Secured purchasing system
First Claim
Patent Images
1. A method for using a system to conduct encrypted commercial transactions with an encrypted file in e-commerce on the Internet which comprises the steps of:
- creating said file, on the Internet, with said file having a first part and a second part;
encrypting said first part of said file with a first private key, wherein said first part of said file includes a second private key;
encrypting said second part of said file with said second private key;
decrypting said first part of said file with said first private key in response to a commercial transaction between a seller and a buyer;
retrieving said second private key from said first part; and
decrypting said second part of said file with said second key to complete the transaction.
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method for transferring an encrypted file over the Internet involves a seller, a buyer, and a transaction agent. The file has a first part (administrative information) and a second part (subject-matter content) that are respectively encrypted with first and second encryption/decryption non-public keys. In operation, the appropriate key is released by the seller or the transaction agent for respective use by either the transaction agent or the buyer, to decrypt and reveal the second part of the file to the buyer.
-
Citations
14 Claims
-
1. A method for using a system to conduct encrypted commercial transactions with an encrypted file in e-commerce on the Internet which comprises the steps of:
-
creating said file, on the Internet, with said file having a first part and a second part;
encrypting said first part of said file with a first private key, wherein said first part of said file includes a second private key;
encrypting said second part of said file with said second private key;
decrypting said first part of said file with said first private key in response to a commercial transaction between a seller and a buyer;
retrieving said second private key from said first part; and
decrypting said second part of said file with said second key to complete the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for using a system to conduct encrypted commercial transactions between a buyer and a seller, wherein said method involves a transaction agent and comprises the step of:
-
presenting a file, said file being created, on the Internet, by the seller and containing at least an overhead and a content, with said overhead being encrypted with a first private key and said content being encrypted with a second private key; and
decrypting said content of said file by employing said second private key to reveal said content of said file by employing said second private key to reveal said content of said file for use by the buyer to complete a commercial transaction between the buyer and the seller. - View Dependent Claims (11, 12, 13, 14)
-
Specification