US20070288394A1 - Transactional security over a network - Google Patents
Transactional security over a network Download PDFInfo
- Publication number
- US20070288394A1 US20070288394A1 US11/844,408 US84440807A US2007288394A1 US 20070288394 A1 US20070288394 A1 US 20070288394A1 US 84440807 A US84440807 A US 84440807A US 2007288394 A1 US2007288394 A1 US 2007288394A1
- Authority
- US
- United States
- Prior art keywords
- customer
- merchant
- encryption stream
- identifier
- causing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000012795 verification Methods 0.000 claims abstract description 145
- 238000000034 method Methods 0.000 claims abstract description 77
- 238000013475 authorization Methods 0.000 claims abstract description 45
- 238000012546 transfer Methods 0.000 claims abstract description 37
- 238000012545 processing Methods 0.000 claims description 14
- 230000008569 process Effects 0.000 description 17
- 238000012790 confirmation Methods 0.000 description 14
- 230000004224 protection Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 11
- 230000000694 effects Effects 0.000 description 9
- 230000015654 memory Effects 0.000 description 8
- 230000008901 benefit Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000003466 anti-cipated effect Effects 0.000 description 4
- 230000008520 organization Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000000737 periodic effect Effects 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000001737 promoting effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000001976 improved effect Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000008093 supporting effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 230000003442 weekly effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/085—Payment architectures involving remote charge determination or related payment systems
- G06Q20/0855—Payment architectures involving remote charge determination or related payment systems involving a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0603—Catalogue ordering
Definitions
- the embodiments of the invention generally relate to securing eCommerce and similar transactional relationships, including the sales of goods and services, between parties over computer networks such as the Internet and to tracking of distributed electronic items, such as electronic documents, electronic presentations, electronic works and to methods and systems for storing encrypted individual agreement identifiers within the distributed electronic items.
- the present invention generally relates to a system for providing security for purchase transactions made over a network and more particularly to an improved security system that only stores and provides encrypted information. Additionally, the invention relates to a system for providing customer controlled rules, including time and value limits, for purchase transactions made over a network.
- Still other e-commerce payment systems require the user to purchase specific hardware (e.g., a credit card reader) that is proprietary in nature and awkward to install and use.
- specific hardware e.g., a credit card reader
- the user is required to transport the hardware device if purchases are to be made at other computers, which hampers this type of payment system.
- the common thread shared by conventional systems is that the customer must provide private information in order to complete a transaction—to the merchant, to a potential third-party, and to the merchant's financial institution. This requirement is the biggest impediment to conventional systems because of the exposure to the customer, perceived or otherwise. Whether the customer obtains additional hardware or merely entrusts private information to third-party vendors, the customer's information ends up stored in someone else's database. The vulnerability of these stored records is a matter of deep concern to potential customers and to policy makers.
- the problem is a matter of how many times a customer must expose private, sensitive, and/or confidential information in order to transact business over a network environment such as the Internet.
- the invention encrypts customer information as a customer code on a storage device on a customer computer (the customer computer is connected to the computer network). Then the invention supplies the customer code to a merchant in a purchase transaction over the computer network and forwards, or allows the merchant to forward, the customer code to a financial institution over the computer network. The financial institution decrypts the customer code, verifies the information, and returns a purchase authorization decision to the merchant over the computer network.
- An important feature of the invention is that encoded customer information, such as credit card numbers (“customer code”), is not available to merchants and, therefore, is not vulnerable to the merchant's security or privacy entrustments.
- the customer code is stored on the customer's storage device only, and it is in encrypted form. This allows the customer to complete merchant transactions without revealing certain of the encrypted information to the merchant, such as credit card numbers.
- the financial institution compares, inter alia, the customer address with historic address information of the customer maintained by the financial institution. Customers may maintain more than one authorized shipping address. The purchase authorization decision is approved only if the customer address and the historic address are consistent.
- the options to the financial institution include: 1) approving the transaction with the corrected address; 2) approving the transaction subject to the customer updating his/her address information prior to the issuance of the authorization code; and, 3) declining authorization.
- the present invention allows the customer to access his/her information by means of a personal key, or access code, however only the financial institution and its agents possess the decryption key, or code.
- the invention provides secure use of the customer's information without adding layers or third-parties and without exposing that information to a myriad of databases.
- the customer code includes encrypted credit card information.
- the invention can encrypt many customer codes on the storage device.
- Each of the customer codes can include a unique payment method.
- one group of the customer codes can identify a single credit organization for payment, wherein each customer code in the group includes a different user name. This allows each customer code in the group to include unique credit limits and allows the customer to authorize additional users for a single credit organization or facility.
- the invention also uses a password on the customer computer to unlock the customer code.
- the invention comprises a system that operates on a customer computer.
- the inventive system includes an encrypter adapted to encrypt customer information as a customer code on a storage device on the customer computer and a populator adapted to supply the customer code to a merchant in a purchase transaction over the computer network.
- the customer computer includes a network connection adapted to forward the customer code to a financial institution over the computer network.
- the financial institution decrypts the customer code and returns a purchase authorization decision to the merchant over the computer network.
- the customer code preferably includes encrypted customer address information
- the system further comprises a comparator located at the financial institution.
- the comparator compares the customer address with a historic address of the customer maintained by the financial institution.
- the purchase authorization decision is approved only if the customer address and the historic address are consistent.
- the system can optionally include an intermediate code confirmation site, external to the customer computer, and connected to the computer network.
- the intermediate code confirmation site receives the customer code prior to forwarding the customer code to the financial institution over the computer network.
- the intermediate confirmation site confirms whether the customer code has a proper encryption format.
- the encrypter can also encrypt a plurality of customer codes on the storage device.
- each of the customer codes can include a unique payment system or a group of the customer codes can identify a single credit organization for payment.
- Each customer code in the group can have a different user name and unique credit limits.
- the inventive system also includes a graphic user interface that can receive a password on the customer computer to unlock the customer code.
- the Internet has changed the way people communicate and the way they do business. With that change, the way of doing things on the Internet has also evolved. As computers and technology opened a new era, software was packaged on disks and sold. Downloadable or otherwise transferable media, such as digital music and movies, soon followed. This activity led certain individuals and groups to seek ways to profit from the unauthorized copying and sale of these products, which became two basic businesses—one that sought to profit by pirating the works of others and another that tried to prevent the pirates' activity. As the Internet continues to evolve, more and more of this media content is being downloaded and shared, creating another layer of complexity and another area of concern.
- Virtual commerce over a virtual environment creates a need to establish agreements as to rights and jurisdiction for the protection and prosecution of those rights.
- the nature of eCommerce creates an additional need to identify the consumer, while protecting that consumer's identity from “identity theft” and “identity fraud,” and while protecting the transaction for both the consumer and the merchant.
- the vendor bares much of the risk in an Internet transaction. If a minor has “borrowed” a parent's credit card, debit card, or prepaid card, if someone has stolen another person's identity, if someone has misrepresented their age as a ploy to enter a restricted site; then, the vendor's claim for payment may be denied. All of these things represent a real problem for the eCommerce merchant who seeks compensation for what they offer because that merchant assumes the risk for a transaction, not the issuing bank, where there is no signed receipt—“no signature present.” The result from this is millions of dollars of fraud, repudiation, and chargebacks of transactions, which raise the costs and risks for all.
- this disclosure presents a method, system, and structure that creates, records, verifies, and makes a storable version of a consumer's encrypted individual agreement identifiers that can be, among other things, embedded with media purchased or otherwise acquired over a computer network and onto the transactional authorization, receipt and/or record of sale, creating a “person present”/“signature present” verifier.
- the method includes the use of any or all user encrypted agreement identifiers, which are created before or during storage to the user's hard drive or otherwise similar purpose computer storage system.
- the method and system includes allowing encrypted agreement identifiers to be used without revealing certain of the encrypted information, such as name, address, or credit/debit/prepaid card numbers, to the vendor with whom a transaction, for instance the purchase of media, is being conducted.
- the need to consistently register and expose a consumer's identity and information with vendors and their databases is eliminated with embodiments herein.
- the method and system allows the encrypted agreement identifiers to be used as a means of verifying user acceptance of qualified terms of use and purchase, in a way that can also be embedded in downloadable media.
- the method and system creates and controls sub-accounts with unique user reporting and corresponding password identifiers.
- the method and system places the control responsibility for an account and any sub-accounts with the primary authorized/registered user.
- the encrypted identifiers enable a method and system for securing and limiting the access and use of the media acquired to the use, terms, and privilege for which it was acquired, thus allowing for the agreed enforcement of copyrights and other protections.
- this disclosure presents a system and method of facilitating computerized purchase transactions of electronically storable items (which are sometimes referred to herein as electronic items) such as literary works, musical works (recordings), and video works (movies, shows, videos, etc.) wherein the consumer agrees to enforcement of adhering rights, such as copyrights.
- electronically storable items which are sometimes referred to herein as electronic items
- electronic items such as literary works, musical works (recordings), and video works (movies, shows, videos, etc.) wherein the consumer agrees to enforcement of adhering rights, such as copyrights.
- customer identifier information may comprise a name identifier (which may or may not be the customer's formal name), a possible customer age identifier (which can be a birthdate, a specific age, an age range, an age classification), a possible address identifier (which can be a customer's address or a different address), and a customer agreement identifier that contains or identifies the contractual agreement between the customer and a verification entity or financial institution (credit issuer) that will facilitate the purchase transaction.
- name identifier which may or may not be the customer's formal name
- possible customer age identifier which can be a birthdate, a specific age, an age range, an age classification
- possible address identifier which can be a customer's address or a different address
- customer agreement identifier that contains or identifies the contractual agreement between the customer and a verification entity or financial institution (credit issuer) that will facilitate the purchase transaction.
- a single, unique identifier may be employed by the verification entity to locate and identify that specific stream of customer information (including a computer identifier).
- customer information is stored only in the verification database and only the identifier and the at-point-of-sale computer identifier can be transmitted as the encryption stream (together with non-encrypted BIN or credit issuer routing number) to the vendor.
- One intent of the program and the participants is to create a “signature present verified transaction” that may be relied upon by all parties to the transaction while allowing identity protection for the customer.
- the embodiments herein cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction for the purchased electronic item.
- the verification entity which may be the credit issuer or the credit issuer's processor or agent (e.g., the verification entity), receives the encryption stream which (in combination with the purchase price) is sent by the merchant for identity verification and payment authorization prior to payment processing. Then, the verification entity cross-references the encryption stream against a separate database containing the customer information to produce the identity verification and payment authorization. Then, the verification entity transfers the identity verification and payment authorization to the merchant, who completes the transaction with the customer and processes the transaction for payment as a “signature present” verified transaction by pre-agreement of all parties.
- the identity verification and payment authorization confirms to the merchant the actual presence of the customer in the purchase transaction, such that the merchant is provided assurance that the merchant is not transacting with any entity other than the customer and that the customer has agreed to be bound by the terms of a transaction verified under the customer-credit issuer agreement.
- the customer-credit issuer agreement anticipates the use of and reliance upon that agreement in third party transactions, in part, in exchange for identity protection and the convenience of the embodiments herein.
- the encryption stream contains identifiers—not necessarily the personal customer information—that have been agreed upon by and between the customer and the credit issuer (e.g., bank), and the identity verification and payment authorization contains information limited to a unique transaction, as anticipated and agreed upon by and between the customer and the credit issuer. Such identifiers would be of little use even if the encryption stream is decrypted.
- the encryption stream, or transaction verification may be added, by the merchant, to a purchased electronic item, such as downloadable digital media, to create a personalized electronic item.
- the encryption steam or unique transaction verification (collectively or separately sometimes referred to herein as the “transaction identifier”) can be hidden, so that the customer is unable to remove the transaction identifier from the personalized electronic item.
- the personalized electronic item could be made non-functional (so that the personalized electronic item cannot be opened, or cannot be played, etc.) if the encryption stream or transaction identifier, in part or in whole, is ever removed.
- the personalized electronic item always maintains the transaction identifier and allows the customer who purchased the electronic item to be identified (through the verification entity).
- the transaction identifier is added in such a way that all copies of the purchased electronic item will have the transaction identifier.
- the customer who originally purchased the electronic item from the merchant (the source of the copies) can always be identified through reference to the verification entities secure database.
- the “transaction identifier” is what is returned by the verifying entity and, because it is a unique identifier, may also be usable as a media embedded identifier.
- the personalized electronic item is supplied from the merchant to the customer.
- Each personalized electronic item distributed to different customers is different because of the uniqueness of each different transaction identifier, which allows the customer who originally purchased the electronic item to be identified in copies of the item. Further, the uniqueness of each transaction identifier permits the source of unauthorized copies of the purchased electronic item to be identified through the secure database maintained by the verification entity.
- the customer can be provided with a notice or warning that their information will always remain with copies of any personalized electronic items.
- a similar notice or warning can be displayed informing the customer that he/she is agreeing to be bound by the terms and penalties provided for unauthorized use or copying of the electronic item; and, each time (or the first few times) the personalized electronic item is opened, played, etc. the same warning may be displayed.
- Such continuous warnings may or may not be applicable to certain downloadable media such as music.
- warnings are intended to discourage the customer from supplying copies of the personalized electronic item to others in violation of the rights of the merchant (e.g., illegally uploading or copying) because the customer is made aware, through the warnings, that the illegal uploading or copying can be traced back to them through the verification entity using the transaction identifier and/or encryption stream and is agreeing to be bound by the conditions and terms set forth in those warnings.
- Similar authorized use and acceptance warnings may also be employed for access based upon age, sale pricing based upon age or residence, etc.
- the embodiments herein allow for a wide range of customer identifiers that encourage, promote, and protect eCommerce and the parties engaging in it.
- the copyright warnings, etc. may not be applicable to audio media after it is downloaded. These warnings are important prior to any downloading, however, to the extent that the customer is agreeing to be bound by the terms and conditions contained in such warnings as a condition of the transaction, he/she is agreeing to be bound under the adhesion provisions of his/her agreement with the credit issuer and is agreeing to be liable for breach of terms and conditions. The parties are agreeing to be responsible for their actions and intensions.
- the encrypting of the customer information can be, for example, performed as follows. First, the customer connects with the credit issuer using a first computerized device and the credit issuer downloads software to the first computerized device. Vendors (which are interchangeably sometimes referred to herein as “merchants”) may also act as a registering agent for a credit issuer by redirecting a customer to the credit issuer's site for registration with the verification entity.
- vendors which are interchangeably sometimes referred to herein as “merchants”
- the advantage to this for example, is that once an existing credit card user registers his/her card under the program, that user/customer may elect to restrict the use of the “card” on a computer network such as the Internet to embodiments herein, protecting the “card” from unauthorized use by others.
- the customer supplies or agrees to allow storage of existing sensitive information, such as valid shipping addresses, their date of birth (for age group classification), their bank account numbers, credit card numbers, etc.
- Certain items of the customer information (such as bank account numbers and credit card numbers) are not stored on the customer's computerized device, but instead are only maintained in the databases of the credit issuer or the verification entity, though coded or un-coded identifiers may be used to specifically reference such information.
- Other items or identifiers (name, address, age reference, etc.) of the customer information may be encrypted to create the encryption stream, which is stored on the customer's computerized device and which may be coded or un-coded prior to encryption, in part or in whole.
- credit issuer herein is a shorthand term for the entity that extends credit to the customer. This can be a merchant, vendor, bank, financial institution, etc. Further, any such credit issuers can include a verification entity and can act through an agent. Therefore, the term “credit issuer” is used to represent any and all of the foregoing.
- the credit issuer as discussed in this document, may be one of several types. One type is a credit card, debit card, or similar type of issuer. Another type of issuer could be an entity that allows existing credit vehicle holders, such as existing credit card holders, to register all of the “cards” they wish to use with a single entity which would then act as the processor.
- Another type could be a non-card/non-bank type of credit issuer, such as a Microsoft® or a Yahoo!® or a Google®, that determines a line-of-credit for an individual, on a case by case basis, and extends to them an identifiable credit amount that may be used by the individual over a network such as the Internet.
- a non-card/non-bank type of credit issuer such as a Microsoft® or a Yahoo!® or a Google®
- a line-of-credit for an individual on a case by case basis, and extends to them an identifiable credit amount that may be used by the individual over a network such as the Internet.
- Credits are processed by the credit issuer or its processor, sometimes acting as the verifier, with participating vendors that do business over the network (this alternative recognizes that conventional credit cards may not be necessary on a computer type of network and that what is necessary is the need to protect the parties to the transaction while tracking the flow of legitimate commerce).
- the vendors may choose to promote this program by referring customers to their credit issuer for enrollment. This protects the customer and his/her identity, improves the marketability of the vendor, assures the vendor of payment, and reduces chargebacks and fraud; all serving to improve the vendor's bottom-line.
- Banks and software companies are capable of reading and verifying a computer's identity without downloading software onto a “visitor's” computer; however, software can be downloaded or otherwise installed in order to perform the other tasks.
- the credit issuer reads and registers the unique hardware identifiers (such as serial numbers from the motherboard, the hard drives, the processor, etc.) from the first computerized device. These unique hardware identifiers are also incorporated into the encryption stream. Then, the same steps are repeated for any additional computerized devices the customer desires to authorize and register for use in future purchase transactions, if, for example, the customer owns or has access to multiple computers and computerized devices. Such processes can be done when the customer is setting up or modifying their account with the credit issuer.
- the verification entity financial institution, and/or credit issuer, (e.g., a bank), sets up the elements of the encryption stream with the customer, including the initial contract/agreement that will be relied upon by any vendor supporting this program. It is the agreement between the credit issuer and the customer that is relied upon by the vendor under the terms of its merchant bank/acquirer agreement.
- the verifying entity may be the credit issuer, or it may be a processor or agent used by the credit issuer, which processor or agent has access to the database containing the customer's information.
- customer types include: 1) new customer (applying for computer network credit; a new credit card; a new debit card or other form of “loaded” card such as a payroll debit card); 2) existing relationship (holder of an existing credit vehicle, such as the types in number 1, above, that may be used for purchases over a computer network such as the internet); or 3) new customer with existing credit vehicle (a person with existing credit vehicles/cards, such as the type described in number 1, above, may chose to register some or all of those “cards” with a single entity that would allow the “program” to be attached to all of the registered “cards”).
- the “credit” may be in the form of an existing credit card, debit card, etc., or it may take the form of a newly issued “credit” from some other source willing to extend such credit to an identifiable individual—a sort of electronic-letter-of-credit, or eCredit—subject to various rules and regulations. It is during the process of registering the customer's identifiers and other information with this credit issuer—a bank will presumably have an existing customer's information in its database—that the customer and the credit issuer form the agreement of what identifiers are to be present, along with the hardware information of the registered device(s), to confirm the customer's presence.
- Elements of the customer information such as age identification can be extrapolated from the database, rather than being stored in the encryption stream, although a date-of-birth or a unique word may be part of the encryption stream.
- the method can incorporate, into the encryption stream, a second set of computer hardware identifiers and a time and date stamp from the computerized device making the actual transfer of the encryption stream.
- the second hardware identifiers that are readjust prior to the transfer of the encryption stream would not match the hardware identifiers in the encryption stream and the transaction would not be approved by the verification entity.
- the time and date stamp could be used to make the encryption stream that is supplied to the merchant only valid for a limited time period (e.g., minutes, hours, days, etc.).
- Such processes further enhance the “customer presence” verification process performed by the verification entity to provide additional assurances to the vendor that they are actually dealing with the customer and not someone other than the actual customer.
- the embodiments herein permit the credit issuer to disallow a specific vendor into the program, where vendor fraud is, or has been, an issue. This further serves to protect the customer, as well as reputable vendors.
- Embodiments herein also comprise one or more systems that use an encoder that is positioned within the customer's computer by the credit issuer.
- the encoder encrypts the customer identifier information in the encryption stream.
- the credit issuer positions a transfer agent within the customer's computer and with the merchant. The transfer agent causes the encryption stream to be transferred from the customer's computer to the merchant's computer in the purchase transaction for the purchased electronic item.
- the verification entity has a verifier that is operatively connected to both the customer's computer and/or the merchant's computer during the verification stage of a transaction.
- the verifier in order to enhance the security of the customer information, is maintained separate from the customer's computer and from the merchant by being maintained in the verification entity.
- a database of the customer payment information can be maintained within the verification entity or separate from the verification entity. In either situation, the database is operatively connected only to the verifier, and neither the customer nor the merchant have access to the database.
- the transfer agent is adapted to cause the encryption stream to be transferred from the merchant's computer to the verifier for payment verification.
- the verifier is further adapted to generate the identity verification and payment authorization, based on the database information, and to transfer the identity verification and payment authorization to the merchant.
- the encryption stream or the unique identity verification and payment authorization is adapted to be added, by the merchant, to the purchased electronic item to create the personalized electronic item that is supplied from the merchant to the customer.
- FIG. 1 is a schematic architectural diagram of one embodiment of the invention
- FIG. 2 is a flow diagram illustrating an embodiment of the invention
- FIG. 3 is a flow diagram illustrating an embodiment of the invention
- FIG. 4 is a schematic diagram of a system embodiment herein;
- FIG. 5 is a schematic diagram of a system embodiment herein;
- FIG. 6 is a schematic diagram of an encryption stream according to embodiments herein;
- FIG. 7 is a flow diagram illustrating a method embodiment herein.
- FIG. 8 is a flow diagram illustrating a method embodiment herein
- FIG. 9 is a flow diagram illustrating a method embodiment herein.
- FIG. 10 is a schematic diagram of a system embodiment herein.
- FIG. 1 a schematic diagram of a preferred embodiment of the invention is illustrated. More specifically, FIG. 1 illustrates a personal computer 100 connected to a network 170 . In addition, a code confirmation site 130 , merchant site 140 , financial institution 150 , and credit agency 160 are also connected to the network 170 .
- the arrangement of features shown in FIG. 1 is arbitrarily selected in order to illustrate the invention. One ordinarily skilled in the art would understand that many other arrangements of items could be utilized with the invention.
- the personal computer 100 (which is sometimes referred to herein has the “customer's computer”) comprises any form of computing device that is capable of connecting with the network 170 . Therefore, the customer's computer 100 can comprise a standard desktop personal computer, a mobile computer, a personal digital assistant, a cell phone, etc.
- the customer's computer 100 includes a graphic user interface (GUI) 110 , and a storage device 112 , such as a magnetic hard drive or other read/write storage device.
- GUI graphic user interface
- the customer's computer 100 includes an encrypter 114 , a network connection 116 , a populator 118 and central processing unit (CPU) 120 .
- CPU central processing unit
- the financial institution 150 includes a database of historical address 154 obtained from the credit agency 160 and a comparator 152 that is utilized to check customer addresses, as discussed below.
- FIG. 2 The operation of the system shown in FIG. 1 is illustrated in flowchart form in FIG. 2 . More specifically, the inventive system is added to the customer's computer 100 . Using the graphic user interface 110 , the customer preferably creates a password as shown in item 200 that will allow future access to the inventive system. The customer then supplies personal information such as Social Security number, address, date of birth, relatives' names, credit card information, banking information, employment information, etc. to the inventive system through the graphic user interface 110 . The encrypter 114 immediately encrypts this information and stores the encrypted information as a customer code on the storage device 112 , as shown in item 202 .
- the encrypter 114 immediately encrypts this information and stores the encrypted information as a customer code on the storage device 112 , as shown in item 202 .
- An important feature of the invention is that the customers' personal information is only stored in encrypted form. Therefore, if an unauthorized user were able to access the user's storage device 112 , the customers' personal information would be secure because of its encrypted nature.
- the encryption process has three elements: 1) the encryption code itself, which is pared to the decryption code maintained by the financial institution; 2) the customer's private key, password and/or personal access code, which is created and controlled by the customer for accessing the encrypted information; and, 3) the customer's computer's system identifier that requires that the encrypted information may only be accessed on the customer's computer. Once the customer's information is entered, these three elements and the need to re-enter any of the information become transparent to all parties during any e-commerce transaction (e.g., dual key or public key).
- the present invention requires the user to supply an authorized shipping address; a procedure that requires a separate secured transaction with the financial institution, confirmed by e-mail to the customer. Such steps make impractical the unauthorized access.
- the user can create multiple customer codes, each of which could include a different credit agency (e.g., a different credit card). Therefore, the invention allows the user to create a customer code for each of the credit cards the user owns.
- customer codes can be created for the same credit card.
- These additional customer codes can include different spending limits. This allows the user to establish different customer codes for budgetary or other similar reasons.
- a user could create customer codes for different items of a personal or business budget. Upon reaching a spending limit, no additional transactions (purchases) could be performed until the budget information is changed or updated.
- the budget plan could be updated automatically to allow periodic budgets to be automatically implemented.
- An example of this could include one customer code that uses a credit card to pay monthly charges to an internet service provider (ISP) for a specific period, e.g., one year.
- the customer code would include a monthly limit of the monthly ISP fee and a twelve-month limit on the transaction.
- ISP internet service provider
- parents could create customer codes for each of their children, where each customer code potentially includes a different spending limit.
- the spending limits can be updated periodically to provide a periodic allowance.
- This aspect of the invention allows parents to establish a monthly Internet-allowance for a child. The parents establish a separately authorized customer code together with periodic limits (e.g., monthly or weekly). The effect of this is that the parent would control the establishment and use of authorized sub-accounts.
- the customer codes preferably include the name, address and credit card number of the user in encrypted form.
- the invention operates in the background on the customer's computer 100 until the customer desires to make a purchase over the network 170 .
- the graphic user interface 110 provides the user with different payment options (customer codes).
- the populator 118 prepares to send the customer code to the merchant's site 140 by issuing an instruction to send the customer code out on the network 170 directed to the merchant site 140 , as shown in item 204 .
- the invention provides for the customer code to automatically populate the appropriate “checkout” box of the merchant site 140 using the populator 118 .
- the customer gets to a checkout (purchase) window of a merchant site, ( 300 ) the customer places the cursor into the appropriate box (e.g., the credit card number field, customer code data fields, etc.) 302 .
- the appropriate box e.g., the credit card number field, customer code data fields, etc.
- Many merchant sites 140 may not have space for the customer code date field. Therefore, the invention allows the credit card number (or other similar payment filed) to be used by the merchant site.
- the encrypted customer code data field is longer than credit card numbers. Therefore, the only modification needed by the merchant site 140 to accommodate the invention is to allow longer encrypted data strings to be accepted by the credit card number field.
- the user Once the user places the cursor in the appropriate box, they press a pre-established function key on the keyboard (or selects a button on the graphic user interface) ( 304 ) which brings up a user ID and password entry pop-up window ( 306 ).
- a pre-established function key on the keyboard or selects a button on the graphic user interface
- the entire customer code is populated (written to) the field on the merchant site. The user does not need to enter their name, address, etc. because all that information is contained in the customer code.
- the financial institution 150 upon approval of the credit transaction, the financial institution 150 will return name, shipping address and credit authorization number (not credit card number) to the merchant site 140 so that the user does not need to input such information.
- the user can select a customer code, which includes information as to a credit card with a sufficient credit limit, desirable interest rate, etc. to make the purchase.
- the customer code itself is the encrypted personal information data stream and can be somewhat lengthy. Therefore, the graphic user interface provides a user-friendly selection menu with abbreviated names. For example, in one embodiment, a pull-down menu with credit card abbreviations is provided to allow the user to select the customer code to be used. If the user has established only one customer code, the pull down menu will include only that single customer code abbreviation. In a similar manner, different budget categories or children's names could also be utilized as the abbreviated names in the pull-down menu to select the appropriate customer code.
- the user ID's are the customer codes abbreviations.
- An error message is generated if the user ID/password is incorrect ( 310 ) and processing returns to box 304 to retry the user ID/password. As is well-known a limited number of retries of the user ID/password will be allowed.
- the customer has the option to set up rules regarding payment ( 312 ), such as the automatic monthly ISP payments discussed above. If no special rules are to be established for payment, a single direct payment scheme is assumed and processing proceeds to box 316 . On the other hand, if payment rules are to be established, another window pops-up ( 314 ) to lead the customer through a wizard to setup payment options such as transaction amounts, total credit limits, and/or time frames, etc.
- the invention then takes the previously encrypted sensitive customer data, and adds to it a purchase specific transaction number and rules (if any).
- the invention also encrypts such additional data (transaction number, rules, etc.) before attaching necessary routing information, and automatically populates the complete customer code into the customer code data field or credit card field 302 .
- the customer code is the encrypted data string of a number of data pieces including credit card number, rules, transaction number, customer name and address, etc.
- the invention sends the customer code directly to the merchant site 140 , as shown in item 208 .
- a code confirmation site 130 is utilized (item 206 ).
- the customer code is directed to the code confirmation site 130 instead of to the merchant site 140 by the populator 118 .
- the code confirmation site 130 controlled by the credit agency, determines whether the customer code has the proper format by allowing the credit agency to periodically update or change the public keys (e.g., the encryption and decryption codes). If the customer code is determined to be improper by the code confirmation unit 130 , an error report is issued explaining that the customer code is improper, as shown in item 212 . If the customer code is proper, it is sent to the merchant site 140 by the code confirmation unit 130 , as shown in item 214 .
- the merchant site 140 Upon receipt of the customer code, the merchant site 140 forwards the customer code to the 150 .
- An important feature of the invention is that confidential information is not provided to the merchant in unencrypted form at any time. Thus, the merchant is relieved of the responsibility for that information.
- the credit transaction is acceptable (e.g., whether the customer has sufficient credit available)
- This aspect of the invention prevents items from being improperly diverted by criminals to addresses other than the customer's address.
- the customer is able to establish multiple authorized shipping addresses directly with the credit agency. These addresses may include such alternatives as office or home. Each address is entered and stored on the customer's storage device with a separate encryption sequence as a separate customer code. At the time the customer is setting up new customer codes, new authorized addresses for the customer are sent (via e-mail or similar electronic transfer) directly from the customer's computer 100 to the credit agency 160 over the network 170 and are augmented to the list of authorized addresses associated with the customer in the credit agency's 160 databases.
- a confirmation code, name, address, and other required information is sent to the merchant 140 , as shown in item 224 .
- the term “consistent” means that the two addresses must be substantially matching.
- the shipping address is directed to an address that is not consistent with an authorized address for that customer (e.g. different state, different city, different street, etc.)
- an error report is issued to the merchant site 140 and an e-mail is sent to the customer explaining the improper transaction.
- the present invention creates a system for eliminating error and fraud in these authorizations by “correcting” the address. It is then the merchant's responsibility to ensure that the product only ships to the authorized or corrected address. This aspect of the present invention adds a layer of security, allowing the customer to “intercept” and return any unauthorized shipments.
- the customer uses the “rule wizard” to temporarily add a “non-permanent” shipping address, allowing the customer to send gifts, etc., to others.
- the customer's computer's system identifier and password are required to access the “wizard” for this non-recurring change. Additionally, a confirmation of this shipment to a non-authorized address is e-mailed to the customer so that the customer may be alerted if a fraudulent transaction were being attempted.
- the merchant site 140 preferably includes an input field (which may be the current credit card field) properly formatted to receive the customer code.
- the format of the input field is established by the credit agency 160 and is similarly required by the financial institution 150 .
- the credit agency 160 can generally dictate the format of information that must be supplied by the more numerous financial institutions 150 that deal with the credit agency 160 .
- merchant sites 140 that desired to deal with the financial institutions 150 must comply with the data format requirements of the financial institution 150 (and, in turn, the credit agency 160 ). Therefore, the invention is applicable to a network that continually adds and drops large numbers of merchant sites 140 , such as the Internet.
- each merchant site 140 will comply with the requirements of the financial institution 150 and will include the specialized format of the customer code data field in their merchant sites 140 . Therefore, the user should find the customer code data field on the vast majority of Web sites that allow customer purchases.
- the invention works with the relatively small number of national credit agencies 160 to establish a format (that can potentially vary from credit card agency to credit card agency) that will be made available by the merchants 140 . Because a limited number of credit agencies 160 control the majority of the online credit purchase transactions, the format of the customer code input field will be provided upon the vast majority of merchant sites 140 . Thus, the invention provides the user with access to virtually all merchant sites 140 that desire to deal with financial institutions (which is virtually all merchant sites that desire to complete purchase transactions).
- the credit agencies [160] are in the business of getting customers to use credit (e.g., their credit cards). Where the present invention creates security for the customer, together with additional control and use features, the credit agencies derive a promotional benefit for their credit facilities. Moreover, these beneficial features do not require extra steps. A benefit of the present invention is that it eliminates steps that include repeated entry of customer information or the posting of that information on third-party databases.
