Secure private agent for electronic transactions
First Claim
1. A computer implemented method of conducting secure electronic commerce, comprising the step of:
- providing a secure private agent, wherein said secure private agent performs the steps of;
authenticating a login of a consumer onto a server of said secure private agent, said consumer being registered with said secure private agent, wherein said secure private agent is in possession of personal details of said consumer, said personal details comprising a credit card number; and
intercepting a communication between said consumer and an electronic commerce site.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented technique for facilitating secure electronic transactions anonymously is presented, wherein a secure private agent establishes a client relationship with a consumer, and mediates communication between the consumer and electronic commerce sites. The secure private agent substitutes internally generated identifiers for personal details of the consumer, completes details of the transaction on behalf of the consumer, authorizes payment, and guarantees the credit of the consumer to the electronic commerce site or a payment processing agent. The secure private agent concurrently monitors internet browsing activity of the consumer and provides its services on demand, or automatically in background mode.
263 Citations
40 Claims
-
1. A computer implemented method of conducting secure electronic commerce, comprising the step of:
-
providing a secure private agent, wherein said secure private agent performs the steps of;
authenticating a login of a consumer onto a server of said secure private agent, said consumer being registered with said secure private agent, wherein said secure private agent is in possession of personal details of said consumer, said personal details comprising a credit card number; and
intercepting a communication between said consumer and an electronic commerce site. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer Implemented method of conducting secure electronic commerce, comprising the steps of:
-
associating a proxy server with a browser of a party to a transaction, wherein said browser is in communication with an electronic commerce site;
authenticating an identity of said party;
modifying files that are provided by said electronic commerce site such that command instructions carried in said files are routed through said proxy server;
generating an identifier that links said party to a current transaction between said party and said electronic commerce site; and
providing said identifier to said electronic commerce site. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A computer system for conducting electronic commerce, comprising:
-
a front end client application, executing on a computer of a user;
a back-office logic application linked to a transaction processor;
a back-end gateway application, linked to said front end client application, and linked to said back-office logic application via a data network, and communicating with a commerce site;
wherein said back-end gateway application intercepts communications between said user and said commerce site;
wherein responsive to a static identifier that is directed by said user to said commerce site in a first communication, said back-end gateway application blocks said first communication, and said back-office logic application generates a virtual identifier;
wherein said back-end gateway application communicates said virtual identifier to said commerce site in a second communication; and
said back-office logic application communicates an actual identifier to said transaction processor in a third communication. - View Dependent Claims (27, 28, 29, 30, 31, 32)
-
-
33. A computer software product, comprising a computer-readable medium in which computer program instructions are stored, which instructions, when read by a computer, cause the computer to perform the steps of:
-
associating a proxy server with a browser of a party to a transact-on, wherein said browser is in communication with an electronic commerce site;
authenticating an identity of said party;
modifying files that are provided by said electronic commerce site such that command instructions carried in said files are routed through said proxy server; and
providing an identifier that links said party to a current transaction between said party and said electronic commerce site;
to said identifier to said electronic commerce site. - View Dependent Claims (34, 35, 36, 37)
-
-
38. A computer software product, comprising a computer-readable medium in which computer program instructions are stored, which instructions, when read by a computer, cause the computer to perform the steps of:
-
intercepting a communication between a browser of a party to a transaction and an electronic commerce site;
authenticating an identity of said party;
receiving an identifier that links said party to a current transaction between said party and said electronic commerce site; and
providing said identifier to said electronic commerce site. - View Dependent Claims (39, 40)
-
Specification