×

Method of conducting secure transactions containing confidential, financial, payment, credit, or other information over a network

  • US 6,910,023 B1
  • Filed: 05/26/2000
  • Issued: 06/21/2005
  • Est. Priority Date: 05/26/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for enabling an individual, business, or other entity to exchange confidential information or to make purchases or conduct financial or other transactions over a public or quasi-public network while limiting the transmission of confidential, sensitive, financial or other information over the public or quasi-public network and limiting access to such information by unauthorized individuals, the method comprising the steps of:

  • (i) on a processing computer, storing confidential, sensitive, financial or other information for which restricted access is desired, said confidential, sensitive, financial or other information for which restricted access is desired concerning one or more individuals, businesses or other entities, said processing computer connected to a computer system or systems of one or more businesses, financial institutions or other entities by way of a private, non-public network;

    (ii) sending a first electronic message from a first computer or computing means to a central network computer through transmitting said first electronic message over a public or quasi-public network, said first computer or computing means and said central network computer each connected to the public or quasi-public network, said first electronic message including information identifying the individual, business or entity from whom the message originated and including commercial, financial, or other information;

    (iii) storing at least a portion of said first electronic message received by said central network computer on data storage or data transfer media connected to said central network computer;

    (iv) thereafter, disconnecting said data storage or data transfer media from said central network computer and connecting said data storage or data transfer media to said processing computer;

    (v) with said processing computer, reading the portion of said first electronic message stored on said data storage or data transfer media, identifying the individual, business or other entity from whom said first electronic message originated, and accessing said stored confidential, sensitive, financial or other information concerning said individual, business or other entity as stored on said processing computer;

    (vi) from said processing computer, transmitting information from said first electronic message, together with the identity of the individual, business or other entity from whom said first electronic message originated and said confidential, sensitive, financial or other information concerning said individual, business or other entity, to the computer system or systems of said one or more businesses, financial institutions, or other entities for processing;

    (vii) following processing of said information, said computer system or systems of said one or more businesses, financial institutions, or other entities transmitting a second electronic message to said processing computer acknowledging the receipt and processing of said information, said second electronic message comprising an electronic confirmation message; and

    , (viii) storing said second electronic message received by said processing computer on data storage or data transfer media, transporting said data storage or data transfer media from said processing computer to said central network computer, and transmitting said second electronic message from said central network computer over said public or quasi-public network to the computer system or systems of individuals, businesses or other entities with whom the originator of said first electronic message wishes to make purchases or conduct financial or other transactions.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×