US20070288394A1 - Transactional security over a network - Google Patents

Transactional security over a network Download PDF

Info

Publication number
US20070288394A1
US20070288394A1 US11/844,408 US84440807A US2007288394A1 US 20070288394 A1 US20070288394 A1 US 20070288394A1 US 84440807 A US84440807 A US 84440807A US 2007288394 A1 US2007288394 A1 US 2007288394A1
Authority
US
United States
Prior art keywords
customer
merchant
encryption stream
identifier
causing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/844,408
Other languages
English (en)
Inventor
Richard Carrott
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BENEDOR CORP
Original Assignee
BENEDOR CORP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/726,304 external-priority patent/US6839692B2/en
Application filed by BENEDOR CORP filed Critical BENEDOR CORP
Priority to US11/844,408 priority Critical patent/US20070288394A1/en
Assigned to BENEDOR CORPORATION reassignment BENEDOR CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CARROTT, RICHARD F.
Priority to JP2010521830A priority patent/JP5052673B2/ja
Priority to MX2010001951A priority patent/MX2010001951A/es
Priority to EP07841796.1A priority patent/EP2191406B8/en
Priority to CA2690529A priority patent/CA2690529C/en
Priority to BRPI0721942-3A2A priority patent/BRPI0721942A2/pt
Priority to KR1020107000597A priority patent/KR101067191B1/ko
Priority to AU2007358254A priority patent/AU2007358254B2/en
Priority to CN200780100359.4A priority patent/CN101785012B/zh
Priority to PCT/US2007/077503 priority patent/WO2009029116A1/en
Priority to EA201000310A priority patent/EA018277B1/ru
Priority to CA2933130A priority patent/CA2933130C/en
Priority to HUE07841796A priority patent/HUE034341T2/en
Publication of US20070288394A1 publication Critical patent/US20070288394A1/en
Priority to US12/202,524 priority patent/US8260723B2/en
Priority to US12/911,801 priority patent/US8260719B2/en
Priority to US13/564,815 priority patent/US8463713B2/en
Priority to US13/565,897 priority patent/US9607299B2/en
Priority to US13/891,278 priority patent/US9400979B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0603Catalogue ordering

Definitions

  • the embodiments of the invention generally relate to securing eCommerce and similar transactional relationships, including the sales of goods and services, between parties over computer networks such as the Internet and to tracking of distributed electronic items, such as electronic documents, electronic presentations, electronic works and to methods and systems for storing encrypted individual agreement identifiers within the distributed electronic items.
  • the present invention generally relates to a system for providing security for purchase transactions made over a network and more particularly to an improved security system that only stores and provides encrypted information. Additionally, the invention relates to a system for providing customer controlled rules, including time and value limits, for purchase transactions made over a network.
  • Still other e-commerce payment systems require the user to purchase specific hardware (e.g., a credit card reader) that is proprietary in nature and awkward to install and use.
  • specific hardware e.g., a credit card reader
  • the user is required to transport the hardware device if purchases are to be made at other computers, which hampers this type of payment system.
  • the common thread shared by conventional systems is that the customer must provide private information in order to complete a transaction—to the merchant, to a potential third-party, and to the merchant's financial institution. This requirement is the biggest impediment to conventional systems because of the exposure to the customer, perceived or otherwise. Whether the customer obtains additional hardware or merely entrusts private information to third-party vendors, the customer's information ends up stored in someone else's database. The vulnerability of these stored records is a matter of deep concern to potential customers and to policy makers.
  • the problem is a matter of how many times a customer must expose private, sensitive, and/or confidential information in order to transact business over a network environment such as the Internet.
  • the invention encrypts customer information as a customer code on a storage device on a customer computer (the customer computer is connected to the computer network). Then the invention supplies the customer code to a merchant in a purchase transaction over the computer network and forwards, or allows the merchant to forward, the customer code to a financial institution over the computer network. The financial institution decrypts the customer code, verifies the information, and returns a purchase authorization decision to the merchant over the computer network.
  • An important feature of the invention is that encoded customer information, such as credit card numbers (“customer code”), is not available to merchants and, therefore, is not vulnerable to the merchant's security or privacy entrustments.
  • the customer code is stored on the customer's storage device only, and it is in encrypted form. This allows the customer to complete merchant transactions without revealing certain of the encrypted information to the merchant, such as credit card numbers.
  • the financial institution compares, inter alia, the customer address with historic address information of the customer maintained by the financial institution. Customers may maintain more than one authorized shipping address. The purchase authorization decision is approved only if the customer address and the historic address are consistent.
  • the options to the financial institution include: 1) approving the transaction with the corrected address; 2) approving the transaction subject to the customer updating his/her address information prior to the issuance of the authorization code; and, 3) declining authorization.
  • the present invention allows the customer to access his/her information by means of a personal key, or access code, however only the financial institution and its agents possess the decryption key, or code.
  • the invention provides secure use of the customer's information without adding layers or third-parties and without exposing that information to a myriad of databases.
  • the customer code includes encrypted credit card information.
  • the invention can encrypt many customer codes on the storage device.
  • Each of the customer codes can include a unique payment method.
  • one group of the customer codes can identify a single credit organization for payment, wherein each customer code in the group includes a different user name. This allows each customer code in the group to include unique credit limits and allows the customer to authorize additional users for a single credit organization or facility.
  • the invention also uses a password on the customer computer to unlock the customer code.
  • the invention comprises a system that operates on a customer computer.
  • the inventive system includes an encrypter adapted to encrypt customer information as a customer code on a storage device on the customer computer and a populator adapted to supply the customer code to a merchant in a purchase transaction over the computer network.
  • the customer computer includes a network connection adapted to forward the customer code to a financial institution over the computer network.
  • the financial institution decrypts the customer code and returns a purchase authorization decision to the merchant over the computer network.
  • the customer code preferably includes encrypted customer address information
  • the system further comprises a comparator located at the financial institution.
  • the comparator compares the customer address with a historic address of the customer maintained by the financial institution.
  • the purchase authorization decision is approved only if the customer address and the historic address are consistent.
  • the system can optionally include an intermediate code confirmation site, external to the customer computer, and connected to the computer network.
  • the intermediate code confirmation site receives the customer code prior to forwarding the customer code to the financial institution over the computer network.
  • the intermediate confirmation site confirms whether the customer code has a proper encryption format.
  • the encrypter can also encrypt a plurality of customer codes on the storage device.
  • each of the customer codes can include a unique payment system or a group of the customer codes can identify a single credit organization for payment.
  • Each customer code in the group can have a different user name and unique credit limits.
  • the inventive system also includes a graphic user interface that can receive a password on the customer computer to unlock the customer code.
  • the Internet has changed the way people communicate and the way they do business. With that change, the way of doing things on the Internet has also evolved. As computers and technology opened a new era, software was packaged on disks and sold. Downloadable or otherwise transferable media, such as digital music and movies, soon followed. This activity led certain individuals and groups to seek ways to profit from the unauthorized copying and sale of these products, which became two basic businesses—one that sought to profit by pirating the works of others and another that tried to prevent the pirates' activity. As the Internet continues to evolve, more and more of this media content is being downloaded and shared, creating another layer of complexity and another area of concern.
  • Virtual commerce over a virtual environment creates a need to establish agreements as to rights and jurisdiction for the protection and prosecution of those rights.
  • the nature of eCommerce creates an additional need to identify the consumer, while protecting that consumer's identity from “identity theft” and “identity fraud,” and while protecting the transaction for both the consumer and the merchant.
  • the vendor bares much of the risk in an Internet transaction. If a minor has “borrowed” a parent's credit card, debit card, or prepaid card, if someone has stolen another person's identity, if someone has misrepresented their age as a ploy to enter a restricted site; then, the vendor's claim for payment may be denied. All of these things represent a real problem for the eCommerce merchant who seeks compensation for what they offer because that merchant assumes the risk for a transaction, not the issuing bank, where there is no signed receipt—“no signature present.” The result from this is millions of dollars of fraud, repudiation, and chargebacks of transactions, which raise the costs and risks for all.
  • this disclosure presents a method, system, and structure that creates, records, verifies, and makes a storable version of a consumer's encrypted individual agreement identifiers that can be, among other things, embedded with media purchased or otherwise acquired over a computer network and onto the transactional authorization, receipt and/or record of sale, creating a “person present”/“signature present” verifier.
  • the method includes the use of any or all user encrypted agreement identifiers, which are created before or during storage to the user's hard drive or otherwise similar purpose computer storage system.
  • the method and system includes allowing encrypted agreement identifiers to be used without revealing certain of the encrypted information, such as name, address, or credit/debit/prepaid card numbers, to the vendor with whom a transaction, for instance the purchase of media, is being conducted.
  • the need to consistently register and expose a consumer's identity and information with vendors and their databases is eliminated with embodiments herein.
  • the method and system allows the encrypted agreement identifiers to be used as a means of verifying user acceptance of qualified terms of use and purchase, in a way that can also be embedded in downloadable media.
  • the method and system creates and controls sub-accounts with unique user reporting and corresponding password identifiers.
  • the method and system places the control responsibility for an account and any sub-accounts with the primary authorized/registered user.
  • the encrypted identifiers enable a method and system for securing and limiting the access and use of the media acquired to the use, terms, and privilege for which it was acquired, thus allowing for the agreed enforcement of copyrights and other protections.
  • this disclosure presents a system and method of facilitating computerized purchase transactions of electronically storable items (which are sometimes referred to herein as electronic items) such as literary works, musical works (recordings), and video works (movies, shows, videos, etc.) wherein the consumer agrees to enforcement of adhering rights, such as copyrights.
  • electronically storable items which are sometimes referred to herein as electronic items
  • electronic items such as literary works, musical works (recordings), and video works (movies, shows, videos, etc.) wherein the consumer agrees to enforcement of adhering rights, such as copyrights.
  • customer identifier information may comprise a name identifier (which may or may not be the customer's formal name), a possible customer age identifier (which can be a birthdate, a specific age, an age range, an age classification), a possible address identifier (which can be a customer's address or a different address), and a customer agreement identifier that contains or identifies the contractual agreement between the customer and a verification entity or financial institution (credit issuer) that will facilitate the purchase transaction.
  • name identifier which may or may not be the customer's formal name
  • possible customer age identifier which can be a birthdate, a specific age, an age range, an age classification
  • possible address identifier which can be a customer's address or a different address
  • customer agreement identifier that contains or identifies the contractual agreement between the customer and a verification entity or financial institution (credit issuer) that will facilitate the purchase transaction.
  • a single, unique identifier may be employed by the verification entity to locate and identify that specific stream of customer information (including a computer identifier).
  • customer information is stored only in the verification database and only the identifier and the at-point-of-sale computer identifier can be transmitted as the encryption stream (together with non-encrypted BIN or credit issuer routing number) to the vendor.
  • One intent of the program and the participants is to create a “signature present verified transaction” that may be relied upon by all parties to the transaction while allowing identity protection for the customer.
  • the embodiments herein cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction for the purchased electronic item.
  • the verification entity which may be the credit issuer or the credit issuer's processor or agent (e.g., the verification entity), receives the encryption stream which (in combination with the purchase price) is sent by the merchant for identity verification and payment authorization prior to payment processing. Then, the verification entity cross-references the encryption stream against a separate database containing the customer information to produce the identity verification and payment authorization. Then, the verification entity transfers the identity verification and payment authorization to the merchant, who completes the transaction with the customer and processes the transaction for payment as a “signature present” verified transaction by pre-agreement of all parties.
  • the identity verification and payment authorization confirms to the merchant the actual presence of the customer in the purchase transaction, such that the merchant is provided assurance that the merchant is not transacting with any entity other than the customer and that the customer has agreed to be bound by the terms of a transaction verified under the customer-credit issuer agreement.
  • the customer-credit issuer agreement anticipates the use of and reliance upon that agreement in third party transactions, in part, in exchange for identity protection and the convenience of the embodiments herein.
  • the encryption stream contains identifiers—not necessarily the personal customer information—that have been agreed upon by and between the customer and the credit issuer (e.g., bank), and the identity verification and payment authorization contains information limited to a unique transaction, as anticipated and agreed upon by and between the customer and the credit issuer. Such identifiers would be of little use even if the encryption stream is decrypted.
  • the encryption stream, or transaction verification may be added, by the merchant, to a purchased electronic item, such as downloadable digital media, to create a personalized electronic item.
  • the encryption steam or unique transaction verification (collectively or separately sometimes referred to herein as the “transaction identifier”) can be hidden, so that the customer is unable to remove the transaction identifier from the personalized electronic item.
  • the personalized electronic item could be made non-functional (so that the personalized electronic item cannot be opened, or cannot be played, etc.) if the encryption stream or transaction identifier, in part or in whole, is ever removed.
  • the personalized electronic item always maintains the transaction identifier and allows the customer who purchased the electronic item to be identified (through the verification entity).
  • the transaction identifier is added in such a way that all copies of the purchased electronic item will have the transaction identifier.
  • the customer who originally purchased the electronic item from the merchant (the source of the copies) can always be identified through reference to the verification entities secure database.
  • the “transaction identifier” is what is returned by the verifying entity and, because it is a unique identifier, may also be usable as a media embedded identifier.
  • the personalized electronic item is supplied from the merchant to the customer.
  • Each personalized electronic item distributed to different customers is different because of the uniqueness of each different transaction identifier, which allows the customer who originally purchased the electronic item to be identified in copies of the item. Further, the uniqueness of each transaction identifier permits the source of unauthorized copies of the purchased electronic item to be identified through the secure database maintained by the verification entity.
  • the customer can be provided with a notice or warning that their information will always remain with copies of any personalized electronic items.
  • a similar notice or warning can be displayed informing the customer that he/she is agreeing to be bound by the terms and penalties provided for unauthorized use or copying of the electronic item; and, each time (or the first few times) the personalized electronic item is opened, played, etc. the same warning may be displayed.
  • Such continuous warnings may or may not be applicable to certain downloadable media such as music.
  • warnings are intended to discourage the customer from supplying copies of the personalized electronic item to others in violation of the rights of the merchant (e.g., illegally uploading or copying) because the customer is made aware, through the warnings, that the illegal uploading or copying can be traced back to them through the verification entity using the transaction identifier and/or encryption stream and is agreeing to be bound by the conditions and terms set forth in those warnings.
  • Similar authorized use and acceptance warnings may also be employed for access based upon age, sale pricing based upon age or residence, etc.
  • the embodiments herein allow for a wide range of customer identifiers that encourage, promote, and protect eCommerce and the parties engaging in it.
  • the copyright warnings, etc. may not be applicable to audio media after it is downloaded. These warnings are important prior to any downloading, however, to the extent that the customer is agreeing to be bound by the terms and conditions contained in such warnings as a condition of the transaction, he/she is agreeing to be bound under the adhesion provisions of his/her agreement with the credit issuer and is agreeing to be liable for breach of terms and conditions. The parties are agreeing to be responsible for their actions and intensions.
  • the encrypting of the customer information can be, for example, performed as follows. First, the customer connects with the credit issuer using a first computerized device and the credit issuer downloads software to the first computerized device. Vendors (which are interchangeably sometimes referred to herein as “merchants”) may also act as a registering agent for a credit issuer by redirecting a customer to the credit issuer's site for registration with the verification entity.
  • vendors which are interchangeably sometimes referred to herein as “merchants”
  • the advantage to this for example, is that once an existing credit card user registers his/her card under the program, that user/customer may elect to restrict the use of the “card” on a computer network such as the Internet to embodiments herein, protecting the “card” from unauthorized use by others.
  • the customer supplies or agrees to allow storage of existing sensitive information, such as valid shipping addresses, their date of birth (for age group classification), their bank account numbers, credit card numbers, etc.
  • Certain items of the customer information (such as bank account numbers and credit card numbers) are not stored on the customer's computerized device, but instead are only maintained in the databases of the credit issuer or the verification entity, though coded or un-coded identifiers may be used to specifically reference such information.
  • Other items or identifiers (name, address, age reference, etc.) of the customer information may be encrypted to create the encryption stream, which is stored on the customer's computerized device and which may be coded or un-coded prior to encryption, in part or in whole.
  • credit issuer herein is a shorthand term for the entity that extends credit to the customer. This can be a merchant, vendor, bank, financial institution, etc. Further, any such credit issuers can include a verification entity and can act through an agent. Therefore, the term “credit issuer” is used to represent any and all of the foregoing.
  • the credit issuer as discussed in this document, may be one of several types. One type is a credit card, debit card, or similar type of issuer. Another type of issuer could be an entity that allows existing credit vehicle holders, such as existing credit card holders, to register all of the “cards” they wish to use with a single entity which would then act as the processor.
  • Another type could be a non-card/non-bank type of credit issuer, such as a Microsoft® or a Yahoo!® or a Google®, that determines a line-of-credit for an individual, on a case by case basis, and extends to them an identifiable credit amount that may be used by the individual over a network such as the Internet.
  • a non-card/non-bank type of credit issuer such as a Microsoft® or a Yahoo!® or a Google®
  • a line-of-credit for an individual on a case by case basis, and extends to them an identifiable credit amount that may be used by the individual over a network such as the Internet.
  • Credits are processed by the credit issuer or its processor, sometimes acting as the verifier, with participating vendors that do business over the network (this alternative recognizes that conventional credit cards may not be necessary on a computer type of network and that what is necessary is the need to protect the parties to the transaction while tracking the flow of legitimate commerce).
  • the vendors may choose to promote this program by referring customers to their credit issuer for enrollment. This protects the customer and his/her identity, improves the marketability of the vendor, assures the vendor of payment, and reduces chargebacks and fraud; all serving to improve the vendor's bottom-line.
  • Banks and software companies are capable of reading and verifying a computer's identity without downloading software onto a “visitor's” computer; however, software can be downloaded or otherwise installed in order to perform the other tasks.
  • the credit issuer reads and registers the unique hardware identifiers (such as serial numbers from the motherboard, the hard drives, the processor, etc.) from the first computerized device. These unique hardware identifiers are also incorporated into the encryption stream. Then, the same steps are repeated for any additional computerized devices the customer desires to authorize and register for use in future purchase transactions, if, for example, the customer owns or has access to multiple computers and computerized devices. Such processes can be done when the customer is setting up or modifying their account with the credit issuer.
  • the verification entity financial institution, and/or credit issuer, (e.g., a bank), sets up the elements of the encryption stream with the customer, including the initial contract/agreement that will be relied upon by any vendor supporting this program. It is the agreement between the credit issuer and the customer that is relied upon by the vendor under the terms of its merchant bank/acquirer agreement.
  • the verifying entity may be the credit issuer, or it may be a processor or agent used by the credit issuer, which processor or agent has access to the database containing the customer's information.
  • customer types include: 1) new customer (applying for computer network credit; a new credit card; a new debit card or other form of “loaded” card such as a payroll debit card); 2) existing relationship (holder of an existing credit vehicle, such as the types in number 1, above, that may be used for purchases over a computer network such as the internet); or 3) new customer with existing credit vehicle (a person with existing credit vehicles/cards, such as the type described in number 1, above, may chose to register some or all of those “cards” with a single entity that would allow the “program” to be attached to all of the registered “cards”).
  • the “credit” may be in the form of an existing credit card, debit card, etc., or it may take the form of a newly issued “credit” from some other source willing to extend such credit to an identifiable individual—a sort of electronic-letter-of-credit, or eCredit—subject to various rules and regulations. It is during the process of registering the customer's identifiers and other information with this credit issuer—a bank will presumably have an existing customer's information in its database—that the customer and the credit issuer form the agreement of what identifiers are to be present, along with the hardware information of the registered device(s), to confirm the customer's presence.
  • Elements of the customer information such as age identification can be extrapolated from the database, rather than being stored in the encryption stream, although a date-of-birth or a unique word may be part of the encryption stream.
  • the method can incorporate, into the encryption stream, a second set of computer hardware identifiers and a time and date stamp from the computerized device making the actual transfer of the encryption stream.
  • the second hardware identifiers that are readjust prior to the transfer of the encryption stream would not match the hardware identifiers in the encryption stream and the transaction would not be approved by the verification entity.
  • the time and date stamp could be used to make the encryption stream that is supplied to the merchant only valid for a limited time period (e.g., minutes, hours, days, etc.).
  • Such processes further enhance the “customer presence” verification process performed by the verification entity to provide additional assurances to the vendor that they are actually dealing with the customer and not someone other than the actual customer.
  • the embodiments herein permit the credit issuer to disallow a specific vendor into the program, where vendor fraud is, or has been, an issue. This further serves to protect the customer, as well as reputable vendors.
