×

Secure proxy service

  • US 10,115,141 B1
  • Filed: 09/24/2014
  • Issued: 10/30/2018
  • Est. Priority Date: 09/24/2014
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computing system comprising one or more computing devices, said computing system programmed to implement:

  • a proxy server configured to receive requests, for network resources hosted on third party sites, from browsers hosted on remote computing devices and to perform one or more browser functions on behalf of the browsers hosted on remote computing devices, the proxy server further comprising an anonymizer module, the proxy server configured to;

    receive, over a network, a request for a network resource hosted on a third party site, the request received over a secure, encrypted channel from a user computing device configured with a browser application,wherein the browser application of the user computing device is in communication with the proxy server, andwherein the request includes browser session and identification data associated with the user computing device, the data comprising at least one of an IP address of the user computing device, a MAC address of the user computing device, a cookie stored on the user computing device, a beacon, a session-id, a request-id, a user agent identifier, or a unique browser identifier;

    in response to receiving the request from the user computing device for the network resource hosted on the third party site, transmit over the network, to a network resource provider comprising the third party site, a request for the network resource requested by the user computing device, wherein the request transmitted to the network resource provider does not comprise at least a portion of the identification data included in the request received from the user computing device;

    receive, over the network, a first response from the network resource provider comprising the third party site, the first response including a user interface comprising one or more corresponding form fields configured to receive shipping address information to which an item is to be shipped to as part of a transaction;

    determine, using an examination of phrases associated with the first response, that the response comprises a shipping webpage comprising shipping form fields;

    provide an anonymous shipping control via which the user can indicate whether an anonymous shipping address associated with a different entity than the user, is to be used as a shipment destination is to be used for the shipment of the item, wherein if the user does not activate the anonymous shipping control an anonymous shipping address will not be used for the shipment of the item;

    receive, over the network, from the browser application an indication that the user has activated the anonymous shipping control;

    receive, over the network, an indication from the user as to which shipping address is to be used as a final destination shipping address;

    generate an anonymous email address and assign the anonymous email address to be used, with respect to email communications, only for the transaction involving the shipment of the item;

    automatically populate corresponding shipping form fields with the anonymous shipping address, and enable the anonymous shipping address to be provided to the network resource provider;

    scan information from a shipping-related label on the item after receipt at the anonymous shipping address, wherein the shipping-related label does not include the final destination shipping address;

    identify the final destination shipping address using the information scanned from the shipping-related label on the received item;

    cause, at least in part, the received item to be shipped to the final destination shipping address.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×