- An important safety feature of the invention is that the merchant site 140 never gains access to the customer's confidential information, such as credit card numbers. To the contrary, the merchant site 140 only receives the encrypted customer code from the customer 100 and the transaction confirmation code (and possibly a corrected address) from the financial institution 150 . Therefore, if any of the foregoing transactions over the network 170 are intercepted or if the merchant site suffers an unauthorized access of its records, the customer's credit card information will be secure.
- the invention avoids many of the problems associated with conventional secured network transactions. More specifically, all elements of the present invention must be in place for a transaction to be completed. Conventional systems provide one level of security to all transactions, so that if a database is breached all of the records on that “secured” site are accessible. The present invention protects individual records creating an additional level of security.
- the benefits that flow from the present invention, as detailed above, include security to an individual customer's online credit and the customer's control and flexible use of that credit.
- the present invention solves the problem of regulation over the many real jurisdictions covered by the virtual worldwide nature of the Internet by providing a system and method for creating individual covenants on individual transactions—covenants that create defined rights and protections for each party engaging in Internet commerce.
- enforceable terms of agreeing between parties each of whom have a valid expectation of reliance on each other (e.g., an expectation that each is “of age” or is otherwise the person authorized to engage in and take responsibility for such a transaction)
- the invention creates jurisdictional and enforceable rights based upon an asset jurisdiction of each party rather than upon the virtual environment of their commercial activity.
- One embodiment herein is centered around a contract (“customer agreement”) created between a customer and credit issuer.
- the customer agreement allows the credit issuer, either acting as a verifier or acting through an authorized processor or agent, to authorize and verify transactions between the customer and various participating vendors.
- Various to customer-vendor agreements are anticipated and allowed under the customer-credit issuer agreement and various, direct or indirect, credit issuer-vendor agreements are also anticipated and allowed under the customer-credit issuer agreement.
- There are also agreements or contracts between the verification entity which can be a stand alone entity or combined with the financial institution that issues credit, debit and/or prepaid cards, or other capable financial provider and the individual customer/consumer.
- the customer agreement is the center of all activity in embodiments herein. It sets the rules and terms by which a customer is bound—i.e., the price for securing an individual's identity over a computer Network is that individual's agreement to be legally bound by his/her transactions whenever all agreed elements that establish the individuals online identity (e.g., his/her registered computer with the other identifiers that distinguish this individual from others that may use or have access to that computer).
- This agreement covers the purchase (i.e., agreement to be responsible and pay) and agreement to terms, such as honoring any copyright or trademarks attached thereto and agreement to be legally and personally accountable for the criminal and civil penalties covering those registered rights.
- this credit issuer-customer agreement/contract gives permission to the credit issuer to reference the customer agreement and adhere its terms to any verified customer-vendor agreement/transaction.
- the customer agreement applied to any credit issuer-vendor agreement, direct or indirect, allows the vendor to rely upon the credit issuer-customer agreement in verifying the customer-vendor agreement. In other words, the vendor's payment is assured for employing this payment device and does not require the individual to disclose, register, or otherwise give up his/her secure identity.
- the customer agreement serves as the center for the related transactional activities that may be controlled under the embodiments herein. These related activities include: any verifiable transaction between the customer and the merchant over a computer network, which transaction may be for such things as goods or services; and, the transaction ultimately facilitated by the contract, directly or indirectly, between the vendor and the financial entity (“vendor agreement”), under which the vendor's consideration for the customer-vendor transaction may be guaranteed or “bonded.”
- vendor agreement the financial entity
- the merchant's consideration may take the form of such things as payment, credit worthiness, agreement to terms of sale or use of the merchant's offering, or any other terms of such agreement between the customer and the merchant that the contract may cover and that the verification entity confirms during the initial transaction to the merchant.
- the contracts formed under the embodiments herein create, inter alia, terms of use, third party reliance, and legal jurisdiction.
- the parties could agree that the proper jurisdiction for adjudicating disputes is the business location of the merchant, the location of a customer dealing with a merchant, or any other location of choice.
- Terms of use include a “person present” guarantee (akin to “signature present”) to ensure that the merchant is only dealing with the identified customer and to assure that the merchant will be paid without suffering from chargebacks. This person present guarantee is accomplished when all registered customer identification elements are present at the time of the transaction, which is confirmed by the verification entity.
- the verification entity certifies both sides of the transaction under the terms of the customer-credit issuer agreement and the vendor-credit issuer agreement, allowing all terms, e.g., confirmation of purchase/“signature present”, agreement of copyright protection, or representation age verification to be enforced and relied upon.
- any customer information that the credit issuer holds could be relied upon by a third party, without actually revealing the customer's information or customer's identity.
- the credit issuer acts as a holder of trust on behalf of both the customer and the merchant, and the verifying entity certifies this with each individual transaction. This could be a bonded or escrowed type of element to the transaction that protects the identity of the customer and the rights of the merchant, and an element upon which the vendor may separately rely.
- this payment procedure has the bank wearing two hats: that of an “issuing bank”; and, that of an “acquiring bank.”
- the bank issues credit and a card to a customer for use in purchasing goods, services, etc.
- the bank agrees to acquire (and to pay for) the debt created by the use of those credit cards.
- a bank acting as an “issuing bank,” uses its agreement for use of the card according to terms that require payment and interest on any unpaid balance.
- a bank acting as an “acquiring bank,” requires merchants, among things, to verify the identity of the credit card user and to get the cardholder to sign a receipt for whatever is purchased. This over-simplified explanation of credit card transactions is sufficient to point out the problem of unauthorized credit card use and identity verification for transactions over the Internet, or any similar system of computer connected commerce.
- the vendor-credit issuer agreement takes the additional role of screening qualified vendors.
- One component of eCommerce fraud is vendor fraud. Vendors with known or suspected fraudulent histories can have their agreements cancelled and otherwise be denied access to the signature-present payment terms provided herein and other protections, such as copyright. This vendor qualifying step is necessary both to protect the customer and to limit fraud.
- an encrypted code (“encryption stream”) that allows a third party verification entity to verify the presence of the customer to the merchant, and to verify the customer's agreement with the credit issuer, the terms of which allow the verification entity to confirm the customer's identity and agreement to be bound by the terms of the transaction with the vendor, including “signature present” payment.
- an encrypted code (“encryption stream”) that allows a third party verification entity to verify the presence of the customer to the merchant, and to verify the customer's agreement with the credit issuer, the terms of which allow the verification entity to confirm the customer's identity and agreement to be bound by the terms of the transaction with the vendor, including “signature present” payment.
- the entire receipt and terms of the transaction could be encrypted and included in the encryption stream.
- the customer-vendor agreement is verified under terms of the credit issuer-customer agreement and, in reliance upon it, the credit issuer-vendor agreement, which secure the terms of the customer-vendor agreement through agreed adhesion of the first two agreements.
- the customer-vendor agreement is the anticipated result any purpose of the other two agreements, which anticipate that all parties will be bound by their part of the separate agreements once at such point as the credit issuer or its agent, such as a processor, verifies the customer's presence and agreement to terms of the transaction—according to the customer's request, which is triggered by presentation of the verifiable encryption stream.
- the separate customer agreement (between the verification entity or credit issuer and the customer) and the separate merchant agreement (between the merchant and its merchant bank) require the customer and the merchant to enter into the customer agreement (between the merchant and the customer) that is created at the time of the purchase transaction between the merchant and the customer.
- the embodiments herein provide the ability of the credit issuer to screen vendors as a further protection to customers.
- a new customer agreement can be created for each purchase transaction between a merchant and a customer, which, inter alia, binds the customer, if applicable to a specific transaction, to observe the intellectual property rights of the merchant or media and which makes binding statements, if applicable to a specific transaction, regarding the presence, identity, age, etc. of the customer.
- the verification entity is bound under the terms of the credit issuer's agreement with the customer, and through that agreement the other parties, to protect the identity and transaction of the customer and to verify, authorize, and protect the payment and other terms of the transaction (such as age, identity, area of residence, agreement to honor/be bound by copyright terms, etc.) on behalf of the merchant.
- an encryption stream Before an encryption stream is created (at the time of the purchase transaction) certain elements must be present to confirm the individual customer's identity and to verify that the customer has agreed to be bound by the terms of the instant customer agreement.
- This sequence of elements may include, among other things, a name (not necessarily the cardholder's name), an address for shipping or confirming residential status (not necessarily the cardholder's billing address), the customer's unique credit number or ID with the financial entity, and the registered hardware identity of the computer, or computers, that the customer intends to authorize for such transactions.
- the encryption stream is created from some of these elements, such as name, address, customer agreement identifier, computer hardware identifier, etc. but does not include sensitive information, such as the customer's credit card number or bank account numbers.
- the BIN Bank Identification Number
- routing identifier such as an IP address, which is not encrypted, is added to the encryption stream for routing purposes.
- the invention uses the terms created by the customer in forming his/her agreement with the credit issuer.
- This agreement has the customer assume responsibility for all transactions where all required elements of any of the customer's encryption streams are present.
- the agreement also allows the encryption stream to be downloaded along with any digital media being acquired by the customer as a record of the agreement to the terms of use, such as copyright protection.
- One aspect of this invention is that it is a system and method for creating, verifying, and imbedding (when necessary) a contractually agreed upon “code” that, when used with all elements present, acts as a signature, unique to the individual customer, confirming the presence of the customer in the transaction.
- the merchant has the right to rely upon the terms agreed to by the customer (which also confirms identity and jurisdiction) for the transaction in the customer agreement.
- This invention offers identity protection in exchange for contractually binding all parties to the terms of such transactions.
- the invention provides the ability to protect the privacy and identity of a customer initiating an Internet purchase transaction, while also protecting the rights and commercial benefits of the merchant providing the product, service, etc.
- the embodiments herein protect the identity of the customer, which remains encrypted and/or otherwise protected unless the terms of the agreement are breached or otherwise violated.
- the invention creates a method, system, structure, and apparatus for promoting, protecting, and verifying commerce over computer networks, such as the Internet, by protecting the rights of the customer, including the customer's identity and financial information, and the rights of the merchant, including the merchant's payment and the merchant's control and ownership of its product and/or service, in part, by establishing an agreed upon jurisdiction for the protection and prosecution of those various rights.
- the embodiments herein create a binding contract between the parties to a transaction by giving the credit issuer and verification entity the contracted ability, by consent of the customer and merchant.
- the embodiments herein confirm that the identity and credit worthy elements of the transaction have been met, while protecting the identity of the customer and guaranteeing the merchant that it will be compensated.
- the invention may be used to establish a “verified presence” element to the transaction, establish a “signature present” element to the transaction, establish the customer's age (e.g., in terms of “over 18” or “over 21” or “over 65”), establish a residential or delivery element, establish a customer/seller nexus to the customer agreement, and establish the customer's identity (without necessarily revealing it or storing it online) all, in part, by requiring that all components of the encryption stream be present and be verified in order for a transaction to be completed.
- the present embodiments provide a method and system of securing transactional rights over a computer network 404 .
