Encrypted E-Commerce Product
First Claim
1. A method for conducting a transaction on a computer network, the method comprising:
- receiving, at a first computer, an overhead key from a seller computing device, the first computer configured to conduct a transaction between the seller computing device and a buyer computing device, the overhead key configured to permit access to a seller verification data;
receiving, at the first computer, a buyer'"'"'s object from a buyer computing device, the buyer'"'"'s object comprising the seller verification data and a purchase solicitation comprising a buyer verification data, wherein the seller verification data is incorporated into the buyer'"'"'s object from a seller'"'"'s object located on the computer network in response to actuation by the buyer computing device, the seller object comprising the seller verification data and a seller content in an electronic information format;
accessing, at the first computer, the seller verification data;
comparing, at the first computer, the seller verification data and the buyer verification data to evaluate compliance;
providing, to a buyer computing device, access to the seller content located on the computer network after compliance is evaluated.
4 Assignments
0 Petitions
Accused Products
Abstract
A system for conducting a financial transaction in e-commerce on the internet includes objects prepared by a seller and a buyer. The seller'"'"'s object includes a clear text header file (advertisement), an encrypted overhead file which contains verification data pertaining to the financial transaction, and an encrypted content file containing the subject matter for sale by the seller. With a purchase solicitation from the buyer, an overhead key can be used by a transaction agency to ensure there is a compliance between the purchase solicitation and the verification data of the overhead (from seller'"'"'s object). Next a revelation key is provided to give the buyer access to the content when such compliance has been ensured.
-
Citations
20 Claims
-
1. A method for conducting a transaction on a computer network, the method comprising:
-
receiving, at a first computer, an overhead key from a seller computing device, the first computer configured to conduct a transaction between the seller computing device and a buyer computing device, the overhead key configured to permit access to a seller verification data; receiving, at the first computer, a buyer'"'"'s object from a buyer computing device, the buyer'"'"'s object comprising the seller verification data and a purchase solicitation comprising a buyer verification data, wherein the seller verification data is incorporated into the buyer'"'"'s object from a seller'"'"'s object located on the computer network in response to actuation by the buyer computing device, the seller object comprising the seller verification data and a seller content in an electronic information format; accessing, at the first computer, the seller verification data; comparing, at the first computer, the seller verification data and the buyer verification data to evaluate compliance; providing, to a buyer computing device, access to the seller content located on the computer network after compliance is evaluated. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for conducting a transaction on a computer network, the method comprising:
-
creating a seller'"'"'s object in an electronic information format at a first computing device, the seller'"'"'s object comprising; a seller content configured to be displayed on the computer network, wherein a first at least a portion of the seller content is concealed; a seller verification data wherein the seller verification data is concealed; wherein the seller verification data is configured to be received, by a buyer computing device, the seller verification data further configured to be incorporated into a buyer'"'"'s object; wherein the buyer'"'"'s object comprises; the seller verification data; a buyer verification data; wherein the buyer'"'"'s object is configured to be received at a transaction agency computing device, the transaction agency computing device comprising a verification key; wherein the verification key is configured for use in exposing the seller verification data at the transaction agency to evaluate compliance between the seller verification data and the buyer verification data; wherein the transaction agency computing device is configured to provide access to the seller content after evaluating compliance. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A tangible computer readable medium including instructions stored thereon that, in response to execution by a computing device, cause the computing device to perform the instructions comprising:
-
instructions to receive, at a first computer, an overhead key from a seller computing device, the first computer configured to conduct a transaction between the seller computing device and a buyer computing device, the overhead key configured to permit access to a seller verification data; instructions to receive, at the first computer, a buyer'"'"'s object from a buyer computing device, the buyer'"'"'s object comprising the seller verification data and a purchase solicitation comprising a buyer verification data, wherein the seller verification data is incorporated into the buyer'"'"'s object from a seller'"'"'s object located on the computer network in response to actuation by the buyer computing device, the seller object comprising the seller verification data and a seller content in an electronic information format; instructions to access, at the first computer, the seller verification data; instructions to compare, at the first computer, the seller verification data and the buyer verification data to evaluate compliance; instructions to provide, to a buyer computing device, access to the seller content located on the computer network after compliance is evaluated. - View Dependent Claims (12, 13, 13, 15)
-
-
16. A tangible computer readable medium including instructions stored thereon that, in response to execution by a computing device, cause the computing device to perform the instructions comprising:
-
instructions to create a seller'"'"'s object in an electronic information format at a first computing device, the seller'"'"'s object comprising; a seller content configured to be displayed on the computer network, wherein a first at least a portion of the seller content is concealed; a seller verification data wherein the seller verification data is concealed; wherein the seller verification data is configured to be received, by a buyer computing device, the seller verification data further configured to be incorporated into a buyer'"'"'s object; wherein the buyer'"'"'s object comprises; the seller verification data; a buyer verification data; wherein the buyer'"'"'s object is configured to be received at a transaction agency computing device, the transaction agency computing device comprising a verification key; wherein the verification key is configured for use in exposing the seller verification data at the transaction agency to evaluate compliance between the seller verification data and the buyer verification data; wherein the transaction agency computing device is configured to provide access to the seller content after evaluating compliance. - View Dependent Claims (17, 18, 19, 20)
-
Specification