METHOD AND COMMUNICATIONS AND COMMUNICATION NETWORK INTRUSION PROTECTION METHODS AND INTERUSION ATTEMPT DETECTION SYSTEM
First Claim
Patent Images
1. A secure e-commerce communications system, the system comprising:
- an e-commerce system, including;
a private system for maintaining confidential information; and
a public system for maintaining non-confidential information,wherein the private system provides variable cyber coordinates to authorized parties for secure communications with the private system, andthe public system provides cyber coordinates to the general public for communications with the public system.
0 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer readable medium for secure e-commerce communications, including an e-commerce system, including a private system for maintaining confidential information; and a public system for maintaining non-confidential information. The private system provides variable cyber coordinates to authorized parties for secure communications with the private system, and the public system provides cyber coordinates to the general public for communications with the public system.
-
Citations
42 Claims
-
1. A secure e-commerce communications system, the system comprising:
-
an e-commerce system, including; a private system for maintaining confidential information; and a public system for maintaining non-confidential information, wherein the private system provides variable cyber coordinates to authorized parties for secure communications with the private system, and the public system provides cyber coordinates to the general public for communications with the public system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for secure e-commerce communications, the method comprising:
-
configuring an e-commerce system to include a private system for maintaining confidential information, and a public system for maintaining non-confidential information; providing via the private system variable cyber coordinates to authorized parties for secure communications with the private system; and providing via the public system cyber coordinates to the general public for communications with the public system. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer program product for secure e-commerce communications, and including one or more computer readable instructions embedded on a computer readable medium and configure to cause one or more computer processors to perform the step of:
-
configuring an e-commerce system to include a private system for maintaining confidential information, and a public system for maintaining non-confidential information; providing via the private system variable cyber coordinates to authorized parties for secure communications with the private system; and providing via the public system cyber coordinates to the general public for communications with the public system. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification