Secure anonymous transaction apparatuses, methods and systems
First Claim
1. A computer-implemented method, comprising:
- receiving, by a computer system from a merchant computer, an anonymized purchase order that comprises a one-time anonymized account number and an anonymized shipping address, the one-time anonymized account number and the anonymized shipping address generated by a one-time anonymous data generation component of a network server; and
prior to instructing, by the computer system, shipment of items related to the anonymized purchase order to the anonymized shipping address;
receiving, by the computer system from the network server, an identifier associated with the anonymized purchase order, andrequesting, by the computer system, an actual shipment address for the anonymized purchase order based at least in part on the identifier by generating an encrypted request message that is verified by the network server.
0 Assignments
0 Petitions
Accused Products
Abstract
The SECURE ANONYMOUS TRANSACTION APPARATUSES, METHODS AND SYSTEMS (“SAT”) transform hardware-verified user authentication requests via SAT components into secure transaction notifications. In one implementation, the SAT obtains a secure anonymous transaction user authentication request. The SAT verifies the authenticity of a user, using the secure anonymous transaction user authentication request. The SAT obtains an authenticated purchase order, in response to which it generates a one-time anonymous card account. Using the one-time card account, the SAT generates an anonymized purchase order for a merchant, and provides the anonymized purchase order. On obtaining a purchase notification for the anonymized purchase order, the SAT provides real-time notification for a user of the purchase notification. Also, on obtaining notification of a shipment related to the anonymized purchase order to an anonymized address, the SAT generates an order to re-route the shipment from the anonymized address to an actual shipment address of the user.
498 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a computer system from a merchant computer, an anonymized purchase order that comprises a one-time anonymized account number and an anonymized shipping address, the one-time anonymized account number and the anonymized shipping address generated by a one-time anonymous data generation component of a network server; and prior to instructing, by the computer system, shipment of items related to the anonymized purchase order to the anonymized shipping address; receiving, by the computer system from the network server, an identifier associated with the anonymized purchase order, and requesting, by the computer system, an actual shipment address for the anonymized purchase order based at least in part on the identifier by generating an encrypted request message that is verified by the network server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A secure anonymous transaction system, comprising:
-
a processor; and a memory disposed in communication with the processor and storing processor-executable instructions to; receive, from a merchant computer, an anonymized purchase order that comprises a one-time anonymized account number and an anonymized shipping address, the one-time anonymized account number and the anonymized shipping address generated by a one-time anonymous data generation component of a network server; receive, prior to instructing shipment of items related to the anonymized purchase order to the anonymized shipping address, an identifier associated with the anonymized purchase order; and request an actual shipment address for the anonymized purchase order based at least in part on the identifier by generating an encrypted request message that is verified by the network server. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification