Jim Sabo, "Riding Shotgun on the Electronic Stagecoach", NetGuide, Aug., 1996, pp. 119-124.
Larry Loeb, "The Stage is Set", Internet World, Aug., 1996, pp. 55-59.
Marvin A. Sirbu, "Credits and Debits on the Internet", IEEE Spectrum, Feb., 1997, pp. 23-29.
David Chaum et al., "Minting Electronic Cash", IEEE Spectrum, Feb., 1997, pp. 31-34.
Peter S. Gemmell, "Traceable e-Cash", IEEE Spectrum, Feb., 1997, pp. 35-37.
Robert W. Baldwin et al., "Locking the e-Safe", IEEE
Spectrum, Feb., 1997, pp. 40^16.
Primary Examiner—-Joseph E. Palys
Assistant Examiner—Norman Michael Wright
Attorney, Agent, or Firm—Anthony R. Barkume
A method for executing a secure online transaction between a vendor computer and a user computer, wherein the vendor computer and the user computer are interconnected to a computer network such as the Internet for data communications therebetween. The method comprises the steps of the user computer transmitting a transaction request message to the vendor computer via the computer network, the financial transaction request comprising user identification data unique to the user computer; in response to receiving the transaction request, the vendor computer sending a transaction verification request to a trust server computer interconnected to the computer network, the transaction verification request comprising the user identification data and data indicative of the requested transaction; in response to receiving the transaction verification request, the trust server computer authenticating the user computer by using the user identification data and communicating with the user computer for verification with the user identification data; and the trust server authorizing the transaction when the authenticating step has passed.
11 Claims, 10 Drawing Sheets