Method and system for receiving and providing access to information at a web site

ABSTRACT

At a vendor-managed web site, purchasing information is received from a first terminal, including purchasing information that is customized for a customer. The customer includes first and second users having respective first and second levels of authorized access to the purchasing information. The first user is identified by a first identifier, and the second user is identified by a second identifier. To a second terminal, access at the vendor-managed web site is provided to: only a first portion of the purchasing information in response to receiving the first identifier from the second terminal which identifies the first user; and at least a second portion of the purchasing information in response to receiving the second identifier from the second terminal which identifies the second user. The second portion includes at least a part of the first portion and a third portion of the purchasing information. The part of the first portion includes at least a portion of the customized purchasing information.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to and is a continuation of co-ownedU.S. patent application Ser. No. 08/488,936 U.S. Pat. No. 6,694,365,filed Jan. 21, 2000, issued on Feb. 17, 2004, to Amy Van Wyngarden, andentitled METHOD AND SYSTEM FOR RECEIVING AND PROVIDING ACCESS TOINFORMATION AT A WEB SITE, which is a continuation of U.S. applicationSer. No. 08/009,401, filed Jan. 20, 1998, co-owned U.S. Pat. No.6,038,597, issued on Mar. 14, 2000, entitled METHOD AND APPARATUS FORPROVIDING AND ACCESSING DATA AT AN INTERNET SITE, which are incorporatedherein by reference in their entirety.

BACKGROUND

The disclosures herein relate generally to information systems and moreparticularly to a method and system for receiving and providing accessto information at a web site.

Various systems have been developed whereby data and information can beaccessed by a remote provider and a remote user. In one such system, aremote access server provides a remote user with access to a localcomputer network. The server receives a user identification string fromits communication port, the string having been entered by the remoteuser at a remote computer which is coupled to the communication port.The string identifies the remote user. The server uses the string toaccess a database and determine an Internet protocol (IP) addressassociated with the string. The remote computer needs the IP address tocommunicate on the local computer network. The database includes a useridentification string for each remote user and an IP address for eachstring. The remote access server sends the IP address to the remotecomputer via the communication port. The server then allows the remotecomputer to access the local computer network and to communicate on thelocal computer network using the IP address.

Another system is a multitask multiuser system which provides forefficient transfer of data from a remote data base to individualsubscribers and has particular utility in the distribution of stockmarket data. A primary provider distributes the incoming data directlyto user tasks or to an inquiry provider or a monitor provider. Theinquiry provider responds to specific inquiries by users for informationin the data base. The monitor provider maintains lists of informationwhich are being monitored by the host computer for individual users. Theinquiry provider and the monitor provider do not repeat requests to theremote data base where a similar request is already pending from anotheruser. Data transfer paths between tasks are established by a code modulewhich may be linked to any of the tasks. The transfer paths areestablished using information from a configuration list and they aremonitored by the operating system through a wait list established foreach user task. Providers in the system may establish subscriber liststhrough the code module.

In another application, an authorization mechanism providesauthorization information for a client requesting access to a serverresource in a server, having a directory server for storing clientinformation required by the server in executing an operation call,including client access rights, and generating a request for anauthorization ticket to the server. The request for an authorizationticket includes an identification of the client and an identification ofthe client information required by the server and is in association withan operation call. The authorization mechanism generates anauthorization ticket including the identified information encrypted withan encryption key derived from the password of the server. Theauthorization ticket is sent to the server and the server decrypts theauthorization ticket with the server password and obtains the clientinformation directly including the client access rights. Clientinformation is stored in directory server fields identified by genericfield tags. The authorization ticket request identifies clientinformation by tag names identifying the fields, the requestedinformation is stored in the authorization ticket in fields identifiedby the tag names, and the server mechanism then reads the clientinformation.

A further application includes a first data processing device (node I)coupled to a first private network and to a firewall server (FWA).Firewall server FWA is in turn coupled to a public network, such as theInternet. A second data processing device (node J) is coupled to asecond private network which is coupled to the Internet through afirewall server (FWB). Node I provides a data packet including IP dataand a destination address for the intended receiving node J to firewallFWA. Firewall FWA is provided with a secret value and a public value.The firewall FWA obtains a Diffie-Hellman (DH) certificate for firewallFWB and determines the public value from the DH certificate. A transientkey is randomly generated and is used to encrypt the data packet to betransmitted by firewall FWA to firewall FWB. The encrypted data packetis then encapsulated in a transmission packet by the firewall FWA. Thetransmission packet includes an unencrypted destination address for thefirewall FWB. Firewall FWA then sends the transmission packet tofirewall FWB over the Internet. Upon receipt of the transmission packetfrom firewall FWA, firewall FWB obtains a DH certificate for firewallFWA and determines the public value from the DH certificate. FirewallFWB decrypts the encrypted data packet received from FWA, therebyresulting in the recovery of the original data sent by node I inunencrypted form to the firewall FWA. The firewall FWB then transmitsthe decrypted data packet to the receiving node J over the secondprivate network.

