System and method for secure network purchasing
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving, by a toolbox from a merchant computer, an IP address and an inquiry whether a user computer is online at the IP address;
confirming, by the toolbox, that the user computer is online at the IP address, wherein the confirming comprises,transmitting a file to the IP address;
receiving acceptance of an online purchase from the user computer by receiving, based on the transmission of the file, identification information of the user computer;
verifying the identification information of the user computer;
determining that a credit limit associated with a user of the user computer is not exceeded; and
sending, based on the determining, a confirmation of the online purchase to the merchant computer.
12 Assignments
0 Petitions
Accused Products
Abstract
There is disclosed a method for performing secure electronic transactions on a computer network, the network comprising a buyer'"'"'s computer, a vendor server, a creditor server and a security server. The buyer'"'"'s computer has a fingerprint file stored in the memory thereof. The method includes the steps of:
- i) the buyer computer requesting to purchase merchandise to the vendor server, the purchase request including said buyer computer'"'"'s IP address;
- ii) the buyer computer selecting a predetermined form of secured payment method;
- iii) the payment method selection causing the vendor server to transmit to the security server a request for confirmation of the buyer computers identity at the buyer computer'"'"'s IP address;
- iv) the confirmation request causing the security server to send a retrieval request to the IP address, the retrieval request including a retrieval program for detecting and retrieving the buyer'"'"'s computer'"'"'s fingerprint file, and the retrieval request further comprising a response request asking for confirmation of the purchase request; whereby a positive response from the buyer'"'"'s computer to the security server accompanied by the fingerprint file causes the security server to confirm the buyer computer'"'"'s identity to the vendor server and to approve the purchase.
-
Citations
15 Claims
-
1. A computer-implemented method comprising:
-
receiving, by a toolbox from a merchant computer, an IP address and an inquiry whether a user computer is online at the IP address; confirming, by the toolbox, that the user computer is online at the IP address, wherein the confirming comprises, transmitting a file to the IP address; receiving acceptance of an online purchase from the user computer by receiving, based on the transmission of the file, identification information of the user computer; verifying the identification information of the user computer; determining that a credit limit associated with a user of the user computer is not exceeded; and sending, based on the determining, a confirmation of the online purchase to the merchant computer. - View Dependent Claims (2, 3, 4, 5)
-
-
6. One or more machine-readable storage medium including instructions which, when executed by one or more machines, cause the one or more machines to perform operations comprising:
-
receiving, by a toolbox from a merchant computer, an IP address and an inquiry whether a user computer is online at the IP address; confirming, by the toolbox, that the user computer is online at the IP address, wherein the confirming comprises, transmitting a file to the IP address; receiving acceptance of an online purchase from the user computer by receiving, based on the transmission of the file, identification information of the user computer; verifying the identification information of the user computer; determining that a credit limit associated with a user of the user computer is not exceeded; and sending, based on the determining, a confirmation of the online purchase to the merchant computer. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor and memory, the memory containing instructions that when executed by the processor performs operations including, receiving, by a toolbox from a merchant computer, an IP address and an inquiry whether a user computer is online at the IP address; confirming, by the toolbox, that the user computer is online at the IP address, wherein the confirming comprises, transmitting a file to the IP address; receiving acceptance of an online purchase from the user computer by receiving, based on the transmission of the file, identification information of the user computer; verifying the identification information of the user computer; determining that a credit limit associated with a user of the user computer is not exceeded; and sending, based on the determining, a confirmation of the online purchase to the merchant computer. - View Dependent Claims (12, 13, 14, 15)
-
Specification