Anonymous shopping transactions on a network through information broker services

ABSTRACT

A system and method for enabling a user to transact an anonymous on-line transaction, wherein a form of on-line payment is requested at a transaction interface is disclosed. The method may include providing an anonymous user interface that enables a user to initiate an on-line payment, accessing a first profile comprising user data when the user activates the form of on-line payment, generating a second profile linked to the first profile wherein, the second profile comprises anonymous data, and communicating the anonymous data from the second profile to the transaction interface to enable completion of the transaction.

FIELD OF THE INVENTION

This invention relates to a system and method for carrying out anonymousshopping and other on-line transactions over a network through the useof information broker services.

BACKGROUND OF THE INVENTION

The rise in the popularity of interconnected, processor-based networks,such as the Internet, has increased the practice of on-line shopping.The increase of on-line shopping has made it possible for consumers topurchase goods and services with ease. Often, consumers are able topurchase items from the convenience of their own home at any hour of theday.

However, in order to complete an on-line transaction, users aretypically required to submit personal, confidential, or otherwiseprivate information over the network to the on-line merchant. Oncesubmitted, the information may be intercepted or otherwise accessed byunintended or unauthorized persons. Obviously, this is an undesirableresult. Thus, it is desirable to carry out on-line transactions withoutneedlessly endangering private information.

For example, buyers are typically required to submit a credit cardnumber to the on-line merchant in order to pay for the desired goods orservices. However, submitting a credit card number over the networkopens the possibility that the credit card number will fall into thewrong hands and unauthorized charges may result.

Buyers are also asked to provide their legal names (usually as itappears on the credit card account). For numerous reasons, buyers maynot want to provide their real name over the network. For example, forsafety reasons, women living alone may not want to provide their realnames. Similarly, buyers may not want to provide their home address whenpurchasing items on-line.

These and other drawbacks exist.

SUMMARY OF THE INVENTION

One advantage of the invention is that it overcomes these and otherdrawbacks in existing devices.

Another advantage is that the invention provides a system and method forenabling consumers to shop on-line without having to reveal personalinformation.

Another advantage is that the invention provides a system and method forusing an information broker service to disguise a user's personalinformation and enable the user to accomplish on-line shopping in ananonymous fashion.

According to one aspect of the invention, there is provided a method forenabling a user to transact an anonymous on-line transaction, wherein aform of on-line payment is requested at a transaction interface. Themethod may include providing an anonymous user interface that enables auser to initiate an on-line payment, accessing a first profilecomprising user data when the user activates the form of on-linepayment, generating a second profile linked to the first profilewherein, the second profile comprises anonymous data, and communicatingthe anonymous data from the second profile to the transaction interfaceto enable completion of the transaction.

According to another aspect of the invention, there is provided a systemfor enabling a user to transact an anonymous on-line transaction,wherein a form of on-line payment is requested at a transactioninterface. The system may include an anonymous user interface thatenables a user to initiate an on-line payment, a profile accessinitiator that accesses a first profile comprising user data when theuser activates the form of on-line payment, a profile generator thatgenerates a second profile linked to the first profile wherein, thesecond profile comprises anonymous data, and an anonymous datacommunicator that communicates the anonymous data from the secondprofile to the transaction interface to enable completion of thetransaction.

Other advantages and features of the invention will be apparent to thoseof skill in the art from the following description.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic of the overall system according to one embodimentof the invention.

FIG. 2 is a schematic of an anonymous shopping interface according toone embodiment of the invention.

FIG. 3 is a schematic flow diagram illustrating an anonymous shoppingmethod according to one embodiment of the invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Operation of the invention may be described with reference to thefollowing example embodiments. One embodiment applies to, among otherthings, the situation when a user wants to buy products on the Internetwithout supplying their credit card number. In this situation, a creditcard issuer (e.g., a bank, credit union, or other credit card issuingentity) acts as an information broker and supplies a single-use creditcard number for the user to use while conducting an on-line transactionon the Internet site. The Internet site receives and processes thesingle-use number the same as any other credit card number. The creditcard issuer treats the card as a transaction card (i.e., single-use) aslong as certain security criteria (explained below) are met.

For example, the above embodiment may be implemented as follows. Auser's Internet browser interface may be adapted to include an anonymousshopper interface. The anonymous shopper interface may contain arepresentation (e.g., graphic image) of a credit card. When the usercomes to the purchase point, or other request for a form of on-linepayment, during his/her on-line shopping transaction he/she may activatethe anonymous shopper interface credit card to complete the purchase. Insome embodiments, activating the anonymous shopper card may activate aform fill-in procedure that reads the amount of the transaction (i.e.,the amount of the purchase and any shipping, tax or other additionalcosts) and uses that amount to complete other transaction procedures asdescribed below.

Activation of a form of on-line payment via the anonymous shoppinginterface may cause a profile access module to initiate access to astored profile that a user may store containing credit card informationcorresponding to the credit card account for which the user wants theon-line transaction charges to ultimately be debited. For example, thestored profile may include the user's name, address, credit card accountnumber, account expiration date, and any other information helpful foraccomplishing on-line shopping. The profile may be stored at anysuitable location. For example, the profile may be stored with theanonymous shopper interface provider, the credit card issuer, the user(e.g., in the user's hard drive), or any other suitable location.Regardless of storage location, upon activation via the anonymousshopper interface, the profile is retrieved for further use in theon-line transaction as described below.

The amount of the transaction and the stored profile information arethen communicated through a secured line to the credit card issuer orother information broker. The secured line prevents unauthorized accessto the user's private information.

The invention provides a transaction number generator software modulefor use by the credit card issuer or other information broker processingcenter. The number generator module generates a single use anonymoustransaction number, associated with the user's credit card account, thatfunctions as a “normal” credit card number. The anonymous transactionnumber is returned over the secured line and filled-in as card creditcard number to complete the on-line shopping transaction.

Thus, instead of exposing the user's credit card number, the credit cardissuer issues an anonymous per transaction credit card account with apurchase limit based on the transaction amount and an expiration datebased on the month/year that the transaction takes place.

This means that the credit card issuer can issue at least one trillionunique credit cards per month. If that limit is hit, some of the numbersin the first four numbers of the user's credit card may be used tocreate a new limit of one trillion transactions per week.

The user's actual credit card number is never sent over the Internet.The only transmission of the actual credit card number occurs betweenthe anonymous shopper interface and the credit card issuer over a secureprivate connection. In this manner, the user removes much of the risk ofunauthorized use of their credit card. The credit card issuer alsoreduces their risk of someone stealing the credit card.

Another aspect of the invention applies to the situation when a userwants to conduct a transaction on the Internet without giving out theirreal name. Currently, users must use their real, or legal, name whensupplying their payment and/or shipping information. One embodiment ofthe invention allows a user to associate an alias or fake name with theselected form of on-line payment (e.g., a single-use credit card).

The alias may be created in any suitable fashion. For example, the aliasmay be created by the user and stored in a profile. Alternatively, theuser may be prompted to submit an alias as part of the request for asingle-use transaction number. In any event, the alias name istransmitted to the on-line shopping site (e.g., through auto-form fill)as the name of the credit card account holder. In this manner, the sitecompletes the on-line transaction using the alias name and the usernever transmits his/her real name over the Internet.

Another aspect of the invention applies to situations when the customerwants to conduct a transaction anonymously without having to provide ahome shipping address. In such a scenario, the invention enables adelivery service (e.g., U.S. Postal Service, UPS, Federal Express, etc.)to act as an information broker for the shipping address.

For example, the above embodiment may be implemented as follows. Ananonymous shopper interface may include a representation of a deliveryservice logo or other identifier. When presented a delivery addressrequest form, the user may select the desired delivery service logo inthe anonymous shopper interface. Selecting the delivery service logosends the delivery address request, along with a user identifier, to theanonymous shopper interface provider.

A user identifier may comprise any identifier that will uniquelycorrespond to the user. For example, a user identifier may comprise auniform resource locator (URL), a domain name, an email address, aglobally unique identifier (GUID), or other unique identifier.

The anonymous shopper interface provider verifies the user identity(e.g., using a password or other authentication scheme) and retrievesthe user's address, billing and other information that the deliveryservice needs to complete the transaction.

Communication between the anonymous shopper interface and the deliveryservice is conducted over a private-secure connection. Upon receipt ofthe request, the delivery service generates an anonymous address. Forexample, the anonymous address may comprise the address of a deliveryservice hub station with a special routing code embedded in the address.

The anonymous shopper interface inserts the anonymous address into theon-line shopping site's shipping address form (e.g., through auto-formfill). The on-line shopping site sends the user's items to the anonymousaddress in the same manner as any other address. When the user's packagereaches delivery service hub station address, the delivery servicerecognizes the anonymous address and routes delivery to the user's realaddress. In this manner, the user can shop on-line without fear ofrevealing private information such as a home address.

The above embodiments are but a few examples of the invention. Otherapplications and embodiments will be apparent to those of skill in theart upon reading the following detailed description of the figures.

FIG. 1 shows a schematic of the overall system 100 according to anembodiment of the invention. As shown, the various parties involved inon-line shopping interact through the medium provided by the Internet102. Those parties may include, users 104, on-line shopping sites 106,anonymous shopping interface providers 108, and information brokers 110.

As described above, users 104 includes persons interested in carryingout an on-line shopping transaction. Users 104 may comprise privateindividuals, businesses, government entities, or other organizations.

On-line shopping sites 106 may include any Internet site that enables auser 104 to order, purchase, lease, or otherwise obtain, goods orservices over the Internet 102.

Anonymous shopping interface provider 108 represents the entity orentities that provide the anonymous shopping interface 200 describedherein. For example, anonymous shopping interface provider 108 maycomprise software providers, Internet service providers, or acombination of these and other computer related service providers. Asdescribed above, the anonymous shopping interface provider 108 providesthe user 104 with an anonymous shopping interface 200 that enables theuser to carry out an anonymous on-line shopping transaction.

Information broker 110 represents the entity or entities that providethe information that enables the user to complete an anonymous on-lineshopping transaction. For example, for embodiments where a user wishesto shop with an anonymous credit card account, information broker 110may comprise a bank, credit union, or other financial institution thatissues credit card accounts. Similarly, for embodiments where a userwishes to shop with an anonymous address, information broker 110 maycomprise a post office, package delivery service, or other deliveryservice. Of course, for any given transaction information broker 110 maycomprise more than one type of entity (e.g., a bank and a deliveryservice).

As described herein, anonymous shopping interface provider 108 andinformation broker 110 communicate over a secure communication link 112.Secure communication link 112 may comprise any suitable communicationlink having appropriate security guarantees. For example, securecommunication link 112 may comprise a credit card authorization network,a secure satellite communication link, a secure telephone communicationlink, a secure computer network connection, or other securecommunication link.

As described above, some embodiments of the invention may comprise auser profile that is stored at a conveniently accessible region. Forexample, profiles may be stored at storage device 114. Storage device114 may comprise any suitable storage device capable of storing userprofile information. For example, storage device may comprise a databasestorage system, a hard drive storage system, or the like.

As indicated by the dashed lines in FIG. 1, communication betweenstorage device 114 and the rest of system 100 may be accomplished in anumber of different fashions. For example, storage device 114 maycomprise a hard drive storage system in communication with user 104, adatabase storage device in communication with anonymous shoppinginterface provider 108, or some other storage scheme may be implemented.

FIG. 2 is a schematic representation of an anonymous shopper interface200 according to one embodiment of the invention. As shown, a user maybrowse the Internet using a suitable browser interface 202. For example,browser interface 202 may comprise a browser such as NetscapeNavigator,™ Microsoft Internet Explorer,™ America On-Line™ browser orother suitable interface.

Browser 202 operates in a known manner and may comprise a toolbar 204that allows a user to perform various browsing tasks (e.g., forward,back, print, refresh, home, etc.). As shown, browser 202 enables theuser to visit Internet sites and view the various images 206, links 208,buttons 209, and other site features.

One embodiment of the anonymous shopping interface 200 provides ananonymous shopping toolbar 210 that includes the anonymous shoppingtools. FIG. 2 shows one embodiment of an anonymous shopping toolbar 210located as a bar at the bottom of browser 202. Of course, otherconfigurations are possible. For example, anonymous shopping toolbar 210may be located at the top or side of the browser 202. Additionally, theanonymous shopping toolbar 210 may comprise a separate window thatoverlays the browser 202 and is positionable and sizable according touser preference. Other embodiments of the anonymous shopping toolbar maycomprise a separate icon or button on browser toolbar 204 that mayactivate a menu of anonymous shopping tools. Other configurations arepossible.

Anonymous shopping toolbar 210 may comprise various tools to enable theanonymous shopping activities described herein. For example, tools maybe provided to enable anonymous credit card accounts (e.g., credit tool212), alias names (e.g., name tool 214) and anonymous delivery (e.g.,delivery tool 216). Other tools may be provided as indicated by othertool 218.

The tools may take any acceptable form on the anonymous shopping toolbar210. For example, tools may comprise buttons that may be activated byclicking with a pointer (e.g., a mouse cursor), pull-down menus, radiobuttons, links, or other user selection devices.

FIG. 3 is a schematic flow diagram illustrating a method of anonymousshopping according to one embodiment of the invention. As shown, a usermay activate an anonymous shopping tool (e.g., credit tool 212) at step300. Activation of a tool may be accomplished by user selection of thetool (e.g., by clicking on or otherwise selecting the tool).

Selection of a tool may initiate access to the user's profile asindicated at step 310. As described herein, the user's profile may bestored at any convenient location and preferably includes userinformation that assists in completing an on-line shopping transaction.

At step 312, transaction related information is submitted to aninformation broker (e.g., information broker 110). Transaction relatedinformation may comprise purchase price, on-line merchant information(e.g., name, address, etc.), user profile information, and othertransaction related information.

At step 314 the information broker 110 generates the anonymousinformation requested by the user to accomplish the transaction. Forexample, if information broker 110 is a credit card company, step 314may comprise generating a single use credit card number for the user tosubmit to the on-line merchant. Other examples of anonymous informationare described above.

At step 316 the anonymous information is returned so that it may besubmitted to the on-line merchant. As described herein, in someembodiments the anonymous information may be returned to the user forthe user to submit to the on-line merchant. In other embodiments, theanonymous information may be submitted to the on-line merchant directly.Other schemes are possible.

In some embodiments, the anonymous information may be submitted as partof a form fill-in procedure. This is indicated in FIG. 3 as steps 318Aand 318B. The form fill-in steps may be accomplished at any convenienttime in the process. For example, the form fill-in 318A may beaccomplished upon activation (e.g., at 318A), after the information isreturned from the information broker 110 (e.g., at step 318B), at acombination of the two times (e.g., some information filled at 318A andsome at 318B) or at some other convenient time.

At step 320 the on-line shopping transaction is completed. For example,the information necessary to complete the on-line transaction, includingthe anonymous information, is submitted to the merchant.

Other embodiments and uses of the invention will be apparent to thoseskilled in the art from consideration of the specification and practiceof the invention disclosed herein. The specification and examples shouldbe considered exemplary only. The scope of the invention is only limitedby the claims appended hereto.

What is claimed is:
 1. A method for initiating anonymous on-linetransactions, the method comprising: displaying an anonymous shoppingtoolbar in a browser on a computer, the anonymous shopping toolbarassociated with a credit card issuer and providing a user with ananonymous credit card option for the user to anonymously initiate anon-line transaction; communicating a request for an anonymous creditcard to the credit card issuer over a network connection that links thecomputer to the credit card issuer, the request communicated in responseto the user selecting the anonymous credit card option, wherein thecredit card issuer: generates the anonymous credit card and links theanonymous credit card to the user's real credit card account in responseto receiving the request for the anonymous credit card, the anonymouscredit card having an anonymous transaction number that includes acredit card number and an expiration date based on a month and a year inwhich the on-line transaction occurs, issues a limit of one trillionunique anonymous transaction numbers per month, and uses one or morenumbers from a first four numbers of the user's real credit card accountin the anonymous transaction number in response to having issued thelimit of one trillion unique anonymous transaction numbers in the monthin which the on-line transaction occurs to create a new limit of anadditional one trillion unique anonymous transaction numbers; receivingthe anonymous credit card at the computer over the network connectionthat links the computer to the credit card issuer; and initiating theon-line transaction over the network connection using the anonymouscredit card.
 2. The method of claim 1, the anonymous credit cardavailable for a single use and having a purchase limit based on anamount of the on-line transaction.
 3. The method of claim 2, wherein therequest communicated to the credit card issuer includes the amount ofthe on-line transaction, information associated with the user's realcredit card account, and an alias to be substituted for the user's realname.
 4. The method of claim 1, the anonymous credit card furtherincluding an alias that substitutes for the user's real name.
 5. Asystem for initiating anonymous on-line transactions, the systemcomprising: a graphical user interface that displays an anonymousshopping toolbar in a browser on a computer, the anonymous shoppingtoolbar associated with a credit card issuer and providing a user withan anonymous credit card option for the user to anonymously initiate anon-line transaction; a storage device that stores informationcorresponding to the user's real credit card account; and a networkconnection that links the computer to the credit issuer, wherein thecomputer: communicates a request for an anonymous credit card to thecredit card issuer over the network connection in response to the userselecting the anonymous credit card option, wherein the credit cardissuer: generates the anonymous credit card and links the anonymouscredit card to the user's real credit card account in response toreceiving the request for the anonymous credit card, the anonymouscredit card having an anonymous transaction number that includes acredit card number and an expiration date based on a month and a year inwhich the on-line transaction occurs, issues a limit of one trillionunique anonymous transaction numbers per month, and uses one or morenumbers from a first four numbers of the user's real credit card accountin the anonymous transaction number in response to having issued thelimit of one trillion unique anonymous transaction numbers in the monthin which the on-line transaction occurs to create a new limit of anadditional one trillion unique anonymous transaction numbers; receivesthe anonymous credit card over the network connection that links thecomputer to the credit card issuer; and anonymously initiates theon-line transaction over the network connection using the anonymouscredit card.
 6. The system of claim 5, the anonymous credit cardavailable for a single use and having a purchase limit based on anamount of the on-line transaction.
 7. The system of claim 5, theanonymous credit card further including an alias that substitutes forthe user's real name.