Encrypted e-commerce product
First Claim
1. A method for conducting a financial transaction on a computer network, the method comprising:
- receiving a first object in an electronic information format at a first computer, wherein the first object comprises;
an overhead file including a first verification data wherein the overhead file is concealed to protect the first verification data; and
a purchase solicitation including a second verification data;
wherein the first object is created in part from a second object located on the computer network wherein the second object is in an electronic information format, the second object comprising;
a header file in clear text for display on the computer network;
the overhead file including the first verification data; and
a content file including content that is concealed;
wherein the overhead file including the first verification data of the second object is incorporated into the first object along with the purchase solicitation;
receiving an overhead key at the first computer for use in exposing the first verification data of the overhead file contained within the first object to ensure there is a compliance between the second verification data and the first verification data wherein the overhead key is a private part of a public-private key pair;
evaluating the first object by comparing the first verification data to the second verification data to ensure compliance between the purchase solicitation and the overhead file; and
providing access to the content file of the second object after compliance is ensured.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for conducting a financial transaction in e-commerce on the internet includes objects prepared by a seller and a buyer. The seller'"'"'s object includes a clear text header file (advertisement), an encrypted overhead file which contains verification data pertaining to the financial transaction, and an encrypted content file containing the subject matter for sale by the seller. With a purchase solicitation from the buyer, an overhead key can be used by a transaction agency to ensure there is a compliance between the purchase solicitation and the verification data of the overhead (from seller'"'"'s object). Next a revelation key is provided to give the buyer access to the content when such compliance has been ensured.
-
Citations
45 Claims
-
1. A method for conducting a financial transaction on a computer network, the method comprising:
-
receiving a first object in an electronic information format at a first computer, wherein the first object comprises; an overhead file including a first verification data wherein the overhead file is concealed to protect the first verification data; and a purchase solicitation including a second verification data; wherein the first object is created in part from a second object located on the computer network wherein the second object is in an electronic information format, the second object comprising; a header file in clear text for display on the computer network; the overhead file including the first verification data; and a content file including content that is concealed; wherein the overhead file including the first verification data of the second object is incorporated into the first object along with the purchase solicitation; receiving an overhead key at the first computer for use in exposing the first verification data of the overhead file contained within the first object to ensure there is a compliance between the second verification data and the first verification data wherein the overhead key is a private part of a public-private key pair; evaluating the first object by comparing the first verification data to the second verification data to ensure compliance between the purchase solicitation and the overhead file; and providing access to the content file of the second object after compliance is ensured. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitional tangible computer readable medium including instructions stored thereon, that in response to execution by a computing device, cause the computing device to perform the instructions comprising:
-
instructions to receive a response to a first object available on a computing network, the first object comprising a plurality of files in electronic information formats, the plurality of files comprising; a header file in clear text for display on the computer network; an overhead file including verification data, the overhead file and the verification data concealed by being encrypted to protect the verification data; a content file, the content file being concealed; wherein the response to the first object is in the form a second object in an electronic information format, the second object including the overhead file and a purchase solicitation; instructions to receive an overhead key, the overhead key being a private part of a public-private key pair for use in exposing the verification data of the overhead file in response to receiving the second object; instructions to evaluate the second object to ensure compliance with the verification data of the first object; and instructions to provide access to the content file. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for conducting a transaction on a computer network, the method comprising:
-
receiving a first object in an electronic information format at a first computer, wherein the first object comprises; an overhead file including a first verification data wherein the overhead file is concealed to protect the first verification data; and a purchase solicitation including a second verification data; wherein the first object is created in part from a second object located on the computer network wherein the second object is in an electronic information format, the second object comprising; a header file in clear text for display on the computer network; the overhead file including the first verification data; and a content file including content that is concealed; wherein the overhead file including the first verification data of the second object is incorporated into the first object along with the purchase solicitation; receiving an overhead key at the first computer for use in exposing the first verification data of the overhead file contained within the first object to ensure there is a compliance between the second verification data and the first verification data wherein the overhead key is a symmetric key; evaluating the first object by comparing the first verification data to the second verification data to ensure compliance between the purchase solicitation and the overhead file; and providing access to the content file of the second object after compliance is ensured. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A non-transitional tangible computer readable medium including instructions stored thereon, that in response to execution by a computing device, cause the computing device to perform the instructions comprising:
-
instructions to receive a response to a first object available on a computing network, the first object comprising a plurality of files in electronic information formats, the plurality of files comprising; a header file in clear text for display on the computer network; an overhead file including verification data, the overhead file and the verification data concealed by being encrypted to protect the verification data; a content file, the content file being concealed; wherein the response to the first object is in the form a second object in an electronic information format, the second object including the overhead file and a purchase solicitation; instructions to receive an overhead key, the overhead key being a symmetric key for use in exposing the verification data of the overhead file in response to receiving the second object; instructions to evaluate the second object to ensure compliance with the verification data of the first object; and instructions to provide access to the content file. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A method for conducting a transaction on a computer network, the method comprising:
-
creating a first object in an electronic information format at a first computer, wherein the first object comprises; a header file for display on the computer network; an overhead file including a first verification data wherein the overhead file is concealed to protect the first verification data; a content file including content that is concealed; wherein the overhead file is configured to be received at a second computer, the overhead file further configured to be incorporated into a second object located on the computer network; wherein the second object comprises; the overhead file including the first verification data; and a purchase solicitation including a second verification data; wherein the second object is configured to be received at a third computer, wherein the third computer comprises an overhead key; wherein the overhead key is configured for use in exposing the first verification data at the third computer to ensure there is compliance between the first verification data and the second verification data; wherein the third computer is configured to evaluate the second object by comparing the first verification data of the overhead file to the second verification data of the purchase solicitation to ensure compliance between the overhead file and the purchase solicitation; wherein the third computer is configured to provide access the content file of the first object after compliance is ensured. - View Dependent Claims (40, 41, 42, 43, 44, 45)
-
Specification