  • Embodiments herein also comprise one or more systems that use an encoder that is positioned within the customer's computer by the credit issuer.
  • the encoder encrypts the customer identifier information in the encryption stream.
  • the credit issuer positions a transfer agent within the customer's computer and with the merchant. The transfer agent causes the encryption stream to be transferred from the customer's computer to the merchant's computer in the purchase transaction for the purchased electronic item.
  • the verification entity has a verifier that is operatively connected to both the customer's computer and/or the merchant's computer during the verification stage of a transaction.
  • the verifier in order to enhance the security of the customer information, is maintained separate from the customer's computer and from the merchant by being maintained in the verification entity.
  • a database of the customer payment information can be maintained within the verification entity or separate from the verification entity. In either situation, the database is operatively connected only to the verifier, and neither the customer nor the merchant have access to the database.
  • the transfer agent is adapted to cause the encryption stream to be transferred from the merchant's computer to the verifier for payment verification.
  • the verifier is further adapted to generate the identity verification and payment authorization, based on the database information, and to transfer the identity verification and payment authorization to the merchant.
  • the encryption stream or the unique identity verification and payment authorization is adapted to be added, by the merchant, to the purchased electronic item to create the personalized electronic item that is supplied from the merchant to the customer.
  • FIG. 1 is a schematic architectural diagram of one embodiment of the invention
  • FIG. 2 is a flow diagram illustrating an embodiment of the invention
  • FIG. 3 is a flow diagram illustrating an embodiment of the invention
  • FIG. 4 is a schematic diagram of a system embodiment herein;
  • FIG. 5 is a schematic diagram of a system embodiment herein;
  • FIG. 6 is a schematic diagram of an encryption stream according to embodiments herein;
  • FIG. 7 is a flow diagram illustrating a method embodiment herein.
  • FIG. 8 is a flow diagram illustrating a method embodiment herein
  • FIG. 9 is a flow diagram illustrating a method embodiment herein.
  • FIG. 10 is a schematic diagram of a system embodiment herein.
  • FIG. 1 a schematic diagram of a preferred embodiment of the invention is illustrated. More specifically, FIG. 1 illustrates a personal computer 100 connected to a network 170 . In addition, a code confirmation site 130 , merchant site 140 , financial institution 150 , and credit agency 160 are also connected to the network 170 .
  • the arrangement of features shown in FIG. 1 is arbitrarily selected in order to illustrate the invention. One ordinarily skilled in the art would understand that many other arrangements of items could be utilized with the invention.
  • the personal computer 100 (which is sometimes referred to herein has the “customer's computer”) comprises any form of computing device that is capable of connecting with the network 170 . Therefore, the customer's computer 100 can comprise a standard desktop personal computer, a mobile computer, a personal digital assistant, a cell phone, etc.
  • the customer's computer 100 includes a graphic user interface (GUI) 110 , and a storage device 112 , such as a magnetic hard drive or other read/write storage device.
  • GUI graphic user interface
  • the customer's computer 100 includes an encrypter 114 , a network connection 116 , a populator 118 and central processing unit (CPU) 120 .
  • CPU central processing unit
  • the financial institution 150 includes a database of historical address 154 obtained from the credit agency 160 and a comparator 152 that is utilized to check customer addresses, as discussed below.
  • FIG. 2 The operation of the system shown in FIG. 1 is illustrated in flowchart form in FIG. 2 . More specifically, the inventive system is added to the customer's computer 100 . Using the graphic user interface 110 , the customer preferably creates a password as shown in item 200 that will allow future access to the inventive system. The customer then supplies personal information such as Social Security number, address, date of birth, relatives' names, credit card information, banking information, employment information, etc. to the inventive system through the graphic user interface 110 . The encrypter 114 immediately encrypts this information and stores the encrypted information as a customer code on the storage device 112 , as shown in item 202 .
  • the encrypter 114 immediately encrypts this information and stores the encrypted information as a customer code on the storage device 112 , as shown in item 202 .
  • An important feature of the invention is that the customers' personal information is only stored in encrypted form. Therefore, if an unauthorized user were able to access the user's storage device 112 , the customers' personal information would be secure because of its encrypted nature.
  • the encryption process has three elements: 1) the encryption code itself, which is pared to the decryption code maintained by the financial institution; 2) the customer's private key, password and/or personal access code, which is created and controlled by the customer for accessing the encrypted information; and, 3) the customer's computer's system identifier that requires that the encrypted information may only be accessed on the customer's computer. Once the customer's information is entered, these three elements and the need to re-enter any of the information become transparent to all parties during any e-commerce transaction (e.g., dual key or public key).
  • the present invention requires the user to supply an authorized shipping address; a procedure that requires a separate secured transaction with the financial institution, confirmed by e-mail to the customer. Such steps make impractical the unauthorized access.
  • the user can create multiple customer codes, each of which could include a different credit agency (e.g., a different credit card). Therefore, the invention allows the user to create a customer code for each of the credit cards the user owns.
  • customer codes can be created for the same credit card.
  • These additional customer codes can include different spending limits. This allows the user to establish different customer codes for budgetary or other similar reasons.
  • a user could create customer codes for different items of a personal or business budget. Upon reaching a spending limit, no additional transactions (purchases) could be performed until the budget information is changed or updated.
  • the budget plan could be updated automatically to allow periodic budgets to be automatically implemented.
  • An example of this could include one customer code that uses a credit card to pay monthly charges to an internet service provider (ISP) for a specific period, e.g., one year.
  • the customer code would include a monthly limit of the monthly ISP fee and a twelve-month limit on the transaction.
  • ISP internet service provider
  • parents could create customer codes for each of their children, where each customer code potentially includes a different spending limit.
  • the spending limits can be updated periodically to provide a periodic allowance.
  • This aspect of the invention allows parents to establish a monthly Internet-allowance for a child. The parents establish a separately authorized customer code together with periodic limits (e.g., monthly or weekly). The effect of this is that the parent would control the establishment and use of authorized sub-accounts.
  • the customer codes preferably include the name, address and credit card number of the user in encrypted form.
  • the invention operates in the background on the customer's computer 100 until the customer desires to make a purchase over the network 170 .
  • the graphic user interface 110 provides the user with different payment options (customer codes).
  • the populator 118 prepares to send the customer code to the merchant's site 140 by issuing an instruction to send the customer code out on the network 170 directed to the merchant site 140 , as shown in item 204 .
  • the invention provides for the customer code to automatically populate the appropriate “checkout” box of the merchant site 140 using the populator 118 .
  • the customer gets to a checkout (purchase) window of a merchant site, ( 300 ) the customer places the cursor into the appropriate box (e.g., the credit card number field, customer code data fields, etc.) 302 .
  • the appropriate box e.g., the credit card number field, customer code data fields, etc.
  • Many merchant sites 140 may not have space for the customer code date field. Therefore, the invention allows the credit card number (or other similar payment filed) to be used by the merchant site.
  • the encrypted customer code data field is longer than credit card numbers. Therefore, the only modification needed by the merchant site 140 to accommodate the invention is to allow longer encrypted data strings to be accepted by the credit card number field.
  • the user Once the user places the cursor in the appropriate box, they press a pre-established function key on the keyboard (or selects a button on the graphic user interface) ( 304 ) which brings up a user ID and password entry pop-up window ( 306 ).
  • a pre-established function key on the keyboard or selects a button on the graphic user interface
  • the entire customer code is populated (written to) the field on the merchant site. The user does not need to enter their name, address, etc. because all that information is contained in the customer code.
  • the financial institution 150 upon approval of the credit transaction, the financial institution 150 will return name, shipping address and credit authorization number (not credit card number) to the merchant site 140 so that the user does not need to input such information.
  • the user can select a customer code, which includes information as to a credit card with a sufficient credit limit, desirable interest rate, etc. to make the purchase.
  • the customer code itself is the encrypted personal information data stream and can be somewhat lengthy. Therefore, the graphic user interface provides a user-friendly selection menu with abbreviated names. For example, in one embodiment, a pull-down menu with credit card abbreviations is provided to allow the user to select the customer code to be used. If the user has established only one customer code, the pull down menu will include only that single customer code abbreviation. In a similar manner, different budget categories or children's names could also be utilized as the abbreviated names in the pull-down menu to select the appropriate customer code.
  • the user ID's are the customer codes abbreviations.
  • An error message is generated if the user ID/password is incorrect ( 310 ) and processing returns to box 304 to retry the user ID/password. As is well-known a limited number of retries of the user ID/password will be allowed.
  • the customer has the option to set up rules regarding payment ( 312 ), such as the automatic monthly ISP payments discussed above. If no special rules are to be established for payment, a single direct payment scheme is assumed and processing proceeds to box 316 . On the other hand, if payment rules are to be established, another window pops-up ( 314 ) to lead the customer through a wizard to setup payment options such as transaction amounts, total credit limits, and/or time frames, etc.
  • the invention then takes the previously encrypted sensitive customer data, and adds to it a purchase specific transaction number and rules (if any).
  • the invention also encrypts such additional data (transaction number, rules, etc.) before attaching necessary routing information, and automatically populates the complete customer code into the customer code data field or credit card field 302 .
  • the customer code is the encrypted data string of a number of data pieces including credit card number, rules, transaction number, customer name and address, etc.
  • the invention sends the customer code directly to the merchant site 140 , as shown in item 208 .
  • a code confirmation site 130 is utilized (item 206 ).
  • the customer code is directed to the code confirmation site 130 instead of to the merchant site 140 by the populator 118 .
  • the code confirmation site 130 controlled by the credit agency, determines whether the customer code has the proper format by allowing the credit agency to periodically update or change the public keys (e.g., the encryption and decryption codes). If the customer code is determined to be improper by the code confirmation unit 130 , an error report is issued explaining that the customer code is improper, as shown in item 212 . If the customer code is proper, it is sent to the merchant site 140 by the code confirmation unit 130 , as shown in item 214 .
  • the merchant site 140 Upon receipt of the customer code, the merchant site 140 forwards the customer code to the 150 .
  • An important feature of the invention is that confidential information is not provided to the merchant in unencrypted form at any time. Thus, the merchant is relieved of the responsibility for that information.
  • the credit transaction is acceptable (e.g., whether the customer has sufficient credit available)
  • This aspect of the invention prevents items from being improperly diverted by criminals to addresses other than the customer's address.
  • the customer is able to establish multiple authorized shipping addresses directly with the credit agency. These addresses may include such alternatives as office or home. Each address is entered and stored on the customer's storage device with a separate encryption sequence as a separate customer code. At the time the customer is setting up new customer codes, new authorized addresses for the customer are sent (via e-mail or similar electronic transfer) directly from the customer's computer 100 to the credit agency 160 over the network 170 and are augmented to the list of authorized addresses associated with the customer in the credit agency's 160 databases.
  • a confirmation code, name, address, and other required information is sent to the merchant 140 , as shown in item 224 .
  • the term “consistent” means that the two addresses must be substantially matching.
  • the shipping address is directed to an address that is not consistent with an authorized address for that customer (e.g. different state, different city, different street, etc.)
  • an error report is issued to the merchant site 140 and an e-mail is sent to the customer explaining the improper transaction.
  • the present invention creates a system for eliminating error and fraud in these authorizations by “correcting” the address. It is then the merchant's responsibility to ensure that the product only ships to the authorized or corrected address. This aspect of the present invention adds a layer of security, allowing the customer to “intercept” and return any unauthorized shipments.
  • the customer uses the “rule wizard” to temporarily add a “non-permanent” shipping address, allowing the customer to send gifts, etc., to others.
  • the customer's computer's system identifier and password are required to access the “wizard” for this non-recurring change. Additionally, a confirmation of this shipment to a non-authorized address is e-mailed to the customer so that the customer may be alerted if a fraudulent transaction were being attempted.
  • the merchant site 140 preferably includes an input field (which may be the current credit card field) properly formatted to receive the customer code.
  • the format of the input field is established by the credit agency 160 and is similarly required by the financial institution 150 .
  • the credit agency 160 can generally dictate the format of information that must be supplied by the more numerous financial institutions 150 that deal with the credit agency 160 .
  • merchant sites 140 that desired to deal with the financial institutions 150 must comply with the data format requirements of the financial institution 150 (and, in turn, the credit agency 160 ). Therefore, the invention is applicable to a network that continually adds and drops large numbers of merchant sites 140 , such as the Internet.
  • each merchant site 140 will comply with the requirements of the financial institution 150 and will include the specialized format of the customer code data field in their merchant sites 140 . Therefore, the user should find the customer code data field on the vast majority of Web sites that allow customer purchases.
  • the invention works with the relatively small number of national credit agencies 160 to establish a format (that can potentially vary from credit card agency to credit card agency) that will be made available by the merchants 140 . Because a limited number of credit agencies 160 control the majority of the online credit purchase transactions, the format of the customer code input field will be provided upon the vast majority of merchant sites 140 . Thus, the invention provides the user with access to virtually all merchant sites 140 that desire to deal with financial institutions (which is virtually all merchant sites that desire to complete purchase transactions).
  • the credit agencies [160] are in the business of getting customers to use credit (e.g., their credit cards). Where the present invention creates security for the customer, together with additional control and use features, the credit agencies derive a promotional benefit for their credit facilities. Moreover, these beneficial features do not require extra steps. A benefit of the present invention is that it eliminates steps that include repeated entry of customer information or the posting of that information on third-party databases.
  • An important safety feature of the invention is that the merchant site 140 never gains access to the customer's confidential information, such as credit card numbers. To the contrary, the merchant site 140 only receives the encrypted customer code from the customer 100 and the transaction confirmation code (and possibly a corrected address) from the financial institution 150 . Therefore, if any of the foregoing transactions over the network 170 are intercepted or if the merchant site suffers an unauthorized access of its records, the customer's credit card information will be secure.
  • the invention avoids many of the problems associated with conventional secured network transactions. More specifically, all elements of the present invention must be in place for a transaction to be completed. Conventional systems provide one level of security to all transactions, so that if a database is breached all of the records on that “secured” site are accessible. The present invention protects individual records creating an additional level of security.
  • the benefits that flow from the present invention, as detailed above, include security to an individual customer's online credit and the customer's control and flexible use of that credit.
  • the present invention solves the problem of regulation over the many real jurisdictions covered by the virtual worldwide nature of the Internet by providing a system and method for creating individual covenants on individual transactions—covenants that create defined rights and protections for each party engaging in Internet commerce.
  • enforceable terms of agreeing between parties each of whom have a valid expectation of reliance on each other (e.g., an expectation that each is “of age” or is otherwise the person authorized to engage in and take responsibility for such a transaction)
  • the invention creates jurisdictional and enforceable rights based upon an asset jurisdiction of each party rather than upon the virtual environment of their commercial activity.
  • One embodiment herein is centered around a contract (“customer agreement”) created between a customer and credit issuer.
  • the customer agreement allows the credit issuer, either acting as a verifier or acting through an authorized processor or agent, to authorize and verify transactions between the customer and various participating vendors.
  • Various to customer-vendor agreements are anticipated and allowed under the customer-credit issuer agreement and various, direct or indirect, credit issuer-vendor agreements are also anticipated and allowed under the customer-credit issuer agreement.
  • There are also agreements or contracts between the verification entity which can be a stand alone entity or combined with the financial institution that issues credit, debit and/or prepaid cards, or other capable financial provider and the individual customer/consumer.
  • the customer agreement is the center of all activity in embodiments herein. It sets the rules and terms by which a customer is bound—i.e., the price for securing an individual's identity over a computer Network is that individual's agreement to be legally bound by his/her transactions whenever all agreed elements that establish the individuals online identity (e.g., his/her registered computer with the other identifiers that distinguish this individual from others that may use or have access to that computer).
  • This agreement covers the purchase (i.e., agreement to be responsible and pay) and agreement to terms, such as honoring any copyright or trademarks attached thereto and agreement to be legally and personally accountable for the criminal and civil penalties covering those registered rights.
  • this credit issuer-customer agreement/contract gives permission to the credit issuer to reference the customer agreement and adhere its terms to any verified customer-vendor agreement/transaction.
  • the customer agreement applied to any credit issuer-vendor agreement, direct or indirect, allows the vendor to rely upon the credit issuer-customer agreement in verifying the customer-vendor agreement. In other words, the vendor's payment is assured for employing this payment device and does not require the individual to disclose, register, or otherwise give up his/her secure identity.
  • the customer agreement serves as the center for the related transactional activities that may be controlled under the embodiments herein. These related activities include: any verifiable transaction between the customer and the merchant over a computer network, which transaction may be for such things as goods or services; and, the transaction ultimately facilitated by the contract, directly or indirectly, between the vendor and the financial entity (“vendor agreement”), under which the vendor's consideration for the customer-vendor transaction may be guaranteed or “bonded.”
  • vendor agreement the financial entity
  • the merchant's consideration may take the form of such things as payment, credit worthiness, agreement to terms of sale or use of the merchant's offering, or any other terms of such agreement between the customer and the merchant that the contract may cover and that the verification entity confirms during the initial transaction to the merchant.
  • the contracts formed under the embodiments herein create, inter alia, terms of use, third party reliance, and legal jurisdiction.
  • the parties could agree that the proper jurisdiction for adjudicating disputes is the business location of the merchant, the location of a customer dealing with a merchant, or any other location of choice.
  • Terms of use include a “person present” guarantee (akin to “signature present”) to ensure that the merchant is only dealing with the identified customer and to assure that the merchant will be paid without suffering from chargebacks. This person present guarantee is accomplished when all registered customer identification elements are present at the time of the transaction, which is confirmed by the verification entity.
  • the verification entity certifies both sides of the transaction under the terms of the customer-credit issuer agreement and the vendor-credit issuer agreement, allowing all terms, e.g., confirmation of purchase/“signature present”, agreement of copyright protection, or representation age verification to be enforced and relied upon.
  • any customer information that the credit issuer holds could be relied upon by a third party, without actually revealing the customer's information or customer's identity.
  • the credit issuer acts as a holder of trust on behalf of both the customer and the merchant, and the verifying entity certifies this with each individual transaction. This could be a bonded or escrowed type of element to the transaction that protects the identity of the customer and the rights of the merchant, and an element upon which the vendor may separately rely.
  • this payment procedure has the bank wearing two hats: that of an “issuing bank”; and, that of an “acquiring bank.”
  • the bank issues credit and a card to a customer for use in purchasing goods, services, etc.
  • the bank agrees to acquire (and to pay for) the debt created by the use of those credit cards.
  • a bank acting as an “issuing bank,” uses its agreement for use of the card according to terms that require payment and interest on any unpaid balance.
  • a bank acting as an “acquiring bank,” requires merchants, among things, to verify the identity of the credit card user and to get the cardholder to sign a receipt for whatever is purchased. This over-simplified explanation of credit card transactions is sufficient to point out the problem of unauthorized credit card use and identity verification for transactions over the Internet, or any similar system of computer connected commerce.
  • the vendor-credit issuer agreement takes the additional role of screening qualified vendors.
  • One component of eCommerce fraud is vendor fraud. Vendors with known or suspected fraudulent histories can have their agreements cancelled and otherwise be denied access to the signature-present payment terms provided herein and other protections, such as copyright. This vendor qualifying step is necessary both to protect the customer and to limit fraud.
  • an encrypted code (“encryption stream”) that allows a third party verification entity to verify the presence of the customer to the merchant, and to verify the customer's agreement with the credit issuer, the terms of which allow the verification entity to confirm the customer's identity and agreement to be bound by the terms of the transaction with the vendor, including “signature present” payment.
  • an encrypted code (“encryption stream”) that allows a third party verification entity to verify the presence of the customer to the merchant, and to verify the customer's agreement with the credit issuer, the terms of which allow the verification entity to confirm the customer's identity and agreement to be bound by the terms of the transaction with the vendor, including “signature present” payment.
  • the entire receipt and terms of the transaction could be encrypted and included in the encryption stream.
  • the customer-vendor agreement is verified under terms of the credit issuer-customer agreement and, in reliance upon it, the credit issuer-vendor agreement, which secure the terms of the customer-vendor agreement through agreed adhesion of the first two agreements.
  • the customer-vendor agreement is the anticipated result any purpose of the other two agreements, which anticipate that all parties will be bound by their part of the separate agreements once at such point as the credit issuer or its agent, such as a processor, verifies the customer's presence and agreement to terms of the transaction—according to the customer's request, which is triggered by presentation of the verifiable encryption stream.
  • the separate customer agreement (between the verification entity or credit issuer and the customer) and the separate merchant agreement (between the merchant and its merchant bank) require the customer and the merchant to enter into the customer agreement (between the merchant and the customer) that is created at the time of the purchase transaction between the merchant and the customer.
  • the embodiments herein provide the ability of the credit issuer to screen vendors as a further protection to customers.
  • a new customer agreement can be created for each purchase transaction between a merchant and a customer, which, inter alia, binds the customer, if applicable to a specific transaction, to observe the intellectual property rights of the merchant or media and which makes binding statements, if applicable to a specific transaction, regarding the presence, identity, age, etc. of the customer.
  • the verification entity is bound under the terms of the credit issuer's agreement with the customer, and through that agreement the other parties, to protect the identity and transaction of the customer and to verify, authorize, and protect the payment and other terms of the transaction (such as age, identity, area of residence, agreement to honor/be bound by copyright terms, etc.) on behalf of the merchant.
  • an encryption stream Before an encryption stream is created (at the time of the purchase transaction) certain elements must be present to confirm the individual customer's identity and to verify that the customer has agreed to be bound by the terms of the instant customer agreement.
  • This sequence of elements may include, among other things, a name (not necessarily the cardholder's name), an address for shipping or confirming residential status (not necessarily the cardholder's billing address), the customer's unique credit number or ID with the financial entity, and the registered hardware identity of the computer, or computers, that the customer intends to authorize for such transactions.
  • the encryption stream is created from some of these elements, such as name, address, customer agreement identifier, computer hardware identifier, etc. but does not include sensitive information, such as the customer's credit card number or bank account numbers.
  • the BIN Bank Identification Number
  • routing identifier such as an IP address, which is not encrypted, is added to the encryption stream for routing purposes.
  • the invention uses the terms created by the customer in forming his/her agreement with the credit issuer.
  • This agreement has the customer assume responsibility for all transactions where all required elements of any of the customer's encryption streams are present.
  • the agreement also allows the encryption stream to be downloaded along with any digital media being acquired by the customer as a record of the agreement to the terms of use, such as copyright protection.
  • One aspect of this invention is that it is a system and method for creating, verifying, and imbedding (when necessary) a contractually agreed upon “code” that, when used with all elements present, acts as a signature, unique to the individual customer, confirming the presence of the customer in the transaction.
  • the merchant has the right to rely upon the terms agreed to by the customer (which also confirms identity and jurisdiction) for the transaction in the customer agreement.
  • This invention offers identity protection in exchange for contractually binding all parties to the terms of such transactions.
  • the invention provides the ability to protect the privacy and identity of a customer initiating an Internet purchase transaction, while also protecting the rights and commercial benefits of the merchant providing the product, service, etc.
  • the embodiments herein protect the identity of the customer, which remains encrypted and/or otherwise protected unless the terms of the agreement are breached or otherwise violated.
  • the invention creates a method, system, structure, and apparatus for promoting, protecting, and verifying commerce over computer networks, such as the Internet, by protecting the rights of the customer, including the customer's identity and financial information, and the rights of the merchant, including the merchant's payment and the merchant's control and ownership of its product and/or service, in part, by establishing an agreed upon jurisdiction for the protection and prosecution of those various rights.
  • the embodiments herein create a binding contract between the parties to a transaction by giving the credit issuer and verification entity the contracted ability, by consent of the customer and merchant.
  • the embodiments herein confirm that the identity and credit worthy elements of the transaction have been met, while protecting the identity of the customer and guaranteeing the merchant that it will be compensated.
  • the invention may be used to establish a “verified presence” element to the transaction, establish a “signature present” element to the transaction, establish the customer's age (e.g., in terms of “over 18” or “over 21” or “over 65”), establish a residential or delivery element, establish a customer/seller nexus to the customer agreement, and establish the customer's identity (without necessarily revealing it or storing it online) all, in part, by requiring that all components of the encryption stream be present and be verified in order for a transaction to be completed.
  • the present embodiments provide a method and system of securing transactional rights over a computer network 404 .
  • the terms of the agreements 422 that are created between the customer 402 the merchant 450 , and the verification entity 420 and/or the financial institution 440 are stored by the verification entity 420 .
  • the verification entity 420 can be included within the financial institution (credit issuer) 440 as shown in FIG. 5 , or be separate therefrom, as shown in FIG. 4 .
  • FIG. 4 illustrates a single customer's computer 410 , a single verification entity 420 , a single financial institution 440 , and a single merchant 450 , as would be understood by those ordinarily skilled in the art, FIG.
  • the verification entity 420 stores multiple agreements 422 , one for each purchase transaction.
  • the method includes registering and storing the customer agreement(s) 422 with the credit issuer/verification entity 440 / 420 .
  • the customer information is stored in a database 430 , which can be within the credit issuer/verification entity 440 / 420 as shown in FIG. 5 , or as shown in FIG. 4 , separate from the credit issuer/verification entity 440 / 420 .
  • a database 430 can be within the credit issuer/verification entity 440 / 420 as shown in FIG. 5 , or as shown in FIG. 4 , separate from the credit issuer/verification entity 440 / 420 .
  • the customer's computer 410 is connected to the merchant 450 and the verification entity 420 over one or more computer networks 404 .
  • a password is used to access an encoder 412 on the customer's computer 410 .
  • the encoder 412 is downloaded to the customer's computer 410 by the verification entity 420 during the customer registration process.
  • the encoder 412 encrypts the customer information to form the encryption stream 414 which is stored on the customer's computer 410 .
  • the customer information is not stored on the customer's computer in non-encrypted form.
  • the encryption stream does not include any personal financial customer information relating to credit card numbers, bank account numbers, etc. and such information is stored only in the database(s) 430 .
  • the verification entity downloads transfer agents 416 , 456 to the customer's computer 410 and to the merchant 450 .
  • the transfer agent 416 causes the encryption stream 414 to be transferred from the customer's computer to the merchant's computer 450 in the purchase transaction for the purchased electronic item 454 .
  • the verification entity 420 has a verifier 424 that is operatively connected to both the customer's computer 410 and the merchant's computer 450 .
  • the verifier 424 is maintained separate from the customer's computer 410 and from the merchant by being maintained in the credit issuer/verification entity 440 / 420 .
  • the database 430 of the customer payment information can be maintained within the credit issuer/verification entity 440 / 420 or separate from the verification entity 420 . In either situation, the database 430 is operatively connected only to the verifier 424 , and neither the customer nor the merchant have access to the database.
  • the transfer agent 416 is adapted to cause the encryption stream 414 to be transferred (along with the monetary amount of the transaction) from the merchant's computer 450 to the verifier 424 for payment verification.
  • the verifier 424 is further adapted to generate the payment verification, based on the database 430 , and to transfer the payment verification to the merchant 450 .
  • the encryption stream 414 and/or a transaction identifier is adapted to be added, by the merchant, to the purchased electronic item to create the personalized electronic item 454 (as shown in FIG. 6 ) that is supplied from the merchant 450 to the customer's computer 410 .
  • the encryption stream 414 can include such information as the customer's name, a customer shipping address, customer's date of birth and customer's hardware computer identifier.
  • the customer shipping address can comprise one of a plurality of valid shipping addresses that depend upon which encryption stream 414 is supplied to the merchant 450 .
  • the method can allow the customer to select from a plurality of stored encryption streams 414 , each having a different valid shipping address.
  • the method supplies the selected encryption stream 414 together with the computer identifier as part of the identifier code (the CID and routing identifier 416 ) to the merchant 450 in a transaction over the computer network 404 .
  • the encryption stream 414 is forwarded, by means of the routing identifier 416 , to the verification entity 420 over the computer network 404 .
  • the verification entity 420 decrypts the encryption stream 414 and compares the customer shipping address identifier, name identifier, age identifier, or other identifiers with the authorized corresponding identifiers of the customer maintained by the verification entity 420 such as “identifiers” of name, age, address, etc., can be actual names, addresses, etc., or can be alpha-numeric codes that are used by the verification entity 420 to look up the name, address, age, etc., in the database 430 . If all is in order, the verification entity 420 returns an authorization decision to the merchant 450 over the computer network 404 .
  • the verification entity 420 can produce (and return to the merchant) the identity verification, payment authorization, etc.
  • the verification entity 420 verifies that the terms of the customer's verified presence and electronic signature have been met according to customer's agreement 422 with the verification entity 420 , which confirms to the merchant 450 that the customer has assumed responsibility for the transaction.
  • each of the encryption streams 414 can include a unique payment method that is different from payment methods of other encryption streams 414 .
  • a group of the encryption streams 414 can identify a single credit organization for payment, but each encryption stream 414 in the group can include a different user name, a different authorized and registered device/computer, different age verification method, and/or different customer address.
  • the embodiments herein can subside in supplying a verification of the customer and a payment authorization.
  • the embodiments herein can add the encryption stream or a transaction identifier to the electronic item.
  • the customer agrees to allow the encryption stream 414 and routing identifier 416 to be imbedded, imprinted, and/or otherwise affixed to media or media content 454 acquired from the merchant 450 , as shown in FIG. 6 .
  • the verification entity Before transferring the encryption stream 414 to the merchant 450 , the verification entity can add the encryption stream, which can contain a customer agreement or customer agreement identifier, or the transaction identifier to the encryption stream 414 to allow the customer agreement 422 between the customer 402 and the merchant 450 to be readily accessed.
  • the encryption stream which can contain a customer agreement or customer agreement identifier, or the transaction identifier to the encryption stream 414 to allow the customer agreement 422 between the customer 402 and the merchant 450 to be readily accessed.
  • This process also establishes the jurisdiction for enforcement of the merchant's 404 rights as established in the customer's agreement 422 .
  • the authorization decision is approved only if the encryption stream 414 and the customer information within the database 430 are consistent.
  • the method can send an e-mail confirmation of the transaction to the customer 414 from the verification entity 420 .
  • the encryption stream 414 /CID is stored on the customer storage device 408 only in encrypted form.
  • the disclosed method facilitates the computerized purchase transactions of electronically storable items (which are sometimes referred to herein as electronic items) such as literary works, musical works (recordings), video works (movies, shows, videos, etc.), etc.
  • electronically storable items which are sometimes referred to herein as electronic items
  • literary works such as literary works, musical works (recordings), video works (movies, shows, videos, etc.), etc.
  • the customer enters into the customer agreement with the verification entity.
  • the embodiments herein encrypt “customer information” to produce an encryption stream 704 .
  • Techniques for data encryption are disclosed in, for example, U.S. Pat. Nos. 7,257,225 and 7,251,326 (incorporated herein by reference) and the details of such processes are not provided herein to maintain focus on the disclosed embodiments.
  • customer information may comprise a name identifier (which may or may not be the customer's formal name), a customer age identifier (which can be a specific age, an age range, an age classification), an address identifier (which can be a customer's address or a different address).
  • the embodiments herein cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction for the purchased electronic item.
  • the verification entity receives the encryption stream which is sent by the merchant for payment verification in item 708 .
  • the verification entity cross-references the encryption stream against a separate database containing customer payment information (item 710 ) to produce the unique transaction identifier comprising the identity verification and/or payment authorization in item.
  • the verification entity transfers the unique transaction identifier from the verification entity to the merchant in item 714 .
  • the identity verification and payment authorization confirms to the merchant the actual presence of the customer in the purchase transaction, such that the merchant is provided assurance that the merchant is not transacting with any entity other than the customer.
  • the encryption stream 704 and the identity verification and payment authorization 710 are devoid of personal payment information of the customer, such as credit card information, bank account information, etc., and can take the form of a unique transaction identifier.
  • the encryption stream supplied from the customer can be modified by the verification entity before being supplied to the merchant to include data or information specific to the purchase transaction being conducted or the encryption stream can be accompanied by the unique transaction identifier.
  • Such a modified encryption stream or unique transaction identifier can be used in place of the original encryption stream in embodiments herein.
  • the original encryption stream, the modified encryption stream, and/or the unique transaction identifier can be added to the electronic item before being provided to the customer.
  • the encryption stream and/or unique transaction identifier is added, by the merchant, to the purchased electronic item to create a personalized electronic item 718 .
  • the encryption steam or transaction identifier can be hidden, so that the customer is unable to remove the encryption stream or transaction identifier from the personalized electronic item.
  • the personalized electronic item could be made non-functional (so that the personalized electronic item cannot be opened, or cannot be played, etc.) if the encryption stream or transaction identifier is ever removed.
  • Techniques for controlling access to digital works through encryption streams or watermarks are also well-known (see U.S. Pat. No. 7,062,069 which is incorporated herein by reference for details of such teachings).
  • the personalized electronic item always maintains the encryption stream and allows the customer who purchased the electronic item to be identified (through the verification entity) and all copies of the purchased electronic item will have the encryption stream or transaction identifier.
  • the customer who originally purchased the electronic item from the merchant the source of the copies
  • the personalized electronic item is supplied from the merchant to the customer in item 720 .
  • Each personalized electronic item distributed to different customers is different because of the uniqueness of each different encryption stream or transaction identifier, which allows the customer who originally purchased the electronic item to be identified in copies of the electronic item. Further, the uniqueness of each encryption stream or transaction identifier permits the source of unauthorized copies of the purchased electronic item to be identified through the verification entity.
  • the method potentially includes the step of identifying the customer from the encryption stream that is included within the personalized electronic item.
  • a notice or warning that their information will always remain with copies of any personalized electronic items.
  • a similar notice or warning is displayed informing the customer that he/she is agreeing to be bound by the terms and penalties provided for unauthorized use or copying of the electronic item; and, each time (or the first few times) the personalized electronic item is opened, played, etc. the same warning may be displayed.
  • warnings are intended to discourage the customer from supplying copies of the personalized electronic item to others in violation of the rights of the merchant (e.g., illegally uploading or copying) because the customer is made aware, through the warnings, that the illegal uploading or copying can be traced back to them through the verification entity using the encryption stream and is agreeing to be bound by the conditions and terms set forth in those warnings.
  • Similar authorized use and acceptance warnings may also be employed for access based upon age, sale pricing based upon age or residence, etc.
  • the embodiments herein allow for a wide range of customer identifiers that encourage, promote, and protect eCommerce and the parties engaging in it.
  • the encrypting of the customer information 702 is performed as shown in FIG. 8 .
  • the customer connects with the credit issuer using a first computerized device 800 and the verification entity downloads some software to the first computerized device 802 .
  • the customer supplies or agrees to allow access to existing sensitive information, such as valid shipping addresses, their date of birth (or age group classification), their bank account numbers, credit card numbers, etc. to the verification entity 804 .
  • Certain items of the customer information (such as bank account numbers and credit card numbers) are not stored on the customer's computerized device, but instead are only maintained in the databases of the credit issuer and/or verification entity, though coded or un-coded identifiers may be used to specifically reference such information.
  • Other items or identifiers (name, address, age reference, etc.) of the customer information may be encrypted to create the encryption stream, which is stored on the customer's computerized device and which may be coded or un-coded prior to encryption, in part or in whole.
  • the credit issuer reads and registers the unique hardware identifiers (such as serial numbers from the motherboard, the hard drives, the processor, etc.) from the first computerized device in item 806 . These unique hardware identifiers are also incorporated into the encryption stream in item 808 . Then, the same steps are repeated for any additional computerized devices the customer desires to authorize and register for use in future purchase transactions. Such processes can be done when the customer is setting up or modifying their account with the credit issuer.
  • the unique hardware identifiers such as serial numbers from the motherboard, the hard drives, the processor, etc.
  • the method can incorporate, into the encryption stream, a second set of hardware identifiers and a time and date stamp from the computerized device making the actual transfer of the encryption stream. Therefore, as shown in FIG. 9 , after the hardware identifiers have been added to the encryption stream in item 900 , the method reads a second set of hardware identifiers from the actual computer that is connected to the merchant in item 902 . This second set of hardware identifiers (and potentially a time and date stamp) are then added to the encryption stream in item 904 and the modified encryption stream (having both sets of hardware identifiers) to the merchant in item 906 .
  • the second hardware identifiers that are readjust prior to the transfer of the encryption stream would not match the first hardware identifiers in the encryption stream and the transaction would not be approved by the verification entity.
  • the time and date stamp could be used to make the encryption stream that is supplied to the merchant only valid for a limited time period (e.g., minutes, hours, days, etc.). Such processes further enhance the “customer presence” verification process performed by the verification entity to provide additional assurances to the merchant that they are actually dealing with the customer and not someone other than the actual customer.
  • the embodiments of the invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment including both hardware and software elements.
  • the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
  • the embodiments of the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
  • a computer-usable or computer readable medium can be any apparatus that can comprise, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
  • Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk.
  • Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
  • a data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus.
  • the memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • I/O devices can be coupled to the system either directly or through intervening I/O controllers.
  • Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
  • FIG. 10 A representative hardware environment for practicing the embodiments of the invention is depicted in FIG. 10 .
  • the system comprises at least one processor or central processing unit (CPU) 10 .
  • the CPUs 10 are interconnected via system bus 12 to various devices such as a random access memory (RAM) 14 , read-only memory (ROM) 16 , and an input/output (I/O) adapter 18 .
  • RAM random access memory
  • ROM read-only memory
  • I/O input/output
  • the I/O adapter 18 can connect to peripheral devices, such as disk units 11 and tape drives 13 , or other program storage devices that are readable by the system.
  • the system can read the inventive instructions on the program storage devices and follow these instructions to execute the methodology of the embodiments of the invention.
  • the system further includes a user interface adapter 19 that connects a keyboard 15 , mouse 17 , speaker 24 , microphone 22 , and/or other user interface devices such as a touch screen device (not shown) to the bus 12 to gather user input.
  • a communication adapter 20 connects the bus 12 to a data processing network 25
  • a display adapter 21 connects the bus 12 to a display device 23 which may be embodied as an output device such as a monitor, printer, or transmitter, for example.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)
US11/844,408 2000-12-01 2007-08-24 Transactional security over a network Abandoned US20070288394A1 (en)

Priority Applications (18)

Application Number Priority Date Filing Date Title
US11/844,408 US20070288394A1 (en) 2000-12-01 2007-08-24 Transactional security over a network
CA2933130A CA2933130C (en) 2007-08-24 2007-09-04 Transactional security over a network
HUE07841796A HUE034341T2 (en) 2007-08-24 2007-09-04 Transaction security on a network
AU2007358254A AU2007358254B2 (en) 2007-08-24 2007-09-04 Transactional security over a network
EA201000310A EA018277B1 (ru) 2007-08-24 2007-09-04 Способ обеспечения безопасной торговой сделки в компьютерной сети
EP07841796.1A EP2191406B8 (en) 2007-08-24 2007-09-04 Transactional security over a network
CA2690529A CA2690529C (en) 2007-08-24 2007-09-04 Transactional security over a network
BRPI0721942-3A2A BRPI0721942A2 (pt) 2007-08-24 2007-09-04 Segurança transacional através de uma rede
KR1020107000597A KR101067191B1 (ko) 2007-08-24 2007-09-04 네트워크를 통한 트랜잭션 보안 방법
JP2010521830A JP5052673B2 (ja) 2007-08-24 2007-09-04 ネットワークにおけるトランザクションセキュリティ
CN200780100359.4A CN101785012B (zh) 2007-08-24 2007-09-04 网络上的交易安全
PCT/US2007/077503 WO2009029116A1 (en) 2007-08-24 2007-09-04 Transactional security over a network
MX2010001951A MX2010001951A (es) 2007-08-24 2007-09-04 Seguridad transaccional en una red.
US12/202,524 US8260723B2 (en) 2000-12-01 2008-09-02 Transactional security over a network
US12/911,801 US8260719B2 (en) 2000-12-01 2010-10-26 Transactional security over a network
US13/564,815 US8463713B2 (en) 2000-12-01 2012-08-02 Transactional security over a network
US13/565,897 US9607299B2 (en) 2000-12-01 2012-08-03 Transactional security over a network
US13/891,278 US9400979B2 (en) 2000-12-01 2013-05-10 Transactional security over a network

