USRE43845E1 - Lock-and-key consumer billing data protection system having data encryption capability - Google Patents
Lock-and-key consumer billing data protection system having data encryption capability Download PDFInfo
- Publication number
- USRE43845E1 USRE43845E1 US12/118,663 US11866308A USRE43845E US RE43845 E1 USRE43845 E1 US RE43845E1 US 11866308 A US11866308 A US 11866308A US RE43845 E USRE43845 E US RE43845E
- Authority
- US
- United States
- Prior art keywords
- consumer
- billing information
- key
- alphanumeric characters
- billing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 238000000034 method Methods 0.000 claims description 37
- 238000012545 processing Methods 0.000 claims description 15
- 238000013459 approach Methods 0.000 description 13
- 230000008901 benefit Effects 0.000 description 9
- 238000012546 transfer Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 8
- 238000013475 authorization Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 239000011449 brick Substances 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000004570 mortar (masonry) Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/102—Bill distribution or payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/04—Billing or invoicing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
Definitions
- the present invention relates generally to computer systems, and more particularly to computerized order entry systems that support and facilitate telemarketing and consumer electronic marketing operations.
- telemarketers did not precisely target consumers who were likely to buy their products or services. Rather, telemarketers routinely employed “cold calls” in an attempt to reach a broad range of consumers. Recently, however, telemarketers have recognized that consumers and the companies providing the goods and services which they market and sell would all benefit from targeted telemarketing. Accordingly, telemarketers have begun to target their efforts to those consumers who most likely would be receptive to the specific products and/or services being offered. Specifically, a telemarketing company attempting to sell a product or service of one of its clients may acquire from a third-party a list of consumers who recently purchased other products or services. For example, a telemarketing company attempting to sell memberships in a dial-in roadside assistance service program may acquire a recent consumer list from a third-party vendor of car telephones.
- direct marketers have begun to acquire lists of consumers for targeted electronic messages that contain product and/or service solicitations. For example, marketers contact consumers on-line over the Internet via electronic mail, instant messaging and the like. They are also employed in other electronic marketing systems in which, for example, marketers contact consumers with messages on their mobile phones, personal data assistants (PDAs) and the like via various wireless communications protocols.
- PDAs personal data assistants
- this billing information includes the entire number, typically sixteen digits, of the consumer's credit card. The same billing information is required regardless of whether the entity accessing the consumer's account is the marketer/telemarketer itself, the seller, or any other entity hired to perform the billing operations.
- the first approach is to acquire all of a consumer's billing information from the list provider that provided the consumer list.
- a consumer's billing information is often acquired from the list provider before the consumer is contacted.
- Variations on this approach include acquiring a consumer's billing information only after the consumer is contacted and indicates that they want to purchase the offered product or service with the same credit used for the prior purchase (commonly referred to as a “matchback”).
- matchback commonly referred to as a “matchback”.
- all of the consumer's billing information is ultimately acquired from the list provider—consumers do not need to provide any billing information themselves.
- list providers sometimes transfer encrypted complete billing information to telemarketers, electronic marketers, or companies hired to perform their payment operations.
- This encrypted complete billing information can be decrypted only by using a cipher key provided by the list provider.
- the list provider releases this cipher key without the consumer providing the telemarketer or electronic marketer any authorization or per transaction-based “key.”
- the consumer's account can be charged even if the consumer does not reach into their wallet to provide a “key” or any other billing information.
- the second approach is to acquire all of a consumer's billing information directly from the consumer. If a consumer wants to accept an offer to purchase a product or service, that consumer must then provide their entire credit card number to authorize the sale.
- the present lock-and-key consumer billing data protection system having data encryption capability provides customer billing account security to marketing and telemarketing systems which operate using consumer lists that may be acquired from a list provider.
- the lock-and-key consumer billing data protection system having data encryption capability includes a database that stores consumer records presently available to the marketer/telemarketer or acquired from a list provider, such as third-parties from whom such consumers have previously purchased goods or services. Each stored consumer record includes consumer identification information and partial billing information.
- the partial billing information (fewer than all of the alphanumeric characters needed to access a consumer's account) in each consumer account is encrypted, using a consumer-specific cipher key, such that the marketer/telemarketer, seller and companies hired to perform billing operations are “locked” out of every consumer's account unless they receive the decryption key from the consumer.
- a predetermined set of digits from the consumer's account is used as the key to decrypt the partial billing information stored in the database as well as to provide the missing billing information not yet stored in the database.
- the consumer provided key is used to decrypt the consumer's billing information.
- the consumer must provide the “key” to decrypt the partial billing information stored in the consumer's account, which key is also the missing billing information not yet stored in the database. Only after the consumer supplies the “key,” can the consumer be charged. Specifically, now that all the consumer's billing information has been acquired—partly from the list provider and partly from the consumer—can the consumer's account can be accessed by the marketer/telemarketer, seller or an entity hired to perform billing operations for such purchases.
- lock-and-key consumer billing data protection system having data encryption capability is that consumers are in control of their billing information. Without receiving the missing billing information (the “key”) from the consumer, no entity can bill the consumer based on an erroneous premise that authorization for a particular transaction was received. Unlike the presently employed approach of acquiring all of a consumer's billing information from a third party, the lock-and-key consumer billing data protection system having data encryption capability “locks” companies out of a consumer's account until the consumer takes the proactive step of providing the missing billing information—the “key”.
- FIG. 1 is a block diagram illustrating the architecture of a lock-and-key consumer billing data protection system having data encryption capability and an environment in which it is operational;
- FIGS. 2 and 3 are a flow charts depicting the operation of a lock-and-key consumer billing data protection system having data encryption capability.
- the present lock-and-key consumer billing data protection system having data encryption capability relates to providing a “lock-and-key” consumer billing data protection capability to marketing and telemarketing systems.
- a marketer/telemarketer selling particular good(s) and/or service(s) acquires a list of consumers (typically from a list provider) or has in its possession a list of consumers. This list typically identifies consumers who have previously purchased goods and/or services, thus allowing for targeted sales.
- Such consumer lists presently available or transferred from the list provider contain only partial billing information (p alphanumeric characters of the m+p alphanumeric character consumer billing information) for each consumer. That is, the partial billing information comprises a predetermined subset of data from the consumer's complete billing data, and fails to include the entirety of the billing data.
- One such example is a string of consecutive digits of the consumer's account number. Because complete billing information is needed to access a consumer's account, the present lock-and-key consumer billing data protection system having data encryption capability “locks” out the marketer/telemarketer, the seller, and even an entity hired to perform billing operations for such purchases from accessing the consumer's account.
- the lock-and-key consumer billing data protection system having data encryption capability requires that they provide only certain numbers from their credit cards—the “key”—in order to authorize the purchase. This is done without allowing access to the consumer's partial billing information previously stored in the database system.
- the marketer/telemarketer, seller, or company hired to perform billing operations now has all of the consumer's billing information and, as a result, can access that consumers account.
- Lock-and-key consumer billing data protection empowers consumers with the ability to buy goods and services while controlling access to their account and eliminating the need to transmit all of their billing information.
- lock-and-key consumer billing data protection guards against consumers being billed for products or services whose purchase they did not, nor intend to, authorize by requiring consumers to take the affirmative, proactive step of communicating part of their billing information to authorize a purchase.
- the consumer can directly contact the marketer/telemarketer to initiate an inbound communication session, or the telemarketer can contact the consumer to initiate an outbound communication session, and both cases can follow the sale of another product or service.
- Biting information means the minimum data needed in order to charge or otherwise gain access to a consumer's account, such as a credit card, checking, savings, share or similar account, utility bill, mortgage loan account or debit card. In most instances, such minimum information is a set of alphanumeric characters, such as the typical sixteen-digit credit card account number.
- “Credit card” means any debit, prepaid, charge, or credit card (whether private label or bank issued), or plate, coupon book or other credit device existing for the purpose of obtaining money, property, labor, or services as authorized by the consumer in whose name the credit card is issued.
- Constant means any person who is or may be required to pay for goods, services or a charitable contribution offered or solicited through telemarketing.
- Consumer identification information means the data used to contact a consumer (e.g. name, telephone number, street address, electronic mail address, etc.).
- List Provider means an entity that provides a list of consumers for use in sales activities. The list typically identifies consumers who recently purchased other products or services and typically includes only partial billing information (p alphanumeric characters of the m+p alphanumeric character consumer billing information) for each consumer, as noted above.
- “Seller” means any person who provides, offers to provide, or arranges for others to provide goods or services to the consumer in exchange for consideration.
- marketer/telemarketer is used herein to include the instances where the marketer/telemarketer is also the seller, since such a distinction is unnecessary for the purpose of describing the operation of the lock-and-key consumer billing data protection system having data encryption capability.
- Marketer means any person who, in connection with marketing activities (plans, programs or campaigns which are conducted to induce the purchase of goods or services or charitable contributions) initiates or receives electronic communications (electronic mail, instant or text messages and the like) to or from a consumer.
- Telemarketer means any person who, in connection with telemarketing, initiates or receives telephone calls to or from a consumer. Further, the terms “user,” “telemarketer,” “telemarketing company,” “entity,” and the plural form of these terms are used interchangeably throughout herein to refer to those who would access, use, and/or benefit from the lock-and-key consumer billing data protection capability provided to telemarketing systems as described herein.
- “Telemarketing” means a plan, program or campaign which is conducted to induce the purchase of goods or services or a charitable contribution, by use of one or more telephones.
- FIG. 1 is a block diagram that illustrates the architecture of a lock-and-key consumer billing data protection system having data encryption capability 100 , termed “consumer billing data protection system” herein.
- FIG. 1 highlights the connectivity among the various data management components of the consumer billing data protection system 100 without providing all of the details of the typical apparatus that is specifically used to employ this system in either telemarketing or electronic marketing activities.
- the above-noted co-pending patent applications provide the details of such apparatus and also provide flow diagrams that illustrate the typical operation of these apparatus.
- Consumer billing data protection system 100 includes a repository database 102 .
- Database 102 in an embodiment, is a computer running database management server software with physical media which acts as a central store for information within consumer billing data protection system 100 . That is, database 102 stores the consumer lists presently available to the marketer/telemarketer or received from a list provider, including the consumer records containing consumers' identification information, the partial billing information, any key received from a consumer and possibly any collected demographic information. In an alternate embodiment, database 102 would only store records containing consumers' contact and demographic information. That is, a seller retains the partial billing information (except for the name of the credit card) for added consumer protection.
- a list server 104 is the data processor of consumer billing data protection system 100 , and is connected to database 102 .
- List server 104 allocates, distributes and provides the data stored in database 102 to, in the telemarketing embodiment, a plurality of workstations 106 (shown in FIG. 1 as workstations 106 A- 106 N) used by a plurality of sales agents employed by a telemarketer.
- list server 104 provides workstations 106 with graphical user interface (GUI) “front-end” screens to present certain data in the consumer records (one at a time) during the telemarketing process.
- GUI graphical user interface
- list server 104 retrieves certain data that is stored in database 102 and uses this data to originate electronic communications via electronic mail, instant messaging, text messages and the like to identified consumers in a well-known fashion.
- Each of the plurality of sales agents is also equipped with a telephone station set 107 (shown in FIG. 1 as 107 A- 107 N) and the list server 104 is capable of originating outgoing telephone calls.
- a Private Branch exchange (PBX) 109 functions to interconnect the telephone station sets 107 via trunks with a Local Exchange System (LES) 103 L.
- Local Exchange System 103 L is part of the Public Switched Telephone Network (PSTN) 112 . This allows the sales agents to originate calls to identified consumers in a well-known fashion.
- PSTN Public Switched Telephone Network
- the list server 104 can originate electronic messages for transmission to the consumers personal computer 111 via the Internet 108 .
- the list server 104 generates an electronic message addressed to the consumer at their Internet e-mail address and transmits this message via a communications connection from list server 104 directly via the Internet 108 or to an Internet Service Provider 109 with whom the consumer billing data protection system 100 has an account.
- the Internet Service Provider 109 receives the electronic message and forwards the electronic message via the Internet 108 to the Internet Service Provider 107 with whom the consumer has an account.
- the Internet Service Provider 107 delivers the electronic message to the consumer.
- the consumer can have access to the Internet 108 in many ways, such as via the Public Switched Telephone Network 105 , cable modem, high speed data connection, satellite communications, and the like.
- List server 104 also allows consumer billing data protection system 100 to store presently available consumer lists or to receive the consumer lists from a list provider. That is, a plurality of servers, such as list provider server 120 belonging to list providers may be authorized to access consumer billing data protection system 100 via the public, global Internet 108 . ( FIG. 1 , however, shows only one list provider server 120 for ease of explanation herein.) Such list provider servers would then transfer consumer records to consumer billing data protection system 100 for storage onto database 102 under the control (authorization, scheduling, validation, etc.) of list server 104 .
- list provider servers 120 would access consumer billing data protection system 100 via a dial-in line over the Public Switched Telephone Network (PSTN) 112 , rather than the global Internet 108 , to PSTN Interface 103 .
- list server 104 receives and loads such consumer records from removable storage media.
- PSTN Public Switched Telephone Network
- the consumer list comprises a plurality of consumer records, at least a portion of each being encrypted using conventional encryption techniques to safeguard the contents.
- the encryption process requires the use of a consumer-specific decryption key in order to access this information.
- a predetermined set of digits from the consumer's account is used as the key to decrypt the partial billing information stored in the database as well as to provide the missing billing information not yet stored in the database.
- the consumer provided key is used to decrypt the consumer's billing information.
- a consumers partial billing information is encrypted prior to being transferred from a list provider to telemarketers, electronic marketers, or companies hired to perform their payment operations.
- This encrypted partial billing information can be decrypted only by using the “key” (e.g. the last four digits of the account number) that the consumer provides as a means of authorizing a purchase.
- the list provider encrypts and transfers the consumer's complete billing information, and the “key” can be used to decrypt this complete billing information.
- the telemarketer, electronic marketer, or company hired to perform their payment operations is able to access the consumer's account only if it receives the consumer provided “key.” Without the consumer providing this “key” to the telemarketer or electronic marketer, it is impossible to access the encrypted information.
- Alternate embodiments to lock-and-key consumer billing data protection for telemarketing and electronic marketing also include systems utilizing a “matchback” procedure.
- a list provider transfers to a telemarketer or electronic marketer only information used to identify a consumer and to identify the credit card previously used by the consumer (e.g. type of credit card, expiration date, the first four digits of the account number, etc.), but does not transfer information sufficient to access the consumer's account. If the telemarketer or electronic marketer sends to the list provider the “key” provided by the consumer (e.g.
- the list provider transfers back to the telemarketer or electronic marketer the complete billing information needed to access the consumer's account.
- the list provider transfers back to the telemarketer or electronic marketer partial billing information which can be used in conjunction with the “key” to access the consumer's account.
- the customer billing information can be encrypted with a customer-specific encryption code and the “key” provided by the customer can then be used to decrypt the customer billing information in order to provide additional security.
- the list provider transfers complete billing information to the company hired to perform their payment operations for the telemarketer or electronic marketer.
- This payment company does not charge any consumer's account, however, unless this payment company receives from the telemarketer or electronic marketer the consumer's “key” (that the consumer provided the telemarketer or electronic marketer as a means of authorizing a purchase) and said “key” matches the corresponding part of the billing information on file with this payment company.
- no consumer's account is accessed unless that consumer reached into their wallet and provided the “key” to that account to the telemarketer or electronic marketer.
- FIGS. 2 and 3 are a flow charts depicting, respectively, the consumer record decryption and matchback portion of the operation of the consumer billing data protection system 100 . This process is collectively termed the billing data decryption process, which illustrates the order-entry functionality, consumer security and other advantages of consumer billing data protection system 100 .
- the location of the consumer's partial/complete billing information and the processing of the received consumer order can be effected in any of a number of manners and in any of a number of locations.
- the decryption process is described in the flow chart of FIG. 2 in the context of the marketer/telemarketer having the consumer record stored in database 102 , which consumer record includes partial billing information, which is encrypted using a consumer-specific cipher key.
- the encrypted partial billing information can be decrypted only by the use of the key provided by the consumer, and the key also constitutes the missing portion of the consumer's partial billing information.
- the key is m alphanumeric characters of the m+p alphanumeric character billing information where consumer billing data protection system 100 has previously stored the p alphanumeric characters in encrypted form in list server 104 .
- the key is the missing m alphanumeric characters of the m+p alphanumeric character credit card billing information in addition to other data unique to the consumer or the consumer's account (such as the ACS code commonly located on credit cards), and this additional information need not be part of the billing information needed to access consumers' account.
- the list server 104 Upon receipt of data at step 202 from the consumer which represents the key, the m alphanumeric characters of the m+p alphanumeric character billing information, the list server 104 transmits this data, along with the identity of the customer record associated with this consumer, to the decryption circuit 103 which uses the key to decrypt the encrypted customer partial billing information contained in the customer record at step 204 .
- the decryption circuit 103 returns the decrypted partial billing information to the list server 104 and the list server at step 208 determines whether the decrypted information constitutes the entire consumer billing information. If not, at step 210 the key is added to the partial billing information to complete the customer billing information.
- the consumer billing data protection system 100 at step 212 executes the normal “back-end” processing to handle, ship—if applicable—and then bill the consumer for the purchased good(s) and/or service(s).
- the decryption process is described in the flow chart of FIG. 3 in the context of the list provider having the consumer record stored in list provider server 120 , which consumer record includes partial or complete billing information, which is optionally encrypted using a consumer-specific cipher key.
- the list provider server 120 in this case performs the tasks noted above with respect to the consumer billing data protection system 100 , as modified to accommodate the matchback process and constitutes a significant element of the consumer billing data protection system 100 .
- the consumer billing information, if encrypted, can be decrypted only by the use of the key provided by the consumer, and the key, in the case of partial billing information, also constitutes the missing portion of the consumer's partial billing information.
- the key is the consumer-specific billing information data that is provided by the consumer and without which the sales process cannot be completed.
- the key is m alphanumeric characters of the m+p alphanumeric character billing information.
- the key is the missing m alphanumeric characters of the m+p alphanumeric character credit card billing information in addition to other data unique to the consumer or the consumer's account (such as the ACS code commonly located on credit cards), and this additional information need not be part of the billing information needed to access consumers' account.
- the telemarketer/marketer only has information used to identify a consumer and to identify the credit card previously used by the consumer.
- the list server 104 Upon receipt at the list server 104 of data at step 302 from the consumer which represents the key, the m alphanumeric characters of the m+p alphanumeric character billing information, the list server 104 transmits this data, along with the identity of the customer record associated with this consumer, to the list provider server 120 which uses the key to match with the customer billing data stored in the list provider server 120 and optionally decrypt the encrypted customer partial billing information contained in the customer record at step 304 .
- the list provider server 120 returns the consumer's retrieved billing information and at step 308 determines whether the information constitutes the entire consumer billing information. If not, at step 310 the key is added to the partial billing information to complete the customer billing information.
- the list provider server 120 at step 312 executes the normal “back-end” processing to handle, ship—if applicable—and then bill the consumer for the purchased good(s) and/or service(s).
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Marketing (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A “lock-and-key” consumer billing data protection capability is provided to telemarketing and electronic marketing systems which are based upon previously-acquired consumer lists. The lists contain encrypted partial billing information for each consumer, which is insufficient to access the consumer's account. Thus, at the time a consumer is offered a product or service, the telemarketer, the electronic marketer, and any entity hired to perform billing operations for such consumer purchases all remain “locked” out from accessing the consumer's account. When the consumer wishes to authorize the purchase of an offered product or service, the consumer must provide the “key” to the consumer's account, which is the key necessary to decrypt the encrypted partial billing information and also the missing billing information not acquired from the list provider.
Description
This application is a continuation in part of, and claims priority to, U.S. patent application Ser. No. 10/146,249, titled “Lock-And-Key Consumer Billing Data Protection For Electronic Marketing” and U.S. patent application Ser. No. 10/146,252 titled “Lock-And-Key Consumer Billing Data Protection For Telemarketing”, both of which are filed on May 15, 2002, which are hereby incorporated by reference in their entirety.
The present invention relates generally to computer systems, and more particularly to computerized order entry systems that support and facilitate telemarketing and consumer electronic marketing operations.
The practice of companies offering to sell goods or services to consumers directly over the telephone, without requiring the consumer to visit a traditional (“bricks and mortar”) store, is known as telemarketing. In today's business climate, telemarketing has become ubiquitous.
Historically, one of the primary problems with telemarketing was that telemarketers did not precisely target consumers who were likely to buy their products or services. Rather, telemarketers routinely employed “cold calls” in an attempt to reach a broad range of consumers. Recently, however, telemarketers have recognized that consumers and the companies providing the goods and services which they market and sell would all benefit from targeted telemarketing. Accordingly, telemarketers have begun to target their efforts to those consumers who most likely would be receptive to the specific products and/or services being offered. Specifically, a telemarketing company attempting to sell a product or service of one of its clients may acquire from a third-party a list of consumers who recently purchased other products or services. For example, a telemarketing company attempting to sell memberships in a dial-in roadside assistance service program may acquire a recent consumer list from a third-party vendor of car telephones.
In an analogous manner, direct marketers have begun to acquire lists of consumers for targeted electronic messages that contain product and/or service solicitations. For example, marketers contact consumers on-line over the Internet via electronic mail, instant messaging and the like. They are also employed in other electronic marketing systems in which, for example, marketers contact consumers with messages on their mobile phones, personal data assistants (PDAs) and the like via various wireless communications protocols.
When a consumer agrees to purchase a product or service offered by a marketer or telemarketer, in order to access that consumer's account (i.e., bill that consumer), it is necessary to possess certain “billing information.” At a minimum, this billing information includes the entire number, typically sixteen digits, of the consumer's credit card. The same billing information is required regardless of whether the entity accessing the consumer's account is the marketer/telemarketer itself, the seller, or any other entity hired to perform the billing operations.
There are two general approaches presently employed to acquire this billing information necessary to access a consumer's account.
The first approach is to acquire all of a consumer's billing information from the list provider that provided the consumer list. Under this approach, a consumer's billing information is often acquired from the list provider before the consumer is contacted. Variations on this approach include acquiring a consumer's billing information only after the consumer is contacted and indicates that they want to purchase the offered product or service with the same credit used for the prior purchase (commonly referred to as a “matchback”). Under the variations of this approach, however, all of the consumer's billing information is ultimately acquired from the list provider—consumers do not need to provide any billing information themselves.
Presently, list providers sometimes transfer encrypted complete billing information to telemarketers, electronic marketers, or companies hired to perform their payment operations. This encrypted complete billing information can be decrypted only by using a cipher key provided by the list provider. Importantly, the list provider releases this cipher key without the consumer providing the telemarketer or electronic marketer any authorization or per transaction-based “key.” Thus, the consumer's account can be charged even if the consumer does not reach into their wallet to provide a “key” or any other billing information.
The advantage of this approach is that it eliminates the need for consumers to transmit their credit card number. This protects consumers from transmitting billing information sufficient to access their account.
The disadvantage of this approach, however, is that consumers are not in control of their billing information. As long as a marketing/telemarketing company professes to have interpreted some response from a consumer as authorizing a purchase, the consumer's account can be charged.
The second approach is to acquire all of a consumer's billing information directly from the consumer. If a consumer wants to accept an offer to purchase a product or service, that consumer must then provide their entire credit card number to authorize the sale.
The advantage of this approach is that consumers are in control of their billing information. Without a consumer's credit card number, the consumer cannot be billed for goods and services.
The disadvantage of this approach, however, is that consumers must transmit all of their billing information. Consequently, consumers may transmit billing information sufficient to access their account to untrustworthy sales agents employed by legitimate telemarketers and/or entities that are not legitimate marketers/telemarketers. In addition, this approach produces billing mistakes due to errors in the transmission and communication of the consumers' billing information.
Therefore, given the above, what is needed is a lock-and-key consumer billing data protection capability that combines some or all of the advantages of the above-described approaches, while eliminating or reducing some or all of their respective disadvantages.
The present lock-and-key consumer billing data protection system having data encryption capability provides customer billing account security to marketing and telemarketing systems which operate using consumer lists that may be acquired from a list provider.
The lock-and-key consumer billing data protection system having data encryption capability, in one embodiment, includes a database that stores consumer records presently available to the marketer/telemarketer or acquired from a list provider, such as third-parties from whom such consumers have previously purchased goods or services. Each stored consumer record includes consumer identification information and partial billing information. The partial billing information (fewer than all of the alphanumeric characters needed to access a consumer's account) in each consumer account is encrypted, using a consumer-specific cipher key, such that the marketer/telemarketer, seller and companies hired to perform billing operations are “locked” out of every consumer's account unless they receive the decryption key from the consumer. In order to provide a simple decryption process, that does not require the previous exchange of a negotiated set of keys between the consumer and the marketer/telemarketer, a predetermined set of digits from the consumer's account is used as the key to decrypt the partial billing information stored in the database as well as to provide the missing billing information not yet stored in the database. In the case where the entirety of the consumer's billing information is encrypted, the consumer provided key is used to decrypt the consumer's billing information.
Therefore, if a consumer wishes to purchase a product or service being offered, the consumer must provide the “key” to decrypt the partial billing information stored in the consumer's account, which key is also the missing billing information not yet stored in the database. Only after the consumer supplies the “key,” can the consumer be charged. Specifically, now that all the consumer's billing information has been acquired—partly from the list provider and partly from the consumer—can the consumer's account can be accessed by the marketer/telemarketer, seller or an entity hired to perform billing operations for such purchases.
One advantage of the lock-and-key consumer billing data protection system having data encryption capability is that consumers are in control of their billing information. Without receiving the missing billing information (the “key”) from the consumer, no entity can bill the consumer based on an erroneous premise that authorization for a particular transaction was received. Unlike the presently employed approach of acquiring all of a consumer's billing information from a third party, the lock-and-key consumer billing data protection system having data encryption capability “locks” companies out of a consumer's account until the consumer takes the proactive step of providing the missing billing information—the “key”.
Further features and advantages of the invention as well as the structure and operation of various embodiments of the lock-and-key consumer billing data protection system having data encryption capability are described in detail below with reference to the accompanying drawings.
The features and advantages of the present lock-and-key consumer billing data protection system will become more apparent from the detailed description set forth below when taken in conjunction with the drawings in which like reference numbers indicate identical or functionally similar elements. Additionally, the left-most digit of a reference number identifies the drawing in which the reference number first appears.
Overview
The present lock-and-key consumer billing data protection system having data encryption capability relates to providing a “lock-and-key” consumer billing data protection capability to marketing and telemarketing systems. In an embodiment, a marketer/telemarketer selling particular good(s) and/or service(s) acquires a list of consumers (typically from a list provider) or has in its possession a list of consumers. This list typically identifies consumers who have previously purchased goods and/or services, thus allowing for targeted sales.
Such consumer lists presently available or transferred from the list provider contain only partial billing information (p alphanumeric characters of the m+p alphanumeric character consumer billing information) for each consumer. That is, the partial billing information comprises a predetermined subset of data from the consumer's complete billing data, and fails to include the entirety of the billing data. One such example is a string of consecutive digits of the consumer's account number. Because complete billing information is needed to access a consumer's account, the present lock-and-key consumer billing data protection system having data encryption capability “locks” out the marketer/telemarketer, the seller, and even an entity hired to perform billing operations for such purchases from accessing the consumer's account.
When a consumer takes a proactive step to unambiguously order the offered product(s) and/or service(s), the lock-and-key consumer billing data protection system having data encryption capability requires that they provide only certain numbers from their credit cards—the “key”—in order to authorize the purchase. This is done without allowing access to the consumer's partial billing information previously stored in the database system. The marketer/telemarketer, seller, or company hired to perform billing operations, however, now has all of the consumer's billing information and, as a result, can access that consumers account.
Lock-and-key consumer billing data protection empowers consumers with the ability to buy goods and services while controlling access to their account and eliminating the need to transmit all of their billing information. Thus, lock-and-key consumer billing data protection guards against consumers being billed for products or services whose purchase they did not, nor intend to, authorize by requiring consumers to take the affirmative, proactive step of communicating part of their billing information to authorize a purchase.
The consumer can directly contact the marketer/telemarketer to initiate an inbound communication session, or the telemarketer can contact the consumer to initiate an outbound communication session, and both cases can follow the sale of another product or service.
The present lock-and-key consumer billing data protection system having data encryption capability is described in terms of the above examples. This is for convenience only and is not intended to limit the application of the present lock-and-key consumer billing data protection system having data encryption capability. In fact, after reading the following description, it will be apparent to one skilled in the relevant art(s) how to implement the lock-and-key consumer billing data protection system having data encryption capability in alternative embodiments.
Glossary
Below are definitions of terms used herein. In the event that a term defined herein has a more common meaning or usage, the definition provided herein should be taken as the intended meaning.
“Billing information” means the minimum data needed in order to charge or otherwise gain access to a consumer's account, such as a credit card, checking, savings, share or similar account, utility bill, mortgage loan account or debit card. In most instances, such minimum information is a set of alphanumeric characters, such as the typical sixteen-digit credit card account number.
“Credit card” means any debit, prepaid, charge, or credit card (whether private label or bank issued), or plate, coupon book or other credit device existing for the purpose of obtaining money, property, labor, or services as authorized by the consumer in whose name the credit card is issued.
“Consumer” means any person who is or may be required to pay for goods, services or a charitable contribution offered or solicited through telemarketing.
“Consumer identification information” means the data used to contact a consumer (e.g. name, telephone number, street address, electronic mail address, etc.).
“List Provider” means an entity that provides a list of consumers for use in sales activities. The list typically identifies consumers who recently purchased other products or services and typically includes only partial billing information (p alphanumeric characters of the m+p alphanumeric character consumer billing information) for each consumer, as noted above.
“Seller” means any person who provides, offers to provide, or arranges for others to provide goods or services to the consumer in exchange for consideration. For simplicity of description, the term “marketer/telemarketer” is used herein to include the instances where the marketer/telemarketer is also the seller, since such a distinction is unnecessary for the purpose of describing the operation of the lock-and-key consumer billing data protection system having data encryption capability.
“Marketer” means any person who, in connection with marketing activities (plans, programs or campaigns which are conducted to induce the purchase of goods or services or charitable contributions) initiates or receives electronic communications (electronic mail, instant or text messages and the like) to or from a consumer.
“Telemarketer” means any person who, in connection with telemarketing, initiates or receives telephone calls to or from a consumer. Further, the terms “user,” “telemarketer,” “telemarketing company,” “entity,” and the plural form of these terms are used interchangeably throughout herein to refer to those who would access, use, and/or benefit from the lock-and-key consumer billing data protection capability provided to telemarketing systems as described herein.
“Telemarketing” means a plan, program or campaign which is conducted to induce the purchase of goods or services or a charitable contribution, by use of one or more telephones.
Lock-and-Key System
Consumer billing data protection system 100 includes a repository database 102. Database 102, in an embodiment, is a computer running database management server software with physical media which acts as a central store for information within consumer billing data protection system 100. That is, database 102 stores the consumer lists presently available to the marketer/telemarketer or received from a list provider, including the consumer records containing consumers' identification information, the partial billing information, any key received from a consumer and possibly any collected demographic information. In an alternate embodiment, database 102 would only store records containing consumers' contact and demographic information. That is, a seller retains the partial billing information (except for the name of the credit card) for added consumer protection.
Returning to FIG. 1 , a list server 104 is the data processor of consumer billing data protection system 100, and is connected to database 102. List server 104 allocates, distributes and provides the data stored in database 102 to, in the telemarketing embodiment, a plurality of workstations 106 (shown in FIG. 1 as workstations 106A-106N) used by a plurality of sales agents employed by a telemarketer. In this embodiment, list server 104 provides workstations 106 with graphical user interface (GUI) “front-end” screens to present certain data in the consumer records (one at a time) during the telemarketing process. In the electronic marketing embodiment, list server 104 retrieves certain data that is stored in database 102 and uses this data to originate electronic communications via electronic mail, instant messaging, text messages and the like to identified consumers in a well-known fashion.
Each of the plurality of sales agents is also equipped with a telephone station set 107 (shown in FIG. 1 as 107A-107N) and the list server 104 is capable of originating outgoing telephone calls. Assuming for the purpose of the description herein that the sales agents are equipped with telephone station sets 107, a Private Branch exchange (PBX) 109 functions to interconnect the telephone station sets 107 via trunks with a Local Exchange System (LES) 103L. Local Exchange System 103L is part of the Public Switched Telephone Network (PSTN) 112. This allows the sales agents to originate calls to identified consumers in a well-known fashion.
Alternatively, the list server 104 can originate electronic messages for transmission to the consumers personal computer 111 via the Internet 108. In this mode, the list server 104 generates an electronic message addressed to the consumer at their Internet e-mail address and transmits this message via a communications connection from list server 104 directly via the Internet 108 or to an Internet Service Provider 109 with whom the consumer billing data protection system 100 has an account. The Internet Service Provider 109 receives the electronic message and forwards the electronic message via the Internet 108 to the Internet Service Provider 107 with whom the consumer has an account. When the consumer connects to this Internet Service Provider 107 from their personal computer 111, the Internet Service Provider 107 delivers the electronic message to the consumer. The consumer can have access to the Internet 108 in many ways, such as via the Public Switched Telephone Network 105, cable modem, high speed data connection, satellite communications, and the like.
Regardless of the mode used to transfer the consumer list, the consumer list comprises a plurality of consumer records, at least a portion of each being encrypted using conventional encryption techniques to safeguard the contents. The encryption process requires the use of a consumer-specific decryption key in order to access this information. In order to provide a simple decryption process, that does not require the previous exchange of a negotiated set of keys between the consumer and the marketer/telemarketer, a predetermined set of digits from the consumer's account is used as the key to decrypt the partial billing information stored in the database as well as to provide the missing billing information not yet stored in the database. In the case where the entirety of the consumer's billing information is encrypted, the consumer provided key is used to decrypt the consumer's billing information.
Encryption of the Consumer's Partial Billing Information
In one embodiment, a consumers partial billing information is encrypted prior to being transferred from a list provider to telemarketers, electronic marketers, or companies hired to perform their payment operations. This encrypted partial billing information can be decrypted only by using the “key” (e.g. the last four digits of the account number) that the consumer provides as a means of authorizing a purchase. In an alternate embodiment utilizing encryption, the list provider encrypts and transfers the consumer's complete billing information, and the “key” can be used to decrypt this complete billing information. In any event, the telemarketer, electronic marketer, or company hired to perform their payment operations is able to access the consumer's account only if it receives the consumer provided “key.” Without the consumer providing this “key” to the telemarketer or electronic marketer, it is impossible to access the encrypted information.
Encryption of the Consumer's Partial Billing Information and Matchback
Alternate embodiments to lock-and-key consumer billing data protection for telemarketing and electronic marketing also include systems utilizing a “matchback” procedure. In one embodiment, a list provider transfers to a telemarketer or electronic marketer only information used to identify a consumer and to identify the credit card previously used by the consumer (e.g. type of credit card, expiration date, the first four digits of the account number, etc.), but does not transfer information sufficient to access the consumer's account. If the telemarketer or electronic marketer sends to the list provider the “key” provided by the consumer (e.g. the last four digits of the account number) and this “key” matches the corresponding part of the billing information on file with the list provider, then the list provider transfers back to the telemarketer or electronic marketer the complete billing information needed to access the consumer's account. In an alternate embodiment utilizing a “matchback” procedure, if the telemarketer or electronic marketer sends to the list provider the “key” provided by the consumer (e.g. the last four digits of the account number) and if this “key” matches the corresponding part of the billing information on file with the list provider, then the list provider transfers back to the telemarketer or electronic marketer partial billing information which can be used in conjunction with the “key” to access the consumer's account. In any event, no consumer's account is accessed unless that consumer reached into their wallet and provided the “key” to that account to the telemarketer or electronic marketer. In both of these cases, the customer billing information can be encrypted with a customer-specific encryption code and the “key” provided by the customer can then be used to decrypt the customer billing information in order to provide additional security.
In yet another alternate embodiment utilizing a “matchback” procedure, the list provider transfers complete billing information to the company hired to perform their payment operations for the telemarketer or electronic marketer. This payment company does not charge any consumer's account, however, unless this payment company receives from the telemarketer or electronic marketer the consumer's “key” (that the consumer provided the telemarketer or electronic marketer as a means of authorizing a purchase) and said “key” matches the corresponding part of the billing information on file with this payment company. Again, no consumer's account is accessed unless that consumer reached into their wallet and provided the “key” to that account to the telemarketer or electronic marketer.
Lock-and-Key Decryption/Matchback Process
In the various alternative embodiments noted above, the location of the consumer's partial/complete billing information and the processing of the received consumer order can be effected in any of a number of manners and in any of a number of locations. In order to illustrate the operation of the decryption process using the lock and key paradigm, the decryption process is described in the flow chart of FIG. 2 in the context of the marketer/telemarketer having the consumer record stored in database 102, which consumer record includes partial billing information, which is encrypted using a consumer-specific cipher key. The encrypted partial billing information can be decrypted only by the use of the key provided by the consumer, and the key also constitutes the missing portion of the consumer's partial billing information.
In this embodiment of lock-and-key consumer billing data protection, the key is m alphanumeric characters of the m+p alphanumeric character billing information where consumer billing data protection system 100 has previously stored the p alphanumeric characters in encrypted form in list server 104. In an alternate embodiment, the key is the missing m alphanumeric characters of the m+p alphanumeric character credit card billing information in addition to other data unique to the consumer or the consumer's account (such as the ACS code commonly located on credit cards), and this additional information need not be part of the billing information needed to access consumers' account.
Upon receipt of data at step 202 from the consumer which represents the key, the m alphanumeric characters of the m+p alphanumeric character billing information, the list server 104 transmits this data, along with the identity of the customer record associated with this consumer, to the decryption circuit 103 which uses the key to decrypt the encrypted customer partial billing information contained in the customer record at step 204. At step 206, the decryption circuit 103 returns the decrypted partial billing information to the list server 104 and the list server at step 208 determines whether the decrypted information constitutes the entire consumer billing information. If not, at step 210 the key is added to the partial billing information to complete the customer billing information. Once the key has been provided, the consumer billing data protection system 100 at step 212 executes the normal “back-end” processing to handle, ship—if applicable—and then bill the consumer for the purchased good(s) and/or service(s).
In order to illustrate the operation of another embodiment of the decryption process using the lock and key paradigm, the decryption process is described in the flow chart of FIG. 3 in the context of the list provider having the consumer record stored in list provider server 120, which consumer record includes partial or complete billing information, which is optionally encrypted using a consumer-specific cipher key. The list provider server 120 in this case performs the tasks noted above with respect to the consumer billing data protection system 100, as modified to accommodate the matchback process and constitutes a significant element of the consumer billing data protection system 100. The consumer billing information, if encrypted, can be decrypted only by the use of the key provided by the consumer, and the key, in the case of partial billing information, also constitutes the missing portion of the consumer's partial billing information. In the pure matchback process, the key is the consumer-specific billing information data that is provided by the consumer and without which the sales process cannot be completed.
In this embodiment of lock-and-key consumer billing data protection, the key is m alphanumeric characters of the m+p alphanumeric character billing information. In an alternate embodiment, the key is the missing m alphanumeric characters of the m+p alphanumeric character credit card billing information in addition to other data unique to the consumer or the consumer's account (such as the ACS code commonly located on credit cards), and this additional information need not be part of the billing information needed to access consumers' account. The telemarketer/marketer only has information used to identify a consumer and to identify the credit card previously used by the consumer.
Upon receipt at the list server 104 of data at step 302 from the consumer which represents the key, the m alphanumeric characters of the m+p alphanumeric character billing information, the list server 104 transmits this data, along with the identity of the customer record associated with this consumer, to the list provider server 120 which uses the key to match with the customer billing data stored in the list provider server 120 and optionally decrypt the encrypted customer partial billing information contained in the customer record at step 304. At step 306, the list provider server 120 returns the consumer's retrieved billing information and at step 308 determines whether the information constitutes the entire consumer billing information. If not, at step 310 the key is added to the partial billing information to complete the customer billing information. Once the key has been provided, the list provider server 120 at step 312 executes the normal “back-end” processing to handle, ship—if applicable—and then bill the consumer for the purchased good(s) and/or service(s).
Conclusion
While various embodiments of the present lock-and-key consumer billing data protection system having data encryption capability have been described above, it should be understood that they have been presented by way of example, and not limitation. It will be apparent to persons skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Thus, the present lock-and-key consumer billing data protection system having data encryption capability should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Claims (33)
1. A method for providing a consumer billing data protection capability, the method comprising the steps of:
storing in a computer system a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information comprising; wherein the encrypted partial billing information comprises an encrypted version of a predetermined set of p alphanumeric characters of the a billing information of said consumer; wherein the billing information is data required by a financial institution separate from the computer system to access funds from a consumer's account at the financial institution; and wherein a remaining m alphanumeric characters of the billing information are not stored in the computer system; and
processing at said computer system an order received from a consumer, comprising:
receiving an input indicative that a consumer, corresponding to said consumer identification information stored in one of said plurality of consumer records, desires to purchase a product or service, said input including a key received from said consumer, the key comprising the remaining m alphanumeric characters of the billing information of said consumer, and wherein m+p is epual equal to the total number of alphanumeric characters in the billing information of said consumer;
decrypting, using said key received from said consumer, said encrypted partial billing information stored in said one of said plurality of consumer records; and
processing an order for said product or service and billing for said order using the decrypted partial billing information stored in said one of the plurality of consumer records, and said key.
2. The method of claim 1 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
3. A method for providing a consumer billing data protection capability in a system, the method comprising the steps of:
storing in a computer system a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information comprising; wherein the encrypted partial billing information comprises an encrypted version of a predetermined set of p alphanumeric characters of the a billing information of said consumer; wherein the billing information comprises data required by a third party to access funds from a consumer's account held by the third party; and wherein a remaining m alphanumeric characters of the billing information are not stored in the computer system; and
processing at said computer system an order received from a consumer, comprising:
receiving an input indicative that a consumer, corresponding to said consumer identification information stored in said one of said plurality of consumer records, desires to purchase a product or service, said input including a key received from said consumer, said key comprising the remaining m alphanumeric characters of the billing information of said consumer, and wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumer;
decrypting, using said key m alphanumeric characters received from said consumer, said encrypted partial billing information stored in said one of said plurality of consumer records; and
processing an order for said product or service and billing for said order using said partial decrypted predetermined set of p alphanumeric characters of the billing information stored in said one of said plurality of consumer records, and said remaining m alphanumeric characters of the billing information from said key.
4. The method of claim 3 further comprising:
receiving data, comprising said plurality of consumer records, transmitted by a list provider.
5. The method of claim 4 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
6. A system for providing a consumer billing data protection capability in a system that stores a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information comprising; wherein the encrypted partial billing information comprises an encrypted version of a predetermined set of p alphanumeric characters of the a billing information of said consumer, wherein the billing information is data required by a financial institution separate from the system to access funds from a consumer's account at the financial institution; and wherein a remaining m alphanumeric characters of the billing information are not stored by the system; the system comprising:
means for receiving an input indicative that a consumer, corresponding to said consumer identification information stored in one of said plurality of consumer records, desires to purchase a product or service, said input including a key received from said consumer, the key comprising the remaining m alphanumeric characters of the billing information of said consumer, and wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumer;
meansa decryption circuit for decrypting, using said key received from said consumer, said encrypted partial billing information stored in said one of said plurality of consumer records; and
means for processing an order for said product or service and billing for said order using the decrypted partial billing information stored in said one of the plurality of consumer records, and said key.
7. The system of claim 6 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
8. A system for providing a consumer billing data protection capability in a system, comprising:
database means for storing a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information comprising; wherein the partial billing information comprises a predetermined set of p alphanumeric characters of the a billing information of said consumer; wherein the billing information is data required by a financial institution separate from the system to access funds from a consumer's account at the financial institution; and wherein a remaining m alphanumeric characters of the billing information are not stored in the computer system;
list server means for receiving an input indicative that a consumer, corresponding to said consumer identification information stored in said one of said plurality of consumer records, desires to purchase a product or service, said input including a key received from said consumer, the key comprising the remaining m alphanumeric characters of the billing information of said consumer, and wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumer;
decryption circuit means for decrypting, using said key received from said consumer, said encrypted partial billing information stored in said one of said plurality of consumer records; and
list provider server means for processing an order for said product or service and billing for said order using said partial billing information stored in said one of said plurality of consumer records, and said key.
9. The system of claim 8 further comprising:
means for receiving data, comprising said plurality of consumer records, transmitted by a list provider.
10. The method system of claim 9 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
11. A method for providing a consumer billing data protection capability, comprising the steps of:
storing in a computer system a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information comprising a; wherein the encrypted partial billing information comprises an encrypted predetermined set of p alphanumeric characters of the a billing information of said consumer; wherein the billing information is data required by a financial institution separate from the computer system to access funds from a consumer's account at the financial institution; and wherein a remaining m alphanumeric characters of the billing information are not stored in the computer system; and
processing at said computer system an order received from a consumer, comprising:
receiving an input indicative that a consumer, corresponding to said consumer identification information stored in one of said plurality of consumer records, desires to purchase a product or service, said input including a key received from said consumer, the key comprising the remaining m alphanumeric characters of the billing information of said consumer, and wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumer;
accessing, using said key received from said consumer, said consumer billing information stored in said one of said plurality of consumer records; and
processing an order for said product or service and billing for said order using the consumer billing information stored in said one of the plurality of consumer records, and said key.
12. The method of claim 11 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
13. The method of claim 11 further comprising:
storing a plurality of consumer records, each of which includes consumer identification information and consumer billing information.
14. A system for providing a consumer billing data protection capability in a system that stores a plurality of consumer records, each of which includes consumer identification information and consumer billing information comprising; wherein the consumer billing information comprises a predetermined set of p alphanumeric characters of the a complete billing information of said consumer, wherein the complete billing information is data required by a financial institution separate from the system to access funds from a consumer's account at the financial institution; and wherein a remaining m alphanumeric characters of the complete billing information are not stored in the computer system; the system comprising the steps of:
means for receiving an input indicative that a consumer, corresponding to said consumer identification information stored in one of said plurality of consumer records, desires to purchase a product or service, said input including a key received from said consumer, the key comprising the remaining m alphanumeric characters of the complete billing information of said consumer and wherein m+p is equal to the total number of alphanumeric characters in the complete billing information of said consumer;
meansa decryption circuit for accessing, using said key received from said consumer, said consumer billing information stored in said one of said plurality of consumer records; and
means for processing an order for said product or service and billing for said order using the consumer billing information stored in said one of the plurality of consumer records, and said key.
15. The system of claim 14 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
16. The system of claim 14 further comprising:
means for storing a plurality of consumer records, each of which includes consumer identification information and consumer billing information.
17. A method for providing a consumer billing data protection capability, comprising:
storing in a computer system a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information; wherein the encrypted partial billing information includes an encrypted copy of a first portion of the billing information of said consumer comprising a predetermined set of p alphanumeric characters of a billing information of said consumer; wherein the billing information is data required by a financial institution separate from the computer system to charge a consumer's account; and wherein a second portion of the billing information that completes the billing information when combined with the first portion is not stored in the computer system; and
processing at said computer system an order received from a consumer, comprising:
receiving a key from said consumer, the key including the second portion of the billing information, the second portion comprising the remaining m alphanumeric characters of the billing information, wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumer;
decrypting said encrypted partial billing information stored in said one of said plurality of consumer records using said key received from said consumer; and
billing said consumer for said order using the first portion of the billing information and the second portion of the billing information.
18. The method of claim 17 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
19. A method for providing a consumer billing data protection capability in a system, comprising:
storing in a computer system a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information; wherein the encrypted partial billing information comprises an encrypted version of a predetermined set of p alphanumeric characters of a p+m alphanumeric characters of the billing information of said consumer required by a third party to access funds from a consumer's account held by the third party; wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumer, and wherein a remaining m alphanumeric characters of the m+p alphanumeric characters of the billing information are not stored in the computer system; and
processing at said computer system an order received from a consumer, comprising:
receiving a key from said consumer, the key comprising the remaining m alphanumeric characters of the billing information of said consumer;
decrypting said p alphanumeric characters, using the m alphanumeric characters from said key; and
billing said consumer for said order using said decrypted p alphanumeric characters and said m alphanumeric characters from said key.
20. The method of claim 19 further comprising:
receiving data, comprising said plurality of consumer records, transmitted by a list provider.
21. The method of claim 19 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
22. A system for providing a consumer billing data protection capability in a system that stores a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information wherein the encrypted partial billing information comprises an encrypted version of a predetermined set of p alphanumeric characters of a billing information of said consumers, wherein the billing information is data required by a financial institution separate from the system to access funds from a consumer's account at the financial institution, and wherein a remaining m alphanumeric characters of the billing information are not stored by the system; the system comprising:
means for receiving a key from a consumer, the key comprising the remaining m alphanumeric characters of the billing information of said consumer, and wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumer;
a decryption circuit for decrypting, using said key received from said consumer, said encrypted partial billing information stored in said one of said plurality of consumer records; and
means for billing said consumer for an order for a product or service using the decrypted partial billing information and said key.
23. The system of claim 22 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
24. A system for providing a consumer billing data protection capability in a system, comprising:
database means for storing a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information; wherein the encrypted partial billing information comprises an encrypted version of a first portion of a billing information of said consumers, the first portion comprising a predetermined set of p alphanumeric characters of the billing information of said consumers; wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumers; wherein the billing information is data required by a financial institution separate from the system to charge a consumer's account; wherein a second portion of the billing information comprising a remaining m alphanumeric characters of the billing information of said consumers is not stored in the computer system, and wherein the first portion and the second portion combined constitute the entire billing information;
list server means for receiving a key from a consumer, the key including the second portion of the billing information of said consumer comprising the remaining m alphanumeric characters of the billing information;
decryption circuit means for decrypting, using the second portion of the billing information, said encrypted partial billing information stored in said one of said plurality of consumer records; and
list provider server means for billing said consumer for an order for a product or service using said decrypted partial billing information and said second portion of the billing information.
25. The system of claim 24 further comprising:
means for receiving data, comprising said plurality of consumer records, transmitted by a list provider.
26. The system of claim 24 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
27. A method for providing a consumer billing data protection capability, comprising:
storing in a computer system a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information; wherein the encrypted partial billing information comprises an encrypted version of a predetermined set of p alphanumeric characters of a complete billing information of said consumers; wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumers; wherein the complete billing information is data required by a financial institution separate from the computer system to access funds from a consumer's account at the financial institution; and wherein a remaining m alphanumeric characters of the complete billing information are not stored in the computer system; and
processing at said computer system an order received from a consumer, comprising:
receiving a key from said consumer, the key comprising the remaining m alphanumeric characters of the complete billing information of said consumer, and wherein m+p is equal to the total number of alphanumeric characters in the complete billing information of said consumer;
accessing, using said key received from said consumer, said partial billing information stored in said one of said plurality of consumer records; and
billing said consumer for said order using the complete billing information by combining the p alphanumeric characters from said partial billing information stored in said one of the plurality of consumer records, and the m alphanumeric characters from said key.
28. The method of claim 27 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
29. The method of claim 27 further comprising:
storing a plurality of consumer records, each of which includes consumer identification information and encrypted partial billing information.
30. A system for providing a consumer billing data protection capability in a system that stores a plurality of consumer records, each of which includes consumer identification information and encrypted consumer billing information; wherein the encrypted consumer billing information comprises a predetermined set of p alphanumeric characters of a complete billing information of said consumers, wherein the complete billing information is data required by a financial institution separate from the system to access funds from a consumer's account at the financial institution, and wherein a remaining m alphanumeric characters of the complete billing information are not stored in the computer system; the system comprising:
means for receiving a key from a consumer, the key comprising the remaining m alphanumeric characters of the billing information of said consumer and wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumer;
a decryption circuit for accessing, using said key received from said consumer, said consumer billing information stored in said one of said plurality of consumer records; and
means for billing said consumer for an order for a product or service using the consumer billing information stored in said one of the plurality of consumer records, and said key.
31. The system of claim 30 wherein said key includes the Authenticated Content Signing (ACS) code of a credit card.
32. The system of claim 30 further comprising:
means for storing a plurality of consumer records, each of which includes consumer identification information and consumer billing information.
33. A tangible computer-readable storage medium having computer-executable instructions stored thereon, execution of which by a computer system causes the computer system to perform operations in decrypting and completing partial billing information stored in a plurality of consumer records, each consumer record including consumer identification information and encrypted partial billing information; wherein the encrypted partial billing information comprises an encrypted version of a predetermined set of p alphanumeric characters of a billing information of said consumers; wherein the billing information is data required by a financial institution separate from the computer system to access funds from a consumer's account at the financial institution; and wherein a remaining m alphanumeric characters of the billing information are not stored in the computer system; the operations comprising:
receiving a key from a consumer, the key comprising the remaining m alphanumeric characters of the billing information of said consumer, and wherein m+p is equal to the total number of alphanumeric characters in the billing information of said consumer;
decrypting, using said key received from said consumer, said encrypted partial billing information stored in said one of said plurality of consumer records; and
completing the billing information by combining the key with the decrypted partial billing information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/118,663 USRE43845E1 (en) | 2002-05-15 | 2008-05-09 | Lock-and-key consumer billing data protection system having data encryption capability |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/146,252 US20030216999A1 (en) | 2002-05-15 | 2002-05-15 | Lock-and-key consumer billing data protection for telemarketing |
US10/146,249 US20030216980A1 (en) | 2002-05-15 | 2002-05-15 | Lock-and-key consumer billing data protection for electronic marketing |
US10/160,765 US7043452B2 (en) | 2002-05-15 | 2002-05-31 | Lock-and-key consumer billing data protection system having data encryption capability |
US12/118,663 USRE43845E1 (en) | 2002-05-15 | 2008-05-09 | Lock-and-key consumer billing data protection system having data encryption capability |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/160,765 Reissue US7043452B2 (en) | 2002-05-15 | 2002-05-31 | Lock-and-key consumer billing data protection system having data encryption capability |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE43845E1 true USRE43845E1 (en) | 2012-12-04 |
Family
ID=29423062
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/160,765 Ceased US7043452B2 (en) | 2002-05-15 | 2002-05-31 | Lock-and-key consumer billing data protection system having data encryption capability |
US12/118,663 Expired - Fee Related USRE43845E1 (en) | 2002-05-15 | 2008-05-09 | Lock-and-key consumer billing data protection system having data encryption capability |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/160,765 Ceased US7043452B2 (en) | 2002-05-15 | 2002-05-31 | Lock-and-key consumer billing data protection system having data encryption capability |
Country Status (1)
Country | Link |
---|---|
US (2) | US7043452B2 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8521647B2 (en) * | 2002-03-26 | 2013-08-27 | Nebard Software Foundation L.L.C. | Lock-and-key consumer billing data protection for telemarketing |
US20030216980A1 (en) * | 2002-05-15 | 2003-11-20 | World Class Marketing | Lock-and-key consumer billing data protection for electronic marketing |
US7043452B2 (en) | 2002-05-15 | 2006-05-09 | Neil Barry Rothfarb | Lock-and-key consumer billing data protection system having data encryption capability |
US20030216999A1 (en) * | 2002-05-15 | 2003-11-20 | World Class Marketing | Lock-and-key consumer billing data protection for telemarketing |
US20040123126A1 (en) * | 2002-12-24 | 2004-06-24 | Lee Whay S. | Method and apparatus for deterring piracy |
US9886693B2 (en) | 2009-03-30 | 2018-02-06 | Yuh-Shen Song | Privacy protected anti identity theft and payment network |
CN102701677A (en) * | 2012-06-13 | 2012-10-03 | 江苏建筑职业技术学院 | Energy saving soundproof mortar for house wall |
US20140358794A1 (en) * | 2013-06-04 | 2014-12-04 | Ncr Corporation | Techniques for credit card processing |
Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4123747A (en) | 1977-05-20 | 1978-10-31 | International Business Machines Corporation | Identity verification method and apparatus |
JPS63316626A (en) | 1987-06-19 | 1988-12-23 | Tokyo Electric Power Co Inc:The | Method of editing record of consumer power interruption |
US5432851A (en) | 1993-10-21 | 1995-07-11 | Tecsec Incorporated | Personal computer access control system |
US5455953A (en) | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
US5590197A (en) | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
US5706442A (en) | 1995-12-20 | 1998-01-06 | Block Financial Corporation | System for on-line financial services using distributed objects |
US5727163A (en) | 1995-03-30 | 1998-03-10 | Amazon.Com, Inc. | Secure method for communicating credit card data when placing an order on a non-secure network |
US5745556A (en) * | 1995-09-22 | 1998-04-28 | At&T Corp. | Interactive and information data services telephone billing system |
US5748718A (en) | 1995-01-17 | 1998-05-05 | Manicone; Paul | Telephone monitoring system to reduce consumer payments of telephone bill |
US5960411A (en) * | 1997-09-12 | 1999-09-28 | Amazon.Com, Inc. | Method and system for placing a purchase order via a communications network |
US6128603A (en) | 1997-09-09 | 2000-10-03 | Dent; Warren T. | Consumer-based system and method for managing and paying electronic billing statements |
US6408284B1 (en) | 1993-11-01 | 2002-06-18 | Visa International Service Association | Electronic bill pay system for consumers to generate messages directing financial institutions to pay a biller's bill |
US20020184089A1 (en) | 2001-05-29 | 2002-12-05 | Tsou I-Wen Winnie | Methods, devices and systems for real-time instant presence with advertisement (RIPA) |
US20030187788A1 (en) | 2002-03-26 | 2003-10-02 | World Class Marketing Will Follow | Lock-and-key consumer billing data protection for telemarketing |
US20030216980A1 (en) | 2002-05-15 | 2003-11-20 | World Class Marketing | Lock-and-key consumer billing data protection for electronic marketing |
US20030216999A1 (en) | 2002-05-15 | 2003-11-20 | World Class Marketing | Lock-and-key consumer billing data protection for telemarketing |
US6676016B1 (en) | 2000-05-04 | 2004-01-13 | Ncr Corporation | Retail terminal configured as consumer gateway to electronic billing application |
US6868403B1 (en) | 1998-02-06 | 2005-03-15 | Microsoft Corporation | Secure online music distribution system |
US7043452B2 (en) | 2002-05-15 | 2006-05-09 | Neil Barry Rothfarb | Lock-and-key consumer billing data protection system having data encryption capability |
US20060129835A1 (en) * | 1999-07-02 | 2006-06-15 | Kimberly Ellmore | System and method for single sign on process for websites with multiple applications and services |
US20070005427A1 (en) | 1997-12-01 | 2007-01-04 | Walker Jay S | System for providing offers using a billing statement |
US20080147564A1 (en) | 2001-06-26 | 2008-06-19 | Tara Chand Singhal | Security in use of bankcards that protects bankcard data from merchant systems in a payment card system |
-
2002
- 2002-05-31 US US10/160,765 patent/US7043452B2/en not_active Ceased
-
2008
- 2008-05-09 US US12/118,663 patent/USRE43845E1/en not_active Expired - Fee Related
Patent Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4123747A (en) | 1977-05-20 | 1978-10-31 | International Business Machines Corporation | Identity verification method and apparatus |
JPS63316626A (en) | 1987-06-19 | 1988-12-23 | Tokyo Electric Power Co Inc:The | Method of editing record of consumer power interruption |
US5432851A (en) | 1993-10-21 | 1995-07-11 | Tecsec Incorporated | Personal computer access control system |
US6408284B1 (en) | 1993-11-01 | 2002-06-18 | Visa International Service Association | Electronic bill pay system for consumers to generate messages directing financial institutions to pay a biller's bill |
US5455953A (en) | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
US5748718A (en) | 1995-01-17 | 1998-05-05 | Manicone; Paul | Telephone monitoring system to reduce consumer payments of telephone bill |
US5727163A (en) | 1995-03-30 | 1998-03-10 | Amazon.Com, Inc. | Secure method for communicating credit card data when placing an order on a non-secure network |
US5590197A (en) | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
US5745556A (en) * | 1995-09-22 | 1998-04-28 | At&T Corp. | Interactive and information data services telephone billing system |
US5706442A (en) | 1995-12-20 | 1998-01-06 | Block Financial Corporation | System for on-line financial services using distributed objects |
US6128603A (en) | 1997-09-09 | 2000-10-03 | Dent; Warren T. | Consumer-based system and method for managing and paying electronic billing statements |
US20050080736A1 (en) | 1997-09-09 | 2005-04-14 | Microsoft Corporation | Consumer-based system and method for managing and paying electronic billing statements |
US20050065883A1 (en) | 1997-09-09 | 2005-03-24 | Microsoft Corporation | Consumer-based system and method for managing and paying electronic billing statements |
US6839687B1 (en) | 1997-09-09 | 2005-01-04 | Microsoft Corporation | Consumer-based system and method for managing and paying electronic billing statements |
US5960411A (en) * | 1997-09-12 | 1999-09-28 | Amazon.Com, Inc. | Method and system for placing a purchase order via a communications network |
US20070005427A1 (en) | 1997-12-01 | 2007-01-04 | Walker Jay S | System for providing offers using a billing statement |
US6868403B1 (en) | 1998-02-06 | 2005-03-15 | Microsoft Corporation | Secure online music distribution system |
US20060129835A1 (en) * | 1999-07-02 | 2006-06-15 | Kimberly Ellmore | System and method for single sign on process for websites with multiple applications and services |
US6676016B1 (en) | 2000-05-04 | 2004-01-13 | Ncr Corporation | Retail terminal configured as consumer gateway to electronic billing application |
US20020184089A1 (en) | 2001-05-29 | 2002-12-05 | Tsou I-Wen Winnie | Methods, devices and systems for real-time instant presence with advertisement (RIPA) |
US20080147564A1 (en) | 2001-06-26 | 2008-06-19 | Tara Chand Singhal | Security in use of bankcards that protects bankcard data from merchant systems in a payment card system |
US20030187788A1 (en) | 2002-03-26 | 2003-10-02 | World Class Marketing Will Follow | Lock-and-key consumer billing data protection for telemarketing |
US20030216999A1 (en) | 2002-05-15 | 2003-11-20 | World Class Marketing | Lock-and-key consumer billing data protection for telemarketing |
US20030216980A1 (en) | 2002-05-15 | 2003-11-20 | World Class Marketing | Lock-and-key consumer billing data protection for electronic marketing |
US7043452B2 (en) | 2002-05-15 | 2006-05-09 | Neil Barry Rothfarb | Lock-and-key consumer billing data protection system having data encryption capability |
Non-Patent Citations (32)
Title |
---|
"Borland® Paradox® for Windows: User's Guide," Version 5.0, Borland International, Inc., Scotts Valley, Calif., 1994, 188 pages. |
"Federal Trade Commission, 16 CFR Part 310, Telemarketing Sales Rule, Proposed Rules," Federal Register, Part II, vol. 67, No. 20, Jan. 30, 2002, pp. 4492-4546. |
"Restatement of the Law, Second (Student Edition): Contracts 2d, Pamphlet 1 §§ 1-177, With Reporter's Notes," American Law Institute, St. Paul, Minn., 1981, pp. I-XXIV, 1-243. |
"The Bank Credit Card Business," 2d ed., American Bankers Association, Washington, D.C., 1996, 243 pages. |
Advisory Action dated Jul. 2, 2009, from U.S. Appl. No. 10/107,863, filed Mar. 26, 2002. |
Board of Appeals Decision dated Sep. 22, 2008, from U.S. Appl. No. 10/146,249, filed May 15, 2002. |
Bragg, S. M., "Accounting Best Practices," Wiley, New York, 1999, 290 pages. |
Chopra, S., and P. Meindl, "Supply Chain Management: Strategy, Planning, and Operation," Prentice-Hall, Upper Saddle River, N.J., 2001, 459 pages. |
Danish, S., and P. Gannon, "Building Database-Driven Web Catalogs," McGraw-Hill, New York, 1998, 263 pages. |
Derfler, Jr., F. J., and L. Freed, "How Networks Work," Millennium Edition, Que Corporation, Indianapolis, Sep. 2000, 230 pages. |
Dobler, D. W., and D. N. Burt, "Purchasing and Supply Management: Text and Cases," 6th ed., McGraw-Hill, New York, 1996, 806 pages. |
Examiner's Answer to Appeal Brief, dated Oct. 15, 2009, from U.S. Appl. No. 10/107,863, filed Mar. 26, 2002. |
Examiner's Interview Summary dated Jun. 11, 2009, from U.S. Appl. No. 10/107,863, filed Mar. 26, 2002. |
Final Office Action dated Jan. 10, 2008, from U.S. Appl. No. 10/107,863, filed Mar. 26, 2002. |
Final Office Action dated Jul. 19, 2006, from U.S. Appl. No. 10/146,249, filed May 15, 2002. |
Final Office Action dated Jun. 27, 2008, from U.S. Appl. No. 10/146,252, filed May 15, 2002. |
Final Office Action dated Mar. 3, 2009, from U.S. Appl. No. 10/107,863, filed Mar. 26, 2002. |
Gavron, J., and J. Moran, "How to Use Microsoft Windows NT 4 Workstation," Macmillan Computer Publishing, Emeryville, Calif., 1996, 198 pages. |
Gralla, P., "How the Internet Works," 6th ed., Que Corporation, Indianapolis, Sep. 7, 2001, 354 pages. |
Muller, N. J., "Desktop Encyclopedia of the Internet," Artech House, Norwood, Mass., Nov. 1998, 566 pages. |
Notice of Allowance dated Dec. 7, 2005, from U.S. Appl. No. 10/160,765, filed May 31, 2002, now U.S. Patent No. 7,043,452, which is a Continuation-in-Part of the present application. |
Notice of Panel Decision From Pre-Appeal Brief Review dated Aug. 20, 2009, from U.S. Appl. No. 10/107,863, filed Mar. 26, 2002. |
Office Action dated Apr. 27, 2007, from U.S. Appl. No. 10/107,863, filed Mar. 26, 2002. |
Office Action dated Apr. 6, 2005, from U.S. Appl. No. 10/160,765, filed May 31, 2002, now U.S. Patent No. 7,043,452, which is a Continuation-in-Part of the present application. |
Office Action dated Dec. 13, 2007, from U.S. Appl. No. 10/146,252, filed May 15, 2002. |
Office Action dated Jan. 31, 2006, from U.S. Appl. No. 10/146,249, filed May 15, 2002. |
Office Action dated Jul. 31, 2008, from U.S. Appl. No. 10/107,863, filed Mar. 26, 2002. |
Restriction Requirement dated Aug. 23, 2007, from U.S. Appl. No. 10/146,252, filed May 15, 2002. |
Restriction Requirement dated Sep. 19, 2005, from U.S. Appl. No. 10/146,249, filed May 15, 2002. |
Riley, D. D., "Data Abstraction and Structures: An Introduction to Computer Science II," Boyd & Fraser Publishing, Boston, 1987, pp. v-xviii, 1-3, 653-662. |
White, J. J., and R. S. Summers, "Uniform Commercial Code," 4th ed., West Publishing Co., St. Paul, Minn., 1995, pp. xxv-xxix, 1019-1043. |
White, R., "How Computers Work," Millennium Edition, Que Corporation, Indianapolis, Sep. 1999, 284 pages. |
Also Published As
Publication number | Publication date |
---|---|
US7043452B2 (en) | 2006-05-09 |
US20030217012A1 (en) | 2003-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10579977B1 (en) | Method and system for controlling certificate based open payment transactions | |
USRE43845E1 (en) | Lock-and-key consumer billing data protection system having data encryption capability | |
US20200126076A1 (en) | Methods for performing internet processes using global positioning and other means | |
US7325136B2 (en) | Method and apparatus for secured electronic commerce | |
US7275685B2 (en) | Method for electronic payment | |
US8352360B2 (en) | Method and system for secured transactions over a wireless network | |
US7379920B2 (en) | System and method for facilitating electronic financial transactions using a mobile telecommunication device | |
CN100359531C (en) | Secure authentication and payment system | |
US20060106699A1 (en) | System and method for conducting secure commercial order transactions | |
US20010005839A1 (en) | Electronic commerce system | |
WO1998034203A1 (en) | Method and apparatus for performing financial transactions using a mobile communication unit | |
EA003027B1 (en) | Credit card system and method | |
CZ20013012A3 (en) | Telepayment method and system for implementing said method | |
JPH07234904A (en) | Method for execution of noncash transaction | |
US20100057621A1 (en) | Payment processing system secure healthcare data trafficking | |
WO2003096252A1 (en) | Purchasing on the internet using verified order information and bank payment assurance | |
JP2002032596A (en) | Method for electronic commerce and profile converter to be used in electronic commerce | |
US20060143122A1 (en) | Purchasing on the internet using verified order information and bank payment assurance | |
US20040039709A1 (en) | Method of payment | |
US8521647B2 (en) | Lock-and-key consumer billing data protection for telemarketing | |
US20040093308A1 (en) | Electronic transaction system | |
US20030216999A1 (en) | Lock-and-key consumer billing data protection for telemarketing | |
US20030216980A1 (en) | Lock-and-key consumer billing data protection for electronic marketing | |
EP1410352B1 (en) | Method for online purchasing with high operating security | |
KR20010088222A (en) | Credit card loan and cash advance service system over wireless internet and method for providing service thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NEBARB SOFTWARE FOUNDATION L.L.C., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROTHFARB, NEIL B.;REEL/FRAME:025547/0068 Effective date: 20080228 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees |