Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for secure electronic commerce

a technology of electronic commerce and secure payment, applied in the field of electronic commerce, can solve the problems of unscrupulous people compromising account numbers, presenting problems in paying for merchandise, and becoming targets of attacks, and achieve the effect of facilitating secure electronic commer

Inactive Publication Date: 2006-02-09
RAJARAM YASHWANTH KUMAR
View PDF27 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The present invention provides a system for secure electronic commerce. The system involves creating a file of security data containing a consumer's private key, public key, and identifiers of the financial institution and merchant. The consumer then uses this file to protect financial transactions with the merchant. The merchant validates the financial institution and requests authorization to complete the transaction. The financial institution verifies the validity of the transaction and determines if it exceeds the account's limit. The system ensures secure and efficient electronic commerce."

Problems solved by technology

While shopping through a web browser is convenient, paying for the merchandise presents problems.
The database then becomes a target for attack, and if the database is not secure, can lead to compromise of the account number to an unscrupulous person.
Consequently, many consumers are uncomfortable with revealing their account numbers over the Internet for fear of having their account number stolen and used illegally.
The same problem exists to some degree at a point-of-sale (POS) terminal located at a cash register at the point of sale.
The account number can be learned by the merchant and, if not adequately protected, compromised.
This leaves the financial institution open to fraud.
If the consumer later denies making the transaction, it can be difficult for the merchant to prove otherwise.
The encryption or decryption algorithms need not be uniform and / or the same across all consumers or merchants.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for secure electronic commerce
  • Method and apparatus for secure electronic commerce
  • Method and apparatus for secure electronic commerce

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.

[0024] The data structures and code described in this detailed description are typically stored on a computer readable storage medium, which may be any device or medium that can store code and / or data for use by a computer system. This includes, but is not limited to, magnetic and optical storage devices such as disk drives, magnetic tape, CD...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

One embodiment of the present invention provides a system that facilitates secure electronic commerce. The system operates by first providing a consumer with a file of security data relating to an account maintained by a financial institution. The consumer then creates a financial transaction with a merchant using security data from the file to protect the financial transaction. This financial transaction is structured to prevent the merchant from knowing the account number for the account. Next, the merchant validates that the financial institution identified by the financial transaction is acceptable using security data from the file. The merchant then requests that the financial institution authorize the financial transaction. Upon receiving authorization to complete the financial transaction, the merchant completes the financial transaction. Finally, the merchant notifies the financial institution that the financial transaction is complete.

Description

BACKGROUND [0001] 1. Field of the Invention [0002] The present invention relates to electronic commerce. More specifically, the present invention relates to a method and an apparatus to facilitate secure electronic commerce. [0003] 2. Related Art [0004] Electronic commerce across the Internet is rapidly becoming a mainstay of the business world. A consumer wishing to make a purchase on the Internet can use a web browser to select the desired merchandise, and then to offer payment for the merchandise. [0005] While shopping through a web browser is convenient, paying for the merchandise presents problems. Payment can be made using a credit card, a debit card, or an electronic check. Typically, when making payment with any of these methods, the consumer reveals the account number to the merchant so that the merchant can debit the account. Since the Internet is not secure and subject to eavesdropping, the account number is typically sent in encrypted form using a secure socket layer (SS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00
CPCG06F21/33G06F21/34G07F7/10G06Q20/382G06Q30/06G06Q20/04
Inventor RAJARAM, YASHWANTH KUMAR
Owner RAJARAM YASHWANTH KUMAR
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products