- the terms of the agreements 422 that are created between the customer 402 the merchant 450 , and the verification entity 420 and/or the financial institution 440 are stored by the verification entity 420 .
- the verification entity 420 can be included within the financial institution (credit issuer) 440 as shown in FIG. 5 , or be separate therefrom, as shown in FIG. 4 .
- FIG. 4 illustrates a single customer's computer 410 , a single verification entity 420 , a single financial institution 440 , and a single merchant 450 , as would be understood by those ordinarily skilled in the art, FIG.
- the verification entity 420 stores multiple agreements 422 , one for each purchase transaction.
- the method includes registering and storing the customer agreement(s) 422 with the credit issuer/verification entity 440 / 420 .
- the customer information is stored in a database 430 , which can be within the credit issuer/verification entity 440 / 420 as shown in FIG. 5 , or as shown in FIG. 4 , separate from the credit issuer/verification entity 440 / 420 .
- a database 430 can be within the credit issuer/verification entity 440 / 420 as shown in FIG. 5 , or as shown in FIG. 4 , separate from the credit issuer/verification entity 440 / 420 .
- the customer's computer 410 is connected to the merchant 450 and the verification entity 420 over one or more computer networks 404 .
- a password is used to access an encoder 412 on the customer's computer 410 .
- the encoder 412 is downloaded to the customer's computer 410 by the verification entity 420 during the customer registration process.
- the encoder 412 encrypts the customer information to form the encryption stream 414 which is stored on the customer's computer 410 .
- the customer information is not stored on the customer's computer in non-encrypted form.
- the encryption stream does not include any personal financial customer information relating to credit card numbers, bank account numbers, etc. and such information is stored only in the database(s) 430 .
- the verification entity downloads transfer agents 416 , 456 to the customer's computer 410 and to the merchant 450 .
- the transfer agent 416 causes the encryption stream 414 to be transferred from the customer's computer to the merchant's computer 450 in the purchase transaction for the purchased electronic item 454 .
- the verification entity 420 has a verifier 424 that is operatively connected to both the customer's computer 410 and the merchant's computer 450 .
- the verifier 424 is maintained separate from the customer's computer 410 and from the merchant by being maintained in the credit issuer/verification entity 440 / 420 .
- the database 430 of the customer payment information can be maintained within the credit issuer/verification entity 440 / 420 or separate from the verification entity 420 . In either situation, the database 430 is operatively connected only to the verifier 424 , and neither the customer nor the merchant have access to the database.
- the transfer agent 416 is adapted to cause the encryption stream 414 to be transferred (along with the monetary amount of the transaction) from the merchant's computer 450 to the verifier 424 for payment verification.
- the verifier 424 is further adapted to generate the payment verification, based on the database 430 , and to transfer the payment verification to the merchant 450 .
- the encryption stream 414 and/or a transaction identifier is adapted to be added, by the merchant, to the purchased electronic item to create the personalized electronic item 454 (as shown in FIG. 6 ) that is supplied from the merchant 450 to the customer's computer 410 .
- the encryption stream 414 can include such information as the customer's name, a customer shipping address, customer's date of birth and customer's hardware computer identifier.
- the customer shipping address can comprise one of a plurality of valid shipping addresses that depend upon which encryption stream 414 is supplied to the merchant 450 .
- the method can allow the customer to select from a plurality of stored encryption streams 414 , each having a different valid shipping address.
- the method supplies the selected encryption stream 414 together with the computer identifier as part of the identifier code (the CID and routing identifier 416 ) to the merchant 450 in a transaction over the computer network 404 .
- the encryption stream 414 is forwarded, by means of the routing identifier 416 , to the verification entity 420 over the computer network 404 .
- the verification entity 420 decrypts the encryption stream 414 and compares the customer shipping address identifier, name identifier, age identifier, or other identifiers with the authorized corresponding identifiers of the customer maintained by the verification entity 420 such as “identifiers” of name, age, address, etc., can be actual names, addresses, etc., or can be alpha-numeric codes that are used by the verification entity 420 to look up the name, address, age, etc., in the database 430 . If all is in order, the verification entity 420 returns an authorization decision to the merchant 450 over the computer network 404 .
- the verification entity 420 can produce (and return to the merchant) the identity verification, payment authorization, etc.
- the verification entity 420 verifies that the terms of the customer's verified presence and electronic signature have been met according to customer's agreement 422 with the verification entity 420 , which confirms to the merchant 450 that the customer has assumed responsibility for the transaction.
- each of the encryption streams 414 can include a unique payment method that is different from payment methods of other encryption streams 414 .
- a group of the encryption streams 414 can identify a single credit organization for payment, but each encryption stream 414 in the group can include a different user name, a different authorized and registered device/computer, different age verification method, and/or different customer address.
- the embodiments herein can subside in supplying a verification of the customer and a payment authorization.
- the embodiments herein can add the encryption stream or a transaction identifier to the electronic item.
- the customer agrees to allow the encryption stream 414 and routing identifier 416 to be imbedded, imprinted, and/or otherwise affixed to media or media content 454 acquired from the merchant 450 , as shown in FIG. 6 .
- the verification entity Before transferring the encryption stream 414 to the merchant 450 , the verification entity can add the encryption stream, which can contain a customer agreement or customer agreement identifier, or the transaction identifier to the encryption stream 414 to allow the customer agreement 422 between the customer 402 and the merchant 450 to be readily accessed.
- the encryption stream which can contain a customer agreement or customer agreement identifier, or the transaction identifier to the encryption stream 414 to allow the customer agreement 422 between the customer 402 and the merchant 450 to be readily accessed.
- This process also establishes the jurisdiction for enforcement of the merchant's 404 rights as established in the customer's agreement 422 .
- the authorization decision is approved only if the encryption stream 414 and the customer information within the database 430 are consistent.
- the method can send an e-mail confirmation of the transaction to the customer 414 from the verification entity 420 .
- the encryption stream 414 /CID is stored on the customer storage device 408 only in encrypted form.
- the disclosed method facilitates the computerized purchase transactions of electronically storable items (which are sometimes referred to herein as electronic items) such as literary works, musical works (recordings), video works (movies, shows, videos, etc.), etc.
- electronically storable items which are sometimes referred to herein as electronic items
- literary works such as literary works, musical works (recordings), video works (movies, shows, videos, etc.), etc.
- the customer enters into the customer agreement with the verification entity.
- the embodiments herein encrypt “customer information” to produce an encryption stream 704 .
- Techniques for data encryption are disclosed in, for example, U.S. Pat. Nos. 7,257,225 and 7,251,326 (incorporated herein by reference) and the details of such processes are not provided herein to maintain focus on the disclosed embodiments.
- customer information may comprise a name identifier (which may or may not be the customer's formal name), a customer age identifier (which can be a specific age, an age range, an age classification), an address identifier (which can be a customer's address or a different address).
- the embodiments herein cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction for the purchased electronic item.
- the verification entity receives the encryption stream which is sent by the merchant for payment verification in item 708 .
- the verification entity cross-references the encryption stream against a separate database containing customer payment information (item 710 ) to produce the unique transaction identifier comprising the identity verification and/or payment authorization in item.
- the verification entity transfers the unique transaction identifier from the verification entity to the merchant in item 714 .
- the identity verification and payment authorization confirms to the merchant the actual presence of the customer in the purchase transaction, such that the merchant is provided assurance that the merchant is not transacting with any entity other than the customer.
- the encryption stream 704 and the identity verification and payment authorization 710 are devoid of personal payment information of the customer, such as credit card information, bank account information, etc., and can take the form of a unique transaction identifier.
- the encryption stream supplied from the customer can be modified by the verification entity before being supplied to the merchant to include data or information specific to the purchase transaction being conducted or the encryption stream can be accompanied by the unique transaction identifier.
- Such a modified encryption stream or unique transaction identifier can be used in place of the original encryption stream in embodiments herein.
- the original encryption stream, the modified encryption stream, and/or the unique transaction identifier can be added to the electronic item before being provided to the customer.
- the encryption stream and/or unique transaction identifier is added, by the merchant, to the purchased electronic item to create a personalized electronic item 718 .
- the encryption steam or transaction identifier can be hidden, so that the customer is unable to remove the encryption stream or transaction identifier from the personalized electronic item.
- the personalized electronic item could be made non-functional (so that the personalized electronic item cannot be opened, or cannot be played, etc.) if the encryption stream or transaction identifier is ever removed.
- Techniques for controlling access to digital works through encryption streams or watermarks are also well-known (see U.S. Pat. No. 7,062,069 which is incorporated herein by reference for details of such teachings).
- the personalized electronic item always maintains the encryption stream and allows the customer who purchased the electronic item to be identified (through the verification entity) and all copies of the purchased electronic item will have the encryption stream or transaction identifier.
- the customer who originally purchased the electronic item from the merchant the source of the copies
- the personalized electronic item is supplied from the merchant to the customer in item 720 .
- Each personalized electronic item distributed to different customers is different because of the uniqueness of each different encryption stream or transaction identifier, which allows the customer who originally purchased the electronic item to be identified in copies of the electronic item. Further, the uniqueness of each encryption stream or transaction identifier permits the source of unauthorized copies of the purchased electronic item to be identified through the verification entity.
- the method potentially includes the step of identifying the customer from the encryption stream that is included within the personalized electronic item.
- a notice or warning that their information will always remain with copies of any personalized electronic items.
- a similar notice or warning is displayed informing the customer that he/she is agreeing to be bound by the terms and penalties provided for unauthorized use or copying of the electronic item; and, each time (or the first few times) the personalized electronic item is opened, played, etc. the same warning may be displayed.
- warnings are intended to discourage the customer from supplying copies of the personalized electronic item to others in violation of the rights of the merchant (e.g., illegally uploading or copying) because the customer is made aware, through the warnings, that the illegal uploading or copying can be traced back to them through the verification entity using the encryption stream and is agreeing to be bound by the conditions and terms set forth in those warnings.
- Similar authorized use and acceptance warnings may also be employed for access based upon age, sale pricing based upon age or residence, etc.
- the embodiments herein allow for a wide range of customer identifiers that encourage, promote, and protect eCommerce and the parties engaging in it.
- the encrypting of the customer information 702 is performed as shown in FIG. 8 .
- the customer connects with the credit issuer using a first computerized device 800 and the verification entity downloads some software to the first computerized device 802 .
- the customer supplies or agrees to allow access to existing sensitive information, such as valid shipping addresses, their date of birth (or age group classification), their bank account numbers, credit card numbers, etc. to the verification entity 804 .
- Certain items of the customer information (such as bank account numbers and credit card numbers) are not stored on the customer's computerized device, but instead are only maintained in the databases of the credit issuer and/or verification entity, though coded or un-coded identifiers may be used to specifically reference such information.
- Other items or identifiers (name, address, age reference, etc.) of the customer information may be encrypted to create the encryption stream, which is stored on the customer's computerized device and which may be coded or un-coded prior to encryption, in part or in whole.
