METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONS
First Claim
1. A method comprising:
- scanning, by a computer-based system for altering executable commands and while in a transaction session, a third party request to find executable commands, wherein the executable commands are associated with a selected programming language; and
at least one of editing and removing, by the computer-based system, at least a portion of the executable commands, wherein the at least one of editing and removing comprises at least one of;
rendering the executable commands unexecutable by a network client by removing a character of the executable commands, andrendering the executable commands unexecutable by the network client by replacing particular characters within the executable commands.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method for conducting electronic commerce are disclosed. In various embodiments, the electronic transaction is a purchase transaction. A user is provided with an intelligent token, such as a smartcard containing a digital certificate. The intelligent token suitably authenticates with a server on a network that conducts all or portions of the transaction on behalf of the user. In various embodiments a wallet server interacts with a security server to provide enhanced reliability and confidence in the transaction. In various embodiments, the wallet server includes a toolbar. In various embodiments, the digital wallet pre-fills forms. Forms may be pre-filled using an auto-remember component.
6 Citations
19 Claims
-
1. A method comprising:
-
scanning, by a computer-based system for altering executable commands and while in a transaction session, a third party request to find executable commands, wherein the executable commands are associated with a selected programming language; and at least one of editing and removing, by the computer-based system, at least a portion of the executable commands, wherein the at least one of editing and removing comprises at least one of; rendering the executable commands unexecutable by a network client by removing a character of the executable commands, and rendering the executable commands unexecutable by the network client by replacing particular characters within the executable commands. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An article of manufacture including a non-transitory, tangible computer readable storage medium having instructions stored thereon that, in response to execution by a computer based system for altering executable commands, cause the computer-based system to perform operations comprising:
-
scanning, by the computer-based system and while in a transaction session, a third party request to find executable commands, wherein the executable commands are associated with a selected programming language; and at least one of editing and removing, by the computer-based system, at least a portion of the executable commands, wherein the at least one of editing and removing comprises at least one of; rendering the executable commands unexecutable by a network client by removing a character of the executable commands, and rendering the executable commands unexecutable by the network client by replacing particular characters within the executable commands.
-
-
19. A system comprising:
-
a tangible, non-transitory memory communicating with a server for altering executable commands, the tangible, non-transitory memory having instructions stored thereon that, in response to execution by the server, cause the server to perform operations comprising; scanning, by the server and while in a transaction session, a third party request to find executable commands, wherein the executable commands are associated with a selected programming language; and at least one of editing and removing, by the server, at least a portion of the executable commands, wherein the at least one of editing and removing comprises at least one of; rendering the executable commands unexecutable by a network client by removing a character of the executable commands, and rendering the executable commands unexecutable by the network client by replacing particular characters within the executable commands.
-
Specification