System and method for secure network purchasing
3 Assignments
0 Petitions
Accused Products
Abstract
There is disclosed a method for performing secure electronic transactions on a computer network, the network comprising a buyer'"'"'s computer, a vendor server, a creditor server and a security server. The buyer'"'"'s computer has a fingerprint file stored in the memory thereof. The method includes the steps of: i) the buyer computer requesting to purchase merchandise to the vendor server, the purchase request including said buyer computer'"'"'s IP address; ii) the buyer computer selecting a predetermined form of secured payment method; iii) the payment method selection causing the vendor server to transmit to the security server a request for confirmation of the buyer computer'"'"'s identity at the buyer computer'"'"'s IP address; iv) the confirmation request causing the security server to send a retrieval request to the IP address, the retrieval request including a retrieval program for detecting and retrieving the buyer'"'"'s computer'"'"'s fingerprint file, and the retrieval request further comprising a response request asking for confirmation of the purchase request; whereby a positive response from the buyer'"'"'s computer to the security server accompanied by the fingerprint file causes the security server to confirm the buyer computer'"'"'s identity to the vendor server and to approve the purchase.
-
Citations
15 Claims
-
1. (canceled)
-
2. (canceled)
-
3. A method for performing secure electronic transactions on a computer network, said network comprising a buyer'"'"'s computer, a vendor server, a creditor server and a security server, including the steps of:
-
i) one or more of a vendor server, a creditor server or a security server, activating a diagnostic program to diagnose on a buyer computer whether the buyer computer has labeled components which can be used for generating a fingerprint file for verifying a buyer computer in future transactions;
ii) said buyer computer requesting to purchase merchandise from said vendor server, said purchase request including said buyer computer'"'"'s IP address;
iii) said buyer computer selecting a predetermined form of secured payment method;
iv) said payment method selection causing said vendor server to transmit to said security server a request for confirmation of said buyer computer'"'"'s identity at said buyer computer'"'"'s IP address;
v) said confirmation request causing said security server to send a retrieval request to said IP address, said retrieval request including a retrieval program for detecting and retrieving said buyer'"'"'s computer'"'"'s fingerprint file, said retrieval request further comprising a response request asking for confirmation of said purchase request;
whereby a positive response from said buyer'"'"'s computer to said security server accompanied by said fingerprint file causes said security server to confirm said buyer computer'"'"'s identity to said vendor server and to approve said purchase.
-
-
4. A method of performing secure electronic transactions on a computer network, said network comprising a buying computer, an ISP computer and a vendor computer, including the steps of:
-
said ISP computer assigning to buying computer a Buyer-ID code said and IP address, said Buyer ID code being determined by said ISP computer after activating a diagnostic program to diagnose on a buying computer whether the buying computer has labeled components which can be used for generating a fingerprint file for verifying a buying computer in future transactions;
said buying computer communicating via said ISP computer with said vendor computer and allowing an operator to select merchandise or services for purchase;
said Buyer-ID and buyer computer'"'"'s IP address are provided to vendor computer programmed to request and receive said information;
vendor computer is programmed to use Buyer-ID and buyer computer'"'"'s current IP address along with information such as desired Item ID, cost and name for generating an electronic purchase inquiry which is transmitted to ISP computer;
ISP is programmed such that upon receipt of purchase inquiry from vendor computer, ISP uses combination of IP address and Buyer-ID to determine within ISP'"'"'s internal network whether buyer is in fact still online at the address assigned at the beginning of the online session;
whereby if buyer computer is determined to be connected to ISP computer at correct address, ISP computer then generates and transmits Transaction Confirmation Number and instructs vendor computer to generate and forward invoice to ISP computer.
-
- 5. In a computer network, a system for performing a secured transaction between a buyer'"'"'s computer, a security server and one or more of a vendor server or a creditor server, wherein a buyer'"'"'s computer is provided with a buyer'"'"'s identification code, said buyer'"'"'s identification code being adapted to be transmitted from said buyer'"'"'s computer to said security server, said security server being adapted to compare the buyer'"'"'s identification code with an assigned buyer'"'"'s identification code, said security server being adapted to communicate with one of either a creditor server or a vendor the results of said comparison, said one of either a creditor server or said vendor server being adapted to complete a transaction based on the satisfactory comparison of said identification codes, said identification code including a fingerprint file, said finger print file being generated by one or more of a vendor server, a creditor server or a security server, said server having activated a diagnostic program to diagnose on a buyer computer whether the buyer computer has labeled components which can be used for generating a fingerprint file for verifying a buyer computer in future transactions.
-
10. A method of performing secure electronic transactions on a computer network comprising
signing a buyer'"'"'s computer into an ISP'"'"'s computer, said buyer'"'"'s computer having been assigned a buyer'"'"'s identification code, said buyer'"'"'s identification code being determined by said ISP activating a diagnostic program to diagnose on a buyer computer whether the buyer computer has labeled components which can be used for generating a fingerprint file for verifying a buyer computer in future transactions; -
transmitting a message from a buyer'"'"'s computer containing an identification code through said ISP'"'"'s computer;
comparing the buyer'"'"'s identification code with the assigned identification code;
connecting the buyer'"'"'s computer through the ISP to a merchant'"'"'s computer or a creditor'"'"'s computer;
initiating a transaction between said buyer'"'"'s computer and said merchant'"'"'s computer or a creditor'"'"'s computer, said merchant'"'"'s computer or creditor'"'"'s computer relying on the comparison of the buyer'"'"'s identification code with the assigned identification code in said transaction. - View Dependent Claims (11, 12)
-
-
13. A method of performing a secured transaction between a buyer'"'"'s computer a security server and one or more of a vendor server or a creditor server, comprising
providing a buyer'"'"'s computer with a buyer'"'"'s identification code, said buyer'"'"'s identification code being determined by activating a diagnostic program to diagnose on a buyer computer whether the buyer computer has labeled components which can be used for generating a fingerprint file for verifying a buyer computer in future transactions; -
transmitting said buyer'"'"'s identification code being adapted from said buyer'"'"'s computer to said security server, said security server comparing the buyer'"'"'s identification code with an assigned buyer'"'"'s identification code;
said security server communicating with one of either a creditor server or a vendor the results of said comparison;
said one of either a creditor server or said vendor server completing a transaction based on the satisfactory comparison of said identification codes. - View Dependent Claims (14, 15)
-
Specification