Method and system for supporting secure transactions in a peer-to-peer network

ABSTRACT

At least two computer systems in a peer-to-peer network are utilized to support a secure transaction. Aspects of the present invention include allowing a shopper to create an order to purchase an item stored on a first computer system in the peer-to-peer network, and after the order is created, passing the order and control from the first computer system to a second computer system in the peer-to-peer network. The second computer system establishes a secure transaction session with the shopper, and then proceeds to process the order.

CROSS-REFERENCE TO RELATED APPLICATION

The present application is a continuation of U.S. patent applicationSer. No. 10/954,930, filed on Sep. 30, 2004, the disclosure of which ishereby incorporated by reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of Invention

The present invention relates to peer-to-peer networks, and moreparticularly to a method and system for supporting secure transactionsin a peer-to-peer network.

2. Description of the Related Art

Over the past several years, photosharing has become widely accepted byphoto enthusiasts. Many websites currently exist that allow users toupload digital images to the website, where they are stored on a serverand viewable by others over the Internet. Photosharing websites alsoallow a shopper to purchase digital images stored in the server, as wellas other products based on the digital images, such as greeting cards,coffee mugs, mouse pads, and T-shirts, on which a selected image isimprinted.

This approach to photosharing and e-commerce, however, presents somedisadvantages. In particular, users are required to upload digitalimages to the website, which can be time consuming, and the websiterequires extensive storage capacity to store the images of all theusers, which can become expensive.

To address some of these concerns, the assignee of the present inventionhas developed a web-based peer-to-peer photosharing environment in whichall workstations and computers (peers) in the network store imageslocally and act as servers to other users on the network. A central siteaccessible by all the peers provides additional functionality, such ascoordinating the peers, providing search capabilities for the peers,purchase order fulfillment, etc.

Each peer computer includes a peer application, which when executed,enables the peer computer to communicate with other peers and with aserver at the central site via a network, such as the Internet. The peerapplication also allows the user to perform operations locally, such asbrowsing thumbnail images and creating greeting cards with selectedimages.

While the peer-to-peer environment provides many advantages forphotosharing, shopping in such an environment presents challenges. Eachpeer that wishes to sell products based on its digital assets must beequipped, at a minimum, to transmit digital assets selected by a shopperto the shopper, collect and authenticate the shopper's financialinformation, assure the shopper that it is authentic typically byproviding a digital certificate, and securely manage the shopper'sconfidential information. Providing this capability can be expensive andcan require significant resources. For example, procuring andmaintaining a digital certificate alone can cost hundreds of dollarseach year.

Accordingly, what is needed is an improved method and system for secureshopping in a peer-to-peer network. The present invention addresses sucha need.

BRIEF SUMMARY OF THE INVENTION

The present invention provides a method and system for supporting asecure transaction in a peer-to-peer network. Aspects of the presentinvention include allowing a shopper to create an order to purchase oneor more digital assets stored on a first computer system in thepeer-to-peer network, and after the order is created, passing the orderand control from the first computer system to a second computer systemin the peer-to-peer network. The second computer system establishes asecure transaction session with the shopper, and then proceeds toprocess the order.

In another aspect of the present invention, after the second computersystem establishes the secure transaction session, it invokes an assetupload web service on the first computer system and passes informationrelated to the assets in the order it is processing. The asset uploadweb service receives the information and retrieves and uploads theassets to the second computer system.

BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is a block diagram illustrating a peer-to-peer (P2P) network inaccordance with a preferred embodiment.

FIG. 2 is a block diagram illustrating the peer computer according to apreferred embodiment of the present invention.

FIG. 3 is an overview flowchart illustrating a method for performing asecure transaction in a peer-to-peer network according to a preferredembodiment of the present invention.

FIG. 4 is a flowchart illustrating a method for creating an order forimages stored in a peer computer according to a preferred embodiment ofthe present invention.

FIG. 5 is a flowchart illustrating a process for initiating a securetransaction session and collecting a shopper's financial information bya peer network server according to a preferred embodiment of the presentinvention.

FIG. 6 is a flowchart illustrating a process for uploading selectedimages from the peer computer to the peer network server according to apreferred embodiment of the present invention.

FIG. 7 is a flowchart illustrating a method for processing the order inthe peer network server according to a preferred embodiment of thepresent invention.

FIG. 8 is a flowchart illustrating a process for notifying a shopperabout the order by the peer network server according to a preferredembodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

The present invention relates to peer-to-peer networks, and moreparticularly to a method and system for supporting a secure transactionin a peer-to-peer network. The following description is presented toenable one of ordinary skill in the art to make and use the inventionand is provided in the context of a patent application and itsrequirements. Various modifications to the preferred embodiments and thegeneric principles and features described herein will be readilyapparent to those skilled in the art. Thus, the present invention is notintended to be limited to the embodiments shown but is to be accordedthe widest scope consistent with the principles and features describedherein.

The present invention provides a method and system for supporting asecure transaction in a peer-to-peer network. In the present invention,first and second computer systems in a peer-to-peer network, indifferent locations and in different domains, cooperate to allow ashopper to perform a secure transaction over the Internet. The shoppercan either be using one of the two computer systems or using a thirdcomputer system. In a preferred embodiment, the shopper chooses topurchase digital assets, e.g., images, stored in the first computersystem and places the selected images in a shopping cart provided by thesecond computer system, which preferably is located at a central siteaccessible by all the peers. When the shopper is ready to complete thetransaction, the shopper provides his or her authentication informationand financial information to the second computer system after the secondcomputer system has presented credentials verifying its authenticity tothe shopper. The selected images are then uploaded from the firstcomputer system to the second computer system where the shopper's orderis fulfilled.

By utilizing the second computer system to provide a secure transactionenvironment for the shopper, secure transactional operations arecentralized in one computer system, while the storing and sharingdigital assets are distributed among the other peer computer systems inthe peer-to-peer network. The second computer system maintains a securetransaction session with the shopper, who is assured that the entitythat is receiving the shopper's confidential information is indeedauthentic and capable of securely managing this sensitive information.Sensitive financial and authentication information for a shopper isstored in the second computer system so that the shopper is not requiredto provide such information to one or more peer computer systems, whichmay or may not be equipped to adequately protect the information.Meanwhile, the peer computer systems are free to concentrate only onstoring and sharing images with other peers and guests.

FIG. 1 is a block diagram illustrating a peer-to-peer (P2P) network inaccordance with a preferred embodiment. According to the presentinvention, the network 10 includes a central site 12 and multiple peercomputers 16, 16′ (collectively referred to as peers 16). The centralsite 12 includes a peer network server (PNS) 22, which providessupporting services to the peers 16. Each peer 16, 16′ includes a webbrowser 18, a web server 20 and images 15, 15′. In a preferredembodiment, a peer 16 uses its web browser 18 to communicate with itsweb server 20 and to communicate with the PNS 22 on the central site 12,via a network such as the Internet. In addition, the peers 16, 16′ cancommunicate with one another via the central site 12 and can share theirrespective images 15, 15′ with each other, as well as with a visitingcomputer 30, i.e., a computer that is not a member of the peer-to-peernetwork 10.

In a preferred embodiment, the web server 20 in the peer 16 and the PNS22, are implemented using Model, View and Control (MVC) architecture.The MVC model is well known to those skilled in the art of websitedesigning and generally partitions the model (i.e., data operations)from the view (i.e., display operations), and routes requests through acontroller.

FIG. 2 is a block diagram illustrating in more detail the peer computer16 according to a preferred embodiment of the present invention, wheresimilar components are identified by similar reference numerals. The webserver 20 includes a view module 121, a model module 123 and acontroller module 122. The view module 121 performs display operations,the model module 123 stores and organizes data in a database 126, andthe controller module 122 performs user requested operations. Thecontroller module 122 includes a plurality of action handlers 124, eachof which is configured to perform a specific user operation.

In operation, the web browser 18 submits a request to the web server 20to perform a user operation. The request is handled by the controller122, which invokes the appropriate action handler 124 to perform theuser operation. The action handler 124 performs the operation and storesthe result in the model module 123. The controller module 122initializes a result page 125 in the view module 121, which retrievesthe result stored in the model module 123, and the view module 121renders the result in the result page 125.

An action handler 124 can perform a user operation locally if allrequired resources are available on the peer 16. In addition, in apeer-to-peer network, an action handler 124 can perform a user operationthat invokes a service residing in another computer system in thenetwork, typically, the PNS 22. Under such circumstances, the actionhandler 124 passes control from the local peer 16 to the PNS 22, wherethe service is invoked.

According to the preferred embodiment of the present invention, actionhandlers 124 in the peer 16 interact with the PNS 22 to facilitate asecure transaction for purchasing images stored in the peer 16. Inparticular, the PNS 22 provides a shopping cart service 24 for allowinga shopper to select and place images into a virtual shopping cart, andaction handlers that collect financial information for the shopper,process orders and notify shoppers about their orders.

FIG. 3 is an overview flowchart illustrating a method for performing asecure transaction in a peer-to-peer network according to a preferredembodiment of the present invention. Referring to FIG. 1 and FIG. 3, theprocess begins when a shopper 50 creates an order based on images 15stored in a peer computer 16 (step 300). In a preferred embodiment, theshopper 50 can either be the peer owner 16 or a guest utilizing avisiting computer 30. In the later case, the visiting computer 30accesses the images 15 in the peer computer 16 via the PNS 22.

According to the preferred embodiment of the present invention, when theshopper 50 is ready to complete the order, the peer 16 passes control tothe PNS 22, which calls an action handler to establish a securetransaction session and to collect the shopper's financial information(step 302). The PNS 22 then invokes an image upload service 11 in thepeer 16 and passes control back to the peer 16, which uploads theselected images 15 to the PNS 22 (step 304). Once the selected images 15are uploaded, the peer 16 passes control back to the PNS 22, which callsanother action handler to process the order (step 306).

Each step (300-306) of the secure transaction process is described inmore detail with reference to the following FIGS. 4-7. FIG. 4 is aflowchart illustrating a method for creating an order for images 15stored in a peer computer 16 (step 300) according to a preferredembodiment of the present invention. Referring again to FIG. 1, FIG. 2and FIG. 4, the process begins by displaying to the shopper 50 images 15stored on the peer computer 16 (step 400). In a preferred embodiment,the web browser 18 displays a page 125 that includes thumbnails of theimages 15. From this page 125, the shopper 50 is allowed to select oneor more images 15 (step 402).

When images 15 are selected, an action handler 124 in the peer computer16 invokes a shopping cart web service in the PNS 22 that allows theshopper 50 to add the selected images 15 to a shopping cart 24 (step404) and passes control to the PNS 22. In a preferred embodiment,pointers associated with each selected image 15 are transmitted to thePNS 22 and the full resolution images 16 remain on the peer 16.

After the selected images 15 have been added to the shopping cart 24,the PNS 22 serves a web page to the browser 20 displaying the contentsof the shopping cart 24 to the shopper 50 (step 406). The shopper 50 isallowed to select the size, quantity, and finish for each image (step408), or to modify the contents of the shopping cart 24, e.g., bydeleting one or more images 15. In response, the PNS 22 updates theshopping cart 24 and displays the updated shopping cart 24 to theshopper 50 (step 410).

If the shopper 50 is finished creating the order and is ready for checkout (step 412), the PNS 22 proceeds to a check out process (step 414),e.g., establishing a secure transaction session and collecting financialinformation for the shopper 50. Otherwise, if the shopper 50 is notready for check out, the PNS 22 passes control back to the peer 16 andthe shopper 50 continues shopping (step 416), i.e., steps 400-412 arerepeated.

FIG. 5 is a flowchart illustrating the process for establishing thesecure transaction session and collecting the shopper's information bythe peer network server 22 according to a preferred embodiment of thepresent invention. Referring to FIG. 1, FIG. 2 and FIG. 5, when theshopper is ready to check out, the PNS 22 serves a log-on page to theshopper 50, which prompts the shopper 50 for authentication information(step 500). In a preferred embodiment, the shopper 50 is requested toenter a userID and a password. If the shopper 50 does not have anaccount with the PNS 22 (step 502), i.e., the shopper 50 has notregistered with the PNS 22, the shopper 50 is asked to register (step504) by providing authentication information and other shopperinformation. The shopper's information 27, including the authenticationinformation, is stored in the PNS 22 (step 506) and steps 500-502 arerepeated.

Once the shopper 50 is registered, i.e., the shopper 50 has an existingaccount, and submits authentication information (step 500), the PNS 22authenticates the shopper 50, presents its digital certificate 28 toassure the shopper 50 that the PNS 22 is authentic, and establishes asecure transaction session between the shopper's computer 16, 30 and thePNS 22 (step 508). The establishment of the secure transaction sessionis well known to those skilled in the art and can be performed in anumber of ways.

After the secure transaction session is established, the PNS 22 serves abilling and shipping page that allows the shopper 50 to providefinancial information (step 510), such as a credit card number, and abilling address. In a preferred embodiment, the shopper 50 is allowed tostore his or her financial information in the PNS 22, so that for futuretransactions, the shopper can choose to automatically populate thebilling and shipping page with the shopper's stored financialinformation and billing address.

The PNS 22 checks the billing and shipping page for any errors. Forexample, an error might include omitting the shopper's zip code or phonenumber. If an error is found (step 512), the shopper 50 prompted tocorrect the error (step 513). If the billing and shipping page is errorfree, the PNS 22 serves an order summary page to the shopper 50 (step514). In the preferred embodiment, the order summary page shows thetotal cost of the order, including shipping and taxes, and a detaileddescription of the items in the shopping cart being purchased. The ordersummary page allows the shopper 50 to submit the order if the shopper 50is ready.

If the shopper 50 is not ready to submit the order (step 516), forexample because the shopper 50 wants to delete items from the shoppingcart 24, the PNS 22 allows the shopper 50 to update the cart (step 410,FIG. 4). If the shopper 50 is ready to submit the order, the PNS 22reserves on the shopper's credit cart an amount equal to the cost of theorder (step 518), but does not yet debit the credit card.

The PNS 22 then invokes an asset upload web service 11 on the peer 16and passes control to the peer 16 along with order details, e.g., theidentifier to each image 15 selected by the shopper 50, for the order(step 520). The functionality of the asset upload web service 11 isdescribed below with reference to FIG. 6.

After control and the order details have been passed to the peer 16, thePNS 22 independently serves a confirmation page to the shopper 50 thatpreferably informs the shopper 50 that the order has been submitted,provides an order identifier for tracking and identification purposes,and terminates the secure transaction session (step 522). The PNS 22then places the order in a notification queue 26 (step 524) for lateruse (described below).

FIG. 6 is a flowchart illustrating the process for uploading images 15from the peer 16 to the PNS 22 according to a preferred embodiment ofthe present invention. This process is preferably performed by the assetupload web service 11 on the peer 16 when it is invoked by the PNS 22,e.g., step 520 (FIG. 5). Referring to FIG. 1 and FIG. 6, when the peer16 receives order details for an order from the PNS 22, it places theorder details in an upload queue 13 (step 600). This is necessaryparticularly when the images 15 for another order are being uploadedwhen the order details for the present order are received.

Eventually, the image upload service 11 retrieves the order from theupload queue 13 (step 602), and retrieves a first image 15 for the order(step 604). The image 15 is uploaded to the PNS 22 (step 606) and ifmore images are in the order (step 608), they too are retrievedindividually (step 609) and uploaded to the PNS 22 (step 606).

When all images 15 in the order have been uploaded, the asset uploadservice 11 notifies the PNS 22 that the order upload is completed andpasses control to the PNS 22 (step 610). The asset image upload webservice 11 then removes the order from the upload queue 13 (step 611),and if more orders are in the upload queue 13 (step 612), the imageupload web service 11 repeats steps 602-610. When the upload queue 13 isempty, the image upload web service 11 waits to be invoked again by thePNS 22 (step 614).

As stated above, after all of the images 15 in an order have beenuploaded to the PNS 22, the peer 16 notifies the PNS 22 that the uploadis completed and passes control to the PNS 22 (step 610). When the PNS22 receives this notification, the PNS 22 continues to process theorder.

FIG. 7 is a flowchart illustrating a method for processing the order inthe PNS 22 after the images have been uploaded according to a preferredembodiment of the present invention. Referring again to FIG. 1 and FIG.7, the PNS 22 receives the notification from the peer 16 that the orderupload is complete (step 700). As stated above, the PNS 22 stores theorder in the notification queue 26 after the shopper 50 submits theorder (step 516, FIG. 5). After the PNS 22 receives the notification,the PNS 22 stores an indicator that the order upload for the order hasbeen completed with the order in the notification queue 26 (step 702).For example, the indicator can be a flag associated with the order inthe queue 26. The indicator is utilized by the PNS 22 to perform anotification function that will be described below with respect to FIG.8.

