Methods for secure internet purchases

ABSTRACT

Methods for purchasing of goods or services over the internet. A customer has a customer account set up at a bank with associated account information. The account information includes verification information for verification parameters, such as authorized computer identification, authorized delivery addresses, authorized user identification, authorized telephone caller identification, and/or other account information. An order is placed by a user via an ordering computer which provides order information. Such order information includes verification variables used by the bank. Verification and/or authentication using one or more variables of the customer account information is used by the bank to validate the order before assuring payment to the merchant.

CROSS-REFERENCE TO RELATED CASES

This is a continuation of U.S. patent application Ser. Nos. 11/325,638and 11/324,832 both filed Jan. 3, 2006; which were continuations of U.S.patent application Ser. No. 09/669,335 filed Sep. 25, 2000, now U.S.Pat. No. 7,006,986 issued February 2006. Priority under 35 U.S.C. §120is hereby claimed and such documents are all hereby incorporated hereinin their entireties.

TECHNICAL FIELD

The technical field of this invention is methods and systems forpurchasing on the internet or other global computer information networkwithout need for transferring charge card numbers or similar sensitivefinancial or personal account information during the purchasetransaction.

BACKGROUND OF THE INVENTION Internet Purchase Transactions

The volume of commercial transactions being conducted by communicationover the internet has grown dramatically. These transactions typicallyinclude placement of orders by purchasers using a merchant or pluralmerchants who are paid by one or more credit card companies or banksusing credit or debit accounts. This trend will continue and the volumeof purchase transactions conducted over the internet will increase,probably at an accelerating rate.

A typical internet purchase transaction includes an order which isplaced with a merchant. The order information is assembled by thecustomer, typically using the customer's name. If the customer is acompany or other organization, then the order will include both thecompany name and the name of the person who is using the computer. Suchuser names are also included to better process the order and providegreater accountability.

The home address, business address, or other mailing and/or billingaddresses are frequently required by the merchant during the ordersession to create an order file. Also included as part of the orderinformation is the shipping or delivery address. If the order is forshipment to a third party, then the shipping or delivery address isdifferent from the customer address.

Order Response Communication

Internet purchasers are also typically invited to provide an emailaddress to which an order response communication can be sent.Alternative order response communications can be used, such as phone,letter or other. The order response communication is most often in theform of a confirmation communication providing the customer withpertinent transaction information and a message which reassures thecustomer that the order has been successfully communicated and is beingprocessed.

Additional information which may be gathered in connection with aninternet purchase may include telephone contact information, purchaseorder numbers, invoice numbers and additional billing or customerinformation.

In most internet purchase transactions the order is processed and paidusing a bank credit or debit card. The information provided by thecustomer includes an account number, card expiration date, card holder'sname and the type of card being used. The charges for the order areposted against the customer account number as a charge entry or entries.These entries can be either a credit charge entry or a debit chargeentry, depending on whether the charge account is a credit card accountor a debit card account.

Placement of orders for internet purchasing using charge card accountsis now widely conducted using the limited information justdescribed—account name, account number, and expiration date. Thisinformation is available on the face of most charge cards. Because ofthis, it is relatively easy for a thief using a stolen charge card topurchase items over the internet. The frequency of internet charge cardfraud is increasing and the associated costs are also rising. Whetherthe order is authentic or a fraud is almost impossible to determineunless the charge card has been reported as stolen and been deactivated.

Initial Processing by Merchant

After an internet purchase order is placed, the merchant then undertakesinitial processing of the order. Initial processing includes amerchant's review of the requested goods or services to determinewhether the order can be properly processed and whether the orderedgoods or services can be provided to the purchasing customer. Thisinitial processing varies from one merchant to another.

A common initial processing sequence is for the merchant to firstanalyze the customer purchase order file to see if all necessaryinformation has been provided. This can be done while the customer is inactive communication with the merchant over the internet. Alternatively,the customer order can be checked or double checked after the customer'ssession with the merchant's web site has been completed. The order filereview performed by the merchant checks for completeness to make surethat sufficient information has been provided for the merchant's furtherreview and processing of the customer's order.

The merchant's initial processing of an order usually leads to aninitial order response communication. The initial order responsecommunication can be in various forms and is used to communicate resultsof the initial processing analysis. For example, the initial orderresponse may communicate confirmation of the order, a query foradditional information, or a refusal that declines the order or explainssome other alternative.

Initial order processing by a merchant may also include inventoryreview. Such inventory review analysis considers the merchant'sinventory of goods or resources available for providing services. Thisis assessed against previous orders to determine if and when the ordereditems can be provided.

Another step or phase of initial processing may include paymentassessment. Payment assessment of an internet order is performed todetermine whether the customer has adequately arranged for or providedpayment for the ordered items. The merchant considers the paymentinformation contained in the order and then decides whether to accept orreject the order on this assessment.

One widespread form of payment assessment involves orders placed usingcredit or debit cards as the means for payment. The customer providessensitive charge account information via the internet as explainedabove. This information is then used by the merchant to determinewhether the customer's account can be charged for the ordered items topay the merchant. The ordered items may be goods, services or acombination of goods and services.

Prior Art Communication of Account Information

The current practice involves not only the communication of sensitiveaccount information between the customer and merchant when the order isinitially placed, but also the secondary retransmission of this accountinformation between the merchant and the bank card company. The order isusually accepted by the merchant after receiving charge authorizationfrom credit card companies, such as VISA™, MASTERCARD™, DISCOVER™, andAMERICAN EXPRESS™, or processing companies working in their behalf orservice. The established approach involves two or more transmissions ofthe customer account name, account number, expiration date of card, andthe amount to be charged to the customer's account for the ordereditems.

Dishonored Bank Card Account Transactions

Submission of charge requests to the bank card processors forauthorization does not necessarily result in a merchant receiving actualpayment. Most businesses receive the customer order and submit a requestto the bank card processors for authorization to charge a particularcustomer's account. In some cases this involves two separate queries bythe merchant.

In reviewing a charge request, a first analysis is performed by the bankcard processor to determine if the account is valid and active. In asecond query, the bank card company or another related bank cardprocessor performs a second analysis to determine if the account hassufficient credit or funds. Both of these queries can also be performedin a single request to a single processing operation serving themerchant or charge card company being used.

The bank card processor responds to the merchant's request forauthorization at the time of submission of the authorization request.This can be at or near the time the order is placed or the saletransaction is being conducted. The submission of an authorization canalso occur at a later time, particularly when the merchant is takingnumerous orders at a substantial frequency. Depending upon themerchant's business, an authorization request or requests can also beroutinely submitted later. For example, telephone orders can beprocessed later in the day or next day, and/or prior to shipment of thegoods or rendition of the services.

Surprisingly, although a merchant may receive a positive authorizationto charge from the charge card processing company, this does not insurethe merchant will actually be paid on the transaction. This uncertaintyarises because merchants submit their charge card sales to a designatedprocessing bank for payment to the merchant's account. This is usuallydone in the form of an electronic file which is submitted hours or evendays after the authorization request may have been submitted by themerchant, and approved by the bank card processor. The actual requestsfor payment are submitted usually at the end of the business day, butcan be at various times.

Whatever the merchant's practice, there is an inherent delay between thetime the request for authorization to charge is approved and the timethe merchant makes an actual demand for payment. The demand for paymentis made at the time such demand is processed at the merchant'sprocessing bank. Under the terms of the merchant's agreement with thebank card company, the charge may or may not be paid. For example, ifother merchants or banks have in the meantime requested payment oradvanced cash so that the customer's account has reached its availablecredit limit or account balance, then the merchant's demand for paymentmay be dishonored even though it was previously authorized. Depending onthe circumstances, the merchant may end up being paid later or never.Merchant's suffering such dishonored charge transactions aredissatisfied since authorization was given to charge against theaccount. Nonetheless, the terms of the merchant's agreement with thecharge card company will be determinative, and many or most cardcompanies have the ability to dishonor a charge if the account exceedsthe available credit limit or account balance.

The merchant's decision as a result of the initial processing is mostfrequently to accept the order. However, the initial processing may belengthened in some situations because a merchant may await irrevocablepayment from the merchant's processing bank before shipment of goods.This can be done to avoid the risk that the charge transaction will bedishonored or paid late. However, it has the disadvantage of increasingthe time between order and shipment. This delay to avoid dishonor mayend up hurting the merchant's business in a general manner because ofnegative effects on responsiveness and business volume. This may beincurred to address the problem of dishonored charges.

Order Acceptance by Merchant

For internet purchase transactions, whether the merchant's initialprocessing response is acceptance, rejection, or request for additionalinformation, a response is usually communicated by the merchant to thecustomer in a relatively short period of time, usually less than 1-2days. This initial processing response communication can be done in anumber of suitable ways. Most typically, the merchant's initialprocessing response is communicated by sending an email to the customer.

Although a variety of formats are used for merchant initial processingresponses, the responses usually involve sending a confirmation that theorder has been received and accepted. An invoice or other transactioncontrol number is usually assigned. The merchant also typicallyindicates that shipment has or will occur on or about an expectedshipping date. Alternatively, the confirmation may state the customershould expect delivery at the delivery address on or about a certaindelivery date.

Electronic Commerce Fraud

A substantial amount of effort has already been expended in setting upinternet purchase transaction systems. Despite these earlier efforts,there is a continuing and increasing risk of electronic commerce fraud.The problem of internet fraud has been previously approached by creatingsecure or encrypted network communications techniques. Although thecommercial establishments developing and using these techniques espouseconfidence to the public, there are common fears that electroniccommerce fraud will both escalate in number and become of greater value.The use of secure or encrypted techniques are not effective where theaccount card or key account information has been stolen and is beingused fraudulently. Fraudulent charges may occur for some time beforebeing reported or detected and the account is deactivated.

The internet or possibly other causes have also led to a growing problemof identity theft. This problem can have a devastating effect on theperson who has their normal identity stolen. In identity theft, animpostor obtains sensitive personal information, such as social securitynumbers, bank account numbers, charge account numbers, driver's licensenumbers and other information having important identificationattributes. The victim of identity theft is usually left with a numberof overdue accounts having large balances run up by the impostor. Theabused accounts are frequently discovered long after the fraudulentactivity first began.

In many instances the victim of identity theft has difficulty inclearing their name from the abusive use by the impostor. This has ledmany such victims to change their names to alleviate the problems ofcredit record destruction and other effects of the identity theft.

General

Some or all of these problems and other objectives and considerationsare addressed by the current invention which is described more fullybelow. Terminology and information used in this background discussion isalso applicable to corresponding aspects of the invention as describedbelow. The reader should also understand that some of the benefits andadvantages of the invention are given in this description, whereasothers may become apparent later, in light of further use and study ofthe invention.

BRIEF DESCRIPTION OF THE DRAWINGS

Preferred embodiments of the invention are described herein with thehelp of accompanying drawings which are now briefly described.

FIG. 1 is a block diagram indicating a prior art equipment arrangementfor conducting purchase transactions over the internet. This diagramalso shows some of the principal actions indicated by arrows.

FIG. 2 is a process block diagram indicating processing steps used inprior art internet purchase transactions, such as shown in FIG. 1.

FIG. 3 is a block diagram indicating an equipment arrangement forconducting transactions over the internet according to this invention.The diagram also shows some of the principal actions indicated byarrows.

FIG. 4 is a process block diagram indicating processing steps used in apreferred embodiment of the invention.

FIG. 5 is a diagram illustrating a series of exemplary screen displaysduring placement of an order by an existing customer account using theinvention.

FIGS. 6 and 7 are diagrams illustrating a series of screen displays andprocess steps involved in an alternative form of the invention wherein anew customer is processed partly on-screen and party via telephone toeffect customer set up.

DETAILED DESCRIPTION Introduction

The current invention has several features, functions and aspects whichare explained below. Additional aspects may also be appreciated from thebackground description given above and the claims presented hereafter.

The invention includes improved methods and associated systems forconducting a purchase transaction over the internet or other widespreador global computer information network or networks. The novel methodsfor conducting purchase transactions have a number of steps or phaseswith associated features. Also included are combinations andsubcombinations of the enumerated steps, phases and features. The novelmethods can be used in connection with a variety of purchase items,including either goods or services, or both, in the same or separatetransactions.

In one aspect the preferred methods involve creating a customer accountwith a financial organization which is a bank, a business akin to abank, or other similar financial institution functioning as provided forherein. For purposes of convenience, such organizations shall herein bereferred to simply as a bank. However, such use of this term should notbe interpreted as implying any legal requirements for being called abank, or implying attributes other than those which are at issue in themethods performed as described herein.

In the methods according to the invention, the bank provides a customeraccount which is associated with a customer. The bank has a record ofthe customer account that includes associated customer accountinformation. In some implementations of the invention the customeraccount is set up prior to any purchase transaction over the internet.In other forms of the invention the customer account is in part createdduring an initial interaction between the customer and bank, such as viathe internet. This is coupled with supplementary set up with the bankwherein the customer supplies additional account information later, orconfirms initially provided account information in second or subsequentsetup sessions.

Prior to providing further explanation of the methods according to thisinvention, the discussion will now turn to a description of a prior artinternet purchase transaction with reference to FIGS. 1 and 2.

Prior Art Internet Purchase Transaction

FIG. 1 shows a diagram representing principal equipment and key actionsinvolved in a common internet purchasing transaction. A customercomputer 10 is operated by a human user (not illustrated), for example aperson using his or her home or office computer. The customer has aninternet service provider with data processing equipment 12 thatprovides service to the customer allowing the customer to communicateover the internet 15 to a large number of internet web sites. Thecustomer accesses web sites of interest in the well-known fashion. Oneweb site is represented by the merchant's internet service provider withdata processing equipment 18.

FIG. 1 also shows a merchant computer 20 which is under the control anddirection of a merchant. The merchant computer provides the informationwhich the merchant wishes to present to the public over the internet.This typically includes general company information and products andservices which the merchant offers to sell. The goods and services maybe produced or rendered by the merchant, or they may be produced,rendered and/or distributed through other businesses with the merchantbeing just an order processor or one of several sources for the offereditems.

Communications links between the customer computer 10, customer internetservice provider 12, internet 15, merchant internet service provider 18and merchant computer may use a variety of data processingcommunications vehicles. Future advancements in communications vehiclesallowing such data processing communications are expected to perform thesame or similar functions, or enhanced functions which are not yetavailable.

FIG. 1 also shows a bank computer 30. Bank computer 30 stores oraccesses customer account information relating to the bank's customerswho have charge accounts, such as VISA™ and MASTERCARD™. The bankcomputer or computers 30 also perform certain analyses which areinitiated by a merchant requesting authorization to charge a particularcustomer account.

FIG. 2 further illustrates steps performed in a typical prior artinternet purchase transaction. The customer computer accesses themerchant computer in step 41 to obtain information relating to thecustomer's interest and planned placement of an order or orders.

Step 43 involves interaction between the customer computer and themerchant computer wherein the customer builds an order file. The orderfile includes the ordered items, the shipping or delivery address, thecost, and sensitive customer charge account information. As explainedabove the customer charge account information usually includes theaccount name, account number, card type, card expiration date and theamount to be charged the customer's account.

