×

Payment information security for multi-merchant purchasing environment for downloadable products

  • US 7,548,889 B2
  • Filed: 01/24/2005
  • Issued: 06/16/2009
  • Est. Priority Date: 01/24/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. One or more device-readable media having device-executable instructions which, when executed, cause one or more processors to perform the steps of:

  • storing by a security application running on a user computer, credit card information comprising a credit card identifier and providing by the security application a token to a purchasing application wherein the token is unique to the credit card identifier;

    identifying a first product from the user computer, the first product being provided by a first merchant computer application;

    adding the first product to a purchase list by the user computer;

    identifying a second product by the user computer, the second product being provided by a second merchant computer application, the second merchant being different from the first merchant;

    adding the second product to the purchase list by the user computer;

    receiving a purchase instruction from a user, the purchase instruction indicating a request from the user to purchase all items on the purchase list, including the first product and the second product;

    identifying by the purchasing application the token;

    providing by the purchasing application the token to the security application;

    providing by the purchasing application a first identifier associated with the first merchant to the security application;

    providing by the purchasing application a second identifier associated with the second merchant to the security application;

    retrieving, by the security application, based on the token, the credit card identifier from the stored credit card information;

    encrypting first credit card data by the security application using a first public key associated with the first merchant, the first credit card data including a credit card identifier;

    encrypting second credit card data by the security application using a second public key associated with the second merchant, the second credit card data including the credit card identifier;

    sending, in response to the purchase instruction, the first encrypted credit card data to a first merchant application associated with the first merchant; and

    sending, in response to the purchase instruction, the second encrypted credit card data to a second merchant application associated with the second merchant.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×