When all of the images 15 in the order have been uploaded, the PNS 22transmits the order along with the images 15 to a fulfillment site 40for completing the order (step 704), e.g., creating prints 42 of theimages 15 or creating a product 44, such as a greeting card, based onthe images 15. The PNS 22 now debits the shopper's credit card for thecost of the order (step 706).

As indicated above, in a preferred embodiment, the PNS 22 also performsa notification function, which is performed by a notification thread 25.The notification thread 25 automatically runs at given time intervalsand provides information to the shopper 50 about pending order(s).

FIG. 8 is a flowchart illustrating a process for notifying a shopperabout the order by the PNS 22 according to a preferred embodiment of thepresent invention. Referring again to FIG. 1 and FIG. 8, the processbegins when the notification thread 25 in the PNS 22 is invoked (step800). Once invoked, the notification thread 25 retrieves an order fromthe notification queue 26 (step 802), and determines whether all theimages 15 in the order have been uploaded from the peer 16 to the PNS 22(step 804), i.e., whether the upload order for the order has beencompleted. For example, the notification thread 25 checks for theindicator associated with the order, and if the indicator is notpresent, the notification thread 25 concludes that the upload order isnot complete.

If all of the images 15 in the order have been uploaded to the PNS 22(step 804), the notification thread 25 notifies the shopper 50 that theimages 15 in the order have been uploaded and that the order is beingcompleted (step 805). The notification thread 25 then removes the orderfrom the queue 26 (step 806). If more orders are in the queue (step807), the notification thread 25 repeats the process for the next order(step 802 et seq.). Otherwise, the notification thread 25 terminates(step 808).

If all of the images 15 in the order have not been uploaded (step 804),then the notification thread 25 determines whether any new images 15have been uploaded during a predetermined time period (step 810). If nonew images have been uploaded, the notification thread 25 informs theshopper 50 that the order upload has been delayed (step 812), forexample because the peer 16 has been turned off. If new images 15 havebeen uploaded, the notification thread 25 moves on the next order, ifone exists (step 807), and repeats the process starting at step 802. Bydetermining whether any new images 15 have been uploaded during the timeperiod (step 810), the notification thread 25 avoids sending a delaymessage to the shopper 50 if the number of images 15 that are beinguploaded is so large that the time required for completing the uploadingprocess exceeds one or more cycles of the notification thread 25.

As stated above, if the order upload has been delayed, the notificationthread 25 sends a message to the shopper 50 indicating that the orderupload is being delayed (step 812). In addition, the notification thread25 determines whether the shopper 50 is the peer owner (step 814). Ifthe shopper 50 is not the peer owner, i.e., the shopper 50 is a guestutilizing another peer 16′ or a visiting computer 30, then thenotification thread 25 asks the peer owner to turn the peer 16 on inorder for the images 15 to be uploaded (step 816). Otherwise, thenotification thread 25 moves on the next order, if one exists (step807), and repeats the process starting at step 802.

The present invention provides a method and system for supporting asecure transaction in a peer-to-peer network. In a preferred embodiment,first and second computer systems in a peer-to-peer network, indifferent locations and in different domains, cooperate to facilitate asecure transaction based on digital assets, e.g., images, stored in thefirst computer system. The second computer system is utilized to providea shopping cart for a shopper and to establish a secure transactionsession during which the shopper provides financial information. Thefirst computer system uploads images selected by the shopper to thesecond computer system, which then processes shopper's order andnotifies the shopper when the order is being completed.

By utilizing the second computer system to host the shopping cartservice and to provide a secure transaction environment with theshopper, transactional operations are centralized. Sensitive financialand authentication information for a shopper is stored in a centralcomputer system, i.e., the second computer system, so that the shopperis not required to register with one or more peers computer systems,which may or may not be equipped to adequately protect the information.The first computer system, typically a peer computer system, is free toconcentrate only on storing and sharing images with other peers andguests.

The present invention has been described in accordance with theembodiments shown, and one of ordinary skill in the art will readilyrecognize that there could be variations to the embodiments, and anyvariations would be within the spirit and scope of the presentinvention. Accordingly, many modifications may be made by one ofordinary skill in the art without departing from the spirit and scope ofthe appended claims.

1. A method of centralizing secure transactions in a peer-to-peernetwork comprising: receiving at a peer network server in thepeer-to-peer network an order to purchase an item stored on a firstcomputer system in the peer-to-peer network, where a shoppercommunicating with the first computer system created the order;receiving control of processing the order from the first computer systemat the peer network server; establishing a secure transaction sessionbetween the peer network server and the shopper; and processing theorder.
 2. The method of claim 1, wherein the item is based on a digitalasset.
 3. The method of claim 2, wherein the digital asset is at leastone of a digital image, a song, or a video.
 4. The method of claim 2,wherein a product is created with the digital asset.
 5. The method ofclaim 1, wherein establishing the secure transaction session includesauthenticating the shopper and presenting to the shopper a certificateverifying the authenticity of the peer network server.
 6. The method ofclaim 1 further including after establishing the secure transactionsession, collecting, by the peer network server, information associatedwith the shopper, wherein the information associated with the shopperincludes a credit card number associated with the shopper and a billingaddress associated with the shopper.
 7. The method of claim 1 furtherincluding providing an asset upload web service on the first computersystem for uploading the item from the first computer system to the peernetwork server.
 8. The method of claim 7, wherein processing the orderincludes invoking the upload web service by the peer network server andpassing control of processing the order and order details to the uploadweb service, wherein the order details include information related tothe item in the order.
 9. The method of claim 8 wherein processing theorder further includes retrieving and uploading the item in the orderfrom the first computer system to the peer network server.
 10. Acomputer readable medium containing program instructions forcentralizing secure transactions in a peer-to-peer network comprisinginstructions for: at a peer network server communicating with peers inthe peer-to-peer network, i) receiving an order to purchase an itemstored on a first computer system in the peer-to-peer network, where ashopper communicating with the first computer system created the order;ii) receiving control of processing the order from the first computersystem; iii) establishing a secure transaction session between the peernetwork server and the shopper; and iv) processing the order.
 11. Thecomputer readable medium of claim 10, wherein the item is based on adigital asset.
 12. The computer readable medium of claim 11, wherein thedigital asset is at least one of a digital image, a song, or a video.13. The computer readable medium of claim 11, wherein a product iscreated with the digital asset.
 14. The computer readable medium ofclaim 10, wherein establishing the secure transaction session includesauthenticating the shopper and presenting to the shopper a certificateverifying the authenticity of the peer network server.
 15. The computerreadable medium of claim 10 further including after establishing thesecure transaction session, collecting, by the peer network server,information associated with the shopper, wherein the informationassociated with the shopper includes a credit card number associatedwith the shopper and a billing address associated with the shopper. 16.The computer readable medium of claim 10 further including providing anasset upload web service on the first computer system for uploading theitem from the first computer system to the peer network server.
 17. Thecomputer readable medium of claim 16, wherein processing the orderincludes invoking the upload web service by the peer network server andpassing control of processing the order and order details to the uploadweb service, wherein the order details include information related tothe item in the order.
 18. The computer readable medium of claim 17wherein processing the order further includes retrieving and uploadingthe item in the order from the first computer system to the peer networkserver.
 19. A peer network server for communicating with peers in apeer-to-peer network wherein the peer network server is adapted to: i)receive an order to purchase an item stored on a first computer systemin the peer-to-peer network, where a shopper communicating with thefirst computer system created the order; ii) receive control ofprocessing the order from the first computer system; iii) establish asecure transaction between the peer network server and the shopper; andiv) process the order.
 20. The peer network server of claim 19, whereinthe item is based on a digital asset.
 21. The peer network server ofclaim 20, wherein the digital asset is at least one of a digital image,a song, or a video.
 22. The peer network server of claim 20, wherein aproduct is created with the digital asset.
 23. The peer network serverof claim 19, wherein establishing the secure transaction sessionincludes authenticating the shopper and presenting to the shopper acertificate verifying the authenticity of the peer network server. 24.The peer network server of claim 19 further including after establishingthe secure transaction session, collecting, by the peer network server,information associated with the shopper, wherein the informationassociated with the shopper includes a credit card number associatedwith the shopper and a billing address associated with the shopper. 25.The peer network server of claim 19 further including providing an assetupload web service on the first computer system for uploading the itemfrom the first computer system to the peer network server.
 26. The peernetwork server of claim 25, wherein processing the order includesinvoking the upload web service by the peer network server and passingcontrol of processing the order and order details to the upload webservice, wherein the order details include information related to theitem in the order.
 27. The peer network server of claim 26 whereinprocessing the order further includes retrieving and uploading the itemin the order from the first computer system to the peer network server.