Payment information security for multi-merchant purchasing environment for downloadable products
First Claim
1. One or more device-readable media having device-executable instructions which, when executed, cause one or more processors to perform the steps of:
- storing by a security application running on a user computer, credit card information comprising a credit card identifier and providing by the security application a token to a purchasing application wherein the token is unique to the credit card identifier;
identifying a first product from the user computer, the first product being provided by a first merchant computer application;
adding the first product to a purchase list by the user computer;
identifying a second product by the user computer, the second product being provided by a second merchant computer application, the second merchant being different from the first merchant;
adding the second product to the purchase list by the user computer;
receiving a purchase instruction from a user, the purchase instruction indicating a request from the user to purchase all items on the purchase list, including the first product and the second product;
identifying by the purchasing application the token;
providing by the purchasing application the token to the security application;
providing by the purchasing application a first identifier associated with the first merchant to the security application;
providing by the purchasing application a second identifier associated with the second merchant to the security application;
retrieving, by the security application, based on the token, the credit card identifier from the stored credit card information;
encrypting first credit card data by the security application using a first public key associated with the first merchant, the first credit card data including a credit card identifier;
encrypting second credit card data by the security application using a second public key associated with the second merchant, the second credit card data including the credit card identifier;
sending, in response to the purchase instruction, the first encrypted credit card data to a first merchant application associated with the first merchant; and
sending, in response to the purchase instruction, the second encrypted credit card data to a second merchant application associated with the second merchant.
2 Assignments
0 Petitions
Accused Products
Abstract
A multi-merchant purchasing system is configured to identify downloadable products selected by a user for purchase. The identified downloadable products are offered by multiple merchants. The multi-merchant purchasing system enables the user to purchase all of the downloadable products in a single transaction. Specifically, the multi-merchant purchasing system determines payment information associated with the user and, with minimum user-interaction, sends the payment information to applications associated with the merchants for processing. The multi-merchant purchasing system may also be configured to receive purchase information from the merchant applications and maintains the purchase information for the user in a locker. The multi-merchant purchasing system may further be configured to automatically download and install the purchased product onto the user'"'"'s computing device through a software assistant. To ensure privacy and security, the multi-merchant purchasing system may include a credit card quarantine module to secure credit card data by encoding and multiple levels of encryptions.
-
Citations
15 Claims
-
1. One or more device-readable media having device-executable instructions which, when executed, cause one or more processors to perform the steps of:
-
storing by a security application running on a user computer, credit card information comprising a credit card identifier and providing by the security application a token to a purchasing application wherein the token is unique to the credit card identifier; identifying a first product from the user computer, the first product being provided by a first merchant computer application; adding the first product to a purchase list by the user computer;
identifying a second product by the user computer, the second product being provided by a second merchant computer application, the second merchant being different from the first merchant;
adding the second product to the purchase list by the user computer;receiving a purchase instruction from a user, the purchase instruction indicating a request from the user to purchase all items on the purchase list, including the first product and the second product; identifying by the purchasing application the token; providing by the purchasing application the token to the security application; providing by the purchasing application a first identifier associated with the first merchant to the security application; providing by the purchasing application a second identifier associated with the second merchant to the security application; retrieving, by the security application, based on the token, the credit card identifier from the stored credit card information;
encrypting first credit card data by the security application using a first public key associated with the first merchant, the first credit card data including a credit card identifier;
encrypting second credit card data by the security application using a second public key associated with the second merchant, the second credit card data including the credit card identifier;sending, in response to the purchase instruction, the first encrypted credit card data to a first merchant application associated with the first merchant; and sending, in response to the purchase instruction, the second encrypted credit card data to a second merchant application associated with the second merchant. - View Dependent Claims (2, 3, 4, 5)
-
-
6. One or more device-readable media having device-executable instructions which, when executed, cause one or more processors to perform the steps of:
-
storing a data structure by a user computer security application running on a user computer, the data structure including; a first data field including credit card information comprising a credit card identifier; a second data field indexed to the first data field, the second data field including a token wherein the token is unigue to the credit card identifier and, and is being used to substitute for a corresponding credit card data identifier in the first data field; a third data field including a plurality of merchant identifiers, each merchant identifier indicating a different merchant; and a fourth data field indexed to the third data field, the fourth data field including a first public key and a second public key wherein the public keys are associated with a corresponding merchant identifier in the third data field; providing by the security application the token to a purchasing application; identifying a first product from the user computer, the first product beinci provided by a first merchant computer application; adding the first product to a purchase list by the user computer; identifying a second product by the user computer, the second product being provided by a second merchant computer application, the second merchant being different from the first merchant; adding the second product to the purchase list by the user computer;
receiving a purchase instruction from a user, the purchase instruction indicating a request from the user to purchase all items on the purchase list. including the first product and the second product;identifying by the purchasing application the token; providing by the purchasing application the token to the security application; providing by the purchasing application a first identifier associated with the first merchant to the security application; providing by the purchasing application a second identifier associated with the second merchant to the security application; retrieving, by the security application, based on the token, the credit card identifier from the stored credit card information; encrypting first credit card data by the security application using the first public key associated with the first merchant, the first credit card data including a credit card identifier; encrypting second credit card data by the security application using the second public key associated with the second merchant, the second credit card data including the credit card identifier; sending, in response to the purchase instruction, the first credit card data to a first merchant application associated with the first merchant; and sending, in response to the purchase instruction, the second credit card data to a second merchant application associated with the second merchant. - View Dependent Claims (7, 8)
-
-
9. A system for purchasing downloadable products comprising:
-
one or more memories; one or more processors operable with the one or more memories to; provide credit card numbers, each credit card number being associated with a token, maintain public keys, each public key corresponding to a different merchant associated with the system, encrypt at least one of the credit card numbers with at least one of the public keys, wherein the one or more processors are operable with the one or more memories for a single purchase request from a user to; provide a token to the security application, receive a first encrypted credit card number and a second encrypted credit card number, the first encrypted credit card number including a credit card number associated with the token encrypted with a first public key associated with a first one of the merchants, the second encrypted credit card number including the credit card number encrypted with a second public key associated with a second one of the merchants, determine first payment information associated with the first encrypted credit card number, determine second payment information associated with the second encrypted credit card number, send the first payment information and the first encrypted credit card number to the first one of the merchants, and send the second payment information and the second encrypted credit card number to the second one of the merchants. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification