Froomkin, 1996 - Google Patents
The essential role of trusted third parties in electronic commerceFroomkin, 1996
View PDF- Document ID
- 5856009771500722299
- Author
- Froomkin A
- Publication year
- Publication venue
- Or. L. Rev.
External Links
Snippet
BY now it is well known that the Internet is a global, but insecure, network. 1 It is also increasingly well understood that cryptography2 can contribute greatly to the ransactional security that Internet commerce so obviously lacks. 3 What is less well understood is that …
- 230000002401 inhibitory effect 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/383—Anonymous user system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Use of an alias or a single-use code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Froomkin | The essential role of trusted third parties in electronic commerce | |
Szabo | Formalizing and securing relationships on public networks | |
Winn | Open Systems, Free Markets, and Regulation of Internet Commerce | |
US6236972B1 (en) | Method and apparatus for facilitating transactions on a commercial network system | |
US20030177361A1 (en) | Method and system for using electronic communications for an electronic contract | |
US20030028782A1 (en) | System and method for facilitating initiation and disposition of proceedings online within an access controlled environment | |
AU2001287164A1 (en) | Method and system for using electronic communications for an electronic contact | |
JP2002536732A (en) | How to operate infrastructure and applications for encryption-supported services | |
Biddle | Misplaced priorities: The Utah Digital Signature Act and liability allocation in a public key infrastructure | |
Abelson et al. | Digital identity in cyberspace | |
Perritt Jr | Legal and Technological Infrastructures for Electronic Payment Systems | |
WO2019063512A1 (en) | A method for generating a digital identity, a digital identity, a method for creating an electronic transaction document and an electronic transaction document | |
Du et al. | Defining security services for electronic tendering | |
Pichler | Trust and Reliance, Enforcement and Compliance: Enhancing Consumer Confidence in the Electronic Marketplace | |
Reagle | Trust in a cryptographic economy and digital security deposits: Protocols and policies | |
Lui-Kwan | Recent developments in digital signature legislation and electronic commerce | |
Ivascanu | Legal issues in electronic commerce in the western hemisphere | |
Song et al. | Pseudonym technology for e-services | |
Muhammad et al. | Shariah-Compliant E-Payment Framework in Malaysia: Integrating Fiqh, Digital Security and Regulatory Governance | |
Hsiung et al. | Bridging e-business and added trust: keys to e-business growth | |
Dodd et al. | Contracting in cyberspace | |
Camp | Privacy and reliability in Internet commerce | |
Gripman | Electronic document certification: A primer on the technology behind digital signatures | |
Hogan | Now That the Floodgates Have Been Opened, Why Haven't Banks Rushed into the Certification Authority Business | |
Bruin | Consumer trust in electronic commerce: time for best practice |