System and apparatus for monitoring secure information in a computer network
First Claim
1. A machine for generating secure transaction data comprising:
- a computer processor;
a secured technology module stored in a computer readable storage media, said secured technology module executable in said computer processor, said secured technology module configured to receive transaction data and audit data, said transaction data comprising a purchase order for goods or services including all information required by a merchant to fill said order and payment instructions, said audit data comprising a copy of at least a portion of said purchase order for goods or services, said secured technology module further configured to encrypt said transaction data into a first encryption format and encrypt said audit data into a second encryption format wherein said first encryption format is different than said second encryption format and each is adapted to be decrypted by a different party; and
an order module in communication with said secured technology module, said order module configured to combine said encrypted transaction data and said encrypted audit data into a secure message.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure transaction system apparatus and method provide for the auditing of secure messages in a computer network. The secure transaction system includes an electronic commerce service which is in communication with multiple consumer computers and multiple merchant computers. The consumer computers initiate consumer transactions between the consumer computers and the merchant computers. Each consumer transaction can include different items, different merchants, different shipping methods and different payment instructions. An order object within the consumer computer stores summaries about the different items, the different merchants, the different shipping methods and different payment instructions during creation of each commercial transaction. While generating transaction data, the consumer computer also generates related audit data. The consumer computers encrypt the transaction data and the audit data into different encryption formats and send the encrypted transaction data and the encrypted audit data to the electronic commerce service. The electronic commerce service decrypts the audit data and stores copies of the encrypted transaction data. The electronic commerce service also routes the encrypted transaction data to the merchant computers. The merchant computers decrypt the encrypted transaction data and complete the desired commercial transaction. Thus, the electronic commerce service can audit secure transactions while maintaining confidentiality.
-
Citations
18 Claims
-
1. A machine for generating secure transaction data comprising:
-
a computer processor; a secured technology module stored in a computer readable storage media, said secured technology module executable in said computer processor, said secured technology module configured to receive transaction data and audit data, said transaction data comprising a purchase order for goods or services including all information required by a merchant to fill said order and payment instructions, said audit data comprising a copy of at least a portion of said purchase order for goods or services, said secured technology module further configured to encrypt said transaction data into a first encryption format and encrypt said audit data into a second encryption format wherein said first encryption format is different than said second encryption format and each is adapted to be decrypted by a different party; and an order module in communication with said secured technology module, said order module configured to combine said encrypted transaction data and said encrypted audit data into a secure message. - View Dependent Claims (2, 3)
-
-
4. A secure system for monitoring secure commercial transactions comprising:
-
a computer network interconnecting multiple computers; and a transaction auditing service executing in said computer network, said transaction auditing service configured to receive secure transaction messages from any one of said computers, said secure transaction messages configured to contain one or more encrypted transaction packets and at least one encrypted audit packet, wherein each of said encrypted transaction packets comprises a purchase order for goods or services including all information required by a merchant to fill said order and payment instructions and said at least one encrypted audit packet comprises a copy of at least a portion of said purchase order for goods or services selected from at least one of said encrypted transaction packets, and wherein said one or more encrypted transaction packets and said at least one encrypted audit packet are encrypted with different encryption formats each adapted to be decrypted by a different party, said transaction auditing service comprising; a first secured technology module configured to decrypt said at least one encrypted audit packet; and a decryption module in communication with said first secured technology module and said computer network, said decryption module configured to receive said secure transaction messages and direct said first secured technology module to decrypt said at least one encrypted audit packet, said decryption module further configured to forward said one or more encrypted transaction packets to one or more of said computers connected to said computer network. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. A secure system for monitoring secure commercial transactions comprising:
-
a computer network interconnecting a plurality of computers; a consumer module executing in at least one of said interconnected computers, said consumer module configured to generate encrypted purchase order data including all information required by a merchant to fill said order, encrypted payment instruction data, and encrypted audit data comprising a copy of at least a portion of said purchase order data, wherein said encrypted purchase order data, said encrypted payment instruction data and said encrypted audit data are encrypted into different encryption formats each adapted to be decrypted by a different party; an auditor module executable in one of said interconnected computers, said auditor module configured to receive said encrypted audit data, said encrypted purchase order data and said encrypted payment instruction data, said auditor module including decryption routines and a database wherein said decryption routines direct said interconnected computer to decrypt said encrypted audit data, said auditor module further including storage routines which store copies of said decrypted audit data, said encrypted purchase order data and said encrypted payment instruction data in said database; a merchant module executing in at least one of said interconnected computers, said merchant module configured to receive and decrypt said encrypted purchase order data; and an acquirer module executing in at least one of said interconnected computers, said acquirer module configured to receive and decrypt said encrypted payment instruction data. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A secure system for monitoring secure commercial transactions comprising:
-
a computer network interconnecting multiple computers; a first electronic mail module executing in a first one of said computers, said first electronic mail module configured to receive a secure transaction message from a second one of said computers, said secure transaction message containing an encrypted transaction packet and an encrypted audit packet, said encrypted transaction packet comprising a purchase order for goods or services including all information required by a merchant to fill said order and payment instructions, said encrypted audit packet comprising a copy of at least a portion of said purchase order for goods or services and a transaction identifier which identifies a third one of said computers, wherein said encrypted transaction packet and said encrypted audit packet are encrypted into different encryption formats each adapted to be decrypted by a different party; and a security means for decrypting said encrypted audit packets, said security means executing in said first one of said computers and in communication with said first electronic mail module, said security means utilizing said transaction identifier in said decrypted audit packet to properly route said encrypted transaction packet to said third one of said computers. - View Dependent Claims (18)
-
Specification