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US09/726,304 US6839692B2 (en) 2000-12-01 2000-12-01 Method and apparatus to provide secure purchase transactions over a computer network
US10/970,051 US20050055317A1 (en) 2000-12-01 2004-10-21 Method and apparatus to provide secure purchase transactions over a computer network
US89023007P 2007-02-16 2007-02-16
US11/844,408 US20070288394A1 (en) 2000-12-01 2007-08-24 Transactional security over a network

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US10/970,051 Continuation-In-Part US20050055317A1 (en) 2000-12-01 2004-10-21 Method and apparatus to provide secure purchase transactions over a computer network
US10/970,051 Continuation US20050055317A1 (en) 2000-12-01 2004-10-21 Method and apparatus to provide secure purchase transactions over a computer network

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US12/202,524 Continuation-In-Part US8260723B2 (en) 2000-12-01 2008-09-02 Transactional security over a network
US12/911,801 Continuation US8260719B2 (en) 2000-12-01 2010-10-26 Transactional security over a network
US13/891,278 Continuation-In-Part US9400979B2 (en) 2000-12-01 2013-05-10 Transactional security over a network

Publications (1)

Publication Number Publication Date
US20070288394A1 true US20070288394A1 (en) 2007-12-13

Family

ID=39522404

Family Applications (3)

Application Number Title Priority Date Filing Date
US11/844,408 Abandoned US20070288394A1 (en) 2000-12-01 2007-08-24 Transactional security over a network
US12/911,801 Expired - Fee Related US8260719B2 (en) 2000-12-01 2010-10-26 Transactional security over a network
US13/565,897 Expired - Lifetime US9607299B2 (en) 2000-12-01 2012-08-03 Transactional security over a network

Family Applications After (2)

Application Number Title Priority Date Filing Date
US12/911,801 Expired - Fee Related US8260719B2 (en) 2000-12-01 2010-10-26 Transactional security over a network
US13/565,897 Expired - Lifetime US9607299B2 (en) 2000-12-01 2012-08-03 Transactional security over a network

Country Status (12)

Country Link
US (3) US20070288394A1 (ja)
EP (1) EP2191406B8 (ja)
JP (1) JP5052673B2 (ja)
KR (1) KR101067191B1 (ja)
CN (1) CN101785012B (ja)
AU (1) AU2007358254B2 (ja)
BR (1) BRPI0721942A2 (ja)
CA (2) CA2690529C (ja)
EA (1) EA018277B1 (ja)
HU (1) HUE034341T2 (ja)
MX (1) MX2010001951A (ja)
WO (1) WO2009029116A1 (ja)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010027657A1 (en) * 2008-09-02 2010-03-11 Benedor Corporation Transactional security over a network
US20120158542A1 (en) * 2010-12-16 2012-06-21 Ebay Inc. Systems and methods for authenticating payments over a network
US20120185251A1 (en) * 2004-06-22 2012-07-19 Hoshiko Llc Method and system for candidate matching
US20130247213A1 (en) * 2012-03-13 2013-09-19 Compagnie Industrielle Et Financiere D'ingenierie "Ingenico" Method and devices to secure the entry of an alphanumerical code, corresponding computer program product and storage means
US20140025571A1 (en) * 2012-07-23 2014-01-23 Its, Inc. System and method for dual message consumer authentication value-based eft transactions
US20140108210A1 (en) * 2012-10-16 2014-04-17 American Express Travel Related Services Company, Inc. Systems and Methods for Expense Management
US20140180930A1 (en) * 2008-05-29 2014-06-26 Simon Hurry Media device payments remote control personalization and protection
US20150161744A1 (en) * 2013-12-05 2015-06-11 Compagnie Industrielle Et Financiere D'ingenierie "Ingenico" Method for Processing Transactional Data, Corresponding Terminal, Server and Computer Program
US20150278814A1 (en) * 2012-11-14 2015-10-01 Jonathan E. Jaffe System for merchant and non-merchant based tractions utilizing secure non-radiating communications while allowing for secure additional functionality
US9208528B2 (en) 2012-10-16 2015-12-08 American Express Travel Related Services Company, Inc. Systems and methods for expense management
US9269086B2 (en) 2007-11-29 2016-02-23 Visa Usa, Inc. Module ID based targeted marketing
US9501661B2 (en) * 2014-06-10 2016-11-22 Salesforce.Com, Inc. Systems and methods for implementing an encrypted search index
EA025111B1 (ru) * 2009-01-30 2016-11-30 Омарко Нетворк Солюшнс Лимитед Усовершенствования в области многофункциональных систем отождествления
US9558493B2 (en) 2014-11-12 2017-01-31 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US9558492B2 (en) 2014-11-12 2017-01-31 Benedoretse Llc Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US9569776B2 (en) 2014-11-12 2017-02-14 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US9607299B2 (en) 2000-12-01 2017-03-28 Richard F. Carrott Transactional security over a network
US9898357B1 (en) 2015-06-25 2018-02-20 Amazon Technologies, Inc. Root cause detection and monitoring for storage systems
US10037543B2 (en) * 2012-08-13 2018-07-31 Amobee, Inc. Estimating conversion rate in display advertising from past performance data
US10049377B1 (en) * 2011-06-29 2018-08-14 Google Llc Inferring interactions with advertisers
US10223189B1 (en) * 2015-06-25 2019-03-05 Amazon Technologies, Inc. Root cause detection and monitoring for storage systems
US10282245B1 (en) * 2015-06-25 2019-05-07 Amazon Technologies, Inc. Root cause detection and monitoring for storage systems
US10614457B2 (en) 2014-11-12 2020-04-07 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US10679285B1 (en) * 2015-07-13 2020-06-09 Wells Fargo Bank, N.A. Systems and methods for real time credit extension and bill pay configuration
CN111667275A (zh) * 2020-06-19 2020-09-15 腾讯科技(深圳)有限公司 用户身份识别方法、装置、设备及其介质
US10984131B2 (en) * 2016-05-30 2021-04-20 Orange Method for providing personal information of a user requested by a given online service

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7958024B2 (en) 2001-03-15 2011-06-07 Versata Development Group, Inc. Method and apparatus for processing sales transaction data
US7908304B2 (en) * 2001-03-15 2011-03-15 Versata Development Group, Inc. Method and system for managing distributor information
US7904326B2 (en) 2001-06-29 2011-03-08 Versata Development Group, Inc. Method and apparatus for performing collective validation of credential information
US20090063312A1 (en) * 2007-08-28 2009-03-05 Hurst Douglas J Method and System for Processing Secure Wireless Payment Transactions and for Providing a Virtual Terminal for Merchant Processing of Such Transactions
US9990673B2 (en) * 2010-05-03 2018-06-05 Symbol Technologies, Llc Universal payment module systems and methods for mobile computing devices
JP2014095976A (ja) * 2012-11-08 2014-05-22 Sharp Corp コンテンツ配信装置
CA2796506A1 (en) * 2012-11-23 2014-05-23 Ibm Canada Limited - Ibm Canada Limitee Personalized budgets for financial services
US10482524B1 (en) * 2013-08-07 2019-11-19 Panos Daskalakis Electronic payment methods and systems
IL229832A (en) * 2013-12-05 2016-06-30 Google Inc Determine merchant identity for received merchant IDs
GB201511964D0 (en) * 2015-07-08 2015-08-19 Barclays Bank Plc Secure digital data operations
CN106447323A (zh) * 2015-08-05 2017-02-22 阿里巴巴集团控股有限公司 业务验证方法及装置
DE102015119004A1 (de) 2015-11-05 2017-05-11 Deutsche Post Ag Vereinfachte Zustellung von Sendungen mit noch unbezahlten Waren
WO2017223238A1 (en) * 2016-06-22 2017-12-28 Solutio LLC System and method of generating and validating a unique transaction identifier
CN109978524A (zh) * 2017-12-27 2019-07-05 航天信息股份有限公司 电子出版物的交易方法以及装置
US11050571B2 (en) 2019-02-14 2021-06-29 Carrott Richard F Systems for producing and maintaining verified electronic signatures
CN110418331B (zh) * 2019-08-02 2022-04-12 Oppo广东移动通信有限公司 解锁方法、解锁装置、移动终端及服务器
US20230325904A1 (en) * 2020-11-30 2023-10-12 Beijing Baidu Netcom Science Technology Co., Ltd. Method and component of processing commodity, electronic device, and computer-readable medium
US12045819B2 (en) 2021-03-22 2024-07-23 Finicity Corporation Consented identity as a service
CN113657955A (zh) * 2021-06-30 2021-11-16 亳州市药通信息咨询有限公司 一种基于大数据的中药材供求资源分配整合系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6078902A (en) * 1997-04-15 2000-06-20 Nush-Marketing Management & Consultance System for transaction over communication network
US6947908B1 (en) * 1998-08-27 2005-09-20 Citibank, N.A. System and use for correspondent banking
US20080222046A1 (en) * 2000-04-03 2008-09-11 Incogno Corporation Method of and system for effecting anonymous credit card purchases over the internet

Family Cites Families (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5721788A (en) * 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
US6614914B1 (en) * 1995-05-08 2003-09-02 Digimarc Corporation Watermark embedder and reader
US5398285A (en) * 1993-12-30 1995-03-14 Motorola, Inc. Method for generating a password using public key cryptography
US6741991B2 (en) 1994-09-30 2004-05-25 Mitsubishi Corporation Data management system
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5857021A (en) * 1995-11-07 1999-01-05 Fujitsu Ltd. Security system for protecting information stored in portable storage media
US6512840B1 (en) * 1996-05-30 2003-01-28 Sun Microsystems, Inc. Digital encoding of personal signatures
US5903721A (en) * 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
IL120585A0 (en) * 1997-04-01 1997-08-14 Teicher Mordechai Countable electronic monetary system and method
US6000832A (en) * 1997-09-24 1999-12-14 Microsoft Corporation Electronic online commerce card with customer generated transaction proxy number for online transactions
US6636833B1 (en) * 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US6898706B1 (en) 1999-05-20 2005-05-24 Microsoft Corporation License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
JP3763702B2 (ja) * 1999-05-27 2006-04-05 富士通株式会社 データ運用方法
US6952685B1 (en) * 1999-08-27 2005-10-04 Ochoa Optics Llc Music distribution system and associated antipiracy protection
US7386516B2 (en) * 1999-09-10 2008-06-10 Metavante Corporation System and method for providing secure services over public and private networks using a removable portable computer-readable storage
US6853987B1 (en) * 1999-10-27 2005-02-08 Zixit Corporation Centralized authorization and fraud-prevention system for network-based transactions
US6792113B1 (en) 1999-12-20 2004-09-14 Microsoft Corporation Adaptable security mechanism for preventing unauthorized access of digital data
US6865550B1 (en) * 2000-02-03 2005-03-08 Eastman Kodak Company System for secure distribution and playback of digital data
US6920565B2 (en) * 2000-06-05 2005-07-19 Iomega Corporation Method and system for providing secure digital music duplication
US7140036B2 (en) * 2000-03-06 2006-11-21 Cardinalcommerce Corporation Centralized identity authentication for electronic communication networks
US6691229B1 (en) * 2000-03-06 2004-02-10 Matsushita Electric Industrial Co., Ltd. Method and apparatus for rendering unauthorized copies of digital content traceable to authorized copies
WO2001075744A1 (en) * 2000-04-03 2001-10-11 Incogno Corporation Method of and system for effecting anonymous credit card purchases over the internet
US7778934B2 (en) * 2000-04-17 2010-08-17 Verisign, Inc. Authenticated payment
US6618705B1 (en) * 2000-04-19 2003-09-09 Tiejun (Ronald) Wang Method and system for conducting business in a transnational e-commerce network
EP1407360A4 (en) * 2000-06-16 2009-08-12 Entriq Inc METHODS AND SYSTEMS FOR DISTRIBUTING CONTENT VIA A NETWORK IMPLEMENTING DISTRIBUTED CONDITIONAL ACCESS AGENTS AND SECURE AGENTS TO PERFORM DIGITAL RIGHTS MANAGEMENT (DRM)
US7742993B2 (en) 2005-10-31 2010-06-22 James Leonard Driessen SCART-card (secure consumer advantaged retail trading)
US7542943B2 (en) * 2000-10-30 2009-06-02 Amazon Technologies, Inc. Computer services and methods for collecting payments from and providing content to web users
AU2001296667A1 (en) 2000-11-09 2002-05-21 Macrovision Corporation Method and apparatus for determining digital a/v content distribution terms based on detected piracy levels
US6839692B2 (en) * 2000-12-01 2005-01-04 Benedor Corporation Method and apparatus to provide secure purchase transactions over a computer network
US8260723B2 (en) * 2000-12-01 2012-09-04 Carrott Richard F Transactional security over a network
US20070288394A1 (en) 2000-12-01 2007-12-13 Carrott Richard F Transactional security over a network
US20030074253A1 (en) * 2001-01-30 2003-04-17 Scheuring Sylvia Tidwell System and method for matching consumers with products
US7240196B2 (en) 2001-06-22 2007-07-03 Verimatrix, Inc. Method and system for protecting ownership rights of digital content files
US7251326B2 (en) * 2001-06-29 2007-07-31 Harris Corporation Method and apparatus for data encryption
US6694045B2 (en) 2002-01-23 2004-02-17 Amerasia International Technology, Inc. Generation and verification of a digitized signature
WO2003075271A1 (en) 2002-03-07 2003-09-12 Activcard Ireland, Limited Method and system for playing a song in dependence upon personalised digital audio data.
AU2003243523B2 (en) * 2002-06-12 2008-04-10 Cardinalcommerce Corporation Universal merchant platform for payment authentication
US20040123126A1 (en) 2002-12-24 2004-06-24 Lee Whay S. Method and apparatus for deterring piracy
US6910630B2 (en) 2003-03-18 2005-06-28 Instaview Systems, Inc. Piracy prevention for voice and video
AU2004258523B2 (en) 2003-07-07 2009-12-10 Irdeto B.V. Reprogrammable security for controlling piracy and enabling interactive content
US7257225B2 (en) * 2003-12-29 2007-08-14 American Express Travel Related Services Company, Inc. System and method for high speed reversible data encryption
US20060078902A1 (en) * 2004-04-15 2006-04-13 Michaeline Bunting Method and compositions for RNA interference
US7562228B2 (en) 2005-03-15 2009-07-14 Microsoft Corporation Forensic for fingerprint detection in multimedia
RU2673875C2 (ru) 2013-08-14 2018-11-30 САГА Коффее С.п.А. Устройство раздачи для раздачи пищевого продукта

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6078902A (en) * 1997-04-15 2000-06-20 Nush-Marketing Management & Consultance System for transaction over communication network
US6947908B1 (en) * 1998-08-27 2005-09-20 Citibank, N.A. System and use for correspondent banking
US20080222046A1 (en) * 2000-04-03 2008-09-11 Incogno Corporation Method of and system for effecting anonymous credit card purchases over the internet

Cited By (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9400979B2 (en) 2000-12-01 2016-07-26 BenedorTSE LLC Transactional security over a network
US8260723B2 (en) 2000-12-01 2012-09-04 Carrott Richard F Transactional security over a network
US20120296831A1 (en) * 2000-12-01 2012-11-22 Carrott Richard F Transactional security over a network
US8463713B2 (en) * 2000-12-01 2013-06-11 Richard F. Carrott Transactional security over a network
US9607299B2 (en) 2000-12-01 2017-03-28 Richard F. Carrott Transactional security over a network
US20120185251A1 (en) * 2004-06-22 2012-07-19 Hoshiko Llc Method and system for candidate matching
US8321202B2 (en) * 2004-06-22 2012-11-27 Hoshiko Llc Method and system for candidate matching
US9269086B2 (en) 2007-11-29 2016-02-23 Visa Usa, Inc. Module ID based targeted marketing
US9805347B2 (en) 2007-11-29 2017-10-31 Visa Usa, Inc. Serial number and payment data based payment card processing
US9349127B2 (en) 2007-11-29 2016-05-24 Visa Usa Inc. Serial number and payment data based payment card processing
US9280775B2 (en) 2007-11-29 2016-03-08 Visa U.S.A. Inc. Module ID based encryption for financial transactions
US20140180930A1 (en) * 2008-05-29 2014-06-26 Simon Hurry Media device payments remote control personalization and protection
WO2010027657A1 (en) * 2008-09-02 2010-03-11 Benedor Corporation Transactional security over a network
EA025111B1 (ru) * 2009-01-30 2016-11-30 Омарко Нетворк Солюшнс Лимитед Усовершенствования в области многофункциональных систем отождествления
US10032164B2 (en) * 2010-12-16 2018-07-24 Paypal, Inc. Systems and methods for authenticating payments over a network
US20120158542A1 (en) * 2010-12-16 2012-06-21 Ebay Inc. Systems and methods for authenticating payments over a network
US10049377B1 (en) * 2011-06-29 2018-08-14 Google Llc Inferring interactions with advertisers
US11120468B2 (en) * 2011-06-29 2021-09-14 Google Llc Inferring interactions with advertisers
US10719846B1 (en) * 2011-06-29 2020-07-21 Google Llc Inferring interactions with advertisers
US20130247213A1 (en) * 2012-03-13 2013-09-19 Compagnie Industrielle Et Financiere D'ingenierie "Ingenico" Method and devices to secure the entry of an alphanumerical code, corresponding computer program product and storage means
US9946882B2 (en) * 2012-03-13 2018-04-17 Ingenico Group Method and devices to secure the entry of an alphanumerical code, corresponding computer program product and storage means
US20140025571A1 (en) * 2012-07-23 2014-01-23 Its, Inc. System and method for dual message consumer authentication value-based eft transactions
US10037543B2 (en) * 2012-08-13 2018-07-31 Amobee, Inc. Estimating conversion rate in display advertising from past performance data
US10438298B2 (en) 2012-10-16 2019-10-08 American Express Travel Related Services Company, Inc. Expense management system receipt review
US10157425B2 (en) 2012-10-16 2018-12-18 American Express Travel Related Services Company, Inc. Associating an image of a receipt with a record of charge
US9208528B2 (en) 2012-10-16 2015-12-08 American Express Travel Related Services Company, Inc. Systems and methods for expense management
US20140108210A1 (en) * 2012-10-16 2014-04-17 American Express Travel Related Services Company, Inc. Systems and Methods for Expense Management
US9818159B2 (en) 2012-10-16 2017-11-14 American Express Travel Related Services Company, Inc. Systems and methods for expense management
US20150278814A1 (en) * 2012-11-14 2015-10-01 Jonathan E. Jaffe System for merchant and non-merchant based tractions utilizing secure non-radiating communications while allowing for secure additional functionality
US10621589B2 (en) * 2012-11-14 2020-04-14 Jonathan E. Jaffe System for merchant and non-merchant based tractions utilizing secure communications while allowing for secure additional functionality
US9767519B2 (en) * 2013-12-05 2017-09-19 Ingenico Group Method for processing transactional data, corresponding terminal, server and computer program
US20150161744A1 (en) * 2013-12-05 2015-06-11 Compagnie Industrielle Et Financiere D'ingenierie "Ingenico" Method for Processing Transactional Data, Corresponding Terminal, Server and Computer Program
US10025951B2 (en) * 2014-06-10 2018-07-17 Salesforce.Com, Inc. Systems and methods for implementing an encrypted search index
US20170053134A1 (en) * 2014-06-10 2017-02-23 Salesforce.Com, Inc. Systems and methods for implementing an encrypted search index
US9501661B2 (en) * 2014-06-10 2016-11-22 Salesforce.Com, Inc. Systems and methods for implementing an encrypted search index
US10311433B2 (en) 2014-11-12 2019-06-04 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US9558493B2 (en) 2014-11-12 2017-01-31 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US10614457B2 (en) 2014-11-12 2020-04-07 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US9558492B2 (en) 2014-11-12 2017-01-31 Benedoretse Llc Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US9569776B2 (en) 2014-11-12 2017-02-14 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US10282245B1 (en) * 2015-06-25 2019-05-07 Amazon Technologies, Inc. Root cause detection and monitoring for storage systems
US9898357B1 (en) 2015-06-25 2018-02-20 Amazon Technologies, Inc. Root cause detection and monitoring for storage systems
US10223189B1 (en) * 2015-06-25 2019-03-05 Amazon Technologies, Inc. Root cause detection and monitoring for storage systems
US10679285B1 (en) * 2015-07-13 2020-06-09 Wells Fargo Bank, N.A. Systems and methods for real time credit extension and bill pay configuration
US11238530B1 (en) * 2015-07-13 2022-02-01 Wells Fargo Bank, N.A. Systems and methods for real time credit extension and bill pay configuration
US11861700B1 (en) 2015-07-13 2024-01-02 Wells Fargo Bank, N.A. Systems and methods for real time credit extension and bill pay configuration
US10984131B2 (en) * 2016-05-30 2021-04-20 Orange Method for providing personal information of a user requested by a given online service
CN111667275A (zh) * 2020-06-19 2020-09-15 腾讯科技(深圳)有限公司 用户身份识别方法、装置、设备及其介质

Also Published As

Publication number Publication date
US20120296773A1 (en) 2012-11-22
EP2191406B8 (en) 2017-06-21
US8260719B2 (en) 2012-09-04
EP2191406B1 (en) 2017-04-19
JP5052673B2 (ja) 2012-10-17
CA2690529C (en) 2017-03-21
HUE034341T2 (en) 2018-02-28
US9607299B2 (en) 2017-03-28
BRPI0721942A2 (pt) 2015-01-27
AU2007358254A1 (en) 2009-03-05
CA2690529A1 (en) 2009-03-05
CN101785012A (zh) 2010-07-21
JP2010537308A (ja) 2010-12-02
US20110040685A1 (en) 2011-02-17
KR101067191B1 (ko) 2011-09-22
EA018277B1 (ru) 2013-06-28
EP2191406A1 (en) 2010-06-02
KR20100036313A (ko) 2010-04-07
CA2933130C (en) 2018-06-12
CN101785012B (zh) 2016-05-04
MX2010001951A (es) 2010-03-11
EA201000310A1 (ru) 2010-10-29
WO2009029116A1 (en) 2009-03-05
CA2933130A1 (en) 2009-03-05
AU2007358254B2 (en) 2013-09-12

Similar Documents

Publication Publication Date Title
US8260719B2 (en) Transactional security over a network
US9400979B2 (en) Transactional security over a network
US20170300981A1 (en) Method and apparatus to provide securing purchase transactions over a computer network
US8996423B2 (en) Authentication for a commercial transaction using a mobile module
AU2006236243B2 (en) Network commercial transactions
US20060235795A1 (en) Secure network commercial transactions
US20030120557A1 (en) System, method and article of manufacture for an internet based distribution architecture
US20060235761A1 (en) Method and apparatus for network transactions
US20030154387A1 (en) System, method and article of manufacture for tracking software sale transactions of an internet-based retailer for reporting to a software publisher
US20030126033A1 (en) System, method and article of manufacture for software source authentication for return purposes
US20070094097A1 (en) System and method for secured authorized user-initiated transactions
Ivascanu Legal issues in electronic commerce in the western hemisphere
WO2001001319A1 (en) A system, method and article of manufacture for a customer profile-tailored support interface in an electronic software distribution environment
WO2001001316A2 (en) A system, method and article of manufacture for an electronic software distribution, post-download payment scheme with encryption capabilities
AU2011202945B2 (en) Network commercial transactions
JP2002352172A (ja) 電子商取引方法及び電子商取引装置

Legal Events

Date Code Title Description
AS Assignment

Owner name: BENEDOR CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CARROTT, RICHARD F.;REEL/FRAME:019741/0012

Effective date: 20070823

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION