Encrypted e-commerce product
First Claim
1. A method for conducting a transaction on a computer network, comprising:
- receiving, by a first computer, an overhead key from a seller computing device, the first computer configured to conduct a transaction on a network between the seller computing device and a buyer computing device, the overhead key configured to permit access to a seller verification data,wherein the seller verification data comprises a header file in clear text for display on the network, andwherein the overhead key is a private part of a public-private key pair;
receiving, by the first computer, a buyer'"'"'s object from the buyer computing device, the buyer'"'"'s object comprising the seller verification data and a purchase solicitation, the purchase solicitation comprising a buyer verification data,wherein the seller verification data is incorporated into the buyer'"'"'s object from a seller'"'"'s object in response to actuation by the buyer computing device, the seller object comprising the seller verification data and a seller content in an electronic information format;
accessing, by the first computer, the seller verification data;
comparing, by the first computer, the seller verification data and the buyer verification data to evaluate compliance; and
providing, to the buyer computing device, access to the seller content dependent on the compliance.
4 Assignments
0 Petitions
Accused Products
Abstract
A system for conducting a financial transaction in e-commerce on the internet includes objects prepared by a seller and a buyer. The seller'"'"'s object includes a clear text header file (advertisement), an encrypted overhead file which contains verification data pertaining to the financial transaction, and an encrypted content file containing the subject matter for sale by the seller. With a purchase solicitation from the buyer, an overhead key can be used by a transaction agency to ensure there is a compliance between the purchase solicitation and the verification data of the overhead (from seller'"'"'s object). Next a revelation key is provided to give the buyer access to the content when such compliance has been ensured.
-
Citations
10 Claims
-
1. A method for conducting a transaction on a computer network, comprising:
-
receiving, by a first computer, an overhead key from a seller computing device, the first computer configured to conduct a transaction on a network between the seller computing device and a buyer computing device, the overhead key configured to permit access to a seller verification data, wherein the seller verification data comprises a header file in clear text for display on the network, and wherein the overhead key is a private part of a public-private key pair; receiving, by the first computer, a buyer'"'"'s object from the buyer computing device, the buyer'"'"'s object comprising the seller verification data and a purchase solicitation, the purchase solicitation comprising a buyer verification data, wherein the seller verification data is incorporated into the buyer'"'"'s object from a seller'"'"'s object in response to actuation by the buyer computing device, the seller object comprising the seller verification data and a seller content in an electronic information format; accessing, by the first computer, the seller verification data; comparing, by the first computer, the seller verification data and the buyer verification data to evaluate compliance; and providing, to the buyer computing device, access to the seller content dependent on the compliance. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory tangible computer readable medium including instructions stored thereon that, in response to execution by a computing device, cause the computing device to perform the instructions comprising:
-
instructions to receive, by a first computer, an overhead key from a seller computing device, the first computer configured to conduct a transaction on a network between the seller computing device and a buyer computing device, the overhead key configured to permit access to a seller verification data, wherein the seller verification data comprises a header file in clear text for display on the network, and wherein the overhead key is a private part of a public-private key pair; instructions to receive, by the first computer, a buyer'"'"'s object from the buyer computing device, the buyer'"'"'s object comprising the seller verification data and a purchase solicitation, the purchase solicitation comprising a buyer verification data, wherein the seller verification data is incorporated into the buyer'"'"'s object from a seller'"'"'s object in response to actuation by the buyer computing device, the seller object comprising the seller verification data and a seller content in an electronic information format; instructions to access, by the first computer, the seller verification data; instructions to compare, by the first computer, the seller verification data and the buyer verification data to evaluate compliance; and instructions to provide, to the buyer computing device, access to the seller content dependent on the compliance. - View Dependent Claims (7, 8, 9, 10)
-
Specification