After the customer has provided such order file information, then themerchant checks the order file for completeness in step 45. In step 47the purchaser submits the order file to the merchant. The merchant thenperforms initial processing in step 49. The merchant's initialprocessing may include one or more analyses which implement themerchant's policies concerning submission and processing of customerorders. For example, the merchant may perform an analysis to see if theitem selected by the customer is available and the date of availability.This may be compared against management-determined ranges for acceptabledelivery response.

The initial processing by the merchant computer also commonly involvespayment analysis to determine whether the order has been placed using apayment method which is valid and authorizes payment. The paymentanalysis usually processes instructions from the customer computer tocharge a bank card charge account, which can be either a credit or debitaccount associated with the customer. To properly process such a paymentmethod, the merchant typically submits the requested transaction forapproval or authorization by the bank card company or it's processingservice, as illustrated in step 51 of FIG. 2. The payment analysis usesthe customer charge account number, expiration date, cardholder's name,and the amount of the charges being submitted for approval.

Step 53 of FIG. 2 represents the bank's analysis of the authorizationrequest. This bank card analysis uses the customer account number andinternal information, such as the credit or account limit on a creditaccount or account balance on a debit account. The analysis determineswhether the bank authorizes a charge to be made against the identifiedaccount. The bank then responds to the merchant in reaction to thecharge authorization request in step 55.

The merchant then completes any additional order analysis or processingin step 57. Step 59 indicates communication of the initial orderprocessing response from the merchant to the customer. This can be aconfirmation of the order, refusal of the order, or query for additionalinformation.

If the initial response includes acceptance of the order, then themerchant charges the customer charge account with the bank, asillustrated in step 61. The merchant's acceptance of the order leads toshipment of the order as directed by the customer when the order filewas submitted in step 63.

This prior art practice includes transmitting sensitive accountinformation between the customer computer 10 and the merchant computer20. Such transmission is a security risk when transmitted over theinternet. The basic internet structure is an open computer architecturewhich allows free access to everyone and involves repeated copying andre-transmission of data being communicated.

Security is also compromised when the merchant computer sends anauthorization request to the bank computer 30. Again, this risk isincreased if it occurs via the internet. Security may still again becompromised if account information is used in the bank card company'sresponse to the charge authorization request.

Since this sensitive business information is communicated at least twicewith any number of relaying intermediary data processors in between,there is significant opportunity for interception. This is particularlytrue when the customer account information is communicated over theinternet to the merchant which in itself may involve numerous relays intransmission, all of which are openly available for others to access dueto the open architecture of the internet.

The merchant's communications link with the bank computer may be eithervia the internet, or by dedicated secure communications vehicle, such asa dedicated telephone data transmission line or other suitablecommunications vehicles. Such “secure” transmissions may also involvenumerous communications processors. These may or may not be susceptibleto third party access for decoding and possible fraudulent use of thecustomer account information being communicated.

Another risk is associated with the employees of the merchant, bank, orother transmitters of account information. Even good organizationssuffer incidents of embezzlement and absconding of information which canserve as the basis of fraud. Thus, it is inherent that current methodsfor handling charge card transactions are subject to fraud by manualand/or automated data interception.

The current methods for transacting purchases over the internet increasethe risks of fraud because commonly transmitted charge accountinformation used in each internet purchase is sufficiently complete tobe used in the conduct of a fraudulent charge using another merchant whomay be located anywhere in the world.

Preferred System Equipment Configuration for Invention

FIG. 3 shows a preferred equipment configuration and some aspects ofpreferred methods according to the current invention. Customer computer10 is linked with the internet using the customer internet serviceprovider computer 12. Data communications are conducted via the internet15 between the internet service provider 12 and the merchant internetservice provider computer 18. Merchant computer 20 is linked to themerchant internet service provider 18. All links use conventional datacommunications vehicles or suitable future technology communicationsvehicles.

FIG. 3 also shows merchant computer 20 communicating with bank computer30. This can be a secure communications vehicle or via the internet asshown. The merchant internet service 18 connects through the internet 15to bank internet service provider 28. Bank computer 30 is connected tothe bank internet service provider 28. Bank computer 30 stores orotherwise controls access to customer account information and other bankinformation or third party information accessed by the bank computer.

FIG. 3 further illustrates customer computer 10 in communication withthe bank computer 30 via the internet. Customer computer 10 is againconnected by the customer internet service provider 12 to internet 15.Internet 15 is connected to bank internet service 28 and hence to bankcomputer 30.

Preferred Communications Linkages

The diagram shown in FIG. 3 illustrates a significant differenceutilized in some of the preferred methods according to this invention.FIG. 3 indicates that the customer computer 10, merchant computer 20 andbank computer 30 can be in simultaneous or effectively simultaneouscommunication. Simultaneous or effectively simultaneous communicationallows one party to communicate with another and immediately thereafterthe same party can communicate to another party thus allowing a threeparty data flow on a real-time or nearly real-time basis.

Simultaneous communication does not necessarily imply that all threeparties are engaged in a multi-party communications session where all ormore than two parties are receiving the same data, voice, video or othercommunications mode provided by or to all other parties. Instead, it ispreferred that the simultaneously or approximately simultaneouscommunication between these parties is established by discretecommunications linkages. These discrete communication linkages areadvantageously not in communication with other linkages except ascontrolled by the merchant, bank or customer computers acting ascommunications nodes in the purchase transaction communications tree.

As illustrated, FIG. 3 most clearly indicates three discretecommunications linkages which define communications routes between thethree key parties—the customer computer 10, the merchant computer 20 andthe bank computer 30. This allows each of the three communicating pairsto communicate independently in a communications triad. In thiscommunications triad each link communicates separately using differentcommunications routes and/or vehicles. They can each also use differentmeans for providing encoding, encryptions, data compression, or otherdata processing and communications techniques which make interception ofmeaningfully complete account information dramatically more difficult oreffectively impossible.

These discrete communications linkages also enhance security for theprocessing of an internet purchase transaction without necessarilyrequiring use of encoding and encryption techniques because the linkagesare independently created and would in general not share the samecommunications vehicles and relaying internet computers. Instead, forexample, one linkage may be communicated by satellite through relayingcomputers between New York and Atlanta, whereas another linkage may bevia optical fiber data communications land facilities between Miami andAtlanta. The third exemplary linkage may be by microwave transmissionand land lines between Miami and New York.

The separation of certain data processing functions and key informationto one of the three or more communications linkages in the purchasingtransaction communications tree, thus provides increased securityagainst surreptitious interception or collection of internetcommunicated files that have all the information needed to effectuate apurchase transaction according to prior art techniques, such asdiscussed above for charge card transactions.

The above configuration advantageously includes having the customercomputer establish one data communications link, sometimes referred toherein as a first data processing linkage having an associated firstcommunication route. This is most preferably via the internet asillustrated so that the customer can in a conventional manner initiateshopping over the internet. This customer-merchant communicationslinkage can function in many of the conventional ways now known orhereafter developed.

The second data communications linkage is established between thecustomer computer 10 and bank computer 30 using an associated secondcommunications route. The third data communications linkage isestablished between the merchant computer 20 and the bank computer 30using an associated third communications route.

The first, second and third communications linkages are preferablyinitiated or established in an independent manner through independentcommunications initiatives and communicating using differentcommunications routes. They also are preferably configured such thateach is using a distinct communications vehicle or vehicles so that thedata involved with the same internet purchasing transaction does not gettransmitted over the same communications vehicles in the same or arelated transmission. This provides inherent added security for thisinternet purchasing transaction data communications equipmentarrangement.

It should also be recognized that one or more of the communicationslinkages in the purchase transaction communications tree mayalternatively be via a non-internet communications vehicle. For example,the customer-merchant communications vehicle is via the internet asillustrated. The second communications link between the customercomputer 10 and bank computer 30 also is preferably via the internet forease and economy. Alternatively, the customer may for specific reasonhave another linkage which is preferably a secure or dedicatedcommunications link with the bank.

The third communications linkage is between the bank and merchant and isalso preferably via the internet. It is alternatively possible that thethird communications linkage may be via a non-internet communicationsvehicle, such as a dedicated data transmission line, direct modemconnection, or otherwise as is now known or hereafter becomes availablein the art.

Customer Account Setup with Bank

The novel methods according to this invention include creating acustomer account with the bank having certain attributes and features asexplained herein. The setup of the customer account can be accomplishedin a number of different ways, but includes limited communication ofcertain types of information relevant to the conduct of internetpurchase transactions in accordance with the invention.

In general, the creating of a customer account involves associating thebank's customer account information with a particular customer. Thecustomer can be an individual, association, government, corporation orother entity which is interested in conducting a purchase transactionover the Internet utilizing the methods of this invention. The exactmanner of associating the customer with the account can vary dependentupon the bank and how it wishes to organize the customer accounts andassociated data. In one example, the customer account may be associatedwith a customer by using a customer identification code. The customeridentification code may be an account number, account name, accountalpha-numeric identifier or other means for identifying the customer inthe records of the bank.

—Customer-Originated Account Information

The creating of a customer account involves communicating informationfrom the customer to the bank for use in connection with the customeraccount. The customer account information includes customer-originatedinformation which is communicated by the customer to the bank. Examplesof customer-originated information would typically include thecustomer's name, home and/or business address, phone number, socialsecurity number, tax identification number and other information, suchas discussed below.

—Bank-Originated Account Information

The process of setting up the customer account may also includecommunicating customer account information from previous records of thebank. This may involve communication from one division of the bank toanother division of the bank. Customer account information originatingfrom the bank is herein termed bank-originated customer accountinformation. The bank-originated customer account information may notneed to be specially communicated and could be called upon byauthorization of the customer or by policy of the bank.

—Third-Party-Originated Account Information

Additionally, methods according to this invention may use customeraccount information provided by third parties. Exemplarythird-party-originated information may include credit information from acredit reporting service or other business or credit reference. Anotherform of third-party-originated information may be various types ofinformation from a government entity, public records or other publicallyavailable information.

—Communicating Customer Account Information

Preferred methods according to the invention include communicating someof the customer account information to the bank, preferably with atleast some of the information being communicated via one or morecommunications vehicles which are not over the internet. This allows thecustomer account information to include information which comes viaanother mode, source or vehicle. This helps to provide additionalsecurity so that fraud cannot easily be practiced. Fraud may otherwisebe possible merely by intercepting communications made via the internet,using publicly accessible files. The accessible files are then used forfraudulent schemes and can be easily perpetrated against priortechnology.

Methods for communicating some of the customer account information mayalso include communicating via the internet for a portion of thecustomer account information. This allows simplicity in some aspects forsetting up portions of the account or for providing additionalinformation desired after the account has be set up or partially set up.Such internet communicated account information may come from anysuitable source. For example, the customer may provide it's name alongwith a request to setup an account via the internet. Other customeraccount data fields may be completed via telephone usingcustomer-originated information, which may be combined withbank-originated information and third-party-originated information, bothor only one of which may be provided via the internet or usingnon-internet communications.

—Customer Account Information Control & Maintenance

The customer account information maintained by the bank, or by a serviceor equipment vendor maintained for the bank's use, is advantageouslystored in the form of a data processing accessible database or theequivalent. The database can be maintained on a bank computer orcomputers, or at computers or other database storage and data processingequipment maintained for the bank and which is accessible thereto. Thebank's access to the customer account database is preferably via adedicated or secure communications conduit, such as within the bank'sdata processing equipment or between the bank's data processingequipment and a service vendor which utilizes a secure, dedicated,encrypted and/or encoded communications link with the bank.

—Customer Account Information Field for Computer Identification

The customer account information with the bank, or maintained for thebank, also preferably includes a number of customer account informationfields. One customer account information field preferably includescustomer computer information. The customer computer informationincludes at least one customer computer identification code or othercomputer identification information which is used to associate thecustomer account with at least one authorized customer computer. Thecustomer computer identification information kept by the bank is used toidentify when a computer is an authorized customer computer which is setup and authorized to conduct transactions for the customer. The bank'scustomer computer identification information may include information forone customer computer, or a plurality of customer computers.

The bank's customer computer identification information may be used inconnection with one authorized customer computer, or by more than oneauthorized customer computer. In one form of the invention a singleauthorized customer computer identification may be used on multiplecomputers; such as home, office, laptop, etc. for a single user. Inanother form of the invention the bank customer computer identificationinformation may be uniquely associated with a single, particularcustomer computer in such a way that no other customer computer isassociated with such information. This can be done by utilizing uniqueinformation which can be stored on the customer computer and is notcapable of being reproduced onto another computer.

The associated bank data field used to specifically or uniquely identifyan authorized customer computer may take various forms now known orhereafter developed. One example would be information kept by or for thebank which indicates what a file stored on the customer computer willcontain when read or interrogated by the bank computer using a code key,or other decoding or deciphering means now known or hereafter developed.

The contents of a customer computer identification file or files mayremain fixed over time. Alternatively, the computer identificationinformation may vary with time, so as to be unique at any particularpoint in time. Still further, such information may change or bechangeable each time or at a certain frequency or variable frequency orvariable frequency when read by the bank. Such information may also, asa matter of programming, change over time either by data processingwhich occurs on the customer computer or as a result of a processperformed by the bank computer during reading or interrogation.

In other forms of the invention the file or files on the customercomputer identification information may change as a result of someadditional variable or parameter other than time. Exemplary alternativesmay include parameters such as bank or customer transaction numbers,control numbers or other variables. In some forms of the invention thebank changes the customer computer identification information as eachcustomer purchase transaction is processed or at each instance ofcommunication between the customer and bank. The associated change inthe authorized customer computer identification may not involve time asa factor but may merely depend on the number of bank-customercommunications interactions.

The customer computer identification information is used on or with thecustomer computer in such a way as to provide a secure, specific, andpreferably unique, identifier which can be read or otherwise identifiedby the bank when in communication with the customer computer. Suchcommunication between the customer computer and the bank can be effectedin a variety of suitable ways, but typically and preferably will becommunication over the internet in the course of conducting a purchaseor similar transaction. Alternatively, it may be more advantageous forsome or all of the computer identification information to becommunicated between the authorized customer computer and the bankcomputer via direct telephone modem or other communication methodologywhen setting up or creating the customer account. The communicationsalternatives will in some forms of the invention have at least onenon-internet communications vehicles.

—Customer Account Information Field for Delivery Address

The process of setting up or creating the customer account with the bankalso preferably involves providing the customer account with customerdelivery address information associating said customer account with atleast one authorized customer delivery address.

Customer delivery address information kept by the bank computer 30 canbe inclusive of a single home or business delivery address. Thisprovides a more secure purchasing transaction because methods accordingto this invention include verification of the shipping or deliveryaddress directions given to the merchant so that shipments are directedto a street address or other address which is tied to the customer. Thedelivery or shipping address setup information is preferably informationwhich can be authenticated. The setup authentication preferably usesthird party authentication or bank-originated information which isuseful for authenticating, and further preferably uses means other thaninternet communicated information ostensibly from the customer computer.

Authentication of the shipping or delivery address can in one form beprovided by having the delivery address supplied for set up in the bankcustomer account records using a non-internet mode of communication,such as personal communication. For example, a person could appear inperson at the bank and provide personal identification for setting up aportion or all of the customer account verification information. Anotherpossibility is for the customer to provide authorized delivery addressesand other customer account information to the bank via voice phone line.Other communications vehicles for supplying setup information mayalternatively be used, such as direct modem communications between thecustomer and bank.

The shipping or delivery address is a key piece of order informationbecause without such information the internet merchant cannot providethe goods or services requested. The shipping or delivery address alsomay serve as customer verification and authentication informationaccording to some of the preferred methods according to this invention.The delivery address can be used as order verification information byhaving the customer include the desired delivery address as part of theorder file and the merchant can submit the requested delivery address tothe bank for verification and confirmation during the bank's analysisdetermining validation of the order.

During the course of a purchase transaction, the delivery address canalternatively be supplied by the bank to the merchant. This may be doneafter the customer has selected during communication with the bank, thedesired authorized delivery address from a group of one or morepreviously set up authorized customer delivery addresses contained inthe customer account records held by or for the bank.

To enhance security, the customer may during communication with the bankindicate the desired authorized delivery address from a set of availableoptions and/or in a shorthand manner. For example, the customer goesthrough a delivery address selection process which allows the customerto only select one of the authorized customer delivery addresses set upin the bank's customer account information.

To further illustrate the shorthand presentation of authorized deliveryaddresses, the customer is placed in communication with the bank, suchas diagramed in FIG. 3. The customer is then prompted to select from hisor her “home address” or “office address” as queried by the bank in anon-line communications sequence. The full home or office addresses neednot be communicated between the bank and customer using the internet.The customer may click upon one of the addresses indicated in shorthand.This is done as part of requesting the bank to validate and authorizethe transaction. The bank is also requested to assure the merchant ofpayment and/or provide payment to the merchant. The bank, aftersuccessfully completing its validation analysis of the purchasetransaction, sends assurance of payment to the merchant and directs thatshipment must be to an authorized delivery address specified by the bankto the merchant. Alternately, the delivery address may be confirmed bythe bank as supplied by the customer to the merchant.

The customer authorized delivery address information is preferablyprovided to the bank for account setup using a non-internet informationsource or communications vehicle, such as a voice telephone line. Morepreferably, the authorized customer delivery address information isprovided to the bank by the customer using a caller identificationtelephone line which can be linked with the customer and/orauthenticated as explained further below.

The customer may have routine address options such as home or officeaddress. The customer may also have secondary or incidental deliveryaddresses to which purchased goods may be directed. For example,secondary address may be setup regularly for close family members uponrequest from the customer in a request which can be authenticated to thetrue customer.

Incidental addresses used by the customer, such as for gifts to friendsor other people, can be handled similarly. The customer calls andsubmits the additional authorized delivery address using a calleridentification telephone line authenticated to the customer and/or user.The bank then edits the customer record to add the additional authorizedaddresses. These too can be presented in shorthand during purchasingtransactions using a variety of different shorthand terms picked by theuser.

—Customer Account Field for Telephone Caller Identification

The customer account with the bank may also include authorized telephonecaller identification information which is associated with the customer.The telephone caller identification line information can be used toprovide immediate authentication evidence if it matches with othercustomer account information. This may be supplemented using additionaltelephone company or other third party information which providessupporting authentication that the telephone line being used isassociated with the customer for which the bank has an associatedcustomer account.

The telephone caller identification information is preferablyauthenticated in some forms of the invention. The telephone calleridentification information may be authenticated by third partyauthentication using the phone company or other third party.

Alternatively and more simply, the telephone caller identificationinformation can be used directly as a verification parameter because thecustomer used the same telephone line when setting up the customeraccount with the bank. Thus the bank verifies that each purchasetransaction communication between the customer and bank is via the sametelephone line or one of several authorized telephone lines.

It is also possible to use one or more of the above verificationtechniques in combination with an additional third party authenticationprocess. This is preferably performed such as by comparison to a creditreport which includes the customer's address information and telephonenumber. With these pieces of information, the customer telephone calleridentification may match either or both the telephone line used duringthe customer account setup, and/or by comparison of the telephone calleridentification information with third party information to perform anauthentication process.

—User Identification Codes

Customer account set up at the bank further preferably includes anotherfield or fields of information to define authorized users for thecustomer account. This is done by setting up a user personalidentification number or other user identification information andcoding. The user identification code may be selected by the bank, or thecode may reflect the user's choice. A particular requested personalidentification number or code can be numeric, alpha-numeric,alphabetical or some other code configuration.

The user identification code is set up, and is provided in the customeraccount records at the bank for the authorized user or users and theassociated customer account. This personal identification information ispreferably communicated using a non-internet means of communication.This is advantageously done using a secure non-internet means ofcommunication. One suitable form of communication is via voice telephoneline. Alternatively, an email communication to the user of the user'spersonal identification code may be employed. Email communicated overthe internet may be acceptable depending upon the policies and levels ofsecurity determined by the bank and customer. Other modes ofcommunication such as telephone caller identified voice discussion,written notification, or personal communication may also be suitable insome of the methods according to this invention.

—Customer Account Verification Information

The customer account information kept by or for the bank includescustomer account verification information. The customer accountverification information may include one or more, or various selectedcombinations of the following types of information.

One verification parameter is the shipping or delivery address oraddresses as discussed above. By performing a verification process usingdelivery address of a purchase transaction order, the bank can helpassure that the purchase transaction includes goods or services whichare being provided to an actual customer at it's authorized address.

Another verification parameter is customer computer identificationinformation as discussed above. By performing a verification processusing customer computer identification information at the bank andcustomer computer, the bank can help assure that the purchasetransaction is being made from a computer authorized by the customer asa source for authorized purchase transactions.

A further verification parameter is telephone caller identificationinformation provided on the telephone line used by the customer tocommunicate with the merchant, the bank, or both. By performing atelephone caller identification analysis, the bank can help assure thatthe purchase transaction is being placed using an authorized customertelephone line having line or caller identification.

An additional or alternative verification parameter is user personalidentification information as discussed above. By performing a userpersonal identification verification analysis, the bank can help assurethat the purchase transaction is being placed by an authorized user forthe particular customer account being used.

Other types or forms of customer account information can also be used asverification information used by the bank in making one or moreverification analyses as part of the bank's process in considering anddetermining whether a purchase transaction is properly validated orinvalidated.

The one or more verification analyses performed by the bank inprocessing a purchase transaction validation request preferably employinformation which is obtained from the customer computer. This isadvantageously done by placing the bank computer 30 and customercomputer 10 into active communication with one another. This can be mosteasily done using the interne as illustrated in FIG. 3. It can also bedone using other alternative communications vehicles.

FIG. 3 shows customer computer 10 submitting a purchase transactionauthorization request to the bank computer. This is preferably donedirectly with the bank. Alternatively, it can be done via relay by themerchant computer.

In the preferred versions of the invention, the bank computer 30responds or precedes the customer authorization request with anidentification inquiry. This can use one or more of the verification orauthentication parameters or other identification means. In general, thelarger the number of verification or authentication parametersconsidered by the bank in the identification inquiry, then thereliability of the inquiry tends to improve. Typically, theidentification inquiry will use verification of customer accountverification information. For example, the user personal identificationand customer computer identification information associated with thecustomer account would be verified. Also, the telephone line calleridentification may be used to verify the caller identification relativeto caller identification information kept re the associated customeraccount. This can be to verify to customer account information, oradditionally or alternatively in an authentication mode. Otherverification parameters may also be used.

The bank verification analysis or analyses can be the determinativefactors in leading to a bank decision whether to validate the purchasetransaction. It is also possible to combine one or more verificationanalyses with one or more authentication analyses as indicated in thisdocument.

In performing validation analyses, the bank can also employ verificationor authentication of one or more verification or authenticationparameters used in connection with a merchant account set up with thebank. The same or different verification or authentication parametersmay be used with the merchant as are described with respect toverification and authentication of the customer and user as describedherein.

—Customer Account Authentication Information

The customer account information kept by or for the bank preferablyincludes customer account authentication information. The customeraccount authentication information can include one or more or variousselected combinations of the following types of information or theirequivalents.

One authentication parameter is the shipping or delivery address asdiscussed above. By performing an authentication process determining theauthenticity of one or more of the customer authorized deliveryaddresses, and then verifying a delivery address of a purchase order,the bank can help assure that the purchase transaction includes goods orservices which are being provided to a customer at it's authorized andauthenticated address.

Another authentication parameter is customer computer identificationinformation as discussed above. By performing an authentication processusing customer computer identification information at the bank andcustomer computer, the bank can help assure that the purchasetransaction is being made from a computer authorized by the customer asa source for authorized purchase transactions and authenticated by thebank after setup.

A further authentication parameter is telephone caller identificationinformation provided on the telephone line used by the customer tocommunicate with the merchant, the bank, or both. By performing atelephone caller identification analysis, the bank can help assure thatthe purchase transaction is being placed using an authorized customertelephone caller identification telephone line by a customerauthenticated to the specific telephone line by comparison withcorresponding authentication information, such as from one or more thirdparties.

An additional or alternative authentication parameter is user personalidentification information as discussed above. By performing a userpersonal identification authentication analysis, the bank can helpassure that the purchase transaction is being placed by an authorizeduser for the customer account being used.

Other types or forms of customer account information can also be used asauthentication information used by the bank in making one or moreauthentication analyses as part of the bank's process in considering anddetermining whether a customer account should be set up or a purchasetransaction should be validated or invalidated. Authentication processesused during setup are termed setup authentication, and authenticationprocesses used during transaction validation are termed transactionauthentication.

The one or more authentication analyses performed by the bank inprocessing a purchase transaction validation request preferably employinformation which is obtained from the customer computer. This isadvantageously done by placing the bank computer 30 and customercomputer 10 into active communication with one another. This can be mosteasily done using the internet as illustrated in FIG. 3. It can also bedone using other alternative communications vehicles.

FIG. 3 shows the customer computer 10 submitting an authorizationrequest to the bank computer. This is preferably done in a linearcommunications relationship connecting the customer with the bankwithout involvement of the merchant. Alternatively, it can be done via arelay communications relationship through the merchant computer.

In the most preferred versions of the invention, the bank computer 30responds to the customer validation and authorization request with anidentification inquiry. This can use one or more of the validationand/or authentication parameters. The larger the number of parametersconsidered by the bank in the identification inquiry, then thereliability of the inquiry tends to improve.

The bank validation analysis or analyses can be the determinative factoror factors in leading to a bank decision whether to validate thepurchase transaction. It is also possible to combine one or morevalidation and/or authentication analyses with one or more otherverification analyses as indicated elsewhere in this document.

In performing validation analyses, the bank can also employ verificationand/or authentication of one or more parameters associated with theinvolved merchant. Such merchant account parameters are used inconnection with a merchant account which is also set up with the bank.The same or different authentication or verification parameters may beused with the merchant as are described with respect to verificationand/or authentication of the customer and user as described herein.

Customer Account Setup at Customer Location

In addition to the customer account setup at the bank, there is alsopreferably setup at the customer location. The customer computer may beprovided with programming that allows the bank to access thebank-encoded or otherwise provided customer computer identificationcode. A variety of known identification methods are possible. Onesuitable form of identification is sometimes referred to as a “cookie”.The preferred cookies for the invention are selectively allowed by thecustomer computer to be written to the customer computer in a form whichallows the bank to positively identify the customer computer. A varietyof formats may be used to produce and render secure the cookie orcookies sent to the customer's computer by the bank.

The cookie is preferably written or encoded onto the customer computerone or more times in a communication or series of communications betweenthe bank computer 30 and the customer computer 10. This can beaccomplished by direct modem interaction over a regular telephone lineor using other communications vehicles. Alternatively, thecommunications between the customer computer 10 and the bank computer 30can be via the internet as illustrated in FIG. 3. The communication orcommunications sending the cookie, cookies or other computeridentification coding is preferably encrypted to improve security,particularly with regard to setup of the customer computer for bankidentification inquiries.

The cookie or other customer computer identification can be a singlesequence or code written a single time. Alternatively, it can be a codeor series of codes which are written at different times. A furtheralternative is that the code placed on the customer computer foridentification by the bank can be written in plural sessions and/orrepeatedly. A further alternative is to rewrite the computeridentification in part or in whole during each transaction.

A still further alternative is to write identification coding each timethe customer computer is used with the bank to provide a historicalseries that cannot be reproduced by interception of any onecommunication. The computer identification may be subject to processingby specific use programming written onto the user's computer, such as bythe bank during setup. The programming may include a code key which isstatic or variable, such as variable with time or with customer, bank orother transaction history.

The customer computer identification may also be subject to processingby the bank computer, and such may include a code key which is static orvariable, such as variable with time or with customer, bank or othertransaction history. Still further, the customer computer identificationmay be subject to combined processing by both the customer computerprogramming and the bank computer programming, and such may include acode key which is static or variable, such as variable with time or withcustomer, bank or other transaction history. A variety of customercomputer identification techniques can be used as may now be known orusing new technology hereafter developed.

It is also contemplated that the customer computer 10 will be providedwith software which facilitates or is required to allow communicationbetween the customer computer 10 and the bank computer 30 to selectivelyallow the customer computer identification processing steps to beperformed in setting up the customer computer. Such software may also beused in conducting purchasing transactions involving the bank andcustomer.

Another feature which may be allowed is the ability for a customer totransfer cookies or other customer computer identification tools betweenone customer computer and another customer computer. This would only bepermitted if the bank and customer programming so provides. If such isallowed, then the customer computer identification tools may becommunicated between the two customer computers in several differentways; such as by direct wiring, or by email from the first to the secondauthorized customer computer.

The customer computer software may also provide the customer andassociated users with various account management and utility features.Account management features may include allowing the customer to performfunctions such as monitoring the purchase transactions made to thecustomer's account and monitoring payments made by the customer to paythe bank for customer charge transactions made. The utility features mayalso act as the means for allowing or controlling transmission ofcustomer computer identification information between first and secondcustomer computers.

Such programming may also advantageously have other capabilities andfeatures which allow the customer and authorized users of the customerto use the account. Although such customer computer interface softwaremay allow some modifications and information gathering, the preferredprocesses according to the invention may require in some implementationsthat setting up or changing of key or all customer account informationfields occur using specific communications vehicles or modes. Forexample, changing (editing, adding or deleting) of customer accountinformation fields may only be allowed by direct, non-internetcommunication. Further, account information such as authorized deliveryaddresses, changes to personal identification codes, changing telephonecaller identification information kept by the bank, user personalidentification or other account information may be modified only bynon-internet communication. These setup or account informationmodification processes are preferably done using a non-internet vehicleof communications which can preferably be authenticated by the bankprior to implementing the requested information. For example, bytelephone communication over a telephone line having telephone calleridentification which matches and is an authorized customer phone line.Such fields may also require voice communication between authorizedrepresentatives of the customer and the bank.

Exemplary Setting Up of Customer Account

In one form of the invention a customer may initiate setup of a customeraccount with the bank. This can be done in various ways. For example, acustomer may telephone the bank and request that the bank set up anaccount according to this invention. The customer could provide some orall of the customer-originated information indicated in the descriptiongiven in this document. For example, name of customer, customer billingaddress, customer phone number, customer social security number,customer tax identification information, customer driver's licensenumber, customer email address, customer authorized user identificationcodes, and other pertinent forms and fields of customer accountinformation may be singularly or in combination provided in one or moremodes or vehicles of communication and in one or more sessions.

The preferred methods for setting up the customer also preferablyinclude authenticating one or more of the fields of customer accountinformation by an independent authentication procedure or procedures.For example, one authenticating process would be for the bank to requirethat the customer provide some or all fields of the customer accountinformation via a telephone line having telephone caller identificationinformation available that matches the customer setting up the account.This matching for authentication may require that the named telephoneowner as indicated by telephone company caller identificationinformation be the same as the information supplied by the customer.

Another example of independent authentication information may includealternative or additional third party information made available bycredit services or other companies having credit information or servingas credit references. Examples of such authenticating analysis would beto verify that one or more of the customer-supplied data fields matchindependent authentication information. Information such as customername, account billing address, home address, home telephone number,social security number and other information given by the customer insetting up the account would be compared to the authenticationinformation. Matched information of this type which corresponds withcomparable customer information provided by the credit reporting agencyor other third-party source of authentication information will providean indication of authenticity during the customer account setupprocedure.

Some preferred setup methods according to the invention also includeplural authenticating procedures. In some forms of the invention, thenew customer account is further subjected to secondary authenticationprocedures after the bank has performed at least one initialauthentication test which confirms the authenticity of the new customeraccount and demonstrates reliability of at least one field of customeraccount information which is a verification parameter. Then the bank mayinstruct the customer to establish a data communications linkage withthe bank to allow the bank to provide computer identificationinformation to the customer computer. Such communications sessions canalso be used to load customer and user interface software whichfacilitates the use of the customer account by authorized users of thecustomer. Such interface software may also play a role in facilitatingthe bank's computer identification inquiry and provide on-lineverification or authentication of the customer computer and authorizeduser during purchase transactions.

The setting up of the customer computer and user, and the setting up ofthe customer account information held by the bank may includeestablishing data communications between the customer and bank using atleast one session where a non-internet data communications vehicle isemployed. For example, the bank may during the setup process instructthe customer to establish direct modem communications with the bank todownload the interface software and provide the customer computer with abank identifiable authentication code or codes and any encryptionsoftware. The processes may require a single non-internet communicationssession or plural sessions whereby the computer identificationinformation provided to the customer computer may be expanded,replicated, rendered more encoded, or encrypted using a single or pluralencryption techniques.

Customer Account Activation

Preferred methods according to this invention further include activatinga customer account. The customer account is most preferably activatedafter the bank has received some or all of the customer accountinformation. It is also advantageous that the customer account beactivated after the bank has performed at least one setup authenticationprocess deemed appropriate by the bank according to the banks securitypolicies. For example, receiving setup information from a new customerusing a caller identification telephone line that indicates the customeris authentic may by bank policy be sufficient authentication foractivation of the account. Alternatively, more fields or other fieldscan be used in a setup authentication analysis.

It is also possible that the setup authentication may proceed in aprogressive manner. After an initial contact and at least one setupauthentication analysis, the bank may provide limited utilization, suchas a small credit limit. The credit limit may be increased afteradditional authentication procedures have been performed successfully.The credit limit may also be increased after additional customerutilization establishes that the account is performing validly. Suchprogressive authentication will allow greater reliability as thecustomer history progresses in time or transaction number.

Activation may also advantageously include writing to the customercomputer. The writing to the customer computer may include interfaceprogramming as discussed herein. It also typically will include writing,encoding or otherwise providing the customer computer with customercomputer identification coding and programming needed.

In some of the preferred methods according to this invention, theactivation of the customer account may also be made contingent uponsuccessful testing. Test communications can be conducted between thecustomer and bank. This can be in the nature of a test communicationwhereby the customer goes to a special web site operated by the bank andthen proceeds to conduct a test internet purchase transaction. In suchtest transaction the user will be prompted for entry of the user'spersonal identification code. The user's actual name may be supplied asadded verification but is not believed necessary since the customer'scomputer has been provided with bank accessible customer computeridentification information. This can be assessed either before or afterthe user is prompted for the user's personal identification code.

In one optional form of the invention, the customer account setup andactivation is abbreviated to facilitate immediate limited use of theaccount and this is further detailed hereinbelow in a separate sectionof this document.

Merchant Account with Bank

Methods according to preferred forms of the invention may also includesetting up a merchant account with the bank. This is advantageous tofurther reduce the risk of fraud and to facilitate and speed payment tothe merchant. It is also desirable in establishing a legal foundationbetween the bank and merchant whereby the merchant is prepared andwilling to accept assurance of payment from the bank as contrasted withactual payment or funds transfer. The processing of internet purchasetransactions will be facilitated by prior setup of the merchant with thebank.

The process of setting up the merchant with the bank can varysignificantly depending on policies of the bank and can vary with timeto improve or modify processing and transaction of the internetpurchases. The merchant can be set up using some or all of the sameprocedures described above in connection with preferred processes forsetting up customers. Some modifications, additions and/or abbreviationsmay be in order depending upon the policies of the bank and the desiredlevel of security relative to convenience.

One possible abbreviation which may be as acceptable is to not employthird-party transaction authentication of the merchant computer forreasons of processing speed or economy. If the bank has a merchantaccount set up with various fields of data and since the merchant isprimarily looking to get paid, then it may be sufficient that themerchant receives assurance of payment and/or payment without the bankperforming authentication of the merchant computer involved in thepurchase transaction.

Authenticating and/or verifying the identification of the merchantcomputer is preferred in other implementations of the invention. Forexample, in some of the preferred methods the customer establishescommunications with the merchant and then indicates to the merchant thatpayment will be assured and/or made by the bank. Since the merchant islooking for payment assurance, it may be to the increased satisfactionof the merchant for the merchant to establish the third communicationslink directly with the bank. This approach may improve the confidencethat the party contacted by the merchant in seeking transactionauthorization is in fact the bank. The bank then may perform anauthentication process similar, the same, or employing one or more ofthe processes, aspects and features described hereinabove in connectionwith the bank identifying, verifying or authenticating the customer.Accordingly, any, all or various combinations of authenticationprocedures and features may be used by the bank, including those used toauthenticate the merchant's computer.

Alternatively, the bank may choose to more simply verify the merchantcomputer identification with merchant account verification informationkept by the bank. This can be done without performing additionalauthentication analysis, or authentication analyses which utilizes thirdparty information or other independent authenticating information.

The description given hereinabove concerning the bank and customerrelationship thus is applied by reference to describe the possible useof some or all of the authentication procedures and/or variousverification procedures described in connection with the customeraccount for use in considering the setup of the merchant and whether atransaction being analyzed by the bank should be validated and paymentassured to the merchant.

It should also be understood that some forms of this invention mayinclude internet purchase transactions where the merchant has not beenpreviously set up with a merchant account with the bank. In suchsituations it may be desirable to set up the merchant during the courseof the purchase transaction. This setup option during the course of thetransaction may be either a partial setup or a complete setup dependingupon the bank's policies and desire for security in validating andpaying for internet purchases.

In other forms of the invention the merchant may not in a practicalmanner be set up at all since the procedures may simply involve transferor delivery of funds automatically after or at the time the transactionis validated and authorized by the bank. For example, the bank andmerchant may be in communication and the merchant instructs payment tobe sent by check to a stipulated address at which the merchant receivespayments. Electronic transfer of funds may similarly be directed as themerchant and bank find acceptable. Other payment options are alsopotentially acceptable.

Merchant Account Setup at Merchant Location

Depending on the degree of security desired, the setting up of themerchant account at the merchant computer may employ actions by themerchant and/or bank similar to those described hereinabove with regardto setup of the customer account upon the customer's computer. Analogousor the same procedures may be used at or upon the merchant computer 20.Such description shall be applied by reference without being reiteratedat this point in this document.

In some respects the setting up of the merchant computer may be tailoredmore specifically to the needs of the bank and merchant. For example,the merchant may be provided with merchant computer identification ornot. This in turn may allow simplified software to be used on themerchant computer to speed order processing or provide other enhancedabilities or features. One or more of the above-explained customer setuptechniques may be applied alone or in combinations for the setup of amerchant.

Merchant Account Activation

The explanations provided above with regard to setting up and activatinga customer account may also be employed in part or in whole with regardto activation of a merchant account. The description given herein isapplied by reference to merchant account activation as described aboveto provide preferred forms of the invention.

The merchant account setup process and activation process may also beabbreviated or eliminated. For example, the merchant could be informedthat it is not yet fully set up, but that a one-time transaction accountis being established in the merchant's name at the bank. The merchantcan obtain payment as the merchant subsequently instructs the bank.

Alternatively, the bank could assure payment and communicate thatpayment in a desired form is being made to the merchant, for example,the assurance of payment may be communicated by the bank to the merchantalong with an indication that the bank is sending payment. Such paymentcan be by check, electronic funds transfer or other suitable means.Payment by effected bank check payable to the order of the merchantillustrates that merchant account setup would not be an absoluterequirement, although such is preferred under this invention.

In the most preferred forms of this invention the merchant wouldpreferably be paid after the bank performs at least a minimal amount ofmerchant account setup and either or both verification and/orauthentication of the merchant during both setup and in processingpurchase transactions. This can be done analogous to the discussiongiven herein with regard to initial use by a new customer.

Order File Creation

Preferred methods according to this invention include order filecreation. The customer is principally involved in creating the orderfile. Key or principal aspects of the order file include: a) specifyingthe goods or services, or both, which the customer seeks to obtain usingthe merchant; and, b) specifying the delivery or shipping address towhich the goods are to be shipped or delivered, or at which therequested services are to be performed.

The order file will typically be assembled using ordering software whichthe merchant provides or makes available at the merchant's web site.Since conventional merchant order taking software requires a preliminaryassessment of means for payment, this indicates the appropriateness ofimplementing modified order software when orders are to be paid usingthe bank and methods according to this invention. Preferably themodifications direct the order taking software into ancillaryprogramming which is associated with the assurance of payment andpayment processes described herein according to this invention.

Under some of the methods according to this invention, the customeraccesses the merchant web site and then builds the order file byspecifying the goods and services. The order file may also include thecustomer's name, although such is not strictly necessary. The essentialfields in the order file are the goods and/or services and deliveryaddress information. The merchant may elect to require more information,and typically the customer name or some other customer identifier willbe used to increase reliability of the ordering process. Also desirableis telephone or email contact information for the customer and userrepresenting the customer.

It is also typically desirable for the order file to define the costsassociated with the order. This is provided so that the customer mayconsent to the amount of charges being incurred by the customer, and theamount to be assured and paid by the bank.

Many additional fields of information may be included in the order fileas desired by the merchant or bank, and in compliance with any agreemententered into between the merchant and bank.

In preferred methods according to this invention, the order file used inplacement of the customer order with the merchant does not include acustomer account number, numbers or codes which is or are separatelyuseful to apply charges to the account. This is eliminated to reduce therisk of interne fraud or other misuse of the customer account with thebank. Instead, the customer builds the order file in part or in totaland specifies that payment will be assured and made by the bank. This ispreferably implemented using a displayed icon on the merchant's web sitewhich allows the customer to at some point in the process of buildingthe order file, or after it is complete, to indicate the use of the bankas the means for payment.

Where a merchant is previously set up with the bank, then the electionby the customer to use the bank for payment may advantageously cause themerchant's order file building program to enter into a programmingroutine or sub-routine that does not require an account number to becommunicated. Other information may also be omitted to minimize the riskof interception and/or fraud.

In some forms of the invention, the order may be assembled by a customerwith merely the ordered items specified, the identity of the merchant,and a transaction identification or control number. Alternatively,merely with the ordered items and customer's name or other customeridentification. The customer may either provide a delivery address inthe order file, or this information can be omitted from the customer'sorder file and supplied solely by the bank. Alternatively, the orderfile can include a customer's specification of the delivery address andthis information can be relayed by the merchant to the bank forverification. The bank can then verify that the delivery address is anauthorized delivery address for the customer involved prior tovalidating the order.

In another form of the invention, the customer builds the order filewith the delivery address being provided to the merchant. The customerestablishes independent communication with the bank seekingauthorization of the purchase transaction. Then the customer is requiredto specify the desired delivery address to the bank. This can be done inresponse to an inquiry by the bank computer. It can also be done using ashorthand listing of authorized delivery addresses so that the customerand bank do not therebetween communicate the delivery address insufficiently complete form to allow interception.

The order file may alternatively be built in one or more order filebuilding sessions involving one or more communications linkages via theinternet between the customer and merchant. The order file may be savedand then retrieved for later editing and placement of the order.

Communicating Between the Customer and Merchant

In methods according to the invention the customer establishescommunication via the internet with the merchant. The mode ofcommunication via the internet may use any acceptable protocol orsecurity precautions now known or hereafter developed. The mode ofcommunication can be encrypted or use other secure network procedures. Avariety of communications options arise and are possible because thecustomer is advantageously not transmitting sensitive information, suchas the account number and expiration date coupled with account name.

In alternative forms of the invention, the customer may initiate thepurchase transaction by contacting the bank and providing an indicationthat an order is planned. Thereafter, the merchant may be contacted.This can occur directly between the customer and merchant, or using thebank as an intermediary.

Order Placement

Methods according to this invention also include placement of thecustomer's order with the merchant. This is most frequently done bycommunications linkage between the customer and merchant computers, suchas illustrated in FIG. 3. The placing of the order will typically occurshortly after the customer has assembled the requisite information inthe order file as required by the merchant. This may be modified fororders being paid by the bank in accordance with this invention.

Placement of the order will preferably entail specification by thecustomer that the means of payment is via the bank. The merchanttherefore looks to the bank for assurance of payment and/or payment.

In alternative forms of the invention, the customer may contact the bankand build the order file and/or place the order via the bank's computer.The bank can then assure payment to the merchant in the same or aseparate communication from the communication including placing orconfirming the customer order.

In either of the above alternatives, the customer account number is notcommunicated to the merchant. Also in such alternatives, the customer'scommunication with the bank does not require providing information whichis sufficient to allow an intercepting party to place orders whichcharge against the customer's account. This should be contrasted to thecurrent practices explained above which provide such information andrequire it to be relayed, usually multiple times.

Communicating Between Customer and Bank

Preferred methods according to the invention also include communicatingbetween the customer and bank whereby the customer submits a request forbank authorization, and for the bank to assure payment and/or makepayment to the merchant. FIG. 3 illustrates an internet communicationslinkage between the customer computer 10 and the bank computer 30. Thisis done via customer internet service 12, internet 15 and the bankinternet service 28.

In alternative systems and methods the customer computer 10 may bedirectly connected via modem (not illustrated) to the bank computer 30.Other communications vehicles and various communications routes can beemployed to provide data communications between the customer and bank.

In some of the methods according to this invention the customercommunicates with the bank in non-internet forms of communication. Thisincludes the direct modem connection explained above. It is alsopossible to employ direct, in person communications between a customerand a representative of the bank. Further it is possible to usetelephone voice lines, fax communication or other non-internetcommunications vehicles. This is particularly advantageous in the setupphase, but also can apply to editing or other changes to the setupinformation.

It may also be desirable to use non-internet forms of communicationbetween the customer and bank in the course of a purchase transaction.The customer or bank can initiate the communication, which is preferablya data processing communications vehicle. Data concerning the proposedorder and other data passed between the customer and bank arecommunicated to perform the methods according to this invention.

—Initiation

The communications linkage between the customer and bank computers canresult from customer initiation or bank initiation. This can be doneeither before or after the order file is created and/or placed. In onepreferred version of the invention, the user representing a customerfirst builds an order file at the merchant's web site. Then the customerindicates while in communication with the merchant via the internet,that the customer wishes to pay using the bank. This is easily providedby having an internet link between the merchant's web site and the bankcomputer 30. This can be part of the merchant setup with the bank.

The selection of the bank using the merchant web site link or othersuitable means initiates a data communications linkage between thecustomer and bank. This is preferably a direct connection between thecustomer and bank.

In alternative methods according to the invention, the customer mayindicate while at the merchant web site that the customer wants to payusing the bank. Instead of the customer initiating the communicationslinkage with the bank, the customer's placement of the order with themerchant can result in a communication between the merchant and bank.The merchant communicates with the bank and indicates that the customerhas placed an order that includes a request that the bank is to be usedto assure payment and/or make payment for the customer order. Themerchant can communicate relevant information to the bank indicating thetransaction control number, customer identification, and amount ofcharges associated with the order.

In response to the merchant's communication with the bank, the bankinitiates a communications linkage with the customer. The customercomputer 10 can be contacted via the internet or by other dataprocessing communications vehicles.

The merchant information supplied to the bank concerning the customerorder includes transaction identification which is also provided to thecustomer computer. When the bank computer establishes communication withthe customer computer, then the bank goes through an identificationinquiry and verification and/or authentication processes to determinethat the bank has contacted the proper customer user and proper customercomputer which is authorized to be involved in the identifiedtransaction with the merchant.

—Bank Identification Inquiry

After communication has been established between the bank and customer,the bank performs a bank identification inquiry. The inquiring actionmay involve a number of different identification procedures. Theseidentification procedures may be the same as described above usingverification of customer account information and/or authentication ofthe customer computer and user using one or more of the indicatedanalyses.

A preferred identification inquiry performed by the bank relative to thecustomer utilizes the customer computer identification setup on thecustomer computer. The bank computer performs an identification inquirywhich is preferably in an encoded form. The customer computer mustprovide a satisfactory response identifying the customer computer to thebank computer. If proper identification is not achieved then thecommunications session is terminated.

If proper identification of the customer computer is achieved, then thebank further analyzes to determine whether the personal identificationinformation given by the customer computer user is an authorized user.This is done by verifying that the personal identification code given bythe user is an authorized user personal identification code. It canalternatively or additionally employ other inquiries using other fieldsof customer and user information for verification or authentication.

The above identification analyses are used to properly associate in thebanks records, the customer account and user for further processing ofthe communication and associated payment authorization request. Theabove-described identification procedures may also act as a portion ofthe verification analyses used in performing validity analyses, or aspart of one or more authentication analyses, which may include justthese considerations or may be combined with additional analyses toprovide additional reliability for the authentication analysis andvalidation decision. The additional parameters may be any of thosedescribed elsewhere herein in connection with verification orauthentication of the setup of the customer account and processing ofthe purchase authorization request, or other similar parameters.

—Bank Authentication Inquiry

The communications between the customer and bank may also advantageouslyinclude an authentication inquiry by the bank to reliably determinewhether the customer computer 10 is an authorized customer computer andthat the user is an authorized user for such customer account. Theauthentication procedures explained above can also be applied duringsetup or a purchasing transaction validation analysis according to theinvention.

The authentication procedures seek to determine that the customercomputer and user are an authorized customer computer and an authorizeduser for the customer account. The authenticity analysis can use thirdparty information as part of the authenticity analysis, or theauthentication can entail only verification by matching one or morefields of customer account information.

Communicating Between Bank and Merchant

Preferred methods according to the invention may also includecommunicating between the bank and merchant. In such communications themerchant is seeking assurance of payment from the bank, so that thecustomer order can be fully processed. The customer or merchant maysubmit a request seeking bank authorization, and for the bank to assurepayment and/or make payment to the merchant. FIG. 3 illustrates aninternet communications linkage between the merchant computer 20 and thebank computer 30. This is done via merchant internet service 18,internet 15 and the bank internet service 28.

In alternative systems and methods the merchant computer 10 may bedirectly connected via modem (not illustrated) to the bank computer 30.Other communications vehicles and various communications routes can beemployed to provide data communications between the merchant and bank.

In some of the methods according to this invention the merchant maycommunicate with the bank using non-internet forms of communication.This includes the direct modem connection explained above. It is alsopossible to employ other direct communications between a merchant andthe bank or a representative of the bank. Furthermore, it is possible touse telephone voice lines, fax communication or other non-internetcommunications vehicles. This is particularly advantageous in the setupphase, but also can apply to editing of setup information.

In most purchase transaction processing the merchant and bank willcommunicate via the internet. It may alternatively be desirable to usenon-internet forms of communication between the merchant and bank in thecourse of a purchase transaction. The customer or bank can initiate thecommunication, which is preferably a data processing communicationsvehicle. Data concerning the proposed order and other data passedbetween the bank and merchant are communicated to perform the methodsaccording to this invention.

—Merchant-Bank Communications Initiation

The communications linkage between the merchant and bank computers canresult from merchant initiation or bank initiation. This can be doneeither before or after the order file is created and/or placed. In onepreferred version of the invention, the user representing a customerfirst builds an order file at the merchant's web site. Then the customerindicates while in communication with the merchant via the internet,that the customer wishes to pay using the bank. This is easily providedby having an internet link between the merchant's web site and the bankcomputer 30. This can be part of the merchant setup with the bank.

The selection of the bank using the merchant web site link or othersuitable means initiates a data communications linkage between thecustomer and bank. This is preferably a direct connection between thecustomer and bank. Invitation of merchant bank communications may varydependent upon the chosen communications approach between the customerand merchant.

In alternative methods according to the invention, the customer mayindicate while at the merchant web site that the customer wants to payusing bank. Instead of the customer initiating the communicationslinkage with the bank, the customer's placement of the order with themerchant can result in communications being initiated between themerchant and bank. In one such procedure, The merchant communicates withthe bank and indicates that the customer has placed an order thatincludes a request that bank is to be used to assure payment and/or makepayment for the customer order. The merchant can communicate relevantinformation to the bank indicating the transaction control number,customer identification, amount of charges associated with the order,ordered goods or services or other information.

In response to the merchant's communication with the bank, the bankpreferably initiates a communications linkage with the customer. Thecustomer computer 10 can be contacted via the internet or by other dataprocessing communications vehicles.

The merchant information supplied to the bank concerning the customerorder includes transaction identification which is also provided to thecustomer computer. When the bank computer establishes communication withthe customer computer, then the bank goes through an identificationinquiry and verification and/or authentication processes to determinethat the bank has contacted the proper customer and proper customercomputer which is involved in the identified transaction with themerchant.

—Bank Identification Inquiry of Merchant

A bank identification inquiry also is preferably used when the bank andmerchant computers are in communication. This can be accomplished in thesame manner as described with respect to the bank identification inquiryfor communications with the customer.

—Bank Authentication Inquiry of Merchant

A bank authentication inquiry may also be used when the bank andmerchant computers are in communication. This can be accomplished in thesame manner as described with respect to the bank authentication inquiryfor communications with the customer.

Other Analyses by Bank for Validation of Transaction

In addition to the analyses mentioned above with regard toidentification, verification or authentication, it is also preferablethat the bank perform one or more supplemental validation analyses.Examples of such supplemental transaction validation analyses includeanalyzing the available credit or available funds in the credit or debitaccount to be charged.

An additional area of analysis which can be employed is transactionfrequency analysis. This type of analysis looks at the frequency of acustomer's use and compares it with a predetermined range or thehistorical frequency of use. The historical frequency can be determinedover any desired prior period or periods of use of the customer account.If the frequency of use is abnormal, then validation may be refusedpending further investigation to determine if the transaction for whichauthorization is being sought is genuine or as a result of fraud orother abusive action by unauthorized users or customer impostors.

Another supplemental validation analysis is dollar amount oftransaction. This analysis can look at the dollar value of a particulartransaction to help determine abusive situations. For example, a setmonetary amount can be used for a particular customer account as atrigger to invalidating the purchase transaction. Alternatively, themonetary trigger may be based on historical data associated with acustomer account or user. The historical data can be compiled over anydesired period of time.

Determination of validity may employ a weak link conditional approachwherein certain factors are necessarily at or above a triggering limit,or within an acceptable range. If such is not found then the ruling bythe bank is invalidity and the transaction is not authorized. It is alsopossible to use weighted factor analysis wherein one or more of thefactors used to determine validity may be scaled relative to one or moreother factors using fixed, predetermined or variable weight scalingfactors.

Validation and Authorization of Transaction

The bank receives a request for authorization to charge a customeraccount in connection with an internet purchase transaction. The requestfor authorization also serves as a request that the bank perform avalidation analysis which is the basis of the decision whether toauthorize the transaction and communicate assurance of payment to themerchant to the benefit of the customer account being charged.

The request for authorization and validation can be communicated byeither the merchant or customer to the direction of the bank. This canbe done in a variety of suitable ways; however, communication via theinternet is contemplated to be the most expedient.

The validation analysis performed by the bank can include one or more ofthe various analyses which have been described herein. Validationanalysis by the bank can also include additional analyses which the bankdeems appropriate in determining whether the proposed internet purchasetransaction will be completed using the bank as a payment assurer andpayment agent in favor of the assured, merchant.

The validation analysis may include analysis of the merchant, analysisof the customer, analysis of the user, analysis of third partyinformation, and analysis of historical or other customer accountinformation. Other analyses can also be included.

The validation analysis results in either validation of the transaction,invalidation of the transaction, or some other response indicating needfor additional analysis or added information.

Communication of Assurance of Payment

If the validation analysis or additional authorization analysesperformed by the bank result in a positive or valid result, then thebank communicates with the merchant and provides assurance of payment.Assurance of payment can be in various forms and formats. Acceptance ofthe assurance is facilitated by having the merchant set up with the bankas a participating merchant. In some forms the assurance of payment iscommunicated by the bank to the merchant via the internet. This can mosteffectively be accomplished by merely including the transaction controlnumber, the amount authorized and an indication that the merchant'saccount with the bank will be credited in due course for the authorizedamount.

It is also possible to send the authorization notice and assurance ofpayment to the merchant along with key information which has beenverified. This may be transaction purchase amount, confirmation of thegoods or services, and/or delivery address information which has beenverified against authorized delivery addresses for the customer accountinvolved. The bank may make payment contingent upon or subject torevocation, if the merchant ships in a manner which is inconsistent withthe key information provided in the bank assurance of payment, or in aseparate communication of bank authorization. In such later case theassurance of payment may be made in a separate communication between thebank and merchant.

Shipment or Delivery

One key piece of transaction information which can be used in the banktransaction authorization or assurance of payment is the deliveryaddress. The delivery address may be specified by the bank and shipmentto any different address may result in refusal to pay or revocation ofpayment. The merchant is obligated in such forms of the invention tofollow the bank instructions containing a delivery authorization addresscommunicated by the bank to the merchant. This delivery authorizationaddress may be the only address provided, or it may be a confirmation ofan address provided by the customer in building the order file. Stillfurther, it is possible for the order file to be built by contributionsfrom both the customer and bank with the bank supplying key information,such as the delivery address using an authorized delivery address set upwith the bank for the proper customer account and user.

A further alternative is that the merchant submits the planned deliveryaddress with the request for authorization and the bank confirms afterverification against the customer account that shipment to the addressindicated in the request for authorization is an authorized deliveryaddress to which the merchant may direct shipment.

Payment by Bank to Merchant

Payment by the bank to the merchant is most efficiently effected bycrediting a previously set up merchant account with the bank.Alternatively, the bank can effect payment by sending checks, wiretransfers, electronic funds transfers, or other known or hereafterdeveloped methods of payment. The payment is preferably made concurrentwith or after debiting the customer account to which the purchasetransaction charges are to be made. Alternatively, the bank may effectpayment and then charge the customer.

Billing or Charging of Customer

The customer is billed in a suitable fashion for the charges which areassociated with the customer's internet purchase transactions. In thecase of a credit account, the charge will be posted to the customer'saccount and then demand for payment is made by the bank to the customer.This can be done in a variety of ways, such as by billing the customerfor the charges using a printed bill format.

Alternatively, the customer may have an account which is prepaid and hasfunds available for debiting to cover the purchase transaction charges.These funds can then be credited to the account of the merchant, eitherdirectly or using one or more intermediaries, such as the bank.

It is also possible that the customer may be charged and that payment iseffected by the customer to the bank using another institution orpayment agent which is billed using paper or electronic documentation.The payment agent then pays in behalf of the customer and thearrangements between the agent and customer may be accounts of varioustypes and requirements.

Further Explanation of Methods According to the Invention

FIG. 4 further details actions taken by the customer, merchant and bankusing a preferred process and preferred configuration, such as theconfiguration of FIG. 3. Step 110 illustrates the customer accessing themerchant internet site for purposes of gaining information, building anorder file, and/or placing an order.

Step 120 is the customer building an order file in preparation forplacing an order. The order file being built by the customer mayidentify the customer or it may be identified solely by an ordertracking number assigned by the merchant. The order file also includesidentification of the items which the customer wishes to obtain.Additionally, the order file may indicate that the customer has selectedto have payment provided by bank 30. However, no account number, accountaddress, or other sensitive information is required to build the orderfile using the novel methods. Instead, the customer order is identifiedby the merchant and the desired goods and services are identified in theorder file. Depending upon the specific embodiment of the inventionemployed, other information may be included in the order file.

Step 130 represents the customer placing the order with the merchant.The merchant can perform any desired initial processing (notillustrated), such as to determine if the order is sufficiently definedand/or complete. The set of order information fields required mayindicate that the customer intends to pay using bank 30.

Step 140 represents the customer contacting the bank. This can be donevia the internet or otherwise as explained herein. Upon customercommunication with the bank, the customer submits to the bankidentification inquiry in step 150. The bank then analyzes the customerfor authenticity using one or more of the authentication or verificationprocedures explained herein.

FIG. 4 also shows that the bank may in step 170 additionally analyze thetransaction relative to the customer account for a monetary limit. Otheradditional analyses as explained herein may also be performed prior tovalidating or invalidating the purchase transaction and responding tothe request for authorization.

In the case where the transaction is validated, then step 180illustrates that in response to the request for authorization, the bankcontacts the merchant and assures payment. The bank may provide deliveryor shipping instructions, or confirm instructions already given by thecustomer, when the bank is assuring the merchant of payment.

Thereafter the bank sends payment to the merchant and bills the customerfor the charges made in the transaction. A transaction processing feemay be charged to either or both the merchant and/or customer.

FIG. 5—Illustration of Established Customer Transaction

FIG. 5 illustrates a method according to the inventions. The customercomputer monitor is shown as monitor 200. Displayed information isincluded on the monitor as shown. This advantageously includes screenorder file data representatively shown as order data 201. Order data 201is used and forms part or all of the order file for this order.

After the order data 201 has been selected by the customer, then theoperational command icons for save 202 and place order 203 are displayedto allow the user to save the order file for later editing orsubmission. If the user is satisfied with the order data and wants toplace the order, then the order placement icon 203 is clicked orotherwise operated to place the order with the merchant or bank.

The display on monitor 200 also shows 2 traditional charge accountoptions labeled as operational icons 205 and 206. A user may click uponeither of these to choose a prior art purchasing process such asdescribed above.

Alternatively, the user is given the option of clicking on the Bank Icon208 which activates one of several different processes according to thisinvention.

FIG. 5 shows a displayed message 210 indicating that the customer is anapproved purchaser. The identification inquiry or inquiries explainedelsewhere herein are being performed. The computer identification isconveniently referred to as an electronic thumbprint. If thisauthentication of the customer computer is successfully completed, thenthe display indicates that the order approval process automaticallystarts.

Display message 220 indicates that the computer identification inquirywas successfully completed. Now the displayed message prompts the userto enter the personal identification code associated with this user andcustomer account. The user then provides the code in the squares or inanother suitable manner. Entering this information on the customer/usercomputer starts the process again and the personal identificationprocess is undertaken. This is advantageously done by verifying thepersonal identification code field of the bank's customer record againstthe entered information.

Message display 230 indicates success in the prior step and the user isnow being prompted to indicate whether the order is to be shipped to theuser's home or business address. After the desired address is indicated,such as by clicking on screen, then the submit order command isactivated and the validation and authorization procedures explainedherein can be performed in various manners as described. The displayedmessage 240 indicates the order has been approved. The user has thuscompleted the interactive portion with his or her customer computer.

FIGS. 6 & 7—Illustration of New Customer Transaction

FIG. 6 shows another monitor 250 having a customer/user computer screendisplay similar to that described above with regard to monitor 200.After providing the needed order data, the user clicks on the Bank Icon208 to start interaction with the bank. The bank seeks to find computeridentification information from the user's computer but is unsuccessfuland thus screen display 260 is presented. Displayed message 260 welcomesthe potential new customer and queries the user whether he or she wantsto open a new account with the bank. The user clicks on the “yes”operation control icon 261.

A subsequent screen display message 270 is presented in reaction to theyes command. The user is prompted to contact the bank using a specifiedvoice telephone line. This is done to setup the customer account asvariously described herein. The user/customer then performs such a setupprocedure. As illustrated in representative display screen message 280,the user/customer provides the indicated information by voiceexplanation. The customer also agrees to the account terms andconditions. The user is also advantageously provided with the personalidentification code or codes needed during this setup telephone session.

FIG. 7 shows a further screen display message 300. This message isdisplayed after the user contacts the bank or merchant web site tocomplete setup of the customer account by activating the account.Message 300 indicates the various verification and authenticationprocesses have been performed and setup has been approved. Analternative rejection (non-approval) display message is shown is displaymessage 310.

The displayed message 300 may also show the credit limit assigned by thebank. If the user want to proceed with account activation, then the“activate account” screen icon is clicked. In the procedure illustratedby FIGS. 6 and 7, the user has been given a personal identification codeby telephone during the customer-bank setup telephone session. Theuser/customer then provides the requested number.

The user/customer then indicates that the activation process, asdescribed herein, should be performed when the “activate account” iconis clicked by the user using the customer computer.

Message 330 indicates that the activation process preferably includesproviding the customer computer with computer identification coding andprogramming as needed to act as an electronic thumbprint which can beread or otherwise decoded by the bank computer to verify or authenticatethe computer in further transaction processing or account modificationoperations. This step can also be used to provide any needed customerinterface programming.

Display message 340 indicates that the acceptance of the computeridentification coding by the customer computer leads to a welcomemessage indicating that the customer account is activated. If thecustomer computer does not accept the coding and/or programming, thenadditional instructions (not shown) can be given.

Upon approval and activation of the customer account, the customer isthen given an opportunity to continue with the initial order. The “yes”icon is clicked as screen display 370 indicates. A yes command leads tostep 360 which prompts the user for the desired customer shippingaddress.

Screen display message 350 indicates that the order has been approved bythe bank and is being further processed. Such further processing leadsto the merchant also receiving approval according to the various methodsdescribed herein.

Example A

This is one example of how the methods according to this invention canbe carried out. In this example the customer and the merchant arealready set up with the bank in accordance herewith. The customercontacts the merchant via the internet as described. The customerinitiates communications with the merchant using a first communicationslink. The customer then builds the order file but does not includecustomer account information which is sufficient for obtaining payment,goods or services in a fraudulent transaction. Instead, the customerclicks on the bank icon set up on the merchant's web site and this linksto the bank web site establishing an additional or second communicationslinkage therewith, advantageously using a distinct communications modeor vehicle.

The bank then performs a customer identity check such as by using bankencoded information written onto the customer computer. The bankanalyzes the customer identity information and verifies that it is anactive account. The user is prompted for his personal identificationcode and the user supplies such information. The bank verifies that thepersonal identification code is correct as an authorized user under thecustomer's account. If these factors are verified, then this serves asan authentication process indicating the authenticity of the user to usethe particular customer account and authorized customer computerinvolved.

Further third party authentication is optionally provided by the bankperforming an assessment of the caller identification informationassociated with the telephone line through which the customer isconnected to the internet in the customer-bank communications linkage.The telephone line number information is verified against the relatedinformation contained in the bank's customer account information. If thecaller identification information is verified, then additionalauthentication evidence is provided and the bank now completes theauthentication analysis.

The customer computer then communicates to the bank computer informationindicating the merchant being used in the purchase transaction. Theamount to be charged to the customer for the goods and/or services arecommunicated to the bank. The bank then does a credit limit analysis forthe customer account, and the amount requested for authorization may ormay not be found acceptable.

The bank then establishes a third communications link with the merchantvia the internet while the customer is in active or standbycommunication with the merchant. The bank performs any desired merchantidentification inquiry, such as done with the customer. The bank alsoperforms an authentication analysis by verifying that the merchantcomputer is an authorized merchant computer using the bank's merchantaccount verification information.

With the above steps performed the bank is now in a position to performa validation analysis for the transaction. Since the merchant, customerand user identifications have been verified and the credit limitanalysis has successfully been passed, then the bank determines that thetransaction is valid.

The merchant, bank and customer are in this example engaged in acommunications triad wherein each is communicating with the other twoover the internet in an independent fashion.

The bank then communicates to both the merchant and customer that thepurchase transaction has been authorized. The bank communicatesassurance of payment to the merchant indicating that payment will bemade to merchant's account with bank on the next business day. Themerchant in many cases will accept the assurance of payment assufficient for the merchant to proceed with shipment of the purchasedgoods or services.

The bank debits the customer account at or near the time theauthorization is given. The bank also credits the merchant's accountsuch as at nearly the same time or otherwise. The customer issubsequently billed for the transaction, such as on the next customerbilling statement.

Example B

In this example the customer and the merchant are already set up withthe bank in accordance herewith. The customer contacts the merchant viathe internet as described. The customer initiates communications withthe merchant using a first communications link. The customer then buildsthe order file but does not include customer account informationsufficient to authorize goods, services or for receiving payment.Instead, the customer saves the order file with the merchant andmaintains a record of the order file contents on the user's computer.The record of the order file includes merchant identificationinformation, transaction identification, and an indication of the amountto be charged to the customer's account. The customer then discontinuescommunications with the merchant via the internet.

The customer thereafter initiates communications with the bank, such asvia the internet. The user is prompted for his personal identificationcode and the user supplies such information. The bank performs thedesired identification inquiry by comparing the user's personalidentification code to the customer account information for this field.The bank also performs customer computer identification analysis usingspecially coded information contained on the user's authorized computer.The bank then analyzes the customer identity information and verifiesthat it is an active account. The bank verifies that the personalidentification code is correct as an authorized user under thecustomer's account.

The user's computer includes bank programming which has an encryptionkey which varies as a function of the information previously written tothe customer's computer by the bank, the time and date, and the numberof transactions conducted by the customer with the bank. The bank thenauthenticates the user and customer computer using such analyses. Ifthese factors are successfully verified, then this serves as anauthentication analysis indicating the authenticity of the user to usethe customer account.

Further third party authentication is optionally provided by the bankperforming an assessment of the caller identification informationassociated with the telephone line through which the customer isconnected to the internet in the customer-bank communications linkage.The telephone line number information is verified against the relatedinformation contained in the bank's customer account information. If thecaller identification information is verified, then additionalauthentication evidence is provided and the bank now has completed theauthentication analysis of the user and customer account.

The customer computer then communicates to the bank computer informationindicating the merchant being used in the purchase transaction and thetransaction control number. The amount to be charged to the customer forthe goods and/or services are also communicated to the bank. The bankthen does a credit limit analysis for the customer account, and theamount requested for authorization is acceptable. The bank communicatesto the user that the transaction is processing.

The bank then establishes a communications link with the merchant viathe internet while the customer is in active or standby communicationswith the merchant. The performs any desired merchant identificationinquiry, such as done with the customer. The bank also performs anauthentication analysis by verifying that the merchant computer is anauthorized merchant computer using the bank's merchant account computeridentification verification information.

With the above steps performed the bank is now in a position to performa validation analysis for the transaction. Since the merchant, customerand user identifications have been verified and the credit limitanalysis has successfully been passed, then the bank determines that thetransaction is valid.

The bank is simultaneously engaged with the merchant and customer butthe customer and merchant are not in active communication. The bank thencommunicates to both the merchant and customer that the purchasetransaction has been authorized. The bank communicates assurance ofpayment to the merchant indicating that payment will be made tomerchant's account with bank by the next business day. The merchantaccepts the assurance of payment as sufficient for the merchant toproceed with shipment of the purchased goods.

The bank debits the customer account at the time the authorization isgiven. The bank also credits the merchant's account at nearly the sametime. The customer is subsequently billed for the transaction on thenext customer billing statement.

Example C

In this example the customer and the merchant are already set up withthe bank in accordance herewith. The customer contacts the merchant viathe internet as described. The customer initiates communications withthe merchant using a first communications link. The customer then buildsthe order file but does not include sensitive customer accountinformation. Instead, the customer saves the order file with themerchant and maintains a record of the order file on the user'scomputer.

The record of the order file includes customer and merchantidentification information, transaction identification, an indication ofthe amount to be charged to the customer's account, an indication thatthe bank is being used to assure payment, and other informationspecifying essential and desired key information for the order beingplaced. The customer then places the order with the merchant via theinternet.

The merchant thereafter initiates communications with the bank, such asvia the internet. Information concerning the order file is in part or inwhole communicated to the bank along with a request for authorization.

The bank then initiates communication with the customer, such as via theinternet. The user is prompted for his personal identification code andthe user supplies such information. The bank performs the desiredidentification inquiry by comparing the user's personal identificationcode to the customer account information for this information field. Thebank also performs customer computer identification analysis usingspecially coded information contained on the user's authorized computer.The bank then analyzes the customer identity information and verifiesthat it is an active account. The bank verifies that the personalidentification code is correct as an authorized user under thecustomer's account.

The user's computer includes bank interface programming which has anencryption key which varies as a function of the information previouslywritten to the customer's computer by the bank, the time and date, andthe number of transactions conducted by the customer with the bank. Thebank then authenticates the user and customer computer using suchanalyses. If these factors are successfully verified, then this servesas an authentication analysis indicating the authenticity of the user touse the customer account.

Further third party authentication is optionally provided by the bankperforming an assessment of the caller identification informationassociated with the telephone line through which the customer isconnected to the internet in the customer-bank communications linkage.The telephone line number information is verified against the relatedinformation contained in the bank's customer account information. If thecaller identification information is verified, then additionalauthentication evidence is provided and the bank now has completed theauthentication analysis of the user and customer account.

The customer computer then communicates to the bank computer informationindicating the merchant being used in the purchase transaction and thetransaction control number. The amount to be charged to the customer forthe goods and/or services are also communicated to the bank. The bankthen does a credit limit analysis for the customer account, and theamount requested for authorization is acceptable. The bank communicatesto the user that the transaction is processing.

The bank then establishes a communications link with the merchant viathe internet while the customer is in active or standby communicationwith the merchant. The bank performs any desired merchant identificationinquiry, such as done with the customer. The bank also performs anauthentication analysis by verifying that the merchant computer is anauthorized merchant computer using the bank's merchant accountverification information.

With the above steps performed the bank is now in a position to performa validation analysis for the transaction. Since the merchant, customerand user identifications have been verified and the credit limitanalysis has successfully been passed, then the bank determines that thetransaction is valid.

The bank is simultaneously engaged with the merchant and customer butthe customer and merchant are no longer in active communication. Thebank then communicates to both the merchant and customer that thepurchase transaction has been authorized. The bank communicatesassurance of payment to the merchant indicating that payment will bemade to merchant's account with bank by the next business day. Themerchant accepts the assurance of payment as sufficient for the merchantto proceed with shipment of the purchased goods.

The bank debits the customer account at the time the authorization isgiven. The bank also credits the merchant's account at nearly the sametime. The customer is subsequently billed for the transaction on thenext billing statement.

Alternative Representation of Customer by Purchasing Agent

The methods according hereto can also be practiced wherein the customeris represented by a buying agent. The buying agent can be a moretraditional type buying agent whereby the customer appoints andauthorizes the buying agent. Alternatively, the buying agent may be acomputer service vested with various techniques for securing the mostfavorable purchasing on behalf of the customer.

Alternative Representation of Merchant by Selling Agent

The methods according hereto can also be practiced wherein the merchantis represented by a selling agent. The selling agent can be a moretraditional type selling agent whereby the customer appoints andeffectively authorizes the selling agent. Alternatively, the sellingagent may be a computer service vested with various techniques forsecuring the most favorable selling price in behalf of the merchant.

Bank Functions May be Divided or Substituted

The description given herein is made as if the bank is a single legalentity. However, the functions of the bank may instead be performed byan agent or various agents which assume some or all of the bank'sresponsibilities and functions in accordance with the inventions. Forexample, the bank may have several subsidiary or sister corporationswhich perform some or all of the functions instead of or in support ofthe bank's performance of the methods according hereto.

Alternative Quick Setup and Related Purchase Transaction

In still another alternative method according to the invention apotential customer is both setup and given credit in a series of stepspreferably performed as explained below.

The procedure applies to certain situations wherein a new customer ismore quickly set up to facilitate nearly immediate use of the customeraccount. The context of the procedure is explained with regard to acustomer accessing a merchant web site for a merchant that is set upwith a merchant account at the bank in accordance with the invention.The screen display at the merchant web site is provided with an icon orother indication that the merchant is a bank authorized merchant andthat payment can be made employing the bank.

If a potential new customer clicks on the bank icon or otherwiseindicates that the customer wants to set up a customer account with thebank, then the setup procedure is initiated. This can initially involveestablishing a communications link between the customer and bank.Preferably, the initial setup communications link is via telephone voiceline between the customer telephone and the bank setup telephone.

Alternatively, the potential customer may make some initialcommunications link via the internet in response to the potentialcustomer's indication that it would like to set up an account with thebank.

The methods thus advantageously also include prompting the potentialcustomer to call the bank setup telephone number. The bank setuptelephone number can be a toll-free number, for example 1-800-000-0000.The prompting of the potential customer involves providing the potentialcustomer with the telephone number to be used. The prompting alsopreferably includes instructing the potential customer that thetelephone to be used in the voice telephone setup contact be thecustomer's or user's home number, or other customer telephone numberthat will be used in future communications sessions with the bank and/ormerchants. Such customer or user telephone line is for conveniencecalled the designated customer or user telephone line.

The prompting also preferably includes explaining that this designatedtelephone line is also preferably a telephone line which has calleridentification information available concerning the customer or user,and that such caller identification information is not in a blockedstatus. This is desired since in at least some of the preferred methodsthe telephone caller identification information is used by the bank inprocessing requests for setup, setup modification and requests forauthorization to charge.

The potential customer then proceeds by telephoning or otherwisecommunicating in a setup mode communications linkage with the bank setuptelephone line. The preferred setup mode communications linkage is acustomer voice telephone line communicating with a bank voice telephoneline.

The methods also include establishing the setup mode communicationslinkage between the potential customer and the bank setup communicationsline.

The methods further preferably include providing some or all of thecustomer account setup information by voice or other communications modewhich is preferably not via the interne. The providing of customeraccount information will typically include voice communication ofcustomer information such as explained above in connection with typicalsetup procedures.

The quick setup methods further employ a quick setup authenticating stepor steps performed while the potential customer is in the setup modeon-line communications linkage with the bank. A preferred mode of quicksetup authentication is to use a pre-existing charge card which can bechecked for validity and credit limit quickly while the potentialcustomer is on the telephone with the bank setup department.Alternatively, the bank may have rapid processing access to a creditreport or abbreviated credit report to use in lieu of or in addition tousing the pre-existing account information. This could bebank-originated information or third-party originated information.

The quick or instant setup procedure speeds setup by providing to thepotential customer a setup option wherein the customer provides creditauthentication information which can be immediately accessed by the bankand used to provide setup approval and authorization for credit usingthe customer account with the bank. One example of such creditauthentication information is the indicated pre-existing credit card.Other quickly accessible customer authentication and credit informationmay also be alternatively used.

In this process the customer provides via the voice telephone line orother setup communications linkage, an indication of the bank cardcustomer account number, customer name and expiration date, similar tomaking a charge over the phone using the pre-existing credit card. Thebank then utilizes conventional technology to seek authorization tocharge the potential customer's pre-existing charge account. Theauthorization request to the pre-existing charge card account may or maynot result in an actual charge to the pre-existing account.

Full setup of the customer account with the bank may be subsequentlycompleted, yet the quick setup procedure will allow an initialtransaction or transactions to be approved by the bank against the newcustomer's account.

When using the quick setup procedure, the bank will typically limit thecredit amount to a low initial value until the full setup procedure cansubsequently be completed. At that time the bank may indicate thatadditional credit is available beyond the quick setup credit limitgiven.

After the new customer has been approved using the quick setupprocedure, then the steps for activation and use will be the same asthose described above.

Alternative Process with Assurance to New Merchant

The quick or instant credit procedure described above can also be usedin the context of quick set up of a new merchant account in the same oran analogous manner to that described above in connection with quick setup of a new customer account. For example, the merchant can use themerchant's pre-existing bank card, e.g. a MASTERCARD™. This can be usedto authenticate the merchant to allow a merchant account to beestablished with the bank on a quick basis similar to the quick set upprocedure for customers described above. Subsequent completion of thefull setup procedure is preferred.

Further Explanation Concerning Aspects of the Invention

The invention may reside in an individual feature or features or incombinations of features as set out herein in summarized and exemplaryforms. Although every novel combination has not been individuallydiscussed, it must be understood that the various features,combinations, subcombinations and functions recited herein areappropriately combined with one or more of the other such features,combinations, subcombinations and functions to serve as bases forclaiming of patent protection on this invention.

Further Indication of Aspects of the Invention

The invention can be considered in a number of different combinationsand subcombinations. Exemplary combinations and subcombinations are setout below. It should be appreciated that additional combinations andsubcombinations can also be defined consistent with the descriptiongiven herein.

A method for conducting a purchase of goods or services over theinternet, the purchase being made by a customer using a merchant forgoods or services which are to be provided at a delivery location, andwherein a bank assures payment to the merchant for said purchase,comprising—creating a customer account with the bank, said customeraccount being associated with said customer; the customer account alsohaving: customer computer identification information associating saidcustomer account with at least one authorized customer computer which isidentifiable by the bank; customer delivery address informationassociating said customer account with at least one authorized customerdelivery address; creating a merchant account, said merchant accountbeing associated with said merchant; said merchant having a merchantinternet site at which the merchant offers goods or services; displayingto the customer on the merchant internet site indicia which indicatescustomers can choose to pay the merchant using said bank; detecting whena customer chooses to pay the merchant using said bank; obtainingcomputerized order information placed from an ordering computer whichindicates an order for chosen goods or services being sought forpurchase by the customer using the merchant; said obtaining computerizedorder information including: obtaining an order delivery addressindicating a location for the delivery of the goods or servicesassociated with the order; obtaining ordering computer identificationinformation from the ordering computer; verifying said ordering computeridentification information from the ordering computer by comparing saidordering computer identification information to said customer computeridentification information kept by the bank to assure it is anauthorized customer computer; communicating assurance of payment to themerchant in connection with said order upon successful verification ofsaid order delivery address and said ordering computer identificationinformation.

A method for conducting a purchase of goods or services over theinternet, the purchase being made by a customer using a merchant via amerchant internet site selling goods or services to be provided at adelivery location, and wherein a bank assures payment to the merchantfor said purchase, comprising—creating a customer account with the bank,said customer account being associated with said customer; the customeraccount also having: customer computer identification informationassociating said customer account with at least one authorized customercomputer which is identifiable by the bank; customer delivery addressinformation associating said customer account with at least oneauthorized customer delivery address; detecting when a customer choosesto pay the merchant using said bank; obtaining computerized orderinformation placed from an ordering computer which indicates an orderfor chosen goods or services being sought for purchase by the customerusing the merchant; said obtaining computerized order informationincluding: recording an order delivery address indicating a location forthe delivery of the goods or services associated with the order;obtaining computer identification information from the orderingcomputer; verifying said order delivery address by comparing said orderdelivery address to said authorized delivery address information kept bythe bank; verifying that said computer identification information fromthe ordering computer is from an authorized customer computer associatedwith said customer account; communicating assurance of payment to themerchant in connection with said order upon successful verification ofsaid order delivery address and said computer identificationinformation.

A method for conducting a purchase of goods or services over theinternet, the purchase being made by a customer using a merchant, saidmerchant having an internet site at which the merchant offers goods orservices; and wherein a bank assures payment to the merchant,comprising—creating a customer account with the bank that is associatedwith said customer; providing the customer account with customer accountinformation associated therewith which includes: authorized useridentification information associating said customer account with atleast one authorized user identification code; customer computeridentification information associating said customer account with atleast one authorized customer computer, said at least one authorizedcustomer computer being identifiable by the bank; detecting when saidcustomer chooses to pay the merchant using said bank; recordinginformation indicating the customer has placed an order which seeks toobtain using the merchant ordered goods or services; obtaining computeridentification information about an ordering computer from which saidorder has been placed; verifying said computer identificationinformation is from an authorized customer computer associated with thecustomer account; recording user identification code informationprovided by a user of the order computer when placing said order;verifying said user identification code information by comparing theuser identification code information so provided in comparison toauthorized user identification codes associated with the customeraccount; communicating assurance of payment to the merchant uponsuccessful verification of said computer identification information andsaid user identification code information.

A method for authorizing a purchase of goods or services over theinternet, the purchase being made by a customer using a merchant, saidmerchant having an internet site at which the merchant offers goods orservices; and wherein a bank authorizes the purchase and assures paymentto the merchant, comprising: detecting when a customer chooses to paythe merchant using said bank; obtaining order information indicating thecustomer has placed an order which seeks to obtain goods or servicesusing the merchant; obtaining information about an order computer fromwhich said order has been placed; orders; accessing customerverification information which includes authorized customer computerinformation which indicates one or more computers which have beenauthorized for use in placing verifying said order computer used inplacing the order is an authorized customer computer; communicating tothe merchant assurance of payment information upon successfulverification in said verifying step.

A method for conducting a purchase of goods or services over theinternet, the purchase being made by a customer using a merchant forgoods or services which are to be provided at a delivery location, andwherein a bank assures payment to the merchant for said purchase,comprising—creating a customer account with the bank, said customeraccount being associated with said customer; the customer account havingverification information contained therein, said verificationinformation including information about at least one of the followingverification parameters: customer delivery address informationassociating said customer account with at least one authorized customerdelivery address; customer computer identification informationassociating said customer account with at least one authorized customercomputer which is identifiable by the bank; authorized useridentification information associating said customer account with atleast one authorized user identification code; or, authorized telephonecaller identification information including at least one authorizedtelephone caller identification code; creating a merchant account, saidmerchant account being associated with said merchant; said merchanthaving a merchant internet site at which the merchant offers goods orservices; detecting when a customer chooses to pay the merchant usingsaid bank; communicating to the bank computerized order informationoriginating in connection with an order for chosen goods or servicesbeing sought using the merchant by a user from an ordering computer;said step of communicating to the bank being performed in connectionwith obtaining computerized information about at least one of thefollowing verification variables: associated with the order; orderingcomputer identification information obtained from the ordering computer;ordering user identification information obtained from the ordering userwhen the order is placed; ordering telephone caller identificationinformation obtained when the order is placed; validating said order bythe bank using said computerized order information and the verificationinformation kept by the bank in connection with said customer account;communicating assurance of payment to the merchant in connection withsaid order upon successful validation of said order.

A method for conducting a purchase of goods or services over theinternet, the purchase being made by a customer using a merchant forgoods or services which are to be provided at a delivery location, andwherein a bank assures payment to the merchant for said purchase,comprising—creating a customer account with the bank, said customeraccount being associated with said customer; the customer account havingverification information contained therein, said verificationinformation including information about at least one of the followingverification parameters: customer delivery address informationassociating said customer account with at least one authorized customerdelivery address; customer computer identification informationassociating said customer account with at least one authorized customercomputer which is identifiable by the bank; authorized useridentification information associating said customer account with atleast one authorized user identification code; or, authorized telephonecaller identification information including at least one authorizedtelephone caller identification code; detecting when a customer choosesto pay the merchant using said bank; communicating to the bankcomputerized order information originating in connection with an orderfor chosen goods or services being sought using the merchant by a userfrom an ordering computer; said step of communicating to the bank beingperformed in connection with obtaining computerized information about atleast one of the following verification variables: an order deliveryaddress indicating a location for the delivery of the goods or servicesassociated with the order; ordering computer identification informationobtained from the ordering computer; ordering user identificationinformation obtained from the ordering user when the order is placed;ordering telephone caller identification information obtained when theorder is placed; qualifying said order by the bank using saidcomputerized order information and the verification information kept bythe bank in connection with said customer account; communicatingassurance of payment to the merchant in connection with said order uponsuccessful qualification of said order.

A method for purchasing of goods or services and assuring payment overthe internet, the purchase being made by a customer using a merchant,said merchant having an internet site at which the merchant offers goodsor services; and wherein a bank authorizes the purchase and assurespayment to the merchant, comprising: obtaining computerized orderinformation indicating a customer desires to place an order which seeksto obtain goods or services using the merchant; communicating the orderinformation to the merchant; providing customer information to the bankin connection with said order information; accessing customerverification information by the bank, said customer verificationinformation being previously set up by the customer with the bank;verifying that the customer order information provided in connectionwith said order information is associated with said customer; verifyingthat order delivery address information is an authorized deliveryaddress associated with the customer; providing delivery addressinformation to the merchant in connection with said order; communicatingfrom the bank to the merchant assurance of payment information uponsuccessful verification in said verifying steps.

A method for facilitating purchasing of goods or services and assuringpayment over the internet, the purchase being made by a customer using amerchant, said merchant having an internet site at which the merchantoffers goods or services; and wherein a bank validates the purchase andassures payment to the merchant, comprising: telephoning the bank by thecustomer using a caller identification phone line associated with thecustomer; providing the bank with customer account information from thecustomer using said caller identification phone line; verifying that thecustomer account information given from the customer using the calleridentification phone line is consistent with account setup verificationinformation which includes the caller identification informationavailable when the customer uses the caller identification phone line;creating a customer account with the bank, said customer account beingassociated with said customer and having customer account informationincluding customer account verification information; obtaining orderinformation indicating a customer desires to place an order which seeksto obtain goods or services using the merchant; delivering the orderinformation to the merchant; providing customer information to the bankin connection with said order information; accessing customerverification information by the bank, said customer verificationinformation being previously set up by the customer with the bank;verifying that the customer order information provided in connectionwith said order information is associated with said customer;communicating from the bank to the merchant assurance of paymentinformation upon successful verification in said verifying steps.

A method performed by a bank for processing a purchase of goods orservices over the internet, the purchase being made by a customer usinga merchant via a merchant internet site selling goods or services to beprovided at a delivery location, and wherein the bank assures payment tothe merchant for said purchase, comprising—creating a customer accountwith the bank, said customer account being associated with saidcustomer; the customer account also having: customer computeridentification information associating said customer account with atleast one authorized customer computer which is identifiable by thebank; one authorized customer delivery address; detecting when acustomer chooses to pay the merchant using said bank; obtainingcomputerized order information placed from an ordering computer whichindicates an order for chosen goods or services being sought forpurchase by the customer using the merchant; said obtaining computerizedorder information including: receiving an order delivery addressindicating a location for the delivery of the goods or servicesassociated with the order; obtaining computer identification informationfrom the ordering computer; verifying said order delivery address bycomparing said order delivery address to said authorized deliveryaddress information kept by the bank; verifying that said computeridentification information from the ordering computer is from anauthorized customer computer associated with said customer account;communicating assurance of payment to the merchant in connection withsaid order upon successful verification of said order delivery addressand said computer identification information.

A method performed by a bank for processing a purchase of goods orservices over the internet, the purchase being made by a customer usinga merchant, said merchant having an internet site at which the merchantoffers goods or services; and wherein a bank assures payment to themerchant, comprising creating a customer account with the bank that isassociated with said customer; providing the customer account withcustomer account information associated therewith which includesauthorized user identification information associating said customeraccount with at least one authorized user identification code; customercomputer identification information associating said customer accountwith at least one authorized customer computer, said at least oneauthorized customer computer being identifiable by the bank; detectingwhen said customer chooses to pay the merchant using said bank;recording information indicating the customer has placed an order whichseeks to obtain using the merchant ordered goods or services; obtainingcomputer identification information about an ordering computer fromwhich said order has been placed; verifying said computer identificationinformation is from an authorized customer computer associated with thecustomer account; recording user identification code informationprovided by a user of the order computer when placing said order;verifying said user identification code information by comparing theuser identification code information so provided in comparison toauthorized user identification codes associated with the customeraccount; communicating assurance of payment to the merchant uponsuccessful verification of said computer identification information andsaid user identification code information.

A method performed by a bank for authorizing a purchase of goods orservices over the internet, the purchase being made by a customer usinga merchant, said merchant having an internet site at which the merchantoffers goods or services; and wherein a bank authorizes the purchase andassures payment to the merchant, comprising: detecting by the bank whena customer chooses to pay the merchant using said bank; obtaining by thebank order information indicating the customer has placed an order whichseeks to obtain goods or services using the merchant; obtaining by thebank information about an order computer from which said order has beenplaced; accessing customer verification information which includesauthorized customer computer information which indicates one or morecomputers which have been authorized for use in placing orders;verifying said order computer used in placing the order is an authorizedcustomer computer; communicating from the bank to the merchant assuranceof payment information upon successful verification in said verifyingstep.

A method for a bank authorizing a purchase of goods or services andassuring payment over the internet, the purchase being made by acustomer using a merchant, said merchant having an internet site atwhich the merchant offers goods or services; and wherein a bankauthorizes the purchase and assures payment to the merchant, comprising:detecting by the bank when a customer chooses to pay the merchant usingsaid bank; obtaining by the bank order information indicating thecustomer has placed an order which seeks to obtain goods or servicesusing the merchant; obtaining by the bank order information about anorder computer from which said order has been placed; obtaining by thebank order information about an order delivery address to which saidorder is to be sent; accessing customer verification information whichincludes authorized customer computer information which indicates one ormore computers which have been authorized for use in placing orders;verifying said order computer used in placing the order is an authorizedcustomer computer; verifying said order delivery address is anauthorized customer delivery address; communicating from the bank to themerchant assurance of payment information upon successful verificationin said verifying steps.

A method performed by a bank for authorizing a purchase of goods orservices and assuring payment over the internet, the purchase being madeby a customer using a merchant, said merchant having an internet site atwhich the merchant offers goods or services; and wherein a bankauthorizes the purchase and assures payment to the merchant, comprising:detecting by the bank when a customer chooses to pay the merchant usingsaid bank; obtaining by the bank order information indicating thecustomer has placed an order which seeks to obtain goods or servicesusing the merchant; obtaining by the bank order information about anorder computer from which said order has been placed; obtaining by thebank order information about an order delivery address; accessingcustomer verification information which includes authorized customercomputer information which indicates one or more computers which havebeen authorized for use in placing orders; verifying said order computerused in placing the order is an authorized customer computer; verifyingsaid order delivery address is an authorized customer delivery address;communicating from the bank to the merchant an authorized deliveryaddress and assurance of payment information upon successfulverification in said verifying steps.

A method performed by a bank for authorizing a purchase of goods orservices and assuring payment over the Internet, the purchase being madeby a customer using a merchant, said merchant having an internet site atwhich the merchant offers goods or services; and wherein a bankauthorizes the purchase and assures payment to the merchant, comprising:detecting by the bank when a customer chooses to pay the merchant usingsaid bank; obtaining by the bank order information indicating thecustomer has placed an order which seeks to obtain goods or servicesusing the merchant; obtaining by the bank order telephone calleridentification information from which said order has been placed;accessing customer verification information which includes authorizedcustomer computer information which indicates one or more computerswhich have been authorized for use in placing orders; verifying saidorder computer used in placing the order is an authorized customercomputer; verifying said order telephone caller identificationinformation is an authorized customer telephone caller identification;communicating from the bank to the merchant an assurance of paymentinformation upon successful verification in said verifying steps.

A method performed by a bank for authorizing a purchase of goods orservices over the internet, the purchase being made by a customer usinga merchant for goods or services which are to be provided at a deliverylocation, and wherein a bank assures payment to the merchant for saidpurchase, comprising creating a customer account with the bank, saidcustomer account being associated with said customer; the customeraccount having verification information contained therein, saidverification information including information about at least one of thefollowing verification parameters: customer delivery address informationassociating said customer account with at least one authorized customerdelivery address; customer computer identification informationassociating said customer account with at least one authorized customercomputer which is identifiable by the bank; authorized useridentification information associating said customer account with atleast one authorized user identification code; or, authorized telephonecaller identification information including at least one authorizedtelephone caller identification code; detecting by the bank when acustomer chooses to pay the merchant using said bank; obtaining by thebank computerized order information originating in connection with anorder for chosen goods or services being sought by a user from anordering computer; said step of obtaining by the bank computerized orderinformation being performed in connection with obtaining computerizedinformation about at least one of the following verification variables:an order delivery address indicating a location for the delivery of thegoods or services associated with the order; ordering computeridentification information obtained from the ordering computer; orderinguser identification information obtained from the ordering user when theorder is placed; ordering telephone caller identification informationobtained when the order is placed; validating said order by the bankusing said computerized order information and the verificationinformation kept by the bank in connection with said customer account;communicating from the bank to the merchant assurance of payment uponsuccessful validation of said order.

A method performed by a merchant for conducting a purchase of goods orservices over the internet, the purchase being made by a customer usingthe merchant for goods or services which are to be provided at adelivery location, and wherein a bank assures payment to the merchantfor said purchase, comprising displaying to the customer on the merchantinternet site indicia which indicates customers can choose to pay themerchant using said bank; detecting when a customer chooses to pay themerchant using said bank; obtaining computerized order informationplaced from an ordering computer which indicates an order for chosengoods or services being sought for purchase by the customer using themerchant; said obtaining computerized order information including:obtaining an order delivery address indicating a location for thedelivery of the goods or services associated with the order; obtainingordering computer identification information from the ordering computer;submitting said order delivery address to the bank for verification ofsaid order delivery address kept by the bank to assure it is anauthorized customer delivery address; verifying said ordering computeridentification information from the ordering computer by comparing saidordering computer identification information to said customer computeridentification information kept by the bank to assure it is anauthorized customer computer; receiving assurance of payment from thebank to the merchant in connection with said order upon successfulverification of said order delivery address and said ordering computeridentification information.

A method performed by a customer for conducting a purchase of goods orservices over the internet, the purchase being made by a customer usinga merchant for goods or services which are to be provided at a deliverylocation, and wherein a bank assures payment to the merchant for saidpurchase, comprising creating a customer account with the bank, saidcustomer account being associated with said customer; the customeraccount having verification information contained therein, saidverification information including information about at least one of thefollowing verification parameters: customer delivery address informationassociating said customer account with at least one authorized customerdelivery address; customer computer identification informationassociating said customer account with at least one authorized customercomputer which is identifiable by the bank; authorized useridentification information associating said customer account with atleast one authorized user identification code; or, authorized telephonecaller identification information including at least one authorizedtelephone caller identification code; detecting when a customer choosesto pay the merchant using said bank; communicating from the customer tothe bank computerized order information originating in connection withan order for chosen goods or services being sought using the merchant bya user from an ordering computer; said step of communicating from thecustomer to the bank being performed in connection with computerizedinformation about at least one of the following verification variables:an order delivery address indicating a location for the delivery of thegoods or services associated with the order; ordering computeridentification information obtained from the ordering computer; orderinguser identification information obtained from the ordering user when theorder is placed; ordering telephone caller identification informationobtained when the order is placed.

A method for establishing a customer account with a bank which is usedto pay merchants in connection with internet purchase transactions forgoods or services, comprising: creating a customer account with thebank, said customer account being associated with said customer andhaving customer account information; said customer account informationincluding customer computer identification information associating saidcustomer account with at least one authorized customer computer which isidentifiable by the bank while the customer is in communication over theinternet.

A method for establishing a customer account with a bank which is usedto pay merchants in connection with internet purchase transactions forgoods or services, comprising: telephoning the bank by the customerusing a caller identification phone line associated with the customer;providing the bank with customer account information from the customerusing said caller identification phone line; verifying that the customeraccount information given from the customer using the calleridentification phone line is consistent with account setup verificationinformation which includes the caller identification informationavailable when the customer uses the caller identification phone line;creating a customer account with the bank, said customer account beingassociated with said customer and having customer account information;said customer account information including customer computeridentification information associating said customer account with atleast one authorized customer computer which is identifiable by the bankwhile the customer is in communication over the internet.

A method for establishing a customer account with a bank which is usedto pay merchants in connection with internet purchase transactions forgoods or services, comprising: telephoning between the bank and thecustomer to provide oral explanation of customer account informationusing a caller identification phone line associated with the customer,said oral explanation of customer account information including:customer name information; at least one authorized customer deliveryaddress; at least one authorized user identification code; verifyingthat the customer account information given from the customer using thecaller identification phone line is consistent with account setupverification information which includes the caller identificationinformation available when the customer uses the caller identificationphone line; creating a customer account with the bank, said customeraccount being associated with said customer and having customer accountinformation; said customer account information including: customercomputer identification information associating said customer accountwith at least one authorized customer computer which is identifiable bythe bank while the customer is in communication over the internet;customer delivery address information associating said customer accountwith at least one authorized customer delivery address; authorized useridentification information associating said customer account with atleast one authorized user identification code.

A method for purchasing of goods or services and assuring payment overthe internet, the purchase being made by a customer using a merchant,said merchant having an internet site at which the merchant offers goodsor services; and wherein a bank authorizes the purchase and assurespayment to the merchant, comprising: obtaining order informationindicating a customer desires to place an order which seeks to obtaingoods or services using the merchant; delivering the order informationto the merchant; providing customer verification information to thebank; accessing customer verification information by the bank, saidcustomer verification information being previously set up with the bank;verifying that the order information is associated with the customerusing the customer verification information; providing delivery addressinformation to the merchant from the bank in connection with said order;communicating from the bank to the merchant assurance of paymentinformation upon successful verification in said verifying step.

A method for purchasing of goods or services and assuring payment overthe internet, the purchase being made by a customer using a merchant,said merchant having an internet site at which the merchant offers goodsor services; and wherein a bank authorizes the purchase and assurespayment to the merchant, comprising: obtaining by the bank computerizedorder information indicating a customer desires to place an order whichseeks to obtain goods or services using the merchant; communicating theat least some of the order information from the bank to the merchant;providing customer information to the bank in connection with said orderinformation; accessing customer verification information by the bank,said customer verification information being previously set up by thecustomer with the bank; verifying that the customer order informationprovided in connection with said order information is associated withsaid customer; verifying that order delivery address information is anauthorized delivery address associated with the customer; providingdelivery address information to the merchant in connection with saidorder; communicating from the bank to the merchant assurance of paymentinformation upon successful verification in said verifying steps.

A method for purchasing of goods or services and assuring payment overthe Internet, the purchase being made by a customer using a merchant,said merchant having an internet site at which the merchant offers goodsor services; and wherein a bank authorizes the purchase and assurespayment to the merchant, comprising: obtaining order informationindicating a customer desires to place an order which seeks to obtaingoods or services using the merchant; delivering a first portion of theorder information to the merchant using a customer computer; deliveringa second portion of the order information to the merchant via a bankcomputer; providing customer information to the bank in connection withsaid order information; accessing customer verification information bythe bank, said customer verification information being previously set upby the customer with the bank; verifying that the customer informationprovided in connection with said order information is associated withsaid customer; communicating from the bank to the merchant assurance ofpayment information upon successful verification in said verifying step.

A method for validating a purchase of goods or services over theinternet, the purchase being made by a customer using a merchant, saidmerchant having an internet site at which the merchant offers goods orservices; and wherein a bank authorizes the purchase and assures paymentto the merchant, comprising: detecting when a customer chooses to paythe merchant using said bank; obtaining order information indicating thecustomer has placed an order which seeks to obtain goods or servicesusing the merchant; obtaining information about an order computer fromwhich said order has been placed; accessing customer verificationinformation which includes authorized customer computer informationwhich indicates one or more computers which have been authorized for usein placing orders; verifying said order computer used in placing theorder is an authorized customer computer; validating the order.

General and Interpretational Explanation

Various forms and aspects of the invention have been described. Itshould be understood that the invention may in alternative forms includeone or more of the aspects or features shown in one embodimentimplemented into another embodiment. Thus the various combinations offeatures shown herein can be combined in such alternative ways tofurther set out alternative forms of the invention.

The invention has been described in compliance with the disclosurerequirements. In doing so the invention has necessarily been describedin language more or less specific as to structural and methodicalfeatures. However, it is understood that the invention is notnecessarily limited to the specific features shown and described, sincethe features and methods disclosed herein comprise preferred forms ofputting the invention into effect, and cannot describe all options forimplementation. The invention is, therefore, claimed in its variousforms or modifications to the full extent allowed by law.

1. A method for purchasing goods or services and assuring payment over the internet, the purchase being made by a customer using a merchant, said merchant having an internet site at which the merchant offers goods or services; and wherein the bank authorizes the purchase and assures payment to the merchant, comprising: setting up a customer account with the bank that includes plural authentication parameters which are not enabling to an intercepting party to charge against said customer account; establishing a first internet communication linkage having at least one first internet communications route for providing customer-merchant communications concerning an order associated with said purchase; communicating over the internet between the customer and merchant using said first internet communications linkage concerning said order without providing a customer account number or other customer account information which enables an intercepting party to use the customer account information to make a charge against the customer account; establishing a second internet communication linkage having at least one second internet communications route for providing customer-bank communications concerning said order associated with said purchase; communicating over the internet between the customer and bank using said second internet communications linkage concerning said order without providing a customer account number or other customer account information which enables an intercepting party to use the customer account information to make a charge against the customer account; authenticating by the bank over the internet whether the customer is authorized to charge against the customer account using a plurality of said authentication parameters and without communicating information that would enable an intercepting party to such communicating over the internet between said customer and said bank; establishing a third internet communication linkage having at least one third internet communications route for providing bank-merchant communications concerning said order associated with said purchase; communicating over the internet between the customer and bank using said third internet communications linkage concerning said order without providing a customer account number or other customer account information which enables an intercepting party to use the customer account information to make a charge against the customer account; wherein said first, second and third Internet communications routes are independent on the interne; communicating from the bank to the merchant assurance of payment upon the bank determining the order is valid and the customer is authorized to charge against the customer account.
 2. The method according to claim 1 wherein said authenticating step uses different combinations of authentication parameters between different orders placed by the customer.
 3. The method according to claim 1 wherein said authenticating step uses different sequencing of authentication parameters between different orders placed by the customer.
 4. The method according to claim 1 wherein said authenticating step uses different combinations of authentication parameters and different sequencing of authentication parameters between different orders placed by the customer. 