Method and system for receiving and providing access to information at a web site

ABSTRACT

At a vendor-managed web site, purchasing information is received from a first terminal, including purchasing information that is customized for a customer. The customer includes first and second users having respective first and second levels of authorized access to the purchasing information. The first user is identified by a first identifier, and the second user is identified by a second identifier. To a second terminal, access at the vendor-managed web site is provided to: only a first portion of the purchasing information in response to receiving the first identifier from the second terminal which identifies the first user; and at least a second portion of the purchasing information in response to receiving the second identifier from the second terminal which identifies the second user. The second portion includes at least a part of the first portion and a third portion of the purchasing information. The part of the first portion includes at least a portion of the customized purchasing information.

CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This application claims priority to and is a continuation ofco-owned co-pending U.S. patent application Ser. No. 09/488,936, filedJan. 21, 2000, by Amy Van Wyngarden, entitled METHOD AND SYSTEM FORRECEIVING AND PROVIDING ACCESS TO INFORMATION AT A WEB SITE, which is acontinuation of co-owned U.S. Pat. No. 6,038,597, issued on Mar. 14,2000, entitled METHOD AND APPARATUS FOR PROVIDING AND ACCESSING DATA ATAN INTERNET SITE, which are incorporated herein by reference in theirentirety.

BACKGROUND

[0002] The disclosures herein relate generally to information systemsand more particularly to a method and system for receiving and providingaccess to information at a web site.

[0003] Various systems have been developed whereby data and informationcan be accessed by a remote provider and a remote user. In one suchsystem, a remote access server provides a remote user with access to alocal computer network. The server receives a user identification stringfrom its communication port, the string having been entered by theremote user at a remote computer which is coupled to the communicationport. The string identifies the remote user. The server uses the stringto access a database and determine an Internet protocol (IP) addressassociated with the string. The remote computer needs the IP address tocommunicate on the local computer network. The database includes a useridentification string for each remote user and an IP address for eachstring. The remote access server sends the IP address to the remotecomputer via the communication port. The server then allows the remotecomputer to access the local computer network and to communicate on thelocal computer network using the IP address.

[0004] Another system is a multitask multiuser system which provides forefficient transfer of data from a remote data base to individualsubscribers and has particular utility in the distribution of stockmarket data. A primary provider distributes the incoming data directlyto user tasks or to an inquiry provider or a monitor provider. Theinquiry provider responds to specific inquiries by users for informationin the data base. The monitor provider maintains lists of informationwhich are being monitored by the host computer for individual users. Theinquiry provider and the monitor provider do not repeat requests to theremote data base where a similar request is already pending from anotheruser. Data transfer paths between tasks are established by a code modulewhich may be linked to any of the tasks. The transfer paths areestablished using information from a configuration list and they aremonitored by the operating system through a wait list established foreach user task. Providers in the system may establish subscriber liststhrough the code module.

[0005] In another application, an authorization mechanism providesauthorization information for a client requesting access to a serverresource in a server, having a directory server for storing clientinformation required by the server in executing an operation call,including client access rights, and generating a request for anauthorization ticket to the server. The request for an authorizationticket includes an identification of the client and an identification ofthe client information required by the server and is in association withan operation call. The authorization mechanism generates anauthorization ticket including the identified information encrypted withan encryption key derived from the password of the server. Theauthorization ticket is sent to the server and the server decrypts theauthorization ticket with the server password and obtains the clientinformation directly including the client access rights. Clientinformation is stored in directory server fields identified by genericfield tags. The authorization ticket request identifies clientinformation by tag names identifying the fields, the requestedinformation is stored in the authorization ticket in fields identifiedby the tag names, and the server mechanism then reads the clientinformation.

[0006] A further application includes a first data processing device(node I) coupled to a first private network and to a firewall server(FWA). Firewall server FWA is in turn coupled to a public network, suchas the Internet. A second data processing device (node J) is coupled toa second private network which is coupled to the Internet through afirewall server (FWB). Node I provides a data packet including IP dataand a destination address for the intended receiving node J to firewallFWA. Firewall FWA is provided with a secret value and a public value.The firewall FWA obtains a Diffie-Hellman (DH) certificate for firewallFWB and determines the public value from the DH certificate. A transientkey is randomly generated and is used to encrypt the data packet to betransmitted by firewall FWA to firewall FWB. The encrypted data packetis then encapsulated in a transmission packet by the firewall FWA. Thetransmission packet includes an unencrypted destination address for thefirewall FWB. Firewall FWA then sends the transmission packet tofirewall FWB over the Internet. Upon receipt of the transmission packetfrom firewall FWA, firewall FWB obtains a DH certificate for firewallFWA and determines the public value from the DH certificate. FirewallFWB decrypts the encrypted data packet received from FWA, therebyresulting in the recovery of the original data sent by node I inunencrypted form to the firewall FWA. The firewall FWB then transmitsthe decrypted data packet to the receiving node J over the secondprivate network.

[0007] Purchasing is a major component of the operation of a business.It involves establishing authorized vendor sources, seeking first timeor unusual vendor sources and maintaining vendor relationships.Typically, as strong relationships build and as quantity buyingdevelops, purchasing power can increase and purchasing costs candecrease. A major part of repetitive purchasing is based on purchasinghistory, i.e. what has been purchased in the past, what options aredesired, and what options are available.

[0008] An important aspect of repetitive purchasing is the accessibilityof purchasing history. A purchaser can maintain records as well as avendor but this will most likely only reveal what has been purchased inthe past. A customer may need to know about available options foranticipated purchases and a vendor may have modified or new productswhich are of interest to the customer. This can be accomplished byrepeated direct contact between purchasing department personnel andvendor sales and accounting or other personnel. Such contact may beaccomplished by numerous telephone calls to several sources at thevendor's site.

[0009] Information gathered by the purchaser from the vendor then needsto be communicated by purchasing personnel to the person(s) within theorganization who requested the information. Additional phone callsand/or meetings may be required before a decision can be made for adefinitive purchase. The purchasing agent must then negotiate the bestprice based on many factors including the nature of the item and thequantity desired.

[0010] Accordingly, a need has arisen for a method and system forreceiving and providing access to information at a web site, in whichvarious shortcomings of previous techniques are overcome.

SUMMARY

[0011] According to one embodiment, at a vendor-managed web site,purchasing information is received from a first terminal, includingpurchasing information that is customized for a customer. The customerincludes first and second users having respective first and secondlevels of authorized access to the purchasing information. The firstuser is identified by a first identifier, and the second user isidentified by a second identifier. To a second terminal, access at thevendor-managed web site is provided to: only a first portion of thepurchasing information in response to receiving the first identifierfrom the second terminal which identifies the first user; and at least asecond portion of the purchasing information in response to receivingthe second identifier from the second terminal which identifies thesecond user. The second portion includes at least a part of the firstportion and a third portion of the purchasing information. The part ofthe first portion includes at least a portion of the customizedpurchasing information.

[0012] A principal advantage of this embodiment is that variousshortcomings of previous techniques are overcome.

BRIEF DESCRIPTION OF THE DRAWING

[0013]FIG. 1 is a diagrammatic view illustrating an embodiment of anetwork.

[0014]FIG. 2 is a diagrammatic view illustrating an embodiment of a website.

[0015]FIG. 3 is a diagrammatic view illustrating an embodiment of a teamarea of the web page.

[0016]FIG. 4 is a diagrammatic view illustrating an embodiment of astore area of the web page.

[0017]FIG. 5 is diagrammatic view illustrating an embodiment of aservice area of the web page.

[0018]FIG. 6 is a diagrammatic view illustrating an embodiment of asecure area of the web page.

[0019]FIG. 7 is a diagrammatic view illustrating an embodiment of amulti-access area of the web page.

DETAILED DESCRIPTION

[0020] A network 10, FIG. 1 includes a web site 12 having a web page orseveral pages coupled to a first user point 14 and a second user point16. The first user point 14 as used in this context is any terminal on aprivate network used by a site provider to input managed information tothe web site 12. The second user point 16 as used in this context is anyterminal used by a site user via the Internet to access all or part ofthe managed information at the web site 12.

[0021] The site provider at first user point 14, writes to a series ofInternet tools, diagrammatically illustrated at 15, and publishes to aninternal copy 17 of the web site 12 for pre-production purposes.Ultimately, the site provider publishes to the web site 12. The siteuser at second user point 16 has access to web site 12 and can alsocommunicate directly via a link 19 with the site provider at first userpoint 14 via, for example, e-mail for the purpose of submitting ordersfor goods offered for sale at the web site 12. Additionally, the siteprovider directly accesses the web site 12 for maintenance purposes,e.g. to access the web site 12 to monitor traffic to the site and thequality of the site.

[0022] Web site 12 includes a web page or pages 18, FIG. 2 includingcustomized information to provide customers at second user point 16 withan easier way of doing business with a site provider at first user point14. Web page 18 resides on the web site 12 behind an unlisted universalresource locator (URL). Users at second user point 16 are provided withuser ID's and user passwords for accessing the web page 18.

[0023] Web page 18 features a user logo area 20 and a menu bar selectionincluding a provider team area 22, a store area 24, a service andsupport area 26, a secure area 28, a site information area 30, a browsearea 32, a multi-access area 34 and a non-disclosure agreement (NDA)area 36. The web page 18 information listed above in the various areasare maintained current by the site provider by multiple daily updates.

[0024] User logo area 20 includes, with the user's permission, agraphical representation of the logo of the user organization. If theuser does not have a logo or does not wish for the logo to be used, theuser organizations name may be used in text format.

[0025] Team area 22, FIG. 3 includes name, address, phone and faxnumbers, e-mail links and title of provider team members and a supportcategory into which each team member is classified, e.g. sales, customerservice, etc. Data listed in the team area can be changed with add-onsand updates in order to be maintained current. Other information can beprovided if desired.

[0026] Store area 24, FIG. 4 provides links to user standard systemconfigurations 24 a including pricing information and the ability tosubmit online orders; links to a discount store 24 b for additionalproduct information; and links to multiple order status 24 c whichpermits the user to view status and shipping details of open orders. Itis also possible to receive shipment e-mail notification automatically,if desired so that the user is prompted when an order is shipped. Storeinformation may include a system category, title, a quote member, aprice and a list of options. The store information may be modified bythe site provider such as by adding a system category, changing astandard configuration, or changing other data included in the storeinformation.

[0027] The service and support information area 26, FIG. 5 featuressystem service tags (SST) 26 a which utilizes a five (5) digit systemidentifier located on a sticker with a bar code on each product. The SSTcan be entered and information specific to the user's system will beprovided. When the SST is entered, an express service code (ESC) 26 bwhich is a unique numeric code, is generated for a user when the userenters the SST at the web site. This will avoid call transfers and menuoptions so that the user is routed directly to a specialist at theprovider site who will provide time help with the user system. A filelibrary 26 c functions as a repository of downloads, BIOS updatesdrivers and utilities for the user system. This allows the user to keeptheir system up-to-date at their convenience. These files may be groupedby system, file type, name and date posted. An order status function 26d provides current status of individual or multiple orders. Providerstaff members can retrieve order, production and ship dates directlyfrom an internal order management system in real time.

[0028] The secure area 28, FIG. 6 includes an account team roster 28 aand purchasing reports 28 b. The account team roster includes pagerlinks and allows direct user contact with account team provider members.There are four (4) different purchasing reports which are provided andregularly updated. Each report is viewable online or available fordownload in several formats. An order status and delivery report 28 cshows the user detailed information on all orders from pendingproduction status to invoiced status. An order detail by enterprise 28 dreport shows the detailed information on the units shipped and amountspent by product category for orders invoiced during a month. A summaryby enterprise report 28 e shows total units and spending by productcategory for the order invoiced during a month. Finally, a summary bylocation report 28 f shows total units and spending by product categoryfor each location in the user organization and includes only ordersinvoiced during a month.

[0029] The information area 30 includes links to the web site home andtips on how to use the web site as well as a feedback form to permit theuser to submit ideas to the provider concerning how to improve the website.

[0030] The browse area 32 provides easy access to the provider home pageas well as to select links on the web site which may be of interest tothe user.

[0031] The multi-access area 34, FIG. 7 has at least two (2) levels ofaccess, each of which is associated with the user ID and passwordmentioned above. One access area is referred to as a general access userID and password area 34 a and allows users to see everything at the website except for the secure area 28. The other access area is referred toas a managed access user ID and password area 34 b and allows users tosee everything at the site including the secure area 28. The managedarea may, if desired, be subdivided into multi-level access areas sothat a first level managed access user ID and password allows users tosee everything at the web site including a first portion 34 c of thesecure area 28 and a second level managed access user ID and passwordallows users to see everything at the web site including the first and asecond portion 34 c, 34 d, respectively, of the secure area 28. Providerteam members contact appropriate personnel at the user organization andprovide the URL and multi-level ID's and passwords as required for useraccess to the web site 12. An intranet manager at the user organizationcan add a link from the second user point 16 to the web site 12 and postthe general user ID and password next to the link for web site 12. Thiswill permit anyone at the second user point 16 to access the web site 12instead of having to recall a URL, user ID and password. The userorganization will be responsible for designating appropriate people atthe user organization to have the managed user ID and password usuallyreserved for a select group of users which may be defined by jobdescription, rank, title, etc.

[0032] The online NDA 36 is provided each time a user visits web site 12for the first time. After entering the URL for the organization web page18, the user will be prompted to view and accept the online NDA 36. Oncethe NDA 36 is accepted, the user's hard drive at the terminal being usedwill function so as not to prompt that particular user with the NDA 36again. However, each time a user accesses the organization web page 18from a different terminal at second user point 16 for the first time,the user will be prompted to accept the NDA 36, and upon accepting, theterminal being used will function so as not to prompt that particularuser with the NDA 36 again.

[0033] As it can be seen, the principal advantages of this embodimentare that the web site provides information which is continuously updatedby the provider and makes business purchases easier to initiate, manageand control for both the organization user/buyer and the provider/sellerand reduces purchasing and maintenance costs for both user and provider.In addition, direct relationships between user and provider are enhancedand supported from presales to post-sales. The provider is able tooff-load tasks such as order quoting and order status from the salesstaff so that they can spend more time selling product. The user isencouraged to do more transactions and information gathering onlinewhich is more efficient. A competitive advantage to the provider is thatthe user can conduct business with the provider in an easier, more costefficient manner. User satisfaction and loyalty is enhanced and newusers are attracted to this mode of purchasing from the provider.

[0034] Although illustrative embodiments have been shown and described,a wide range of modification, change and substitution is contemplated inthe foregoing disclosure and in some instances, some features of theembodiments may be employed without a corresponding use of otherfeatures. Accordingly, it is appropriate that the appended claims beconstrued broadly and in a manner consistent with the scope of theembodiments disclosed herein.

What is claimed is:
 1. An information system, comprising: avendor-managed web site for: receiving purchasing information from afirst terminal, including purchasing information that is customized fora customer, the customer including first and second users havingrespective first and second levels of authorized access to thepurchasing information, the first user being identified by a firstidentifier, and the second user being identified by a second identifier;and to a second terminal, providing access to: only a first portion ofthe purchasing information in response to receiving the first identifierfrom the second terminal which identifies the first user; and at least asecond portion of the purchasing information in response to receivingthe second identifier from the second terminal which identifies thesecond user, wherein the second portion includes at least a part of thefirst portion and a third portion of the purchasing information, whereinthe part of the first portion includes at least a portion of thecustomized purchasing information, and wherein the customized purchasinginformation includes a listing of configurations, so that the customerat the second terminal can submit an online order to the vendor-managedweb site in response to the configurations.
 2. The system of claim 1,wherein the first portion includes the portion of the customizedpurchasing information.
 3. The system of claim 1, wherein the firstportion includes a first portion of the customized purchasinginformation, and wherein the third portion includes a second portion ofthe customized purchasing information.
 4. The system of claim 1, whereinthe vendor-managed web site is for providing access to the secondterminal via a URL.
 5. The system of claim 4, wherein the URL is anunlisted URL.
 6. The system of claim 1, wherein the customizedpurchasing information includes status information related to the onlineorder.
 7. The system of claim 6, wherein the status information includesshipping data.
 8. The system of claim 1, wherein the vendor-managed website is for outputting a notification to the second terminal, so thatthe customer at the second terminal is notified of a shipment of theonline order.
 9. The system of claim 1, wherein the vendor-managed website is for providing access to the second terminal, so that thecustomer at the second terminal can enter an identifier for routing thecustomer to a specialist at the first terminal.
 10. The system of claim1, wherein the customized purchasing information includes a listing of ateam member at the first terminal, so that the customer at the secondterminal can access the listing for making contact with the team member.11. A method performed by an information system, the method comprising:at a vendor-managed web site, receiving purchasing information from afirst terminal, including purchasing information that is customized fora customer, the customer including first and second users havingrespective first and second levels of authorized access to thepurchasing information, the first user being identified by a firstidentifier, and the second user being identified by a second identifier;and to a second terminal, providing access at the vendor-managed website to: only a first portion of the purchasing information in responseto receiving the first identifier from the second terminal whichidentifies the first user; and at least a second portion of thepurchasing information in response to receiving the second identifierfrom the second terminal which identifies the second user, wherein thesecond portion includes at least a part of the first portion and a thirdportion of the purchasing information, wherein the part of the firstportion includes at least a portion of the customized purchasinginformation, and wherein the customized purchasing information includesa listing of configurations, so that the customer at the second terminalcan submit an online order to the vendor-managed web site in response tothe configurations.
 12. The method of claim 11, wherein the firstportion includes the portion of the customized purchasing information.13. The method of claim 11, wherein the first portion includes a firstportion of the customized purchasing information, and wherein the thirdportion includes a second portion of the customized purchasinginformation.
 14. The method of claim 11, wherein the providing accesscomprises: providing access to the second terminal via a URL.
 15. Themethod of claim 14, wherein the URL is an unlisted URL.
 16. The methodof claim 11, wherein the customized purchasing information includesstatus information related to the online order.
 17. The method of claim16, wherein the status information includes shipping data.
 18. Themethod of claim 11 and comprising: outputting a notification to thesecond terminal, so that the customer at the second terminal is notifiedof a shipment of the online order.
 19. The method of claim 11, whereinthe providing access comprises: providing access to the second terminal,so that the customer at the second terminal can enter an identifier forrouting the customer to a specialist at the first terminal.
 20. Themethod of claim 11, wherein the customized purchasing informationincludes a listing of a team member at the first terminal, so that thecustomer at the second terminal can access the listing for makingcontact with the team member.
 21. An information system, comprising: avendor-managed web site for: receiving purchasing information from afirst terminal, including purchasing information that is customized fora customer, the customer including first and second users havingrespective first and second levels of authorized access to thepurchasing information, the first user being identified by a firstidentifier, and the second user being identified by a second identifier;and to a second terminal, providing access to: only a first portion ofthe purchasing information in response to receiving the first identifierfrom the second terminal which identifies the first user; and at least asecond portion of the purchasing information in response to receivingthe second identifier from the second terminal which identifies thesecond user, wherein the second portion includes at least a part of thefirst portion and a third portion of the purchasing information, whereinthe part of the first portion includes at least a portion of thecustomized purchasing information, and wherein the first identifierincludes a first user identifier and a first password, and wherein thesecond identifier includes a second user identifier and a secondpassword.
 22. The system of claim 21, wherein the first portion includesthe portion of the customized purchasing information.
 23. The system ofclaim 21, wherein the first portion includes a first portion of thecustomized purchasing information, and wherein the third portionincludes a second portion of the customized purchasing information. 24.The system of claim 21, wherein the vendor-managed web site is forproviding access to the second terminal via a URL.
 25. The system ofclaim 24, wherein the URL is an unlisted URL.
 26. The system of claim21, wherein the customized purchasing information includes statusinformation related to the online order.
 27. The system of claim 26,wherein the status information includes shipping data.
 28. The system ofclaim 21, wherein the vendor-managed web site is for outputting anotification to the second terminal, so that the customer at the secondterminal is notified of a shipment of the online order.
 29. The systemof claim 21, wherein the vendor-managed web site is for providing accessto the second terminal, so that the customer at the second terminal canenter an identifier for routing the customer to a specialist at thefirst terminal.
 30. The system of claim 21, wherein the customizedpurchasing information includes a listing of a team member at the firstterminal, so that the customer at the second terminal can access thelisting for making contact with the team member.
 31. A method performedby an information system, the method comprising: at a vendor-managed website, receiving purchasing information from a first terminal, includingpurchasing information that is customized for a customer, the customerincluding first and second users having respective first and secondlevels of authorized access to the purchasing information, the firstuser being identified by a first identifier, and the second user beingidentified by a second identifier; and to a second terminal, providingaccess at the vendor-managed web site to: only a first portion of thepurchasing information in response to receiving the first identifierfrom the second terminal which identifies the first user; and at least asecond portion of the purchasing information in response to receivingthe second identifier from the second terminal which identifies thesecond user, wherein the second portion includes at least a part of thefirst portion and a third portion of the purchasing information, whereinthe part of the first portion includes at least a portion of thecustomized purchasing information, and wherein the first identifierincludes a first user identifier and a first password, and wherein thesecond identifier includes a second user identifier and a secondpassword.
 32. The method of claim 31, wherein the first portion includesthe portion of the customized purchasing information.
 33. The method ofclaim 31, wherein the first portion includes a first portion of thecustomized purchasing information, and wherein the third portionincludes a second portion of the customized purchasing information. 34.The method of claim 31, wherein the providing access comprises:providing access to the second terminal via a URL.
 35. The method ofclaim 34, wherein the URL is an unlisted URL.
 36. The method of claim31, wherein the customized purchasing information includes statusinformation related to the online order.
 37. The method of claim 36,wherein the status information includes shipping data.
 38. The method ofclaim 31 and comprising: outputting a notification to the secondterminal, so that the customer at the second terminal is notified of ashipment of the online order.
 39. The method of claim 31, wherein theproviding access comprises: providing access to the second terminal, sothat the customer at the second terminal can enter an identifier forrouting the customer to a specialist at the first terminal.
 40. Themethod of claim 31, wherein the customized purchasing informationincludes a listing of a team member at the first terminal, so that thecustomer at the second terminal can access the listing for makingcontact with the team member.