- the credit issuer reads and registers the unique hardware identifiers (such as serial numbers from the motherboard, the hard drives, the processor, etc.) from the first computerized device in item 806 . These unique hardware identifiers are also incorporated into the encryption stream in item 808 . Then, the same steps are repeated for any additional computerized devices the customer desires to authorize and register for use in future purchase transactions. Such processes can be done when the customer is setting up or modifying their account with the credit issuer.
- the unique hardware identifiers such as serial numbers from the motherboard, the hard drives, the processor, etc.
- the method can incorporate, into the encryption stream, a second set of hardware identifiers and a time and date stamp from the computerized device making the actual transfer of the encryption stream. Therefore, as shown in FIG. 9 , after the hardware identifiers have been added to the encryption stream in item 900 , the method reads a second set of hardware identifiers from the actual computer that is connected to the merchant in item 902 . This second set of hardware identifiers (and potentially a time and date stamp) are then added to the encryption stream in item 904 and the modified encryption stream (having both sets of hardware identifiers) to the merchant in item 906 .
- the second hardware identifiers that are readjust prior to the transfer of the encryption stream would not match the first hardware identifiers in the encryption stream and the transaction would not be approved by the verification entity.
- the time and date stamp could be used to make the encryption stream that is supplied to the merchant only valid for a limited time period (e.g., minutes, hours, days, etc.). Such processes further enhance the “customer presence” verification process performed by the verification entity to provide additional assurances to the merchant that they are actually dealing with the customer and not someone other than the actual customer.
- the embodiments of the invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment including both hardware and software elements.
- the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
- the embodiments of the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
- a computer-usable or computer readable medium can be any apparatus that can comprise, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
- the medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
- Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk.
- Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
- a data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus.
- the memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
- I/O devices can be coupled to the system either directly or through intervening I/O controllers.
- Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
- FIG. 10 A representative hardware environment for practicing the embodiments of the invention is depicted in FIG. 10 .
- the system comprises at least one processor or central processing unit (CPU) 10 .
- the CPUs 10 are interconnected via system bus 12 to various devices such as a random access memory (RAM) 14 , read-only memory (ROM) 16 , and an input/output (I/O) adapter 18 .
- RAM random access memory
- ROM read-only memory
- I/O input/output
- the I/O adapter 18 can connect to peripheral devices, such as disk units 11 and tape drives 13 , or other program storage devices that are readable by the system.
- the system can read the inventive instructions on the program storage devices and follow these instructions to execute the methodology of the embodiments of the invention.
- the system further includes a user interface adapter 19 that connects a keyboard 15 , mouse 17 , speaker 24 , microphone 22 , and/or other user interface devices such as a touch screen device (not shown) to the bus 12 to gather user input.
- a communication adapter 20 connects the bus 12 to a data processing network 25
- a display adapter 21 connects the bus 12 to a display device 23 which may be embodied as an output device such as a monitor, printer, or transmitter, for example.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Priority Applications (18)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/844,408 US20070288394A1 (en) | 2000-12-01 | 2007-08-24 | Transactional security over a network |
CA2933130A CA2933130C (en) | 2007-08-24 | 2007-09-04 | Transactional security over a network |
HUE07841796A HUE034341T2 (en) | 2007-08-24 | 2007-09-04 | Transaction security on a network |
AU2007358254A AU2007358254B2 (en) | 2007-08-24 | 2007-09-04 | Transactional security over a network |
EA201000310A EA018277B1 (ru) | 2007-08-24 | 2007-09-04 | Способ обеспечения безопасной торговой сделки в компьютерной сети |
EP07841796.1A EP2191406B8 (en) | 2007-08-24 | 2007-09-04 | Transactional security over a network |
CA2690529A CA2690529C (en) | 2007-08-24 | 2007-09-04 | Transactional security over a network |
BRPI0721942-3A2A BRPI0721942A2 (pt) | 2007-08-24 | 2007-09-04 | Segurança transacional através de uma rede |
KR1020107000597A KR101067191B1 (ko) | 2007-08-24 | 2007-09-04 | 네트워크를 통한 트랜잭션 보안 방법 |
JP2010521830A JP5052673B2 (ja) | 2007-08-24 | 2007-09-04 | ネットワークにおけるトランザクションセキュリティ |
CN200780100359.4A CN101785012B (zh) | 2007-08-24 | 2007-09-04 | 网络上的交易安全 |
PCT/US2007/077503 WO2009029116A1 (en) | 2007-08-24 | 2007-09-04 | Transactional security over a network |
MX2010001951A MX2010001951A (es) | 2007-08-24 | 2007-09-04 | Seguridad transaccional en una red. |
US12/202,524 US8260723B2 (en) | 2000-12-01 | 2008-09-02 | Transactional security over a network |
US12/911,801 US8260719B2 (en) | 2000-12-01 | 2010-10-26 | Transactional security over a network |
US13/564,815 US8463713B2 (en) | 2000-12-01 | 2012-08-02 | Transactional security over a network |
US13/565,897 US9607299B2 (en) | 2000-12-01 | 2012-08-03 | Transactional security over a network |
US13/891,278 US9400979B2 (en) | 2000-12-01 | 2013-05-10 | Transactional security over a network |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/726,304 US6839692B2 (en) | 2000-12-01 | 2000-12-01 | Method and apparatus to provide secure purchase transactions over a computer network |
US10/970,051 US20050055317A1 (en) | 2000-12-01 | 2004-10-21 | Method and apparatus to provide secure purchase transactions over a computer network |
US89023007P | 2007-02-16 | 2007-02-16 | |
US11/844,408 US20070288394A1 (en) | 2000-12-01 | 2007-08-24 | Transactional security over a network |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/970,051 Continuation-In-Part US20050055317A1 (en) | 2000-12-01 | 2004-10-21 | Method and apparatus to provide secure purchase transactions over a computer network |
US10/970,051 Continuation US20050055317A1 (en) | 2000-12-01 | 2004-10-21 | Method and apparatus to provide secure purchase transactions over a computer network |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/202,524 Continuation-In-Part US8260723B2 (en) | 2000-12-01 | 2008-09-02 | Transactional security over a network |
US12/911,801 Continuation US8260719B2 (en) | 2000-12-01 | 2010-10-26 | Transactional security over a network |
US13/891,278 Continuation-In-Part US9400979B2 (en) | 2000-12-01 | 2013-05-10 | Transactional security over a network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070288394A1 true US20070288394A1 (en) | 2007-12-13 |
Family
ID=39522404
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/844,408 Abandoned US20070288394A1 (en) | 2000-12-01 | 2007-08-24 | Transactional security over a network |
US12/911,801 Expired - Fee Related US8260719B2 (en) | 2000-12-01 | 2010-10-26 | Transactional security over a network |
US13/565,897 Expired - Lifetime US9607299B2 (en) | 2000-12-01 | 2012-08-03 | Transactional security over a network |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/911,801 Expired - Fee Related US8260719B2 (en) | 2000-12-01 | 2010-10-26 | Transactional security over a network |
US13/565,897 Expired - Lifetime US9607299B2 (en) | 2000-12-01 | 2012-08-03 | Transactional security over a network |
Country Status (12)
Country | Link |
---|---|
US (3) | US20070288394A1 (ja) |
EP (1) | EP2191406B8 (ja) |
JP (1) | JP5052673B2 (ja) |
KR (1) | KR101067191B1 (ja) |
CN (1) | CN101785012B (ja) |
AU (1) | AU2007358254B2 (ja) |
BR (1) | BRPI0721942A2 (ja) |
CA (2) | CA2690529C (ja) |
EA (1) | EA018277B1 (ja) |
HU (1) | HUE034341T2 (ja) |
MX (1) | MX2010001951A (ja) |
WO (1) | WO2009029116A1 (ja) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010027657A1 (en) * | 2008-09-02 | 2010-03-11 | Benedor Corporation | Transactional security over a network |
US20120158542A1 (en) * | 2010-12-16 | 2012-06-21 | Ebay Inc. | Systems and methods for authenticating payments over a network |
US20120185251A1 (en) * | 2004-06-22 | 2012-07-19 | Hoshiko Llc | Method and system for candidate matching |
US20130247213A1 (en) * | 2012-03-13 | 2013-09-19 | Compagnie Industrielle Et Financiere D'ingenierie "Ingenico" | Method and devices to secure the entry of an alphanumerical code, corresponding computer program product and storage means |
US20140025571A1 (en) * | 2012-07-23 | 2014-01-23 | Its, Inc. | System and method for dual message consumer authentication value-based eft transactions |
US20140108210A1 (en) * | 2012-10-16 | 2014-04-17 | American Express Travel Related Services Company, Inc. | Systems and Methods for Expense Management |
US20140180930A1 (en) * | 2008-05-29 | 2014-06-26 | Simon Hurry | Media device payments remote control personalization and protection |
US20150161744A1 (en) * | 2013-12-05 | 2015-06-11 | Compagnie Industrielle Et Financiere D'ingenierie "Ingenico" | Method for Processing Transactional Data, Corresponding Terminal, Server and Computer Program |
US20150278814A1 (en) * | 2012-11-14 | 2015-10-01 | Jonathan E. Jaffe | System for merchant and non-merchant based tractions utilizing secure non-radiating communications while allowing for secure additional functionality |
US9208528B2 (en) | 2012-10-16 | 2015-12-08 | American Express Travel Related Services Company, Inc. | Systems and methods for expense management |
US9269086B2 (en) | 2007-11-29 | 2016-02-23 | Visa Usa, Inc. | Module ID based targeted marketing |
US9501661B2 (en) * | 2014-06-10 | 2016-11-22 | Salesforce.Com, Inc. | Systems and methods for implementing an encrypted search index |
EA025111B1 (ru) * | 2009-01-30 | 2016-11-30 | Омарко Нетворк Солюшнс Лимитед | Усовершенствования в области многофункциональных систем отождествления |
