Method and system for conducting a transaction over a network
First Claim
1. A method for conducting a transaction between a first computer system and a second computer system, the method comprising the steps of:
- (a) receiving in the second computer system a request from a user of the first computer system to download data from the second computer system, the data to be encrypted with an encryption key prior to being downloaded;
(b) determining by the second computer system whether the request represents a new transaction or an incomplete transaction by comparing a first value stored in the first computer system with a part of a second value stored in the second system, the first value being a portion of the encryption key, the second value being a whole portion of the encryption key; and
(c) if wherein the request represents an incomplete transaction indicated by the portion of the encryption key stored in the first computer not matching any part of the whole portion of the encryption key stored in the second computer, and completing the incomplete transaction, wherein the user is not charged duplicate fees associated with starting a new transaction completing the incomplete transaction.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for conducting a transaction over a network is disclosed. The network includes a first system and a second system. The method and system comprise initiating a transaction, comparing a value of the first system with a value of the second system and continuing the transaction based on the comparison. Through the use of the present invention, a client can download for-fee files as often as necessary in spite of potential lost connections. Consequently, the client can download files he or she has paid for with the assurance that he or she will pay just once because payment is not for the content, but for an encryption key that is capable of being utilized by the client system to subsequently decrypt the downloaded file.
50 Citations
33 Claims
-
1. A method for conducting a transaction between a first computer system and a second computer system, the method comprising the steps of:
-
(a) receiving in the second computer system a request from a user of the first computer system to download data from the second computer system, the data to be encrypted with an encryption key prior to being downloaded; (b) determining by the second computer system whether the request represents a new transaction or an incomplete transaction by comparing a first value stored in the first computer system with a part of a second value stored in the second system, the first value being a portion of the encryption key, the second value being a whole portion of the encryption key; and (c) if wherein the request represents an incomplete transaction indicated by the portion of the encryption key stored in the first computer not matching any part of the whole portion of the encryption key stored in the second computer, and completing the incomplete transaction, wherein the user is not charged duplicate fees associated with starting a new transaction completing the incomplete transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for conducting a transaction between a first computer system and a second computer system, the system comprising:
-
means in the second computer system for receiving a request from a user of the first computer system to download data from the second computer system, the data to be encrypted with an encryption key prior to being downloaded; means for determining by the second computer system whether the request represents a new transaction or an incomplete transaction by comparing a first value stored in the first computer system with a cart of a second value stored in the second system, the first value being a portion of the encryption key, the second value being a whole portion of the encryption key; and means for completing the incomplete transaction if the request represents an incomplete transaction, the incomplete transaction being indicated by the portion of the encryption key stored in the first computer not matching any part of the whole portion of the encryption key stored in the second computer, wherein the user is not charged duplicate fees associated with starting a new transaction completing the incomplete transaction. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer readable medium containing program instructions for conducting a transaction between a first computer system and a second computer system, the program instructions for:
-
(a) receiving in the second computer system a request from a user of the first computer system to download data from the second computer system, the data to be encrypted with an encryption key prior to being downloaded; (b) determining by the second computer system whether the request represents a new transaction or an incomplete transaction by comparing a first value stored in the first computer system with a part of a second value stored in the second system, the first value being a portion of the encryption key, the second value being a whole portion of the encryption key; and (c) if wherein the request represents an incomplete transaction indicated by the portion of the encryption key stored in the first computer not matching any part of the whole portion of the encryption key stored in the second computer, and completing the incomplete transaction, wherein the user is not charged duplicate fees associated with starting a new transaction completing the incomplete transaction. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for conducting a transaction between a first computer system and a second computer system, the method comprising the steps of:
-
(a) receiving in the second computer system a request from a user of the first computer system to download data from the second computer system; (b) determining by the second computer system whether the request represents a new transaction or an incomplete transaction by comparing a first value stored in the first computer system with a part of a second value stored in the second system; and (c) if the request represents an incomplete transaction, completing the incomplete transaction, wherein the user is not charged duplicate fees associated with starting a new transaction completing the incomplete transaction; wherein the first value is a first portion of an encryption key and the second value is a whole encryption key, and step c) further comprises; c1) encrypting the requested data with the whole encryption key; c2) transmitting the encrypted data from the second computer system to the first computer system; and c3) after the encrypted data has been transmitted, sending a remaining portion of the encryption key from the second computer system to the first computer system, whereby the first computer system combines the first portion and the remaining portion of the encryption key to form the whole encryption key and utilizes the whole encryption key to decrypt the encrypted data.
-
-
32. A system for conducting a transaction between a first computer system and a second computer system, the system comprising:
-
means in the second computer system for receiving a request from a user of the first computer system to download data from the second computer system; means for determining by the second computer system whether the request represents a new transaction or an incomplete transaction by comparing a first value stored in the first computer system with a part of a second value stored in the second system; and means for completing the incomplete transaction if the request represents an incomplete transaction, wherein the user is not charged duplicate fees associated with starting a new transaction completing the incomplete transaction; wherein the first value is a first portion of an encryption key and the second value is a whole encryption key, and the means for completing the incomplete transaction comprises; means for encrypting the requested data with the whole encryption key; means in the second computer system for transmitting the encrypted data from the second computer system to the first computer system; and means in the second computer system for sending a remaining portion of the encryption key from the second computer system to the first computer system, whereby the first computer system combines the first portion and the remaining portion of the encryption key to form the whole encryption key and utilizes the whole encryption key to decrypt the encrypted information.
-
-
33. A computer readable medium containing program instructions for conducting a transaction between a first computer system and a second computer system, the program instructions for:
-
(a) receiving in the second computer system a request from a user of the first computer system to download data from the second computer system; (b) determining by the second computer system whether the request represents a new transaction or an incomplete transaction by comparing a first value stored in the first computer system with a part of a second value stored in the second system; and (c) if the request represents an incomplete transaction, completing the incomplete transaction, wherein the user is not charged duplicate fees associated with starting a new transaction completing the incomplete transaction; wherein the first value is a first portion of an encryption key and the second value is a whole encryption key, and instruction c) further comprises; c1) encrypting the requested data with the whole encryption key; c2) transmitting the encrypted data from the second computer system to the first computer system; and c3) after the encrypted data has been transmitted, sending a remaining portion of the encryption key from the second computer system to the first computer system, whereby the first computer system combines the first portion and the remaining portion of the encryption key to form the whole encryption key and utilizes the whole encryption key to decrypt the encrypted data.
-
Specification