Purchasing is a major component of the operation of a business. Itinvolves establishing authorized vendor sources, seeking first time orunusual vendor sources and maintaining vendor relationships. Typically,as strong relationships build and as quantity buying develops,purchasing power can increase and purchasing costs can decrease. A majorpart of repetitive purchasing is based on purchasing history, i.e. whathas been purchased in the past, what options are desired, and whatoptions are available.

An important aspect of repetitive purchasing is the accessibility ofpurchasing history. A purchaser can maintain records as well as a vendorbut this will most likely only reveal what has been purchased in thepast. A customer may need to know about available options foranticipated purchases and a vendor may have modified or new productswhich are of interest to the customer. This can be accomplished byrepeated direct contact between purchasing department personnel andvendor sales and accounting or other personnel. Such contact may beaccomplished by numerous telephone calls to several sources at thevendor's site.

Information gathered by the purchaser from the vendor then needs to becommunicated by purchasing personnel to the person(s) within theorganization who requested the information. Additional phone callsand/or meetings may be required before a decision can be made for adefinitive purchase. The purchasing agent must then negotiate the bestprice based on many factors including the nature of the item and thequantity desired.

Accordingly, a need has arisen for a method and system for receiving andproviding access to information at a web site, in which variousshortcomings of previous techniques are overcome.

SUMMARY

According to one embodiment, at a vendor-managed web site, purchasinginformation is received from a first terminal, including purchasinginformation that is customized for a customer. The customer includesfirst and second users having respective first and second levels ofauthorized access to the purchasing information. The first user isidentified by a first identifier, and the second user is identified by asecond identifier. To a second terminal, access at the vendor-managedweb site is provided to: only a first portion of the purchasinginformation in response to receiving the first identifier from thesecond terminal which identifies the first user; and at least a secondportion of the purchasing information in response to receiving thesecond identifier from the second terminal which identifies the seconduser. The second portion includes at least a part of the first portionand a third portion of the purchasing information. The part of the firstportion includes at least a portion of the customized purchasinginformation.

A principal advantage of this embodiment is that various shortcomings ofprevious techniques are overcome.

BRIEF DESCRIPTION OF THE DRAWING

FIG. 1 is a diagrammatic view illustrating an embodiment of a network.

FIG. 2 is a diagrammatic view illustrating an embodiment of a web site.

FIG. 3 is a diagrammatic view illustrating an embodiment of a team areaof the web page.

FIG. 4 is a diagrammatic view illustrating an embodiment of a store areaof the web page.

FIG. 5 is diagrammatic view illustrating an embodiment of a service areaof the web page.

FIG. 6 is a diagrammatic view illustrating an embodiment of a securearea of the web page.

FIG. 7 is a diagrammatic view illustrating an embodiment of amulti-access area of the web page.

DETAILED DESCRIPTION

A network 10, FIG. 1 includes a web site 12 having a web page or severalpages coupled to a first user point 14 and a second user point 16. Thefirst user point 14 as used in this context is any terminal on a privatenetwork used by a site provider to input managed information to the website 12. The second user point 16 as used in this context is anyterminal used by a site user via the Internet to access all or part ofthe managed information at the web site 12.

The site provider at first user point 14, writes to a series of Internettools, diagrammatically illustrated at 15, and publishes to an internalcopy 17 of the web site 12 for pre-production purposes. Ultimately, thesite provider publishes to the web site 12. The site user at second userpoint 16 has access to web site 12 and can also communicate directly viaa link 19 with the site provider at first user point 14 via, forexample, e-mail for the purpose of submitting orders for goods offeredfor sale at the web site 12. Additionally, the site provider directlyaccesses the web site 12 for maintenance purposes, e.g. to access theweb site 12 to monitor traffic to the site and the quality of the site.

Web site 12 includes a web page or pages 18, FIG. 2 including customizedinformation to provide customers at second user point 16 with an easierway of doing business with a site provider at first user point 14. Webpage 18 resides on the web site 12 behind an unlisted universal resourcelocator (URL). Users at second user point 16 are provided with user ID'sand user passwords for accessing the web page 18.