US9558493B2 (en) | 2014-11-12 | 2017-01-31 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9558492B2 (en) | 2014-11-12 | 2017-01-31 | Benedoretse Llc | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9569776B2 (en) | 2014-11-12 | 2017-02-14 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9607299B2 (en) | 2000-12-01 | 2017-03-28 | Richard F. Carrott | Transactional security over a network |
US9898357B1 (en) | 2015-06-25 | 2018-02-20 | Amazon Technologies, Inc. | Root cause detection and monitoring for storage systems |
US10037543B2 (en) * | 2012-08-13 | 2018-07-31 | Amobee, Inc. | Estimating conversion rate in display advertising from past performance data |
US10049377B1 (en) * | 2011-06-29 | 2018-08-14 | Google Llc | Inferring interactions with advertisers |
US10223189B1 (en) * | 2015-06-25 | 2019-03-05 | Amazon Technologies, Inc. | Root cause detection and monitoring for storage systems |
US10282245B1 (en) * | 2015-06-25 | 2019-05-07 | Amazon Technologies, Inc. | Root cause detection and monitoring for storage systems |
US10614457B2 (en) | 2014-11-12 | 2020-04-07 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US10679285B1 (en) * | 2015-07-13 | 2020-06-09 | Wells Fargo Bank, N.A. | Systems and methods for real time credit extension and bill pay configuration |
CN111667275A (zh) * | 2020-06-19 | 2020-09-15 | 腾讯科技(深圳)有限公司 | 用户身份识别方法、装置、设备及其介质 |
US10984131B2 (en) * | 2016-05-30 | 2021-04-20 | Orange | Method for providing personal information of a user requested by a given online service |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7958024B2 (en) | 2001-03-15 | 2011-06-07 | Versata Development Group, Inc. | Method and apparatus for processing sales transaction data |
US7908304B2 (en) * | 2001-03-15 | 2011-03-15 | Versata Development Group, Inc. | Method and system for managing distributor information |
US7904326B2 (en) | 2001-06-29 | 2011-03-08 | Versata Development Group, Inc. | Method and apparatus for performing collective validation of credential information |
US20090063312A1 (en) * | 2007-08-28 | 2009-03-05 | Hurst Douglas J | Method and System for Processing Secure Wireless Payment Transactions and for Providing a Virtual Terminal for Merchant Processing of Such Transactions |
US9990673B2 (en) * | 2010-05-03 | 2018-06-05 | Symbol Technologies, Llc | Universal payment module systems and methods for mobile computing devices |
JP2014095976A (ja) * | 2012-11-08 | 2014-05-22 | Sharp Corp | コンテンツ配信装置 |
CA2796506A1 (en) * | 2012-11-23 | 2014-05-23 | Ibm Canada Limited - Ibm Canada Limitee | Personalized budgets for financial services |
US10482524B1 (en) * | 2013-08-07 | 2019-11-19 | Panos Daskalakis | Electronic payment methods and systems |
IL229832A (en) * | 2013-12-05 | 2016-06-30 | Google Inc | Determine merchant identity for received merchant IDs |
GB201511964D0 (en) * | 2015-07-08 | 2015-08-19 | Barclays Bank Plc | Secure digital data operations |
CN106447323A (zh) * | 2015-08-05 | 2017-02-22 | 阿里巴巴集团控股有限公司 | 业务验证方法及装置 |
DE102015119004A1 (de) | 2015-11-05 | 2017-05-11 | Deutsche Post Ag | Vereinfachte Zustellung von Sendungen mit noch unbezahlten Waren |
WO2017223238A1 (en) * | 2016-06-22 | 2017-12-28 | Solutio LLC | System and method of generating and validating a unique transaction identifier |
CN109978524A (zh) * | 2017-12-27 | 2019-07-05 | 航天信息股份有限公司 | 电子出版物的交易方法以及装置 |
US11050571B2 (en) | 2019-02-14 | 2021-06-29 | Carrott Richard F | Systems for producing and maintaining verified electronic signatures |
CN110418331B (zh) * | 2019-08-02 | 2022-04-12 | Oppo广东移动通信有限公司 | 解锁方法、解锁装置、移动终端及服务器 |
US20230325904A1 (en) * | 2020-11-30 | 2023-10-12 | Beijing Baidu Netcom Science Technology Co., Ltd. | Method and component of processing commodity, electronic device, and computer-readable medium |
US12045819B2 (en) | 2021-03-22 | 2024-07-23 | Finicity Corporation | Consented identity as a service |
CN113657955A (zh) * | 2021-06-30 | 2021-11-16 | 亳州市药通信息咨询有限公司 | 一种基于大数据的中药材供求资源分配整合系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6078902A (en) * | 1997-04-15 | 2000-06-20 | Nush-Marketing Management & Consultance | System for transaction over communication network |
US6947908B1 (en) * | 1998-08-27 | 2005-09-20 | Citibank, N.A. | System and use for correspondent banking |
US20080222046A1 (en) * | 2000-04-03 | 2008-09-11 | Incogno Corporation | Method of and system for effecting anonymous credit card purchases over the internet |
Family Cites Families (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5721788A (en) * | 1992-07-31 | 1998-02-24 | Corbis Corporation | Method and system for digital image signatures |
US6614914B1 (en) * | 1995-05-08 | 2003-09-02 | Digimarc Corporation | Watermark embedder and reader |
US5398285A (en) * | 1993-12-30 | 1995-03-14 | Motorola, Inc. | Method for generating a password using public key cryptography |
US6741991B2 (en) | 1994-09-30 | 2004-05-25 | Mitsubishi Corporation | Data management system |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5857021A (en) * | 1995-11-07 | 1999-01-05 | Fujitsu Ltd. | Security system for protecting information stored in portable storage media |
US6512840B1 (en) * | 1996-05-30 | 2003-01-28 | Sun Microsystems, Inc. | Digital encoding of personal signatures |
US5903721A (en) * | 1997-03-13 | 1999-05-11 | cha|Technologies Services, Inc. | Method and system for secure online transaction processing |
IL120585A0 (en) * | 1997-04-01 | 1997-08-14 | Teicher Mordechai | Countable electronic monetary system and method |
US6000832A (en) * | 1997-09-24 | 1999-12-14 | Microsoft Corporation | Electronic online commerce card with customer generated transaction proxy number for online transactions |
US6636833B1 (en) * | 1998-03-25 | 2003-10-21 | Obis Patents Ltd. | Credit card system and method |
US6898706B1 (en) | 1999-05-20 | 2005-05-24 | Microsoft Corporation | License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer |
JP3763702B2 (ja) * | 1999-05-27 | 2006-04-05 | 富士通株式会社 | データ運用方法 |
US6952685B1 (en) * | 1999-08-27 | 2005-10-04 | Ochoa Optics Llc | Music distribution system and associated antipiracy protection |
US7386516B2 (en) * | 1999-09-10 | 2008-06-10 | Metavante Corporation | System and method for providing secure services over public and private networks using a removable portable computer-readable storage |
US6853987B1 (en) * | 1999-10-27 | 2005-02-08 | Zixit Corporation | Centralized authorization and fraud-prevention system for network-based transactions |
US6792113B1 (en) | 1999-12-20 | 2004-09-14 | Microsoft Corporation | Adaptable security mechanism for preventing unauthorized access of digital data |
US6865550B1 (en) * | 2000-02-03 | 2005-03-08 | Eastman Kodak Company | System for secure distribution and playback of digital data |
US6920565B2 (en) * | 2000-06-05 | 2005-07-19 | Iomega Corporation | Method and system for providing secure digital music duplication |
US7140036B2 (en) * | 2000-03-06 | 2006-11-21 | Cardinalcommerce Corporation | Centralized identity authentication for electronic communication networks |
US6691229B1 (en) * | 2000-03-06 | 2004-02-10 | Matsushita Electric Industrial Co., Ltd. | Method and apparatus for rendering unauthorized copies of digital content traceable to authorized copies |
WO2001075744A1 (en) * | 2000-04-03 | 2001-10-11 | Incogno Corporation | Method of and system for effecting anonymous credit card purchases over the internet |
US7778934B2 (en) * | 2000-04-17 | 2010-08-17 | Verisign, Inc. | Authenticated payment |
US6618705B1 (en) * | 2000-04-19 | 2003-09-09 | Tiejun (Ronald) Wang | Method and system for conducting business in a transnational e-commerce network |
EP1407360A4 (en) * | 2000-06-16 | 2009-08-12 | Entriq Inc | METHODS AND SYSTEMS FOR DISTRIBUTING CONTENT VIA A NETWORK IMPLEMENTING DISTRIBUTED CONDITIONAL ACCESS AGENTS AND SECURE AGENTS TO PERFORM DIGITAL RIGHTS MANAGEMENT (DRM) |
US7742993B2 (en) | 2005-10-31 | 2010-06-22 | James Leonard Driessen | SCART-card (secure consumer advantaged retail trading) |
US7542943B2 (en) * | 2000-10-30 | 2009-06-02 | Amazon Technologies, Inc. | Computer services and methods for collecting payments from and providing content to web users |
AU2001296667A1 (en) | 2000-11-09 | 2002-05-21 | Macrovision Corporation | Method and apparatus for determining digital a/v content distribution terms based on detected piracy levels |
US6839692B2 (en) * | 2000-12-01 | 2005-01-04 | Benedor Corporation | Method and apparatus to provide secure purchase transactions over a computer network |
US8260723B2 (en) * | 2000-12-01 | 2012-09-04 | Carrott Richard F | Transactional security over a network |
US20070288394A1 (en) | 2000-12-01 | 2007-12-13 | Carrott Richard F | Transactional security over a network |
US20030074253A1 (en) * | 2001-01-30 | 2003-04-17 | Scheuring Sylvia Tidwell | System and method for matching consumers with products |
US7240196B2 (en) | 2001-06-22 | 2007-07-03 | Verimatrix, Inc. | Method and system for protecting ownership rights of digital content files |
US7251326B2 (en) * | 2001-06-29 | 2007-07-31 | Harris Corporation | Method and apparatus for data encryption |
US6694045B2 (en) | 2002-01-23 | 2004-02-17 | Amerasia International Technology, Inc. | Generation and verification of a digitized signature |
WO2003075271A1 (en) | 2002-03-07 | 2003-09-12 | Activcard Ireland, Limited | Method and system for playing a song in dependence upon personalised digital audio data. |
AU2003243523B2 (en) * | 2002-06-12 | 2008-04-10 | Cardinalcommerce Corporation | Universal merchant platform for payment authentication |
US20040123126A1 (en) | 2002-12-24 | 2004-06-24 | Lee Whay S. | Method and apparatus for deterring piracy |
US6910630B2 (en) | 2003-03-18 | 2005-06-28 | Instaview Systems, Inc. | Piracy prevention for voice and video |
AU2004258523B2 (en) | 2003-07-07 | 2009-12-10 | Irdeto B.V. | Reprogrammable security for controlling piracy and enabling interactive content |
US7257225B2 (en) * | 2003-12-29 | 2007-08-14 | American Express Travel Related Services Company, Inc. | System and method for high speed reversible data encryption |
US20060078902A1 (en) * | 2004-04-15 | 2006-04-13 | Michaeline Bunting | Method and compositions for RNA interference |
US7562228B2 (en) | 2005-03-15 | 2009-07-14 | Microsoft Corporation | Forensic for fingerprint detection in multimedia |
RU2673875C2 (ru) | 2013-08-14 | 2018-11-30 | САГА Коффее С.п.А. | Устройство раздачи для раздачи пищевого продукта |
-
2007
- 2007-08-24 US US11/844,408 patent/US20070288394A1/en not_active Abandoned
- 2007-09-04 KR KR1020107000597A patent/KR101067191B1/ko active IP Right Grant
- 2007-09-04 MX MX2010001951A patent/MX2010001951A/es active IP Right Grant
- 2007-09-04 JP JP2010521830A patent/JP5052673B2/ja not_active Expired - Fee Related
- 2007-09-04 CN CN200780100359.4A patent/CN101785012B/zh not_active Expired - Fee Related
- 2007-09-04 BR BRPI0721942-3A2A patent/BRPI0721942A2/pt not_active Application Discontinuation
- 2007-09-04 WO PCT/US2007/077503 patent/WO2009029116A1/en active Application Filing
- 2007-09-04 AU AU2007358254A patent/AU2007358254B2/en not_active Ceased
- 2007-09-04 EP EP07841796.1A patent/EP2191406B8/en not_active Not-in-force
- 2007-09-04 EA EA201000310A patent/EA018277B1/ru not_active IP Right Cessation
- 2007-09-04 CA CA2690529A patent/CA2690529C/en not_active Expired - Fee Related
- 2007-09-04 CA CA2933130A patent/CA2933130C/en not_active Expired - Fee Related
- 2007-09-04 HU HUE07841796A patent/HUE034341T2/en unknown
-
2010
- 2010-10-26 US US12/911,801 patent/US8260719B2/en not_active Expired - Fee Related
-
2012
- 2012-08-03 US US13/565,897 patent/US9607299B2/en not_active Expired - Lifetime
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6078902A (en) * | 1997-04-15 | 2000-06-20 | Nush-Marketing Management & Consultance | System for transaction over communication network |
US6947908B1 (en) * | 1998-08-27 | 2005-09-20 | Citibank, N.A. | System and use for correspondent banking |
US20080222046A1 (en) * | 2000-04-03 | 2008-09-11 | Incogno Corporation | Method of and system for effecting anonymous credit card purchases over the internet |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9400979B2 (en) | 2000-12-01 | 2016-07-26 | BenedorTSE LLC | Transactional security over a network |
US8260723B2 (en) | 2000-12-01 | 2012-09-04 | Carrott Richard F | Transactional security over a network |
US20120296831A1 (en) * | 2000-12-01 | 2012-11-22 | Carrott Richard F | Transactional security over a network |
US8463713B2 (en) * | 2000-12-01 | 2013-06-11 | Richard F. Carrott | Transactional security over a network |
US9607299B2 (en) | 2000-12-01 | 2017-03-28 | Richard F. Carrott | Transactional security over a network |
US20120185251A1 (en) * | 2004-06-22 | 2012-07-19 | Hoshiko Llc | Method and system for candidate matching |
US8321202B2 (en) * | 2004-06-22 | 2012-11-27 | Hoshiko Llc | Method and system for candidate matching |
US9269086B2 (en) | 2007-11-29 | 2016-02-23 | Visa Usa, Inc. | Module ID based targeted marketing |
US9805347B2 (en) | 2007-11-29 | 2017-10-31 | Visa Usa, Inc. | Serial number and payment data based payment card processing |
US9349127B2 (en) | 2007-11-29 | 2016-05-24 | Visa Usa Inc. | Serial number and payment data based payment card processing |
US9280775B2 (en) | 2007-11-29 | 2016-03-08 | Visa U.S.A. Inc. | Module ID based encryption for financial transactions |
US20140180930A1 (en) * | 2008-05-29 | 2014-06-26 | Simon Hurry | Media device payments remote control personalization and protection |
WO2010027657A1 (en) * | 2008-09-02 | 2010-03-11 | Benedor Corporation | Transactional security over a network |
EA025111B1 (ru) * | 2009-01-30 | 2016-11-30 | Омарко Нетворк Солюшнс Лимитед | Усовершенствования в области многофункциональных систем отождествления |
US10032164B2 (en) * | 2010-12-16 | 2018-07-24 | Paypal, Inc. | Systems and methods for authenticating payments over a network |
US20120158542A1 (en) * | 2010-12-16 | 2012-06-21 | Ebay Inc. | Systems and methods for authenticating payments over a network |
US10049377B1 (en) * | 2011-06-29 | 2018-08-14 | Google Llc | Inferring interactions with advertisers |
US11120468B2 (en) * | 2011-06-29 | 2021-09-14 | Google Llc | Inferring interactions with advertisers |
US10719846B1 (en) * | 2011-06-29 | 2020-07-21 | Google Llc | Inferring interactions with advertisers |
US20130247213A1 (en) * | 2012-03-13 | 2013-09-19 | Compagnie Industrielle Et Financiere D'ingenierie "Ingenico" | Method and devices to secure the entry of an alphanumerical code, corresponding computer program product and storage means |
US9946882B2 (en) * | 2012-03-13 | 2018-04-17 | Ingenico Group | Method and devices to secure the entry of an alphanumerical code, corresponding computer program product and storage means |
US20140025571A1 (en) * | 2012-07-23 | 2014-01-23 | Its, Inc. | System and method for dual message consumer authentication value-based eft transactions |
US10037543B2 (en) * | 2012-08-13 | 2018-07-31 | Amobee, Inc. | Estimating conversion rate in display advertising from past performance data |
US10438298B2 (en) | 2012-10-16 | 2019-10-08 | American Express Travel Related Services Company, Inc. | Expense management system receipt review |
US10157425B2 (en) | 2012-10-16 | 2018-12-18 | American Express Travel Related Services Company, Inc. | Associating an image of a receipt with a record of charge |
US9208528B2 (en) | 2012-10-16 | 2015-12-08 | American Express Travel Related Services Company, Inc. | Systems and methods for expense management |
US20140108210A1 (en) * | 2012-10-16 | 2014-04-17 | American Express Travel Related Services Company, Inc. | Systems and Methods for Expense Management |
US9818159B2 (en) | 2012-10-16 | 2017-11-14 | American Express Travel Related Services Company, Inc. | Systems and methods for expense management |
US20150278814A1 (en) * | 2012-11-14 | 2015-10-01 | Jonathan E. Jaffe | System for merchant and non-merchant based tractions utilizing secure non-radiating communications while allowing for secure additional functionality |
US10621589B2 (en) * | 2012-11-14 | 2020-04-14 | Jonathan E. Jaffe | System for merchant and non-merchant based tractions utilizing secure communications while allowing for secure additional functionality |
US9767519B2 (en) * | 2013-12-05 | 2017-09-19 | Ingenico Group | Method for processing transactional data, corresponding terminal, server and computer program |
US20150161744A1 (en) * | 2013-12-05 | 2015-06-11 | Compagnie Industrielle Et Financiere D'ingenierie "Ingenico" | Method for Processing Transactional Data, Corresponding Terminal, Server and Computer Program |
US10025951B2 (en) * | 2014-06-10 | 2018-07-17 | Salesforce.Com, Inc. | Systems and methods for implementing an encrypted search index |
US20170053134A1 (en) * | 2014-06-10 | 2017-02-23 | Salesforce.Com, Inc. | Systems and methods for implementing an encrypted search index |
US9501661B2 (en) * | 2014-06-10 | 2016-11-22 | Salesforce.Com, Inc. | Systems and methods for implementing an encrypted search index |
US10311433B2 (en) | 2014-11-12 | 2019-06-04 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9558493B2 (en) | 2014-11-12 | 2017-01-31 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US10614457B2 (en) | 2014-11-12 | 2020-04-07 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9558492B2 (en) | 2014-11-12 | 2017-01-31 | Benedoretse Llc | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9569776B2 (en) | 2014-11-12 | 2017-02-14 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US10282245B1 (en) * | 2015-06-25 | 2019-05-07 | Amazon Technologies, Inc. | Root cause detection and monitoring for storage systems |
US9898357B1 (en) | 2015-06-25 | 2018-02-20 | Amazon Technologies, Inc. | Root cause detection and monitoring for storage systems |
US10223189B1 (en) * | 2015-06-25 | 2019-03-05 | Amazon Technologies, Inc. | Root cause detection and monitoring for storage systems |
US10679285B1 (en) * | 2015-07-13 | 2020-06-09 | Wells Fargo Bank, N.A. | Systems and methods for real time credit extension and bill pay configuration |
US11238530B1 (en) * | 2015-07-13 | 2022-02-01 | Wells Fargo Bank, N.A. | Systems and methods for real time credit extension and bill pay configuration |
US11861700B1 (en) | 2015-07-13 | 2024-01-02 | Wells Fargo Bank, N.A. | Systems and methods for real time credit extension and bill pay configuration |
US10984131B2 (en) * | 2016-05-30 | 2021-04-20 | Orange | Method for providing personal information of a user requested by a given online service |
CN111667275A (zh) * | 2020-06-19 | 2020-09-15 | 腾讯科技(深圳)有限公司 | 用户身份识别方法、装置、设备及其介质 |
Also Published As
Publication number | Publication date |
---|---|
US20120296773A1 (en) | 2012-11-22 |
EP2191406B8 (en) | 2017-06-21 |
US8260719B2 (en) | 2012-09-04 |
EP2191406B1 (en) | 2017-04-19 |
JP5052673B2 (ja) | 2012-10-17 |
CA2690529C (en) | 2017-03-21 |
HUE034341T2 (en) | 2018-02-28 |
US9607299B2 (en) | 2017-03-28 |
BRPI0721942A2 (pt) | 2015-01-27 |
AU2007358254A1 (en) | 2009-03-05 |
CA2690529A1 (en) | 2009-03-05 |
CN101785012A (zh) | 2010-07-21 |
JP2010537308A (ja) | 2010-12-02 |
US20110040685A1 (en) | 2011-02-17 |
KR101067191B1 (ko) | 2011-09-22 |
EA018277B1 (ru) | 2013-06-28 |
EP2191406A1 (en) | 2010-06-02 |
KR20100036313A (ko) | 2010-04-07 |
CA2933130C (en) | 2018-06-12 |
CN101785012B (zh) | 2016-05-04 |
MX2010001951A (es) | 2010-03-11 |
EA201000310A1 (ru) | 2010-10-29 |
WO2009029116A1 (en) | 2009-03-05 |
CA2933130A1 (en) | 2009-03-05 |
AU2007358254B2 (en) | 2013-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8260719B2 (en) | Transactional security over a network | |
US9400979B2 (en) | Transactional security over a network | |
US20170300981A1 (en) | Method and apparatus to provide securing purchase transactions over a computer network | |
US8996423B2 (en) | Authentication for a commercial transaction using a mobile module | |
AU2006236243B2 (en) | Network commercial transactions | |
US20060235795A1 (en) | Secure network commercial transactions | |
US20030120557A1 (en) | System, method and article of manufacture for an internet based distribution architecture | |
US20060235761A1 (en) | Method and apparatus for network transactions | |
US20030154387A1 (en) | System, method and article of manufacture for tracking software sale transactions of an internet-based retailer for reporting to a software publisher | |
US20030126033A1 (en) | System, method and article of manufacture for software source authentication for return purposes | |
US20070094097A1 (en) | System and method for secured authorized user-initiated transactions | |
Ivascanu | Legal issues in electronic commerce in the western hemisphere | |
WO2001001319A1 (en) | A system, method and article of manufacture for a customer profile-tailored support interface in an electronic software distribution environment | |
WO2001001316A2 (en) | A system, method and article of manufacture for an electronic software distribution, post-download payment scheme with encryption capabilities | |
AU2011202945B2 (en) | Network commercial transactions | |
JP2002352172A (ja) | 電子商取引方法及び電子商取引装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BENEDOR CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CARROTT, RICHARD F.;REEL/FRAME:019741/0012 Effective date: 20070823 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |