770B2 (en) | Electronic commerce with anonymous shopping and anonymous vendor shipping | |
Liu et al. | Web sites of the Fortune 500 companies: Facing customers through home pages | |
US8266007B2 (en) | Methods and systems for delivering customized advertisements | |
US7657458B2 (en) | Vendor-driven, social-network enabled review collection system and method | |
US8285589B2 (en) | Referring-site based recommendations | |
US8332277B2 (en) | Method, system and computer readable medium for facilitating a transaction between a customer, a merchant and an associate | |
US20140372176A1 (en) | Method and apparatus for anonymous data profiling | |
US20020178166A1 (en) | Knowledge by go business model | |
US8341025B2 (en) | E-mail based gift delivery | |
TW200849131A (en) | A system and device for social shopping on-line | |
MX2012004106A (es) | Sistemas y metodos para proporcionar y explotar comercialmente validacion de persona en linea. | |
US20110184804A1 (en) | Method and apparatus for queuing user action prior to authentication | |
CA2753977A1 (en) | Systems and methods for using verified information cards in a communications network | |
US20020128933A1 (en) | Interactive method and apparatus for product customization and purchase | |
KR20020059212A (ko) | 광고 콘텐츠 제공과 보상을 제공하는 방법 | |
KR20020007163A (ko) | 컴퓨터 네트워크를 통한 쇼핑을 보조하기 위한 가상 희망리스트 생성 시스템 및 방법 | |
KR100699138B1 (ko) | 지능형 의상 대여 및 판매 서비스 시스템 및 그 방법 | |
Rahman et al. | Internet commerce and software agents: cases, technologies, and opportunities | |
MXPA00004384A (en) | Electronic commerce with anonymous shopping and anonymous vendor shipping | |
JP5221865B2 (ja) | ネットワークシステム及びネットワーク制御方法 | |
WO2001045011A1 (en) | A method and system for conducting electronic commerce by using an intelligent direct marketing engine | |
Dodrajka | Online Marketing: Measuring Indian Urban Customer Perception towards Online Shopping Sites | |
Singhsathitsukh | Herrmann suits online | |
KR20020014924A (ko) | 인터넷을 이용한 광고표시 방법 및 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20000426 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: MK PAYMENT 20000426;SI PAYMENT 20000426 |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20030401 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: 7G 06F 17/60 A |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20030402 |