A system and method facilitates purchase transactions over a computer network, including the purchase of electronically storable items. The embodiments herein encrypt “customer information” in an encryption stream and cause the encryption stream to be transferred from the customer to a merchant in t
A system and method facilitates purchase transactions over a computer network, including the purchase of electronically storable items. The embodiments herein encrypt “customer information” in an encryption stream and cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction. A verification entity receives the encryption stream which is sent by the merchant for identity verification and payment authorization. Then, the verification entity verifies the identifiers contained in the encryption stream and transfers an identity verification and payment authorization from the verification entity to the merchant. The encryption stream or unique transaction identifier can be added, by the merchant, to a purchased electronic item to create a personalized electronic item.
대표청구항▼
1. A method comprising: when establishing an account: establishing an agreement between a user and a verification entity;creating, by said verification entity, an agreement identifier that identifies said agreement and identifies said user;downloading a software application from said verification en
1. A method comprising: when establishing an account: establishing an agreement between a user and a verification entity;creating, by said verification entity, an agreement identifier that identifies said agreement and identifies said user;downloading a software application from said verification entity and said agreement identifier over a computer network to an input and output device of a computerized device associated with said user;using, by a processor of said computerized device, said software application to store at least one permitted password, at least one user identifier string, permitted hardware identifiers, and said agreement identifier in a storage media of said computerized device; andusing, by said processor, said software application to transmit said user identifier string, said permitted hardware identifiers, and personal payment information of said user to said verification entity; andwhen requesting an authorization decision: receiving, into a graphic user interface of said computerized device, an entered password;determining, by said processor, whether said entered password is valid based on whether said entered password matches said at least one permitted password;based on said entered password being valid, reading, by said processor, a hardware identifier from hardware of said computerized device;determining, by said processor, whether said hardware identifier is valid based on whether said hardware identifier matches one of said permitted hardware identifiers;based on said hardware identifier being valid, retrieving, by said processor, said agreement identifier from said storage media of said computerized device;creating, by said processor, an encrypted user code by encrypting said agreement identifier and said hardware identifier, each said encrypted user code being valid only for a single request for an authorization decision;causing, by said processor, said encrypted user code to be devoid of said personal payment information of said user;transmitting, by said input and output device of said computerized device, said encrypted user code to a provider in a request for an authorization decision over a computer network, said encrypted user code being sent by said provider to said verification entity for an authorization decision, said verification entity creating a unique transaction identifier comprising an identity verification based on said encrypted user code, and at least one of said encrypted user code and said unique transaction identifier being added, by said provider, to downloadable digital media to create a personalized electronic item; andreceiving, by said input and output device, said personalized electronic item from said provider,each personalized electronic item supplied to different users being different because of a uniqueness of each said encrypted user code. 2. The method according to claim 1, further comprising encrypting, by said processor, a time and date stamp in said encrypted user code. 3. The method according to claim 1, further comprising, after said encrypting, adding, by said processor, routing information to said encrypted user code in non-encrypted form to cause said encrypted user code to be routed to a financial institution. 4. The method according to claim 1, said authorization decision comprising a verifying person-present authorization decision. 5. The method according to claim 1, said authorization decision comprising one of a purchase authorization decision, a protected network access authorization decision, a protected site access authorization decision, a voting authorization decision, an age-sensitive authorization decision, and a transaction authorization decision. 6. The method according to claim 1, each of said permitted hardware identifiers comprising at least a portion of a serial number. 7. A method comprising: when establishing an account: storing at least one permitted password, at least one user identifier string, permitted hardware identifiers, and an agreement identifier that identifies an agreement between a user and a verification entity in a storage media of an computerized device operated by said user; andtransmitting said user identifier string, said permitted hardware identifiers, and personal payment information of said user to said verification entity, using an input and output device of said computerized device; andwhen requesting an authorization decision: receiving, into a graphic user interface of said computerized device, an entered password;determining, by a processor of said computerized device, whether said entered password is valid based on whether said entered password matches said at least one permitted password;based on said entered password being valid, reading, by said processor, a hardware identifier from hardware of said computerized device;determining, by said processor, whether said hardware identifier is valid based on whether said hardware identifier matches one of said permitted hardware identifiers;based on said hardware identifier being valid, retrieving, by said processor, said agreement identifier from said storage media of said computerized device;creating, by said processor, an encrypted user code by encrypting said agreement identifier and said hardware identifier, each said encrypted user code being valid only for a single request for an authorization decision;transmitting, by said input and output device of said computerized device, said encrypted user code to a provider in a request for an authorization decision over a computer network, said encrypted user code being sent by said provider to said verification entity for an authorization decision, said verification entity creating a unique transaction identifier comprising an identity verification based on said encrypted user code, and at least one of said encrypted user code and said unique transaction identifier being added, by said provider, to downloadable digital media to create a personalized electronic item; andreceiving, by said input and output device, said personalized electronic item from said provider,each personalized electronic item supplied to different users being different because of a uniqueness of each said encrypted user code. 8. The method according to claim 7, further comprising encrypting, by said processor, a time and date stamp in said encrypted user code. 9. The method according to claim 7, further comprising, after said encrypting, adding, by said processor, routing information to said encrypted user code in non-encrypted form to cause said encrypted user code to be routed to a financial institution. 10. The method according to claim 7, said authorization decision comprising a verifying person-present authorization decision. 11. The method according to claim 7, said authorization decision comprising one of a purchase authorization decision, a protected network access authorization decision, a protected site access authorization decision, a voting authorization decision, an age-sensitive authorization decision, and a transaction authorization decision. 12. The method according to claim 7, each of said permitted hardware identifiers comprising at least a portion of a serial number. 13. A method comprising: receiving, into a graphic user interface of a computerized device, an entered password from a user;determining, by a processor of said computerized device, whether said entered password is valid based on whether said entered password matches at least one permitted password;based on said entered password being valid, reading, by said processor, a hardware identifier from hardware of said computerized device;determining, by said processor, whether said hardware identifier is valid based on whether said hardware identifier matches at least one permitted hardware identifier;based on said hardware identifier being valid, retrieving, by said processor, a user agreement identifier from a storage media of said computerized device, said user agreement identifier identifying an agreement between said user and a verification entity;creating, by said processor, an encrypted user code by encrypting said user agreement identifier and said hardware identifier, each said encrypted user code being valid only for a single request for an authorization decision;transmitting, by an input and output device of said computerized device, said encrypted user code to a provider in a request for an authorization decision over a computer network, said encrypted user code being sent by said provider to said verification entity for an authorization decision, said verification entity creating a unique transaction identifier comprising an identity verification based on said encrypted user code, and at least one of said encrypted user code and said unique transaction identifier being added, by said provider, to downloadable digital media to create a personalized electronic item; andreceiving, by said input and output device, said personalized electronic item from said provider,each personalized electronic item supplied to different users being different because of a uniqueness of each said encrypted user code. 14. The method according to claim 13, further comprising encrypting, by said processor, a time and date stamp in said encrypted user code. 15. The method according to claim 13, further comprising, after said encrypting, adding, by said processor, routing information to said encrypted user code in non-encrypted form to cause said encrypted user code to be routed to a financial institution. 16. The method according to claim 13, said authorization decision comprising a verifying person-present authorization decision. 17. The method according to claim 13, said authorization decision comprising one of a purchase authorization decision, a protected network access authorization decision, a protected site access authorization decision, a voting authorization decision, an age-sensitive authorization decision, and a transaction authorization decision. 18. The method according to claim 13, each said permitted hardware identifier comprising at least a portion of a serial number. 19. A method comprising: receiving, into a graphic user interface of a computerized device, an entered password from a user;determining, by a processor of said computerized device, whether said entered password is valid based on whether said entered password matches at least one permitted password stored in a storage media of said computerized device;based on said entered password being valid, reading, by said processor, a hardware identifier from hardware of said computerized device;determining, by said processor, whether said hardware identifier is valid based on whether said hardware identifier matches a permitted hardware identifier stored in said storage media;based on said hardware identifier being valid, retrieving, by said processor, a user agreement identifier from said storage media, said user agreement identifier identifying an agreement between said user and a verification entity;based on said hardware identifier being valid, incrementing a count value to produce a different count value each time said count value is incremented, using said processor;creating, by said processor, an encrypted code by encrypting said count value, said user agreement identifier, and said hardware identifier, each said encrypted code being valid only for a single request for an authorization decision;transmitting, by an input and output device of said computerized device, said encrypted code to a provider in an request for an authorization decision over a computer network, said encrypted code being sent by said provider to said verification entity for an authorization decision, said verification entity creating a unique transaction identifier comprising an identity verification based on said encrypted code, and at least one of said encrypted code and said unique transaction identifier being added, by said provider, to downloadable digital media to create a personalized electronic item; andreceiving, by said input and output device, said personalized electronic item from said provider,each personalized electronic item supplied to different users being different because of a uniqueness of each said encrypted code, andsaid authorization decision comprising a consent between said user and said provider through operation of said agreement between said user and said verification entity. 20. The method according to claim 19, further comprising encrypting, by said processor, a time and date stamp in said encrypted code. 21. The method according to claim 19, further comprising, after said encrypting, adding, by said processor, routing information to said encrypted code in non-encrypted form to cause said encrypted code to be routed to a financial institution. 22. The method according to claim 19, said authorization decision comprising a verifying person-present authorization decision. 23. The method according to claim 19, said authorization decision comprising one of a purchase authorization decision, a protected network access authorization decision, a protected site access authorization decision, a voting authorization decision, an age sensitive authorization decision, and a transaction authorization decision. 24. The method according to claim 19, each said permitted hardware identifier comprising at least a portion of a serial number. 25. A non-transitory computer readable storage medium readable by a computerized device, said non-transitory computer readable storage medium storing instructions executable by said computerized device to perform a method comprising: when establishing an account: storing at least one permitted password, at least one user identifier string, permitted hardware identifiers, and an agreement identifier that identifies an agreement between a user and a verification entity in a storage media of an computerized device operated by said user; andtransmitting said user identifier string, said permitted hardware identifiers, and personal payment information of said user to said verification entity, using an input and output device of said computerized device; andwhen requesting an authorization decision: receiving, into a graphic user interface of said computerized device, an entered password;determining, by a processor of said computerized device, whether said entered password is valid based on whether said entered password matches said at least one permitted password;based on said entered password being valid, reading, by said processor, a hardware identifier from hardware of said computerized device;determining, by said processor, whether said hardware identifier is valid based on whether said hardware identifier matches one of said permitted hardware identifiers;based on said hardware identifier being valid, retrieving, by said processor, said agreement identifier from said storage media of said computerized device;creating, by said processor, an encrypted user code by encrypting said agreement identifier and said hardware identifier, each said encrypted user code being valid only for a single request for an authorization decision;transmitting, by said input and output device of said computerized device, said encrypted user code to a provider in a request for an authorization decision over a computer network, said encrypted user code being sent by said provider to said verification entity for an authorization decision, said verification entity creating a unique transaction identifier comprising an identity verification based on said encrypted user code, and at least one of said encrypted user code and said unique transaction identifier being added, by said provider, to downloadable digital media to create a personalized electronic item; andreceiving, by said input and output device, said personalized electronic item from said provider,each personalized electronic item supplied to different users being different because of a uniqueness of each said encrypted user code. 26. The non-transitory computer readable storage medium according to claim 25, further comprising encrypting, by said processor, a time and date stamp in said encrypted user code. 27. The non-transitory computer readable storage medium according to claim 25, further comprising, after said encrypting, adding, by said processor, routing information to said encrypted user code in non-encrypted form to cause said encrypted user code to be routed to a financial institution. 28. The non-transitory computer readable storage medium according to claim 25, said authorization decision comprising a verifying person-present authorization decision. 29. The non-transitory computer readable storage medium according to claim 25, said authorization decision comprising one of a purchase authorization decision, a protected network access authorization decision, a protected site access authorization decision, a voting authorization decision, an age-sensitive authorization decision, and a transaction authorization decision. 30. The non-transitory computer readable storage medium according to claim 25, each of said permitted hardware identifiers comprising at least a portion of a serial number. 31. A computerized device comprising: a non-transitory storage media device storing at least one permitted password, at least one user identifier string, permitted hardware identifiers, and an agreement identifier that identifies an agreement between a user operating said computerized device and a verification entity; andan input and output device operatively connected to said non-transitory storage media device, said input and output device transmitting said user identifier string, said permitted hardware identifiers, and personal payment information of said user to said verification entity;a graphic user interface operatively connected to said non-transitory storage media device, said graphic user interface receiving an entered password from said user; anda processor operatively connected to said non-transitory storage media device, said processor determining whether said entered password is valid based on whether said entered password matches said at least one permitted password,based on said entered password being valid, said processor reading a hardware identifier from hardware of said computerized device,said processor determining whether said hardware identifier is valid based on whether said hardware identifier matches one of said permitted hardware identifiers,based on said hardware identifier being valid, said processor retrieving said agreement identifier from said non-transitory storage media of said computerized device,said processor creating an encrypted user code by encrypting said agreement identifier and said hardware identifier,said input and output device transmitting said encrypted user code to a provider in a request for an authorization decision over a computer network,said encrypted user code being sent by said provider to said verification entity for an authorization decision,said verification entity creating a unique transaction identifier comprising an identity verification based on said encrypted user code,at least one of said encrypted user code and said unique transaction identifier being added, by said provider, to downloadable digital media to create a personalized electronic item,said input and output device receiving said personalized electronic item from said provider, andeach personalized electronic item supplied to different users being different because of a uniqueness of each encrypted user code. 32. The computerized device according to claim 31, said processor encrypting a time and date stamp in said encrypted user code. 33. The computerized device according to claim 31, after said encrypting, said processor adding routing information to said encrypted user code in non-encrypted form to cause said encrypted user code to be routed to a financial institution. 34. The computerized device according to claim 31, said authorization decision comprising a verifying person-present authorization decision. 35. The computerized device according to claim 31, said authorization decision comprising one of a purchase authorization decision, a protected network access authorization decision, a protected site access authorization decision, a voting authorization decision, an age-sensitive authorization decision, and a transaction authorization decision. 36. The computerized device according to claim 31, each of said permitted hardware identifiers comprising at least a portion of a serial number.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (22)
Bhagavatula,Ravishankar S.; Balasubramanian,Chandra S.; Sherwin,Francis M.; Keresman, III,Michael A.; Bowman,Jeffry J., Centralized identity authentication for electronic communication networks.
Franklin D. Chase ; Rosen Daniel ; Benaloh Josh ; Simon Daniel R., Electronic online commerce card with customer generated transaction proxy number for online transactions.
Turgeon,Paul Charles, System and method for providing secure services over public and private networks using a removable portable computer-readable storage.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.