Methods and apparatus for conducting electronic transactions
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06Q-020/00
G06Q-020/10
G06Q-020/34
G06Q-020/36
G06Q-020/38
G06Q-020/40
G06Q-030/06
G07F-007/08
G07F-007/10
출원번호
US-0488284
(2012-06-04)
등록번호
US-9519894
(2016-12-13)
발명자
/ 주소
Bishop, Fred Alan
Glazer, Elliott Harold
Gorgol, Zygmunt Steven
Hohle, William G.
Johnson, Michael G.
Johnstone, David E.
Lake, Walter Donald
Royer, Coby
Simkin, Marvin
Swift, Nick
White, Dirk B.
Bennett, Russell
출원인 / 주소
Gula Consulting Limited Liability Company
대리인 / 주소
Christensen O'Connor Johnson Kindness PLLC
인용정보
피인용 횟수 :
0인용 특허 :
162
초록▼
A system and method for conducting electronic commerce are disclosed. In various embodiments, the electronic transaction is a purchase transaction. A user is provided with an intelligent token, such as a smartcard containing a digital certificate. The intelligent token suitably authenticates with a
A system and method for conducting electronic commerce are disclosed. In various embodiments, the electronic transaction is a purchase transaction. A user is provided with an intelligent token, such as a smartcard containing a digital certificate. The intelligent token suitably authenticates with a server on a network that conducts all or portions of the transaction on behalf of the user. In various embodiments a wallet server interacts with a security server to provide enhanced reliability and confidence in the transaction. In various embodiments, the wallet server includes a toolbar. In various embodiments, the digital wallet pre-fills forms. Forms may be pre-filled using an auto-remember component.
대표청구항▼
1. A computer-implemented method comprising: receiving, by a first server from a user device, a request for a transaction;receiving, by the first server from a second server, an authentication request associated with the transaction and the user device, wherein the user device is allowed to proceed
1. A computer-implemented method comprising: receiving, by a first server from a user device, a request for a transaction;receiving, by the first server from a second server, an authentication request associated with the transaction and the user device, wherein the user device is allowed to proceed with the transaction in response to the user device providing an authentication of credentials based on the authentication request;receiving, by the first server, transaction data associated with the transaction, the transaction data comprising executable commands associated with a programming language;scanning, by the first server, the transaction data to identify the executable commands in the transaction data;rendering, by the first server, the executable commands in the transaction data unexecutable by a network client by removing a character from the executable commands or replacing particular characters within the executable commands; andsending, from the first server to the user device, the transaction data comprising the executable commands rendered unexecutable by the network client, wherein the transaction data sent to the user device is usable by the user device to conduct an electronic transaction. 2. The method of claim 1, wherein the transaction data is received as part of a transaction request from a user for a transaction at a merchant server. 3. The method of claim 1, further comprising: forwarding a challenge to a user, wherein the challenge is passed to an intelligent token for processing the challenge, and wherein the intelligent token generates a response to the challenge; receiving, by a computer, the response from the user based upon the challenge;processing, by the computer, the response;verifying, by the computer, the intelligent token;assembling, by the computer, credentials for a transaction, wherein the credentials comprise a key; andsending, by the computer, at least a portion of the assembled credentials to the user. 4. The method of claim 1, further comprising: receiving, by a computer, a second request from a user, wherein the second request includes the portion of assembled credentials sent to the user; validating, by the computer, the portion of the assembled credentials with a key of the assembled credentials, wherein the key is usable to authorize access to a transaction service; and initiating, by the computer, a transaction session for use with the transaction service. 5. The method of claim 1, further comprising rejecting a request containing the executable commands. 6. The method of claim 1, further comprising logging the executable commands to form a security log. 7. The method of claim 6, further comprising reviewing the security log to identify executable commands that are hostile. 8. The method of claim 1, wherein the executable commands are determined to violate a security policy. 9. The method of claim 1, wherein the executable commands are included in a predetermined list of security threats. 10. The method of claim 1, further comprising receiving a request for a connection from the network client. 11. The method of claim 10, further comprising verifying that a response to the network client is void of the executable commands. 12. The method of claim 11, further comprising sending the response to the network client. 13. The method of claim 1, wherein the replacing comprises converting a script format character to another character, wherein the script format character identifies a block of code. 14. The method of claim 1, wherein the removing comprises removing a script format character, wherein the script format character identifies a block of code. 15. The method of claim 1, wherein the programming language comprises at least one of javascript, SQL code, XML code or markup language. 16. The method of claim 1, further comprising rejecting a transaction request in response to said removing or replacing. 17. The method of claim 1, further comprising rejecting a transaction request in response to a third party request being received from a merchant server. 18. A non-transitory computer-readable storage medium having instructions stored thereon that, in response to execution by a computer-based system, cause the computer-based system to perform operations comprising: receiving, by a first server from a user device, a request for a transaction; receiving, by the first server from a second server, an authentication request associated with the transaction and the user device, wherein the user device is allowed to proceed with the transaction in response to the user device providing an authentication of credentials based on the authentication request; receiving, by the first server, a third party transaction data associated with the transaction, the third party transaction data comprising executable commands associated with a programming language;scanning the third party transaction data to identify the executable commands, at least one of editing or removing, by the computer-based system, at least a portion of the executable commands in the third party transaction data, wherein the at least one of editing or removing comprises at least one of:rendering the executable commands in the third party transaction data unexecutable by a network client by removing a character of the executable commands, orrendering the executable commands in the third party transaction data unexecutable by the network client by replacing particular characters within the executable commands; andsending, from the first server to the user device, the third party transaction data comprising the executable commands rendered unexecutable by the network client, wherein the third party transaction data sent to the user device is usable by the user device to conduct an electronic transaction. 19. A system comprising: a memory communicatively coupled to a server, the memory having instructions stored thereon that, in response to execution by the server, at least cause the server to perform operations comprising:receiving, by a first server from a user device, a request for a transaction;receiving, by the first server from a second server, an authentication request associated with the transaction and the user device, wherein the user device is allowed to proceed with the transaction in response to the user device providing an authentication of credentials based on the authentication request;receiving, by the first server, transaction data associated with the transaction, the transaction data comprising executable commands associated with a programming language;scanning, by the server, the transaction data to identify the executable commands in the transaction data;editing, by the server, at least a portion of the executable commands in the transaction data so that the executable commands are unexecutable by a computing device; andsending, from the first server to the user device, the transaction data comprising the executable commands rendered unexecutable by the computing device, wherein the transaction data sent to the user device is usable by the user device to conduct an electronic transaction.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (162)
Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
Davis Terry L. (Scottsdale AZ) Hart James A. (Radnor PA) O\Malley Michael F. (Glenside PA) Russell James F. (Hockessin DE) Sears John W. (Peoria AZ) Trice Philip H. (Phoenix AZ), Collection of value from stored value systems.
Rose Marshall T. ; Stein Lee H. ; Borenstein Nathaniel S. ; Lowery Carlyn M. ; New Darren ; Stefferud Einar, Computerized payment system for purchasing goods and services on the internet.
Stein Lee H. ; Stefferud Einar A. ; Borenstein Nathaniel S. ; Rose Marshall T., Computerized system for making payments and authenticating transactions over the internet.
Renner G. Fred ; Johnson Randall E. ; Chu-Jeng Caroline, Distinct smart card reader having wiegand, magnetic strip and bar code types emulation output.
Mansvelt Andre P. (171 ANderson Avenue Northcliff ; Johannesburg ; Transvaal ZAX) Belamant Serge C. P. (55 - 13th Street Parkmore ; Johannesburg ; Transvaal ZAX), Funds transfer system.
Dancs Frank B. ; Zmuda James E., Mechanism for facilitating secure storage and retrieval of information on a smart card by an internet service provider using various network computer client devices.
Glass Randal ; Salganicoff Marcos ; von Seelen Ulf Cahn, Method and apparatus for securely transmitting and authenticating biometric data over a network.
Biorge James E. ; Hauge Richard T. ; Svigals Jerome, Method and system for allocating and redeeming incentive credits between a portable device and a base device.
Friedes Albert (East Brunswick NJ) Perea Carlos A. (Bethlehem PA) Tsao Yao-Chung (Middletown NJ), Method and system for mediating transactions that use portable smart cards.
Bolle, Rudolf Maarten; Nunes, Sharon Louise; Pankanti, Sharathchandra; Ratha, Nalini Kanta; Smith, Barton Allen; Zimmerman, Thomas Guthrie, Method for biometric-based authentication in wireless communication for access control.
Binding,Carl; Hild,Stefan; Moser,Michael; O'Connor,Luke, Method of establishing the trustworthiness level of a participant in a communication connection.
Bishop, Fred Alan; Glazer, Elliot Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
Scalora Michael (Huntsville AL) Dowling Jonathan P. (Huntsville AL) Bowden Charles M. (Huntsville AL) Bloemer Mark J. (Athens AL), Photonic band edge optical diode.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Dolan George M. (Charlotte NC) Holloway Christopher J. (Woking GB2) Matyas ; Jr. Stephen M. (Poughkeepsie NY), Public key data communications system under control of a portable security device.
Hoffstein Jeffrey ; Kaliski ; Jr. Burton S. ; Lieman Daniel Bennett ; Robshaw Matthew John Barton ; Yin Yiqun Lisa, Secure user identification based on constrained polynomials.
Schick David (150-54 76th Rd. Flushing NY 11367) Bane Mark (141-17 72nd Crescent Flushing NY 11367), Self verifying transaction card with disabling capability.
Fox, Barbara L.; Waters, Lester L.; Spelman, Jeffrey F.; Seidensticker, Robert B.; Thomlinson, Matthew W., System and method for secure electronic commerce transaction.
Dillaway Blair B. ; Barlow Douglas C. ; Lipscomb Terry M., System and method of using smart cards to perform security-critical operations requiring user authorization.
Hoehn-Saric Rudolph Christopher ; Nguyen Christopher L. ; Stevens Patrick D., System for administration of remotely-proctored, secure examinations and methods therefor.
Michael F. Guheen ; James D. Mitchell ; James J. Barrese, System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network framework.
Bogosian ; Jr. Charles A. (Warwick RI), System for verifying use of a credit/identification card including recording of physical attributes of unauthorized user.
Nguyen Trong ; Subramanian Mahadevan P. ; Haller Daniel R., System, method and article of manufacture for a gateway system architecture with system administration information acce.
Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for network electronic authorization utilizing an authorization instrument.
Davis Terry L. ; Hart James A. ; Imperia Vincent A. ; Love Michael ; O'Malley Michael F. ; Russell James F. ; Sears John W. ; Trice Philip H., Transaction system comprising a first transportable integrated circuit device, a terminal, and a security device.
Davis Terry L. (Scottsdale AZ) Hart James A. (Radnor PA) Imperia Vincent A. (Tempe AZ) Love Michael (Wilmington DE) O\Malley Michael F. (Glenside PA) Russell James F. (Hockessin DE) Sears John W. (Pe, Transaction system for integrated circuit cards.
Pitroda Satyan G. (1480 Golden Bell Ct. Downers Grove IL 60515), Universal electronic transaction card including receipt storage and system and methods of conducting electronic transact.
Bezos,Jeffrey P.; Kaphan,Sheldon J.; Ratajak,Ellen L.; Schonhoff,Thomas K., Use of shopping cart to collect and purchase items selected from multiple web sites.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.