Web page 18 features a user logo area 20 and a menu bar selectionincluding a provider team area 22, a store area 24, a service andsupport area 26, a secure area 28, a site information area 30, a browsearea 32, a multi-access area 34 and a non-disclosure agreement (NDA)area 36. The web page 18 information listed above in the various areasare maintained current by the site provider by multiple daily updates.

User logo area 20 includes, with the user's permission, a graphicalrepresentation of the logo of the user organization. If the user doesnot have a logo or does not wish for the logo to be used, the userorganizations name may be used in text format.

Team area 22, FIG. 3 includes name, address, phone and fax numbers,e-mail links and title of provider team members and a support categoryinto which each team member is classified, e.g. sales, customer service,etc. Data listed in the team area can be changed with add-ons andupdates in order to be maintained current. Other information can beprovided if desired.

Store area 24, FIG. 4 provides links to user standard systemconfigurations 24 a including pricing information and the ability tosubmit online orders; links to a discount store 24 b for additionalproduct information; and links to multiple order status 24 c whichpermits the user to view status and shipping details of open orders. Itis also possible to receive shipment e-mail notification automatically,if desired so that the user is prompted when an order is shipped. Storeinformation may include a system category, title, a quote member, aprice and a list of options. The store information may be modified bythe site provider such as by adding a system category, changing astandard configuration, or changing other data included in the storeinformation.

The service and support information area 26, FIG. 5 features systemservice tags (SST) 26 a which utilizes a five (5) digit systemidentifier located on a sticker with a bar code on each product. The SSTcan be entered and information specific to the user's system will beprovided. When the SST is entered, an express service code (ESC) 26 bwhich is a unique numeric code, is generated for a user when the userenters the SST at the web site. This will avoid call transfers and menuoptions so that the user is routed directly to a specialist at theprovider site who will provide time help with the user system. A filelibrary 26 c functions as a repository of downloads, BIOS updatesdrivers and utilities for the user system. This allows the user to keeptheir system up-to-date at their convenience. These files may be groupedby system, file type, name and date posted. An order status function 26d provides current status of individual or multiple orders. Providerstaff members can retrieve order, production and ship dates directlyfrom an internal order management system in real time.

The secure area 28, FIG. 6 includes an account team roster 28 a andpurchasing reports 28 b. The account team roster includes pager linksand allows direct user contact with account team provider members. Thereare four (4) different purchasing reports which are provided andregularly updated. Each report is viewable online or available fordownload in several formats. An order status and delivery report 28 cshows the user detailed information on all orders from pendingproduction status to invoiced status. An order detail by enterprise 28 dreport shows the detailed information on the units shipped and amountspent by product category for orders invoiced during a month. A summaryby enterprise report 28 e shows total units and spending by productcategory for the order invoiced during a month. Finally, a summary bylocation report 28 f shows total units and spending by product categoryfor each location in the user organization and includes only ordersinvoiced during a month.

The information area 30 includes links to the web site home and tips onhow to use the web site as well as a feedback form to permit the user tosubmit ideas to the provider concerning how to improve the web site.

The browse area 32 provides easy access to the provider home page aswell as to select links on the web site which may be of interest to theuser.

The multi-access area 34, FIG. 7 has at least two (2) levels of access,each of which is associated with the user ID and password mentionedabove. One access area is referred to as a general access user ID andpassword area 34 a and allows users to see everything at the web siteexcept for the secure area 28. The other access area is referred to as amanaged access user ID and password area 34 b and allows users to seeeverything at the site including the secure area 28. The managed areamay, if desired, be subdivided into multi-level access areas so that afirst level managed access user ID and password allows users to seeeverything at the web site including a first portion 34 c of the securearea 28 and a second level managed access user ID and password allowsusers to see everything at the web site including the first and a secondportion 34 c, 34 d, respectively, of the secure area 28. Provider teammembers contact appropriate personnel at the user organization andprovide the URL and multi-level ID's and passwords as required for useraccess to the web site 12. An intranet manager at the user organizationcan add a link from the second user point 16 to the web site 12 and postthe general user ID and password next to the link for web site 12. Thiswill permit anyone at the second user point 16 to access the web site 12instead of having to recall a URL, user ID and password. The userorganization will be responsible for designating appropriate people atthe user organization to have the managed user ID and password usuallyreserved for a select group of users which may be defined by jobdescription, rank, title, etc.

The online NDA 36 is provided each time a user visits web site 12 forthe first time. After entering the URL for the organization web page 18,the user will be prompted to view and accept the online NDA 36. Once theNDA 36 is accepted, the user's hard drive at the terminal being usedwill function so as not to prompt that particular user with the NDA 36again. However, each time a user accesses the organization web page 18from a different terminal at second user point 16 for the first time,the user will be prompted to accept the NDA 36, and upon accepting, theterminal being used will function so as not to prompt that particularuser with the NDA 36 again.

As it can be seen, the principal advantages of this embodiment are thatthe web site provides information which is continuously updated by theprovider and makes business purchases easier to initiate, manage andcontrol for both the organization user/buyer and the provider/seller andreduces purchasing and maintenance costs for both user and provider. Inaddition, direct relationships between user and provider are enhancedand supported from presales to post-sales. The provider is able tooff-load tasks such as order quoting and order status from the salesstaff so that they can spend more time selling product. The user isencouraged to do more transactions and information gathering onlinewhich is more efficient. A competitive advantage to the provider is thatthe user can conduct business with the provider in an easier, more costefficient manner. User satisfaction and loyalty is enhanced and newusers are attracted to this mode of purchasing from the provider.

Although illustrative embodiments have been shown and described, a widerange of modification, change and substitution is contemplated in theforegoing disclosure and in some instances, some features of theembodiments may be employed without a corresponding use of otherfeatures. Accordingly, it is appropriate that the appended claims beconstrued broadly and in a manner consistent with the scope of theembodiments disclosed herein.

1. An information system, comprising: a vendor-managed web site for:receiving purchasing information from a first terminal, includingpurchasing information that is customized for a customer, the customerincluding first and second users having respective first and secondlevels of authorized access to the purchasing information, the firstuser being identified by a first identifier, and the second user beingidentified by a second identifier; and to a second terminal, providingaccess to: only a first portion of the purchasing information inresponse to receiving the first identifier from the second terminalwhich identifies the first user; and at least a second portion of thepurchasing information in response to receiving the second identifierfrom the second terminal which identifies the second user, wherein thesecond portion includes at least a part of the first portion and a thirdportion of the purchasing information, wherein the part of the firstportion includes at least a portion of the customized purchasinginformation, and wherein the customized purchasing information includesa listing of configurations, so that the customer at the second terminalcan submit an online order to the vendor-managed web site in response tothe configurations.
 2. The system of claim 1, wherein the first portionincludes the portion of the customized purchasing information.
 3. Thesystem of claim 1, wherein the first portion includes a first portion ofthe customized purchasing information, and wherein the third portionincludes a second portion of the customized purchasing information. 4.The system of claim 1, wherein the vendor-managed web site is forproviding access to the second terminal via a URL.
 5. The system ofclaim 4, wherein the URL is an unlisted URL.
 6. The system of claim 1,wherein the customized purchasing information includes statusinformation related to the online order.
 7. The system of claim 6,wherein the status information includes shipping data.
 8. The system ofclaim 1, wherein the vendor-managed web site is for outputting anotification to the second terminal, so that the customer at the secondterminal is notified of a shipment of the online order.
 9. The system ofclaim 1, wherein the vendor-managed web site is for providing access tothe second terminal, so that the customer at the second terminal canenter an identifier for routing the customer to a specialist at thefirst terminal.
 10. The system of claim 1, wherein the customizedpurchasing information includes a listing of a team member at the firstterminal, so that the customer at the second terminal can access thelisting for making contact with the team member.
 11. A method performedby an information system, the method comprising: at a vendor-managed website, receiving purchasing information from a first terminal, includingpurchasing information that is customized for a customer, the customerincluding first and second users having respective first and secondlevels of authorized access to the purchasing information, the firstuser being identified by a first identifier, and the second user beingidentified by a second identifier; and to a second terminal, providingaccess at the vendor-managed web site to: only a first portion of thepurchasing information in response to receiving the first identifierfrom the second terminal which identifies the first user; and at least asecond portion of the purchasing information in response to receivingthe second identifier from the second terminal which identifies thesecond user, wherein the second portion includes at least a part of thefirst portion and a third portion of the purchasing information, whereinthe part of the first portion includes at least a portion of thecustomized purchasing information, and wherein the customized purchasinginformation includes a listing of configurations, so that the customerat the second terminal can submit an online order to the vendor-managedweb site in response to the configurations.
 12. The method of claim 11,wherein the first portion includes the portion of the customizedpurchasing information.
 13. The method of claim 11, wherein the firstportion includes a first portion of the customized purchasinginformation, and wherein the third portion includes a second portion ofthe customized purchasing information.
 14. The method of claim 11,wherein the providing access comprises: providing access to the secondterminal via a URL.
 15. The method of claim 14, wherein the URL is anunlisted URL.
 16. The method of claim 11, wherein the customizedpurchasing information includes status information related to the onlineorder.
 17. The method of claim 16, wherein the status informationincludes shipping data.
 18. The method of claim 11 and comprising:outputting a notification to the second terminal, so that the customerat the second terminal is notified of a shipment of the online order.19. The method of claim 11, wherein the providing access comprises:providing access to the second terminal, so that the customer at thesecond terminal can enter an identifier for routing the customer to aspecialist at the first terminal.
 20. The method of claim 11, whereinthe customized purchasing information includes a listing of a teammember at the first terminal, so that the customer at the secondterminal can access the listing for making contact with the team member.21. An information system, comprising: a vendor-managed web site for:receiving purchasing information from a first terminal, includingpurchasing information that is customized for a customer, the customerincluding first and second users having respective first and secondlevels of authorized access to the purchasing information, the firstuser being identified by a first identifier, and the second user beingidentified by a second identifier; and to a second terminal, providingaccess to: only a first portion of the purchasing information inresponse to receiving the first identifier from the second terminalwhich identifies the first user; and at least a second portion of thepurchasing information in response to receiving the second identifierfrom the second terminal which identifies the second user, wherein thesecond portion includes at least a part of the first portion and a thirdportion of the purchasing information, wherein the part of the firstportion includes at least a portion of the customized purchasinginformation, and wherein the first identifier includes a first useridentifier and a first password, and wherein the second identifierincludes a second user identifier and a second password.
 22. The systemof claim 21, wherein the first portion includes the portion of thecustomized purchasing information.
 23. The system of claim 21, whereinthe first portion includes a first portion of the customized purchasinginformation, and wherein the third portion includes a second portion ofthe customized purchasing information.
 24. The system of claim 21,wherein the vendor-managed web site is for providing access to thesecond terminal via a URL.
 25. The system of claim 24, wherein the URLis an unlisted URL.
 26. The system of claim 21, wherein the customizedpurchasing information includes status information related to the onlineorder.
 27. The system of claim 26, wherein the status informationincludes shipping data.
 28. The system of claim 21, wherein thevendor-managed web site is for outputting a notification to the secondterminal, so that the customer at the second terminal is notified of ashipment of the online order.
 29. The system of claim 21, wherein thevendor-managed web site is for providing access to the second terminal,so that the customer at the second terminal can enter an identifier forrouting the customer to a specialist at the first terminal.
 30. Thesystem of claim 21, wherein the customized purchasing informationincludes a listing of a team member at the first terminal, so that thecustomer at the second terminal can access the listing for makingcontact with the team member.
 31. A method performed by an informationsystem, the method comprising: at a vendor-managed web site, receivingpurchasing information from a first terminal, including purchasinginformation that is customized for a customer, the customer includingfirst and second users having respective first and second levels ofauthorized access to the purchasing information, the first user beingidentified by a first identifier, and the second user being identifiedby a second identifier; and to a second terminal, providing access atthe vendor-managed web site to: only a first portion of the purchasinginformation in response to receiving the first identifier from thesecond terminal which identifies the first user; and at least a secondportion of the purchasing information in response to receiving thesecond identifier from the second terminal which identifies the seconduser, wherein the second portion includes at least a part of the firstportion and a third portion of the purchasing information, wherein thepart of the first portion includes at least a portion of the customizedpurchasing information, and wherein the first identifier includes afirst user identifier and a first password, and wherein the secondidentifier includes a second user identifier and a second password. 32.The method of claim 31, wherein the first portion includes the portionof the customized purchasing information.
 33. The method of claim 31,wherein the first portion includes a first portion of the customizedpurchasing information, and wherein the third portion includes a secondportion of the customized purchasing information.
 34. The method ofclaim 31, wherein the providing access comprises: providing access tothe second terminal via a URL.
 35. The method of claim 34, wherein theURL is an unlisted URL.
 36. The method of claim 31, wherein thecustomized purchasing information includes status information related tothe online order.
 37. The method of claim 36, wherein the statusinformation includes shipping data.
 38. The method of claim 31 andcomprising: outputting a notification to the second terminal, so thatthe customer at the second terminal is notified of a shipment of theonline order.
 39. The method of claim 31, wherein the providing accesscomprises: providing access to the second terminal, so that the customerat the second terminal can enter an identifier for routing the customerto a specialist at the first terminal.
 40. The method of claim 31,wherein the customized purchasing information includes a listing of ateam member at the first terminal, so that the customer at the secondterminal can access the listing for making contact with the team member.