US20020184375A1 - Integrated electronic commerce system and method - Google Patents
Integrated electronic commerce system and method Download PDFInfo
- Publication number
- US20020184375A1 US20020184375A1 US10/191,598 US19159802A US2002184375A1 US 20020184375 A1 US20020184375 A1 US 20020184375A1 US 19159802 A US19159802 A US 19159802A US 2002184375 A1 US2002184375 A1 US 2002184375A1
- Authority
- US
- United States
- Prior art keywords
- client
- server
- application
- identifier
- electronic commerce
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims description 52
- 238000012546 transfer Methods 0.000 claims abstract description 78
- 238000010200 validation analysis Methods 0.000 claims description 33
- 230000004044 response Effects 0.000 claims description 28
- 238000013497 data interchange Methods 0.000 claims description 12
- 230000003213 activating effect Effects 0.000 claims 5
- 238000004891 communication Methods 0.000 description 34
- 238000010586 diagram Methods 0.000 description 11
- 238000009826 distribution Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 9
- 238000003860 storage Methods 0.000 description 8
- 241000700605 Viruses Species 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 230000004913 activation Effects 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Definitions
- This invention relates generally to the field of electronic commerce, and more particularly to an integrated electronic commerce system and method.
- Electronic commerce is a way to electronically conduct and manage business transactions using computer and telecommunications networks. It provides participants with efficient methods of working with customers, suppliers, and other trading partners.
- Network-based electronic commerce may include simple transactions, such as electronic mail and facsimiles, and more complicated transactions, such as electronic data interchange (EDI), electronic funds transfer (EFT), and shared network resources.
- EDI electronic data interchange
- EFT electronic funds transfer
- shared network resources allow companies to accelerate time-to-market cycles through collaborative development and product customization.
- the present invention provides an integrated electronic commerce system and method that substantially reduce or eliminate disadvantages and problems associated with prior systems.
- an integrated electronic commerce system may include a server system comprising a plurality of electronic commerce applications and a server security system.
- the electronic commerce applications may include an electronic mail application, a web server application, and a file transfer application.
- the server security system may validate a client system and download information operable to enable a service manager of the client system to invoke the electronic mail application, the web server application, and the file transfer application to send and receive data over a network.
- the information downloaded to the client system may comprise an electronic mail identifier, a file transfer identifier, and a browser identifier.
- the electronic mail identifier may enable the service manager of the client system to invoke the electronic mail application.
- the file transfer identifier may enable the service manager to invoke the file transfer application.
- the file transfer application may send and receive electronic data interchange (EDI) data, electronic funds transfer (EFT) data, and the like over the network.
- EDI electronic data interchange
- EFT electronic funds transfer
- the browser identifier may enable the service manager to invoke the web server application.
- the web server application may send and receive data over public and private networks.
- Public networks may include the Internet.
- Private networks may include value added networks (VAN) such as an intranet or an extranet.
- VAN value added networks
- Technical advantages of the present invention include providing an integrated electronic commerce system.
- the client may access a plurality of electronic commerce systems from an integrated service manager. This allows clients to electronically conduct business from a simple interface having a single point of entry.
- Another technical advantage of the present invention includes providing relatively low cost electronic commerce services.
- the client may access electronic commerce services through a server system.
- the server system may include an electronic mail application, a web server application, and a file transfer application. Accordingly, the client may efficiently and inexpensively send and receive data over a network.
- the data may include electronic data interchange (EDI), electronic funds transfer (EFT), and the like.
- FIG. 1 is a schematic diagram illustrating a client system and a server system connected via a network in accordance with one embodiment of the present invention
- FIG. 2 is a schematic block diagram illustrating components of the client and server systems of FIG. 1 in accordance with one embodiment of the present invention
- FIG. 3 is a flow diagram from a client's perspective illustrating the process of conducting electronic commerce in accordance with one embodiment of the present invention
- FIG. 4 illustrates a graphical user interface (GUI) window for conducting electronic commerce in accordance with one embodiment of the present invention
- FIG. 5 is a flow diagram illustrating a method of providing integrated electronic commerce services over a network in accordance with one embodiment of the present invention
- FIG. 6 is a flow diagram illustrating a method of uploading and transmitting a client file over a network in accordance with one embodiment of the present invention.
- FIG. 7 is a flow diagram illustrating a method of receiving and downloading a data file to a client in accordance with one embodiment of the present invention.
- FIGS. 1 - 7 illustrate a system and method of providing electronic commerce over a network.
- the system and method employ a client system having an integrated service manager operable to open and use electronic commerce applications of a server system to transmit electronic commerce over a series of networks.
- Electronic commerce applications may include electronic mail, a file transfer system, and a browser. It will be understood that electronic commerce applications may comprise other applications in that the electronic mail, file transfer and web server applications are for illustrative purposes only. Accordingly, the present invention allows electronic commerce to be conducted from a single point of entry.
- FIG. 1 illustrates an integrated electronic commerce system 10 in accordance with one embodiment of the present invention.
- the integrated electronic commerce system 10 may comprise a server system 12 connected to a client system 14 by a dedicated network 16 .
- the server system 12 may be a computer such as a personal computer, file server, workstation, minicomputer, mainframe or any other computer capable of communicating and interconnecting with other computers.
- the server system 12 may include an input/output system, processor, and memory.
- the input/output system may connect the dedicated network 16 and other input and output devices to the server system 12 .
- the dedicated network 16 may be directly connected to the server system 12 or may be connected through a data transmission device such as a modem or the like.
- the dedicated network 16 may comprise a modem connected to the client system 14 and a modem link to the server system 12 via an access server connected to an internal wide area network to which the server system 12 is connected.
- the input devices may include a pointing device such as a mouse or trackpad, a keyboard, or the like.
- the output devices may include a monitor, a printer, or the like.
- the server system 12 may be connected to a plurality of networks 18 . As described in more detail below, electronic commerce may be conducted over the networks 18 .
- the networks 18 may include a public Internet 20 , one or more value added networks 22 , and an X.400 electronic mail network. It will be understood that other or different networks 18 may be connected to the server system 12 within the scope of the present invention.
- Each network 18 may comprise a plurality of communication lines 19 .
- Communication lines 19 may be any type of communication link capable of supporting data transfer.
- the communication lines 19 may include any combination of an Integrated Services Digital Network (ISDN) communication line, a hardwire line, or a telephone link. It will be understood that the communication lines 19 may comprise other types of links within the scope of the present invention.
- ISDN Integrated Services Digital Network
- the client system 14 may be similar to the server system 12 and may be implemented using virtually any type of computer.
- the client system 12 is preferably a personal computer having an input/output system, a processor, and a memory.
- the input/output system may connect the dedicated network 16 and other input and output devices to the client system 14 .
- the dedicated network 16 may include a plurality of communication lines 28 between the server system 12 and a plurality of clients such as the client system 14 .
- the communication lines 28 may also connect to intermediate servers between the server system 12 and the client system 14 .
- a plurality of intermediate servers may be disposed between the client system 14 and the server system 12 along communication lines 28 .
- Communication lines 28 may be any type of communication link capable of supporting data transfer.
- the communication lines 28 may include any combination of an Integrated Services Digital Network (ISDN) communication line, a hardware line, or a telephone link. It will be understood that the communication lines 28 may comprise other types of links within the scope of the present invention.
- ISDN Integrated Services Digital Network
- the dedicated network 16 may comprise dial access via a telephone link.
- the server system 12 may be remote from the client system 14 and located anywhere in the world.
- the client system 14 may connect and communicate with the server system 12 via a modem.
- Dial access may be through a 1-800 telephone number.
- the modem has a data transmission rate of at least 9.6-28.8 kilobytes (Kb). It will be understood that a modem may have other transmission rates and that access may be otherwise obtained within the scope of the present invention.
- the dedicated network 16 is illustrated and described in FIG. 1 as dial access via a telephone link, the dedicated network 16 may be any interconnection found on any computer network such as a local area network (LAN), a wide area network (WAN), or any other communications and data exchange systems created by connecting two or more computers.
- LAN local area network
- WAN wide area network
- FIG. 2 illustrates a block diagram of the server system 12 and client system 14 in accordance with one embodiment of the present invention.
- the server system 12 may comprise an input/output system 30 , a processor 32 and memory 34 .
- the input/output system 30 may connect the dedicated network 16 and other input and output devices to the server system 12 .
- the dedicated network 16 may be directly connected to the server system 12 or may be connected through a data transmission device such as a modem or the like.
- Input devices may include a pointing device such as a mouse or trackpad, a keyboard, and the like.
- Output devices may include a monitor, a printer, and the like.
- the server system 12 includes computer software that may be loaded into the memory 34 and executed by the processor 32 .
- the computer software may generally be identified by modules and similar systems in memory 34 . It will be understood that the computer software may be otherwise combined and/or divided for processing within the scope of the present invention. Accordingly, the labels of the modules and other software systems are for illustrative purposes and may be varied within the scope of the present invention.
- Disk storage may include a variety of types of storage media.
- disk storage may include floppy disk drives, hard disk drives, CD/ROM drives, or magnetic tape drives.
- Memory 34 may include an operating system 40 , a server communication system 42 , a set of electronic commerce applications 44 , and a server security system 46 .
- the operating system 40 may include a standard UNIX interface 48 .
- the operating system 40 may be UNIX, NVS, or the like.
- the server communication system 42 may, in conjunction with a counterpart on the client system 14 , provide a communication infrastructure for the integrated electronic commerce system 10 .
- the server communication system 42 may comprise TCP/IP which is the primary communications protocol for a UNIX server platform. It will be understood that the server communication system 42 may comprise other communication formats within the scope of the present invention.
- the electronic commerce applications 44 may comprise an electronic mail application 52 , a web server application 54 , and a file transfer application 56 . It will be understood that the server system 12 may comprise other electronic commerce applications 44 within the scope of the present invention.
- the electronic mail application 52 may send and receive messages over the networks 18 .
- the electronic mail application 52 may comprise HP OPENMAIL SERVER by Hewlett-Packard Company.
- the electronic mail application 52 may send or receive messages over the X.400 electronic mail network 24 (FIG. 1).
- the server system 12 may comprise other electronic mail applications 52 within the scope of the present invention.
- the web server application 54 may connect to and browse the networks 18 .
- the web server application 54 may send and receive data over a public network, an intranet, an extranet, and the like.
- the web server application 54 may also access a shared resource, a value added network (VAN) and the like over a network.
- the browser 54 may comprise NETSCAPE COMMERCE SERVER by Netscape Communication Corporation. It will be understood that the web server application 54 may comprise other browsers capable of connecting and browsing networks 18 within the scope of the present invention.
- the web server application 54 may access the networks 18 through a fire wall 58 .
- access to public networks such as the public Internet 20 may be routed through the fire wall 58 . It will be understood that access to other networks may be routed through the fire wall 58 within the scope of the present invention.
- the file transfer application 56 may transmit and receive data files over the networks 18 .
- the file transfer application 56 may collect and distribute data files from a client directory 60 .
- the client directory 60 may comprise a collection sub-directory 62 and a distribution sub-directory 64 .
- Files downloaded from the networks 18 may be held in the collection sub-directory 62 prior to being downloaded to the client system 14 .
- Files uploaded from the client system 14 may be held in the distribution sub-directory 64 prior to transmission over the networks 18 .
- data files may be otherwise stored or transmitted “on-the-fly” (in real time or near real time) by the server system 14 within the scope of the present invention.
- the file transfer application 56 may download data files from the collection sub-directory 62 to the client system 14 upon a request by the client. As described in more detail below, the request may be automatic upon a client logon to the server system 12 or other type of event.
- the file transfer application may periodically scan the distribution sub-directory 64 for data files to be transmitted over the networks 18 .
- the file transfer application 56 may scan the distribution sub-directory 64 every fifteen (15) minutes. It will be understood that the file transfer application 56 may otherwise scan the distribution sub-directory 64 within the scope of the present invention.
- the file transfer application 56 may call a translator 66 to translate data files received or to be transmitted over the networks 18 .
- the translator 66 may translate preset types of data files between identified trading partners.
- the data files may be translated to be compatible with the recipient system.
- data files received from the networks 18 may be translated on the fly prior to being stored in the collection sub-directory 62 .
- data files uploaded from the client system 14 may be stored in the distribution sub-directory 64 and later translated if necessary prior to being delivered to a trading partner. It will be understood that data files may be otherwise translated in the scope of the present invention.
- the server security system 46 may provide validation of the client system 14 .
- the server security system 46 may validate a user identifier and a system identifier of the client system 14 .
- the user identifier may be a combination of a user ID and password.
- the system identifier may be a combination of a software serial number and a random number previously generated and downloaded by the server security system 46 . The random number in conjunction with the serial number prevents the software of the client system 14 from being copied and used on another system.
- the server security system 46 may comprise a profile information table 70 , an application table 72 and a computer table 74 .
- the profile information table 70 may store user preferences.
- the preferences may include automatic downloads, automatic logoffs, and the like. It will be understood that other client preferences may be stored in profile information table 70 . It will be further understood that the server security system 46 may comprise other or different information tables in the scope of the present invention.
- the application table 72 may comprise application identifiers for each client system.
- the application identifiers may be downloaded by the server security system 46 to the client system 14 upon validation.
- the application identifiers enable the client system 14 to access the electronic mail application 52 , the web server application 54 , and the file transfer application 56 to conduct electronic commerce over the networks 18 .
- the application identifiers may include an ID and password for each electronic commerce application. It will be understood that the application identifiers may comprise other fields within the scope of the present invention.
- the server security system 46 may periodically update the application identifiers to prevent unauthorized access to the applications.
- the application identifiers may be updated every thirty (30) days. It will be understood that the identifiers may be otherwise updated within the scope of the present invention.
- the computer table 74 may comprise a serial number of the software of each client system 14 .
- the last random number downloaded to a client system 14 may also be stored in the computer table 74 .
- the serial and random numbers may be compared to serial and random numbers provided by the client system 14 for system validation. If the numbers match, the system is valid. If the numbers do not match, the system is not valid and access to the server system 12 may be denied.
- the server security system 46 may comprise PERL scripts and MICROSOFT VISUAL C++ version 1.5. It will be understood that the server security system 46 may comprise other programming formats within the scope of the present invention.
- the client system 14 may comprise an input/output system 80 , a processor 82 and memory 84 .
- the input/output system 80 may connect the dedicated network 16 and other input and output devices to the client system 14 .
- the dedicated network 16 may be directly connected to the client system 14 or may be connected through a data transmission device such as a modem or the like.
- Input devices may include a pointing device such as a mouse or trackpad, a keyboard, and the like.
- Output devices may include a monitor, a printer, and the like.
- the client system 14 includes computer software that may be loaded and/or downloaded into memory 84 and executed by the processor 82 .
- the computer software may generally be identified by modules and similar systems in memory 84 . It will be understood that the computer software may be otherwise combined and/or divided for processing within the scope of the present invention. Accordingly, the labels of the modules and other software systems are for illustrative purposes and may be varied within the scope of the present invention.
- Disks storage may include a variety of types of storage media.
- disk storage may include floppy disk drives, hard disk drives, CD/ROM drives or magnetic tape drives.
- Memory 84 may include an operating system 86 , a client communication system 88 and an integrated service manager 90 .
- the operating system 86 may include a graphical user interface (GUI) 92 capable of generating a plurality of application windows 94 .
- GUI graphical user interface
- the operating system 86 may be MacIntosh OS, WINDOWS NT, WINDOWS 95, OS/2, or any other operating system capable of providing or operating in conjunction with a graphical user interface (GUI).
- the client communication system 88 may operate in conjunction with the server communication system 42 to provide a communication infrastructure between the client system 14 and the server system 12 .
- the client communication system 88 may comprise TCP/IP for Windows, SDK-Visual Edition, part number: TCP/107S version 4.0. It will be understood that the client communication system 88 may comprise other communication formats compatible with the server communication system 42 within the scope of the present invention.
- the integrated service manager 90 may comprise a user interface 92 for interacting with a client.
- the user interface 92 may comprise icons associated with modules of the service manager 90 .
- Modules may include a logon module 94 and a set of electronic commerce modules 96 .
- the client may click on icons to logon to the server system 12 and to conduct electronic commerce transactions via the server system 12 . Accordingly, the client may conduct all of its electronic commerce transactions from a single interface. As a result, a client need not locate and launch a number of separate applications, which can be time-consuming and confusing to an unsophisticated small business client.
- the logon module 94 may invoke a client security system 100 to logon to the server system 12 .
- the client security system 100 may operate in conjunction with the server security system 46 to validate the client system 14 .
- the client security system 100 may request a user identifier from the client.
- the user identifier may be a user identifier (ID) and a password.
- the client security system 100 may pass the user identifier to the server security system 46 for validation.
- the client security system 100 may also pass a system identifier to the server security system 46 for validation.
- the system identifier may comprise a serial number 102 and a random number 104 of the client system software. A new random number is generated and downloaded by the server security system 46 with each validation.
- the client security system 100 may receive application identifiers 106 from the server security system 46 .
- the application identifiers 106 enable the integrated service manager 90 to access the electronic mail application 52 , the web server application 54 , and the file transfer application 56 on the server system 12 .
- the application identifiers may comprise an ID and password for each application. As previously described in connection with the server security system 46 , the IDs and passwords may be periodically updated by the server security system 46 to lessen or prevent unauthorized use of the applications 44 .
- the electronic commerce modules 96 may include a module for each electronic commerce application 44 of the server system 12 .
- the modules 96 may comprise an electronic mail module 110 , a browser module 112 , and a file transfer module 114 . It will be understood that the electronic commerce modules 96 may comprise other modules within the scope of the present invention.
- the electronic mail module 110 may be launched by an electronic mail icon (FIG. 4) of the user interface 92 of the service manager 90 . Upon activation, the electronic mail module 110 may open an electronic mail user interface 116 to access the electronic mail application 52 . Thereafter, the client may interact directly with the application through the application interface 116 .
- the browser module 112 may be launched by a browser icon (FIG. 4) of the user interface 92 of the service manager 90 . Upon activation, the browser module 112 may open a browser user interface 118 to access the web server application 54 . Thereafter, the client may interact directly with the web server application 54 through the application interface 118 .
- a browser extension 120 may be provided on the client system 14 for reading specific types of Web pages.
- the browser extension 120 may comprise ACROBAT READER version 2.1 by Adobe Systems Inc., which provides cross-platform capabilities. It will be understood that other or no browser extensions 120 may be provided within the scope of the present invention.
- the file transfer module 114 may be launched by a file transfer icon (FIG. 4) of the user interface 92 of the service manager 90 . Upon the activation, the file transfer module 114 may open a file transfer user interface 122 to access the file transfer application 56 . Thereafter, the client may interact directly with the file transfer application 56 through the application interface 122 .
- a file transfer icon FIG. 4
- the file transfer application 56 may download files to an inbox 124 of the client system 14 .
- the inbox 124 prevents pre-existing files and data of the client system 14 from being overwritten by the file transfer application 56 during file download.
- the inbox 124 may be a dedicated directory. It will be understood that the inbox 124 may be otherwise configured within the scope of the present invention.
- the service manager 90 may comprise MICROSOFT VISUAL BASIC version 3.0.
- the user interface 92 , logon module 94 and electronic commerce modules 96 may also comprise MICROSOFT VISUAL BASIC version 3.0. It will be understood that the integrated service manager 90 , user interface 92 and modules 94 and 96 may comprise other programming formats and remain within in the scope of the present invention.
- a virus protection application 130 may also be provided in memory.
- the virus protection application 130 may be operated by the client system 14 to scan downloaded data for harmful viruses and the like.
- the virus protection application 130 may comprise F-PROT PROFESSIONAL version 2.22.2 for DOS/Wind3.X/Win95 by Command Software Systems.
- the virus protection application 130 may be set to selectively or continually monitor the client system 14 . It will be understood that other or no virus protection applications may be used and remain within the scope of the present invention.
- the client system 14 may include a tutorial 132 in memory 84 .
- the tutorial may provide information to the client on how to operate the integrated service manager 90 .
- the tutorial 132 may be accessed through the integrated service manager 90 .
- the tutorial 132 may be accessed through an icon (FIG. 4) of the user interface 92 of the service manager 90 .
- the tutorial 132 may be programmed using XVT DEVELOPMENT SOLUTIONS FOR C by XVT Software, Inc. It will be understood that the tutorial 132 may be otherwise programmed or accessed within the scope of the present invention.
- the client system 14 may also provide a customer assistance module 134 for the client.
- Customer assistance may allow the client to quickly and easily obtain help for configuring and using the integrated electronic commerce system 10 .
- the customer assistance module 134 may be accessed through an icon (FIG. 4) of the user interface 92 of the service manager 90 .
- FIG. 3 illustrates a flow diagram by which a client may conduct electronic commerce in accordance with one embodiment of the present invention.
- the process begins at step 150 in which a client may initiate logon to the server system 12 .
- the client may initiate logon by clicking on a logon icon of the user interface 92 of the service manager 90 .
- the client security system 100 may display a dialog box to the client requesting a user identifier from the client.
- the user identifier may comprise a user ID and a password.
- the client may enter a user ID.
- the client may enter a password.
- the client security system 100 may then pass the user ID and password to the server system 12 for validation.
- the client system 14 may display the user interface 92 of the service manager 90 .
- the user interface 92 may comprise an application window 170 .
- Application window 170 may comprise drop down menus 172 , toolbar 174 and a plurality of icons 176 for selecting electronic commerce services.
- the window 170 may comprise a logon icon 180 , an electronic mail icon 182 , a plurality of browser icons 184 , and a file transfer icon 186 .
- the logon icon 180 may be associated with the logon module 94 of the service manager 90 .
- the electronic mail icon 182 may be associated with the electronic mail module 110 of the service manager 90 .
- the browser icons 184 may be associated with the browser module 112 of the service manager 90 .
- Several browser icons 184 may be provided to divide browser services into specific network services.
- Internet access may have a separate icon from intranet access.
- intranet access may be divided into specific value added networks (VAN) such as online regulations, regulatory rulings and the like, databases, and a particular company's intranet.
- VAN value added networks
- the browser icons 184 may be otherwise divided within the scope of the present invention.
- the file transfer icon 186 may be associated with the file transfer module 114 of the service manager 90 .
- the application window 170 may include additional icons within the scope of the present invention.
- the application window 170 may include a tutorial icon 190 and a customer assistance icon 192 .
- the tutorial icon 190 may be associated with the tutorial 132 .
- the customer assistance icon 192 may be associated with customer assistance 134 . It will be understood that fewer or different icons may be provided in the user interface 92 of the service manager 90 .
- the client may select electronic mail services from the application window 170 displayed at state 156 .
- the client may select electronic mail by clicking on the electronic mail icon 182 .
- the electronic mail selection branch of state 156 leads to state 158 .
- the client may send, receive and/or check electronic mail messages. After the client has finished, the quit electronic mail branch of state 158 may return to state 156 .
- the client may also select browser services from the application window 170 displayed at state 156 .
- the client may select the browser by clicking on one of the browser icons 184 .
- the browser selection branch of state 156 leads to state 160 .
- the client may browse the selected network 18 .
- the network may be a value added network (VAN) , an intranet, extranet, Internet, and the like.
- VAN value added network
- the quit browser branch of state 160 may return to state 156 .
- the client may further select file transfer services from the application window 170 displayed at state 156 .
- the client may select file transfer services by clicking on the file transfer icon 186 .
- the file transfer selection branch of state 156 leads to state 162 .
- the client may transmit and receive data files over the networks 18 .
- the data files may include electronic data interchange (EDI), electronic funds transfer (EFT), and the like.
- EDI electronic data interchange
- EFT electronic funds transfer
- the quit file transfer branch of state 162 may return to state 156 .
- the client may access a wide variety of electronic commerce services from a single interface.
- smaller and non-sophisticated businesses may participate in electronic commerce services. Such participation improves the efficiency of the smaller businesses and of larger businesses that may now electronically trade with the smaller businesses.
- the client may logoff the server system 12 .
- the logoff selection branch of state 156 leads to the end of the process.
- FIG. 5 illustrates a flow diagram of a method of providing electronic commerce services in accordance with one embodiment of the present invention.
- the process begins at step 200 in which the client system 14 may receive an initiation event.
- the initiation event may be a client clicking on the logon icon 180 of the user interface 92 of the service manager.
- the client security system 100 may receive a user identifier.
- the user identifier may be received from the client in response to a request by the client security system 100 .
- the user identifier may comprise a user ID and a password.
- the client security system 100 may retrieve a system identifier.
- the system identifier may be a serial number 102 and a random number 104 of the client system software.
- the client security system 100 may upload the user and system identifiers to the server system 12 . Communication between the client system 14 and the server system 12 may be carried out by the server and client communication systems 42 and 88 .
- the server security system 46 may validate the user identifier. As previously described, the user identifier is valid if the user ID and password matches that stored in the server system 12 .
- the server security system 46 may validate the system identifier. The system identifier is valid if the serial and random numbers 102 and 104 of the software matches that stored in the server system 12 . If the user identifier and/or the system identifier is invalid, access to the server system 12 may be denied.
- the server security system 46 may retrieve profile information and application identifiers associated with the client system 14 .
- the profile information may be retrieved from the profile information table 70 .
- the application identifiers may be retrieved from the application table 72 .
- the application identifiers may comprise an ID and password for each electronic commerce application of the system 10 .
- the server security system 46 may generate a random number to be used for validation the next time the client attempts to logon to the server system 12 .
- the random number is a safeguard to prevent unauthorized copying and use of the client system software.
- the application identifiers and the random number may be downloaded to the client system 14 .
- the application identifiers enable the client system 14 to access the electronic commerce applications of the server system 12 . Accordingly, the electronic commerce system 10 provides a single point of entry for the client to electronic commerce systems. As a result, the client need only remember a single user identifier rather than identifiers for several different electronic commerce applications.
- Step 216 leads to state 218 .
- the service manager 90 may display the user interface 92 .
- the user interface 92 may be the application window 170 described in connection with FIG. 4.
- the electronic mail branch of state 218 may lead to step 220 .
- the electronic mail application 52 may be invoked.
- the electronic mail identifier may be provided to the electronic mail application 52 to enable access to the application. After the application has been accessed, the client may work directly with the application. Accordingly, step 222 returns to state 218 wherein the user interface 92 of the service manager 90 is displayed.
- the browser branch of state 218 may lead to step 224 .
- the web server application 54 may be invoked.
- the browser identifier may be provided to access the web server application 54 .
- a fire wall identifier for the browser may also be provided. Proceeding to step 230 , the fire wall identifier may be validated to allow the browser to access a public network through the fire wall 58 .
- the client may work directly with the application. Step 230 returns to state 218 wherein the user interface 92 of the service manager 90 is displayed.
- the file transfer branch of state 218 may lead to step 232 .
- the file transfer application 56 may be invoked.
- the file transfer identifier may be provided to access the file transfer application 56 .
- the client may work directly in the application.
- Step 234 returns to state 218 wherein the user interface 92 of the service manager 90 is displayed.
- step 240 the logoff branch of state 218 may lead to step 240 .
- the client system 14 may logoff of the server system 12 .
- Step 240 leads to the end of the process.
- FIG. 6 illustrates a flow diagram of a method of uploading and transmitting a client data file over the network 18 in accordance with one embodiment of the present invention.
- the data file may comprise an electronic data interchange (EDI) file, an electronic funds transfer (EFT) file, and the like.
- EDI electronic data interchange
- EFT electronic funds transfer
- the process begins at step 250 in which the file transfer application 56 receives a recipient address for a data file through the file transfer user interface 122 .
- the file transfer application 56 may receive the name of the data file through the user interface 122 .
- the data file may be retrieved on the client system 14 .
- the file transfer application 56 may upload the data file and the recipient address to the server system 12 .
- decisional step 258 it is determined if the data file is to be translated. As previously described, preset types of data files between identified training partners may be translated to be compatible with the recipient system. For example, a file may be translated in accordance with a data format required by a particular trading partner. If the data file is to be translated, the YES branch of decisional step 258 leads to step 260 .
- step 260 the translation protocol for the data file is retrieved.
- step 262 the translator 66 may translate the data file.
- step 262 continues to step 264 .
- decisional step 258 if the data file is not to be translated, the NO branch of decisional step 258 also leads to step 264 .
- the file transfer application 56 may temporarily hold the data file in the distribution sub-directory 64 of client directory 60 . Proceeding to step 266 , the file transfer application 56 may periodically check the distribution sub-directories 64 for files to be transmitted over the networks 18 . In one embodiment, the file transfer application 56 may check the distribution sub-directory 64 every fifteen (15) minutes. It will be understood that file transfer application 56 may otherwise check the distribution sub-directory 64 within the scope of the present invention. Proceeding to step 268 , the file transfer application 56 may transmit the data file over the networks 18 to the recipient address. Step 268 leads to the end of the process.
- FIG. 7 illustrates a flow diagram of a method of receiving and downloading a data file from a network to a client system in accordance with one embodiment of the present invention.
- the data file may be an electronic data interchange (EDI) file, an electronic funds transfer (EFT) file, and the like.
- EDI electronic data interchange
- EFT electronic funds transfer
- the file transfer application 56 may determine if the data file is to be translated. As previously described, preset types of data files between identified trading partners may be translated to be compatible with the recipient's system. If the data files are to be translated, the YES branch of decisional step 304 leads to step 306 .
- step 306 a translation protocol for the data file is retrieved. Proceeding to step 308 , the translator 66 may translate the data file. Step 308 leads to step 310 . Returning to decisional step 304 , if the data file is not to be translated, the NO branch of decisional step 304 also leads to step 310 .
- the file transfer application 56 may temporarily hold the data file in a collection sub-directory 62 .
- the file transfer application 56 may receive a request to download the data file to the client system 14 .
- the request may be an automatic, periodic or manual request from the client.
- the file transfer application 56 may download a data file from the collection sub-directory 62 to the inbox 124 of the client system 14 .
- Use of the inbox 124 will prevent the file transfer application 56 from overwriting other files or data of the client system 14 .
- the process ends.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Information Transfer Between Computers (AREA)
Abstract
An integrated electronic commerce system (10) may include a server system (12) comprising a plurality of electronic commerce applications (44) and a server security system (46). The electronic commerce applications (44) may comprise an electronic mail application (52), a web server application (54), and a file transfer application (56). The server security system (46) may validate a client system (14) and download information operable to enable a service manager (90) of the client system (14) to invoke the electronic mail application (52), the web server application (54), and the file transfer application (56) to send and receive data over a network (18).
Description
- This application is a continuation of U.S. patent application Ser. No. 08/892,580 filed Jul. 14, 1997 and entitled “INTEGRATED ELECTRONIC COMMERCE SYSTEM AND METHOD”.
- This invention relates generally to the field of electronic commerce, and more particularly to an integrated electronic commerce system and method.
- Electronic commerce (EC) is a way to electronically conduct and manage business transactions using computer and telecommunications networks. It provides participants with efficient methods of working with customers, suppliers, and other trading partners. Network-based electronic commerce may include simple transactions, such as electronic mail and facsimiles, and more complicated transactions, such as electronic data interchange (EDI), electronic funds transfer (EFT), and shared network resources. Electronic data interchange and electronic funds transfer transactions create opportunities for companies to shorten procurement cycles and to cut costs on inventory and manufacture parts through the use of just-in-time (JIT) and quick response (QR) practices. Shared network resources allow companies to accelerate time-to-market cycles through collaborative development and product customization.
- Resources to support complicated electronic commerce services such as electronic data interchange, electronic funds transfer, and shared resources are expensive. Additionally, the resources are often segregated into specialized systems. As a result, access to complicated electronic commerce services has traditionally been limited to larger business. The lack of smaller business participation in such services reduces the efficiency of the smaller business and the value of the services to the larger business.
- Accordingly, a need has arisen in the art for improved electronic commerce services. The present invention provides an integrated electronic commerce system and method that substantially reduce or eliminate disadvantages and problems associated with prior systems.
- In accordance with the present invention, an integrated electronic commerce system may include a server system comprising a plurality of electronic commerce applications and a server security system. The electronic commerce applications may include an electronic mail application, a web server application, and a file transfer application. The server security system may validate a client system and download information operable to enable a service manager of the client system to invoke the electronic mail application, the web server application, and the file transfer application to send and receive data over a network.
- More specifically, in accordance with one embodiment of the present invention, the information downloaded to the client system may comprise an electronic mail identifier, a file transfer identifier, and a browser identifier. The electronic mail identifier may enable the service manager of the client system to invoke the electronic mail application. Similarly, the file transfer identifier may enable the service manager to invoke the file transfer application. The file transfer application may send and receive electronic data interchange (EDI) data, electronic funds transfer (EFT) data, and the like over the network.
- The browser identifier may enable the service manager to invoke the web server application. The web server application may send and receive data over public and private networks. Public networks may include the Internet. Private networks may include value added networks (VAN) such as an intranet or an extranet.
- Technical advantages of the present invention include providing an integrated electronic commerce system. In particular, the client may access a plurality of electronic commerce systems from an integrated service manager. This allows clients to electronically conduct business from a simple interface having a single point of entry.
- Another technical advantage of the present invention includes providing relatively low cost electronic commerce services. In particular, the client may access electronic commerce services through a server system. The server system may include an electronic mail application, a web server application, and a file transfer application. Accordingly, the client may efficiently and inexpensively send and receive data over a network. The data may include electronic data interchange (EDI), electronic funds transfer (EFT), and the like.
- Other technical advantages will be readily apparent to one skilled in the art from the following figures, descriptions, and claims.
- For a more complete understanding of the present invention and its advantages thereof, reference is now made to the following brief description, taken in conjunction with the accompanied drawings and detailed description, where like reference numerals represent like parts, in which:
- FIG. 1 is a schematic diagram illustrating a client system and a server system connected via a network in accordance with one embodiment of the present invention;
- FIG. 2 is a schematic block diagram illustrating components of the client and server systems of FIG. 1 in accordance with one embodiment of the present invention;
- FIG. 3 is a flow diagram from a client's perspective illustrating the process of conducting electronic commerce in accordance with one embodiment of the present invention;
- FIG. 4 illustrates a graphical user interface (GUI) window for conducting electronic commerce in accordance with one embodiment of the present invention;
- FIG. 5 is a flow diagram illustrating a method of providing integrated electronic commerce services over a network in accordance with one embodiment of the present invention;
- FIG. 6 is a flow diagram illustrating a method of uploading and transmitting a client file over a network in accordance with one embodiment of the present invention; and
- FIG. 7 is a flow diagram illustrating a method of receiving and downloading a data file to a client in accordance with one embodiment of the present invention.
- The preferred embodiments of the present invention and its advantages are best understood by referring now in more detail to FIGS.1-7 of the drawings, in which like numerals refer to like parts throughout the several views. FIGS. 1-7 illustrate a system and method of providing electronic commerce over a network. As described in more detail below, the system and method employ a client system having an integrated service manager operable to open and use electronic commerce applications of a server system to transmit electronic commerce over a series of networks. Electronic commerce applications may include electronic mail, a file transfer system, and a browser. It will be understood that electronic commerce applications may comprise other applications in that the electronic mail, file transfer and web server applications are for illustrative purposes only. Accordingly, the present invention allows electronic commerce to be conducted from a single point of entry.
- FIG. 1 illustrates an integrated
electronic commerce system 10 in accordance with one embodiment of the present invention. The integratedelectronic commerce system 10 may comprise aserver system 12 connected to aclient system 14 by adedicated network 16. Theserver system 12 may be a computer such as a personal computer, file server, workstation, minicomputer, mainframe or any other computer capable of communicating and interconnecting with other computers. As described in more detail below, theserver system 12 may include an input/output system, processor, and memory. The input/output system may connect thededicated network 16 and other input and output devices to theserver system 12. Thededicated network 16 may be directly connected to theserver system 12 or may be connected through a data transmission device such as a modem or the like. In one embodiment, thededicated network 16 may comprise a modem connected to theclient system 14 and a modem link to theserver system 12 via an access server connected to an internal wide area network to which theserver system 12 is connected. The input devices may include a pointing device such as a mouse or trackpad, a keyboard, or the like. The output devices may include a monitor, a printer, or the like. - The
server system 12 may be connected to a plurality ofnetworks 18. As described in more detail below, electronic commerce may be conducted over thenetworks 18. In one embodiment, thenetworks 18 may include apublic Internet 20, one or more value addednetworks 22, and an X.400 electronic mail network. It will be understood that other ordifferent networks 18 may be connected to theserver system 12 within the scope of the present invention. - Each
network 18 may comprise a plurality of communication lines 19.Communication lines 19 may be any type of communication link capable of supporting data transfer. In one embodiment, thecommunication lines 19 may include any combination of an Integrated Services Digital Network (ISDN) communication line, a hardwire line, or a telephone link. It will be understood that thecommunication lines 19 may comprise other types of links within the scope of the present invention. - The
client system 14 may be similar to theserver system 12 and may be implemented using virtually any type of computer. As described in more detail below, theclient system 12 is preferably a personal computer having an input/output system, a processor, and a memory. As previously described for theserver system 12, the input/output system may connect thededicated network 16 and other input and output devices to theclient system 14. - The dedicated
network 16 may include a plurality ofcommunication lines 28 between theserver system 12 and a plurality of clients such as theclient system 14. The communication lines 28 may also connect to intermediate servers between theserver system 12 and theclient system 14. Thus, a plurality of intermediate servers may be disposed between theclient system 14 and theserver system 12 along communication lines 28. -
Communication lines 28 may be any type of communication link capable of supporting data transfer. In one embodiment, thecommunication lines 28 may include any combination of an Integrated Services Digital Network (ISDN) communication line, a hardware line, or a telephone link. It will be understood that thecommunication lines 28 may comprise other types of links within the scope of the present invention. - In one embodiment, the
dedicated network 16 may comprise dial access via a telephone link. In this embodiment, theserver system 12 may be remote from theclient system 14 and located anywhere in the world. Generally described, theclient system 14 may connect and communicate with theserver system 12 via a modem. Dial access may be through a 1-800 telephone number. Preferably, the modem has a data transmission rate of at least 9.6-28.8 kilobytes (Kb). It will be understood that a modem may have other transmission rates and that access may be otherwise obtained within the scope of the present invention. Moreover, although thededicated network 16 is illustrated and described in FIG. 1 as dial access via a telephone link, thededicated network 16 may be any interconnection found on any computer network such as a local area network (LAN), a wide area network (WAN), or any other communications and data exchange systems created by connecting two or more computers. - FIG. 2 illustrates a block diagram of the
server system 12 andclient system 14 in accordance with one embodiment of the present invention. Theserver system 12 may comprise an input/output system 30, aprocessor 32 andmemory 34. As previously described, the input/output system 30 may connect thededicated network 16 and other input and output devices to theserver system 12. Thededicated network 16 may be directly connected to theserver system 12 or may be connected through a data transmission device such as a modem or the like. Input devices may include a pointing device such as a mouse or trackpad, a keyboard, and the like. Output devices may include a monitor, a printer, and the like. - The
server system 12 includes computer software that may be loaded into thememory 34 and executed by theprocessor 32. The computer software may generally be identified by modules and similar systems inmemory 34. It will be understood that the computer software may be otherwise combined and/or divided for processing within the scope of the present invention. Accordingly, the labels of the modules and other software systems are for illustrative purposes and may be varied within the scope of the present invention. - The computer software may be loaded into
memory 34 from disk storage (not shown). Disk storage may include a variety of types of storage media. For example, disk storage may include floppy disk drives, hard disk drives, CD/ROM drives, or magnetic tape drives. -
Memory 34 may include anoperating system 40, aserver communication system 42, a set of electronic commerce applications 44, and aserver security system 46. Theoperating system 40 may include astandard UNIX interface 48. Theoperating system 40 may be UNIX, NVS, or the like. - The
server communication system 42 may, in conjunction with a counterpart on theclient system 14, provide a communication infrastructure for the integratedelectronic commerce system 10. In one embodiment, theserver communication system 42 may comprise TCP/IP which is the primary communications protocol for a UNIX server platform. It will be understood that theserver communication system 42 may comprise other communication formats within the scope of the present invention. - In one embodiment, the electronic commerce applications44 may comprise an
electronic mail application 52, aweb server application 54, and afile transfer application 56. It will be understood that theserver system 12 may comprise other electronic commerce applications 44 within the scope of the present invention. - The
electronic mail application 52 may send and receive messages over thenetworks 18. In one embodiment, theelectronic mail application 52 may comprise HP OPENMAIL SERVER by Hewlett-Packard Company. In this embodiment, theelectronic mail application 52 may send or receive messages over the X.400 electronic mail network 24 (FIG. 1). It will be understood that theserver system 12 may comprise otherelectronic mail applications 52 within the scope of the present invention. - The
web server application 54 may connect to and browse thenetworks 18. Theweb server application 54 may send and receive data over a public network, an intranet, an extranet, and the like. Theweb server application 54 may also access a shared resource, a value added network (VAN) and the like over a network. In one embodiment, thebrowser 54 may comprise NETSCAPE COMMERCE SERVER by Netscape Communication Corporation. It will be understood that theweb server application 54 may comprise other browsers capable of connecting andbrowsing networks 18 within the scope of the present invention. - The
web server application 54 may access thenetworks 18 through afire wall 58. In one embodiment, access to public networks such as thepublic Internet 20 may be routed through thefire wall 58. It will be understood that access to other networks may be routed through thefire wall 58 within the scope of the present invention. - The
file transfer application 56 may transmit and receive data files over thenetworks 18. Thefile transfer application 56 may collect and distribute data files from aclient directory 60. Theclient directory 60 may comprise acollection sub-directory 62 and adistribution sub-directory 64. Files downloaded from thenetworks 18 may be held in thecollection sub-directory 62 prior to being downloaded to theclient system 14. Files uploaded from theclient system 14 may be held in thedistribution sub-directory 64 prior to transmission over thenetworks 18. It will be understood that data files may be otherwise stored or transmitted “on-the-fly” (in real time or near real time) by theserver system 14 within the scope of the present invention. - The
file transfer application 56 may download data files from thecollection sub-directory 62 to theclient system 14 upon a request by the client. As described in more detail below, the request may be automatic upon a client logon to theserver system 12 or other type of event. - The file transfer application may periodically scan the
distribution sub-directory 64 for data files to be transmitted over thenetworks 18. In one embodiment, thefile transfer application 56 may scan thedistribution sub-directory 64 every fifteen (15) minutes. It will be understood that thefile transfer application 56 may otherwise scan thedistribution sub-directory 64 within the scope of the present invention. - The
file transfer application 56 may call atranslator 66 to translate data files received or to be transmitted over thenetworks 18. Thetranslator 66 may translate preset types of data files between identified trading partners. The data files may be translated to be compatible with the recipient system. In one embodiment, data files received from thenetworks 18 may be translated on the fly prior to being stored in thecollection sub-directory 62. Similarly, data files uploaded from theclient system 14 may be stored in thedistribution sub-directory 64 and later translated if necessary prior to being delivered to a trading partner. It will be understood that data files may be otherwise translated in the scope of the present invention. - The
server security system 46 may provide validation of theclient system 14. In one embodiment, theserver security system 46 may validate a user identifier and a system identifier of theclient system 14. As described in more detail below, the user identifier may be a combination of a user ID and password. The system identifier may be a combination of a software serial number and a random number previously generated and downloaded by theserver security system 46. The random number in conjunction with the serial number prevents the software of theclient system 14 from being copied and used on another system. - The
server security system 46 may comprise a profile information table 70, an application table 72 and a computer table 74. The profile information table 70 may store user preferences. The preferences may include automatic downloads, automatic logoffs, and the like. It will be understood that other client preferences may be stored in profile information table 70. It will be further understood that theserver security system 46 may comprise other or different information tables in the scope of the present invention. - The application table72 may comprise application identifiers for each client system. The application identifiers may be downloaded by the
server security system 46 to theclient system 14 upon validation. The application identifiers enable theclient system 14 to access theelectronic mail application 52, theweb server application 54, and thefile transfer application 56 to conduct electronic commerce over thenetworks 18. In one embodiment, the application identifiers may include an ID and password for each electronic commerce application. It will be understood that the application identifiers may comprise other fields within the scope of the present invention. - The
server security system 46 may periodically update the application identifiers to prevent unauthorized access to the applications. In one embodiment, the application identifiers may be updated every thirty (30) days. It will be understood that the identifiers may be otherwise updated within the scope of the present invention. - The computer table74 may comprise a serial number of the software of each
client system 14. The last random number downloaded to aclient system 14 may also be stored in the computer table 74. The serial and random numbers may be compared to serial and random numbers provided by theclient system 14 for system validation. If the numbers match, the system is valid. If the numbers do not match, the system is not valid and access to theserver system 12 may be denied. - In one embodiment, the
server security system 46 may comprise PERL scripts and MICROSOFT VISUAL C++ version 1.5. It will be understood that theserver security system 46 may comprise other programming formats within the scope of the present invention. - The
client system 14 may comprise an input/output system 80, aprocessor 82 andmemory 84. As previously described in connection with the input/output system 30, the input/output system 80 may connect thededicated network 16 and other input and output devices to theclient system 14. Thededicated network 16 may be directly connected to theclient system 14 or may be connected through a data transmission device such as a modem or the like. Input devices may include a pointing device such as a mouse or trackpad, a keyboard, and the like. Output devices may include a monitor, a printer, and the like. - The
client system 14 includes computer software that may be loaded and/or downloaded intomemory 84 and executed by theprocessor 82. The computer software may generally be identified by modules and similar systems inmemory 84. It will be understood that the computer software may be otherwise combined and/or divided for processing within the scope of the present invention. Accordingly, the labels of the modules and other software systems are for illustrative purposes and may be varied within the scope of the present invention. - As previously described in connection with
memory 34, computer software may be loaded intomemory 84 from disk storage (not shown). Disks storage may include a variety of types of storage media. For example, disk storage may include floppy disk drives, hard disk drives, CD/ROM drives or magnetic tape drives. -
Memory 84 may include anoperating system 86, aclient communication system 88 and anintegrated service manager 90. Theoperating system 86 may include a graphical user interface (GUI) 92 capable of generating a plurality ofapplication windows 94. Theoperating system 86 may be MacIntosh OS, WINDOWS NT, WINDOWS 95, OS/2, or any other operating system capable of providing or operating in conjunction with a graphical user interface (GUI). - The
client communication system 88 may operate in conjunction with theserver communication system 42 to provide a communication infrastructure between theclient system 14 and theserver system 12. As previously discussed in connection with theserver communication system 42, theclient communication system 88 may comprise TCP/IP for Windows, SDK-Visual Edition, part number: TCP/107S version 4.0. It will be understood that theclient communication system 88 may comprise other communication formats compatible with theserver communication system 42 within the scope of the present invention. - The integrated
service manager 90 may comprise auser interface 92 for interacting with a client. As described in more detail below in connection with FIG. 4, theuser interface 92 may comprise icons associated with modules of theservice manager 90. Modules may include alogon module 94 and a set ofelectronic commerce modules 96. Thus, the client may click on icons to logon to theserver system 12 and to conduct electronic commerce transactions via theserver system 12. Accordingly, the client may conduct all of its electronic commerce transactions from a single interface. As a result, a client need not locate and launch a number of separate applications, which can be time-consuming and confusing to an unsophisticated small business client. - The
logon module 94 may invoke aclient security system 100 to logon to theserver system 12. Theclient security system 100 may operate in conjunction with theserver security system 46 to validate theclient system 14. In one embodiment, theclient security system 100 may request a user identifier from the client. The user identifier may be a user identifier (ID) and a password. Theclient security system 100 may pass the user identifier to theserver security system 46 for validation. Theclient security system 100 may also pass a system identifier to theserver security system 46 for validation. In one embodiment, the system identifier may comprise aserial number 102 and arandom number 104 of the client system software. A new random number is generated and downloaded by theserver security system 46 with each validation. - Upon validation of the
client system 14, theclient security system 100 may receiveapplication identifiers 106 from theserver security system 46. The application identifiers 106 enable theintegrated service manager 90 to access theelectronic mail application 52, theweb server application 54, and thefile transfer application 56 on theserver system 12. In one embodiment, the application identifiers may comprise an ID and password for each application. As previously described in connection with theserver security system 46, the IDs and passwords may be periodically updated by theserver security system 46 to lessen or prevent unauthorized use of the applications 44. - The
electronic commerce modules 96 may include a module for each electronic commerce application 44 of theserver system 12. In one embodiment, themodules 96 may comprise anelectronic mail module 110, abrowser module 112, and afile transfer module 114. It will be understood that theelectronic commerce modules 96 may comprise other modules within the scope of the present invention. - The
electronic mail module 110 may be launched by an electronic mail icon (FIG. 4) of theuser interface 92 of theservice manager 90. Upon activation, theelectronic mail module 110 may open an electronicmail user interface 116 to access theelectronic mail application 52. Thereafter, the client may interact directly with the application through theapplication interface 116. - The
browser module 112 may be launched by a browser icon (FIG. 4) of theuser interface 92 of theservice manager 90. Upon activation, thebrowser module 112 may open abrowser user interface 118 to access theweb server application 54. Thereafter, the client may interact directly with theweb server application 54 through theapplication interface 118. - A
browser extension 120 may be provided on theclient system 14 for reading specific types of Web pages. In one embodiment, thebrowser extension 120 may comprise ACROBAT READER version 2.1 by Adobe Systems Inc., which provides cross-platform capabilities. It will be understood that other or nobrowser extensions 120 may be provided within the scope of the present invention. - The
file transfer module 114 may be launched by a file transfer icon (FIG. 4) of theuser interface 92 of theservice manager 90. Upon the activation, thefile transfer module 114 may open a filetransfer user interface 122 to access thefile transfer application 56. Thereafter, the client may interact directly with thefile transfer application 56 through theapplication interface 122. - The
file transfer application 56 may download files to aninbox 124 of theclient system 14. Theinbox 124 prevents pre-existing files and data of theclient system 14 from being overwritten by thefile transfer application 56 during file download. In one embodiment, theinbox 124 may be a dedicated directory. It will be understood that theinbox 124 may be otherwise configured within the scope of the present invention. - In one embodiment, the
service manager 90 may comprise MICROSOFT VISUAL BASIC version 3.0. In this embodiment, theuser interface 92,logon module 94 andelectronic commerce modules 96 may also comprise MICROSOFT VISUAL BASIC version 3.0. It will be understood that theintegrated service manager 90,user interface 92 andmodules - A
virus protection application 130 may also be provided in memory. Thevirus protection application 130 may be operated by theclient system 14 to scan downloaded data for harmful viruses and the like. In one embodiment, thevirus protection application 130 may comprise F-PROT PROFESSIONAL version 2.22.2 for DOS/Wind3.X/Win95 by Command Software Systems. In this embodiment, thevirus protection application 130 may be set to selectively or continually monitor theclient system 14. It will be understood that other or no virus protection applications may be used and remain within the scope of the present invention. - The
client system 14 may include a tutorial 132 inmemory 84. The tutorial may provide information to the client on how to operate theintegrated service manager 90. The tutorial 132 may be accessed through theintegrated service manager 90. In one embodiment, the tutorial 132 may be accessed through an icon (FIG. 4) of theuser interface 92 of theservice manager 90. The tutorial 132 may be programmed using XVT DEVELOPMENT SOLUTIONS FOR C by XVT Software, Inc. It will be understood that the tutorial 132 may be otherwise programmed or accessed within the scope of the present invention. - The
client system 14 may also provide acustomer assistance module 134 for the client. Customer assistance may allow the client to quickly and easily obtain help for configuring and using the integratedelectronic commerce system 10. In one embodiment, thecustomer assistance module 134 may be accessed through an icon (FIG. 4) of theuser interface 92 of theservice manager 90. - FIG. 3 illustrates a flow diagram by which a client may conduct electronic commerce in accordance with one embodiment of the present invention. The process begins at
step 150 in which a client may initiate logon to theserver system 12. As previously described, the client may initiate logon by clicking on a logon icon of theuser interface 92 of theservice manager 90. In response, as described in more detail below, theclient security system 100 may display a dialog box to the client requesting a user identifier from the client. The user identifier may comprise a user ID and a password. - Proceeding to step152, the client may enter a user ID. At
step 154, the client may enter a password. Theclient security system 100 may then pass the user ID and password to theserver system 12 for validation. Upon validation, theclient system 14 may display theuser interface 92 of theservice manager 90. - Referring to FIG. 4, the
user interface 92 may comprise anapplication window 170.Application window 170 may comprise drop downmenus 172,toolbar 174 and a plurality oficons 176 for selecting electronic commerce services. For the embodiment of FIG. 4, thewindow 170 may comprise alogon icon 180, anelectronic mail icon 182, a plurality ofbrowser icons 184, and afile transfer icon 186. Thelogon icon 180 may be associated with thelogon module 94 of theservice manager 90. Theelectronic mail icon 182 may be associated with theelectronic mail module 110 of theservice manager 90. Thebrowser icons 184 may be associated with thebrowser module 112 of theservice manager 90.Several browser icons 184 may be provided to divide browser services into specific network services. For example, Internet access may have a separate icon from intranet access. Further, intranet access may be divided into specific value added networks (VAN) such as online regulations, regulatory rulings and the like, databases, and a particular company's intranet. It will be understood that thebrowser icons 184 may be otherwise divided within the scope of the present invention. Thefile transfer icon 186 may be associated with thefile transfer module 114 of theservice manager 90. - The
application window 170 may include additional icons within the scope of the present invention. For example, theapplication window 170 may include atutorial icon 190 and acustomer assistance icon 192. Thetutorial icon 190 may be associated with the tutorial 132. Similarly, thecustomer assistance icon 192 may be associated withcustomer assistance 134. It will be understood that fewer or different icons may be provided in theuser interface 92 of theservice manager 90. - Returning to FIG. 3, the client may select electronic mail services from the
application window 170 displayed atstate 156. As previously described, the client may select electronic mail by clicking on theelectronic mail icon 182. The electronic mail selection branch ofstate 156 leads tostate 158. Atstate 158, the client may send, receive and/or check electronic mail messages. After the client has finished, the quit electronic mail branch ofstate 158 may return tostate 156. - The client may also select browser services from the
application window 170 displayed atstate 156. As previously described, the client may select the browser by clicking on one of thebrowser icons 184. The browser selection branch ofstate 156 leads tostate 160. Atstate 160, the client may browse the selectednetwork 18. As previously described, the network may be a value added network (VAN) , an intranet, extranet, Internet, and the like. After the client has finished browsing the selectednetwork 18, the quit browser branch ofstate 160 may return tostate 156. - The client may further select file transfer services from the
application window 170 displayed atstate 156. As previously described, the client may select file transfer services by clicking on thefile transfer icon 186. The file transfer selection branch ofstate 156 leads tostate 162. Atstate 162, the client may transmit and receive data files over thenetworks 18. As previously described, the data files may include electronic data interchange (EDI), electronic funds transfer (EFT), and the like. After the client has finished transferring funds, the quit file transfer branch ofstate 162 may return tostate 156. - Accordingly, the client may access a wide variety of electronic commerce services from a single interface. As a result, smaller and non-sophisticated businesses may participate in electronic commerce services. Such participation improves the efficiency of the smaller businesses and of larger businesses that may now electronically trade with the smaller businesses.
- After the client has finished its electronic commerce transactions, the client may logoff the
server system 12. The logoff selection branch ofstate 156 leads to the end of the process. - FIG. 5 illustrates a flow diagram of a method of providing electronic commerce services in accordance with one embodiment of the present invention. The process begins at
step 200 in which theclient system 14 may receive an initiation event. As previously described, the initiation event may be a client clicking on thelogon icon 180 of theuser interface 92 of the service manager. - Proceeding to step202, the
client security system 100 may receive a user identifier. As previously described, the user identifier may be received from the client in response to a request by theclient security system 100. The user identifier may comprise a user ID and a password. Atstep 204, theclient security system 100 may retrieve a system identifier. The system identifier may be aserial number 102 and arandom number 104 of the client system software. Proceeding to step 206, theclient security system 100 may upload the user and system identifiers to theserver system 12. Communication between theclient system 14 and theserver system 12 may be carried out by the server andclient communication systems - Next, at
step 208, theserver security system 46 may validate the user identifier. As previously described, the user identifier is valid if the user ID and password matches that stored in theserver system 12. Atstep 210, theserver security system 46 may validate the system identifier. The system identifier is valid if the serial andrandom numbers server system 12. If the user identifier and/or the system identifier is invalid, access to theserver system 12 may be denied. - Proceeding to step212, upon validation the
server security system 46 may retrieve profile information and application identifiers associated with theclient system 14. The profile information may be retrieved from the profile information table 70. The application identifiers may be retrieved from the application table 72. As previously described, the application identifiers may comprise an ID and password for each electronic commerce application of thesystem 10. - At
step 214, theserver security system 46 may generate a random number to be used for validation the next time the client attempts to logon to theserver system 12. The random number is a safeguard to prevent unauthorized copying and use of the client system software. Next, atstep 216, the application identifiers and the random number may be downloaded to theclient system 14. The application identifiers enable theclient system 14 to access the electronic commerce applications of theserver system 12. Accordingly, theelectronic commerce system 10 provides a single point of entry for the client to electronic commerce systems. As a result, the client need only remember a single user identifier rather than identifiers for several different electronic commerce applications. -
Step 216 leads tostate 218. Atstate 218, theservice manager 90 may display theuser interface 92. As previously described, theuser interface 92 may be theapplication window 170 described in connection with FIG. 4. In response to receipt of an electronic mail selection atstate 218, the electronic mail branch ofstate 218 may lead to step 220. Atstep 220, theelectronic mail application 52 may be invoked. Next, atstep 222, the electronic mail identifier may be provided to theelectronic mail application 52 to enable access to the application. After the application has been accessed, the client may work directly with the application. Accordingly, step 222 returns tostate 218 wherein theuser interface 92 of theservice manager 90 is displayed. - In response to receipt of a browser selection at
state 218, the browser branch ofstate 218 may lead to step 224. Atstep 224, theweb server application 54 may be invoked. Next, atstep 226, the browser identifier may be provided to access theweb server application 54. Atstep 228, a fire wall identifier for the browser may also be provided. Proceeding to step 230, the fire wall identifier may be validated to allow the browser to access a public network through thefire wall 58. After theweb server application 54 has been accessed, the client may work directly with the application. Step 230 returns tostate 218 wherein theuser interface 92 of theservice manager 90 is displayed. - In response to receipt of a file transfer selection at
state 218, the file transfer branch ofstate 218 may lead to step 232. Atstep 232, thefile transfer application 56 may be invoked. Next, atstep 234, the file transfer identifier may be provided to access thefile transfer application 56. After thefile transfer application 56 has been accessed, the client may work directly in the application. Step 234 returns tostate 218 wherein theuser interface 92 of theservice manager 90 is displayed. - In response to a logoff selection at
state 218, the logoff branch ofstate 218 may lead to step 240. Atstep 240, theclient system 14 may logoff of theserver system 12. Step 240 leads to the end of the process. - FIG. 6 illustrates a flow diagram of a method of uploading and transmitting a client data file over the
network 18 in accordance with one embodiment of the present invention. As previously described, the data file may comprise an electronic data interchange (EDI) file, an electronic funds transfer (EFT) file, and the like. The process begins atstep 250 in which thefile transfer application 56 receives a recipient address for a data file through the filetransfer user interface 122. Next, atstep 252, thefile transfer application 56 may receive the name of the data file through theuser interface 122. - Proceeding to step254, the data file may be retrieved on the
client system 14. Atstep 256, thefile transfer application 56 may upload the data file and the recipient address to theserver system 12. Next, atdecisional step 258, it is determined if the data file is to be translated. As previously described, preset types of data files between identified training partners may be translated to be compatible with the recipient system. For example, a file may be translated in accordance with a data format required by a particular trading partner. If the data file is to be translated, the YES branch ofdecisional step 258 leads to step 260. - At
step 260, the translation protocol for the data file is retrieved. Next, atstep 262, thetranslator 66 may translate the data file. Step 262 continues to step 264. Returning todecisional step 258, if the data file is not to be translated, the NO branch ofdecisional step 258 also leads to step 264. - At
step 264, thefile transfer application 56 may temporarily hold the data file in thedistribution sub-directory 64 ofclient directory 60. Proceeding to step 266, thefile transfer application 56 may periodically check thedistribution sub-directories 64 for files to be transmitted over thenetworks 18. In one embodiment, thefile transfer application 56 may check thedistribution sub-directory 64 every fifteen (15) minutes. It will be understood thatfile transfer application 56 may otherwise check thedistribution sub-directory 64 within the scope of the present invention. Proceeding to step 268, thefile transfer application 56 may transmit the data file over thenetworks 18 to the recipient address. Step 268 leads to the end of the process. - FIG. 7 illustrates a flow diagram of a method of receiving and downloading a data file from a network to a client system in accordance with one embodiment of the present invention. As previously described, the data file may be an electronic data interchange (EDI) file, an electronic funds transfer (EFT) file, and the like. The process begins at
step 300 wherein a data file is received over thenetworks 18. Next, atstep 302, the address of the file is also received. Step 302 leads todecisional step 304. - At
decisional step 304, thefile transfer application 56 may determine if the data file is to be translated. As previously described, preset types of data files between identified trading partners may be translated to be compatible with the recipient's system. If the data files are to be translated, the YES branch ofdecisional step 304 leads to step 306. - At
step 306, a translation protocol for the data file is retrieved. Proceeding to step 308, thetranslator 66 may translate the data file. Step 308 leads to step 310. Returning todecisional step 304, if the data file is not to be translated, the NO branch ofdecisional step 304 also leads to step 310. - At
step 310, thefile transfer application 56 may temporarily hold the data file in acollection sub-directory 62. Next, atstep 312, thefile transfer application 56 may receive a request to download the data file to theclient system 14. The request may be an automatic, periodic or manual request from the client. - Next, at
step 314, thefile transfer application 56 may download a data file from thecollection sub-directory 62 to theinbox 124 of theclient system 14. Use of theinbox 124 will prevent thefile transfer application 56 from overwriting other files or data of theclient system 14. At this point the process ends. - Although the present invention has been described with several embodiments, various changes and modifications may be suggested to one skilled in the art. It is intended that the present invention encompass such changes and modifications as fall within the scope of the appended claims.
Claims (63)
1. A method comprising:
providing an electronic commerce application at a server;
providing a first user interface at a client having an icon associated with a module at the client and the electronic commerce application;
validating, at the server, the client using an identifier associated with the client and validating a user associated with the client in response to clicking the icon; and
allowing a second user interface to access the electronic commerce application on the server based on the validation of the client and the validation of the user.
2. The method according to claim 1 and further comprising activating, by the module, the second user interface at the client in response to clicking the icon.
3. The method according to claim 1 , wherein the module comprises a logon module.
4. The method according to claim 1 , wherein the second user interface comprises an application window.
5. The method according to claim 1 , wherein a user identifier associated with the user is requested at the second user interface at the client.
6. The method according to claim 1 , wherein validating the user further comprises uploading a user identifier from the client system to the server system.
7. The method according to claim 1 , wherein the module is at the client.
8. The method according to claim 1 , wherein the identifier was previously downloaded from the server to the client.
9. The method according to claim 1 , wherein the electronic commerce application comprises any of an electronic mail application, a web server application or a file transfer application.
10. The method according to claim 1 and further comprising validating access of the client system to a firewall.
11. The method according to claim 1 , wherein the identifier comprises a serial number.
12. The method according to claim 1 , wherein the identifier comprises a random number.
13. The method according to claim 1 , wherein validating the identifier comprises uploading the identifier from the client to the server.
14. The method according to claim 1 and further comprising retrieving profile information associated with the client from the server.
15. The method according to claim 1 and further comprising:
generating a new identifier in response to validation of the identifier; and
downloading the new identifier to the client.
16. The method according to claim 1 , wherein the electronic commerce application comprises a file transfer application operable to send and receive electronic data interchange (EDI) data over the network.
17. A system comprising:
software operable to:
provide an electronic commerce application at a server;
provide a first user interface at a client having an icon associated with a module at the client and the electronic commerce application;
validate, at the server, the client using an identifier associated with the client and validating a user associated with the client in response to clicking the icon; and
allow a second user interface to access the electronic commerce application on the server based on the validation of the client and the validation of the user.
18. The system according to claim 17 , wherein the software is further operable to activate, by the module, the second user interface at the client in response to clicking the icon.
19. The system according to claim 17 , wherein the module comprises a logon module.
20. The system according to claim 17 , wherein the second user interface comprises an application window.
21. The system according to claim 17 , wherein a user identifier associated with the user is requested at the second user interface at the client.
22. The system according to claim 17 , wherein validating the user further comprises uploading a user identifier from the client system to the server system.
23. The system according to claim 17 , wherein the module is at the client.
24. The system according to claim 17 , wherein the identifier was previously downloaded from the server to the client.
25. The system according to claim 17 , wherein the electronic commerce application comprises any of an electronic mail application, a web server application or a file transfer application.
26. The system according to claim 17 , wherein the software is further operable to validate access of the client system to a firewall.
27. The system according to claim 17 , wherein the identifier comprises a serial number.
28. The system according to claim 17 , wherein the identifier comprises a random number.
29. The system according to claim 17 , wherein validating the identifier comprises uploading the identifier from the client to the server.
30. The system according to claim 17 and further comprising retrieving profile information associated with the client from the server.
31. The system according to claim 17 , wherein the software is further operable to:
generate a new identifier in response to validation of the identifier; and
download the new identifier to the client.
32. The system according to claim 17 , wherein the electronic commerce application comprises a file transfer application operable to send and receive electronic data interchange (EDI) data over the network.
33. A system comprising:
means for providing an electronic commerce application at a server;
means for providing a first user interface at a client having an icon associated with a module at the client and the electronic commerce application;
means for validating, at the server, the client using an identifier associated with the client and validating a user associated with the client in response to clicking the icon; and
means for allowing a second user interface to access the electronic commerce application on the server based on the validation of the client and the validation of the user.
34. A method comprising:
providing an electronic commerce application at a server;
providing a first user interface at a client having an icon associated with a module at the client and the electronic commerce application;
activating, by the module, a second user interface at the client in response to clicking the icon;
validating the client at the server using an identifier previously downloaded to the client;
validating a user associated with the client at the server; and
allowing the second user interface to access the electronic commerce application on the server based on the validation of the client and the validation of the user.
35. The method according to claim 34 , wherein the module comprises a logon module at the client.
36. The method according to claim 34 , wherein the electronic commerce application comprises any of an electronic mail application, a web server application or a file transfer application.
37. The method according to claim 34 , wherein validating the user further comprises uploading a user identifier from the client system to the server system.
38. The method according to claim 34 , wherein the identifier comprises a serial number.
39. The method according to claim 34 , wherein the identifier comprises a random number.
40. The method according to claim 34 , wherein validating the identifier comprises uploading the identifier from the client to the server.
41. The method according to claim 34 and further comprising retrieving profile information associated with the client.
42. The method according to claim 34 and further comprising:
generating a new identifier in response to validation of the identifier; and
downloading the new identifier to the client.
43. The method according to claim 34 , wherein the electronic commerce application comprises a file transfer application operable to send and receive electronic data interchange (EDI) data over the network.
44. A system comprising:
software operable to:
provide an electronic commerce application at a server;
provide a first user interface at a client having an icon associated with a module at the client and the electronic commerce application;
activate, by the module, a second user interface at the client in response to clicking the icon;
validate the client at the server using an identifier previously downloaded to the client;
validate a user associated with the client at the server; and
allow the second user interface to access the electronic commerce application on the server based on the validation of the client and the validation of the user.
45. The system according to claim 44 wherein the module comprises a logon module at the client.
46. The system according to claim 44 , wherein the electronic commerce application comprises any of an electronic mail application, a web server application or a file transfer application.
47. The system according to claim 44 , wherein the software is further operable to upload a user identifier from the client system to the server system.
48. The system according to claim 44 , wherein the identifier comprises a serial number.
49. The system according to claim 44 , wherein the identifier comprises a random number.
50. The system according to claim 44 , wherein validating the identifier comprises uploading the identifier from the client to the server.
51. The system according to claim 44 , wherein the software is further operable to retrieve profile information associated with the client.
52. The system according to claim 44 , wherein the software is further operable to:
generate a new identifier in response to validation of the identifier; and
download the new identifier to the client.
53. The system according to claim 44 , wherein the electronic commerce application comprises a file transfer application operable to send and receive electronic data interchange (EDI) data over the network.
54. A system comprising:
means for providing an electronic commerce application at a server;
means for providing a first user interface at a client having an icon associated with a module at the client and the electronic commerce application;
means for activating, by the module, a second user interface at the client in response to clicking the icon;
means for validating the client at the server using an identifier previously downloaded to the client;
means for validating a user associated with the client at the server; and
means for allowing the second user interface to access the electronic commerce application on the server based on the validation of the client and the validation of the user.
55. A method comprising:
providing an electronic commerce application at a server;
providing a first user interface at a client having an application icon and a logon icon;
validating the client at the server using an identifier previously downloaded to the client in response to clicking the logon icon;
validating a user associated with the client at the server in response to clicking the logon icon;
activating, by the module, a second user interface at the client in response to clicking the application icon; and
allowing the second user interface to access the electronic commerce application on the server based on the validation of the client and the validation of the user.
56. The method according to claim 55 , wherein the second user interface comprises an application window.
57. The method according to claim 55 , wherein the identifier comprises a serial number.
58. The method according to claim 55 , wherein the electronic commerce application comprises any of an electronic mail application, a web server application or a file transfer application.
59. A system comprising:
software operable to:
provide an electronic commerce application at a server;
provide a first user interface at a client having an application icon and a logon icon;
validate the client at the server using an identifier previously downloaded to the client in response to clicking the logon icon;
validate a user associated with the client at the server in response to clicking the logon icon;
activate, by the module, a second user interface at the client in response to clicking the application icon; and
allow the second user interface to access the electronic commerce application on the server based on the validation of the client and the validation of the user.
60. The system according to claim 59 , wherein the second user interface comprises an application window.
61. The system according to claim 59 , wherein the identifier comprises a serial number.
62. The system according to claim 59 , wherein the electronic commerce application comprises any of an electronic mail application, a web server application or a file transfer application.
63. A system comprising:
means for providing an electronic commerce application at a server;
means for providing a first user interface at a client having an application icon and a logon icon;
means for validating the client at the server using an identifier previously downloaded to the client in response to clicking the logon icon;
means for validating a user associated with the client at the server in response to clicking the logon icon;
means for activating, by the module, a second user interface at the client in response to clicking the application icon; and
means for allowing the second user interface to access the electronic commerce application on the server based on the validation of the client and the validation of the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/191,598 US20020184375A1 (en) | 1997-07-14 | 2002-07-08 | Integrated electronic commerce system and method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/892,580 US6453352B1 (en) | 1997-07-14 | 1997-07-14 | Integrated electronic commerce system and method |
US10/191,598 US20020184375A1 (en) | 1997-07-14 | 2002-07-08 | Integrated electronic commerce system and method |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/892,580 Continuation US6453352B1 (en) | 1997-07-14 | 1997-07-14 | Integrated electronic commerce system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
US20020184375A1 true US20020184375A1 (en) | 2002-12-05 |
Family
ID=25400168
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/892,580 Expired - Lifetime US6453352B1 (en) | 1997-07-14 | 1997-07-14 | Integrated electronic commerce system and method |
US10/191,598 Abandoned US20020184375A1 (en) | 1997-07-14 | 2002-07-08 | Integrated electronic commerce system and method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/892,580 Expired - Lifetime US6453352B1 (en) | 1997-07-14 | 1997-07-14 | Integrated electronic commerce system and method |
Country Status (3)
Country | Link |
---|---|
US (2) | US6453352B1 (en) |
AU (1) | AU8482698A (en) |
WO (1) | WO1999004357A1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050288005A1 (en) * | 2004-06-22 | 2005-12-29 | Roth Daniel L | Extendable voice commands |
US20100046392A1 (en) * | 2005-01-20 | 2010-02-25 | International Business Machines Corporation | Controlling Software Distribution or File Transfer |
US9507791B2 (en) | 2014-06-12 | 2016-11-29 | Google Inc. | Storage system user interface with floating file collection |
US9509772B1 (en) | 2014-02-13 | 2016-11-29 | Google Inc. | Visualization and control of ongoing ingress actions |
US9531722B1 (en) | 2013-10-31 | 2016-12-27 | Google Inc. | Methods for generating an activity stream |
US9536199B1 (en) | 2014-06-09 | 2017-01-03 | Google Inc. | Recommendations based on device usage |
US9542457B1 (en) | 2013-11-07 | 2017-01-10 | Google Inc. | Methods for displaying object history information |
US9614880B1 (en) | 2013-11-12 | 2017-04-04 | Google Inc. | Methods for real-time notifications in an activity stream |
US9870420B2 (en) | 2015-01-19 | 2018-01-16 | Google Llc | Classification and storage of documents |
US10078781B2 (en) | 2014-06-13 | 2018-09-18 | Google Llc | Automatically organizing images |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3844588B2 (en) * | 1998-03-05 | 2006-11-15 | 富士通株式会社 | Information management system, local computer, and computer-readable recording medium recording information acquisition program |
KR20000057127A (en) * | 1999-02-03 | 2000-09-15 | 송동호 | Executing software program system for application service provider on distributed computing environment and method using the sa me |
US7359871B1 (en) | 1999-03-02 | 2008-04-15 | Alticor Investments Inc. | System and method for managing recurring orders in a computer network |
EP1402429A2 (en) | 1999-03-02 | 2004-03-31 | Quixtar Investments, Inc. | Electronic commerce transactions within a marketing system that may contain a membership buying opportunity |
KR19990046731A (en) * | 1999-04-20 | 1999-07-05 | 천주현 | System for implementing electronic commerce shopping mall on LINUX |
WO2001003079A1 (en) * | 1999-07-06 | 2001-01-11 | Amdahl Corporation | Pooled resource e-value multiple provider systems |
AU7456200A (en) * | 1999-09-20 | 2001-04-24 | Hwangjin Jang | Internet on-line service system |
JP3654812B2 (en) * | 2000-02-25 | 2005-06-02 | ルビコン株式会社 | Display method and management method in component supply management system |
US8036905B2 (en) * | 2000-02-29 | 2011-10-11 | Newgistics, Inc. | Method and system for processing the local return of remotely purchased products |
US8386337B2 (en) * | 2000-03-24 | 2013-02-26 | Newgistics, Inc. | System and method for single-action returns of remotely purchased merchandise |
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US6799197B1 (en) * | 2000-08-29 | 2004-09-28 | Networks Associates Technology, Inc. | Secure method and system for using a public network or email to administer to software on a plurality of client computers |
US20060074727A1 (en) | 2000-09-07 | 2006-04-06 | Briere Daniel D | Method and apparatus for collection and dissemination of information over a computer network |
GB0028729D0 (en) * | 2000-11-24 | 2001-01-10 | Nokia Oy Ab | Improvement in and relating to transaction security |
US7958237B2 (en) * | 2001-01-23 | 2011-06-07 | Pearl Software, Inc. | Method for managing computer network access |
US7716091B2 (en) * | 2001-05-24 | 2010-05-11 | Newgistics, Inc. | Local returns of remotely purchased merchandise with return code validation |
EP1428346A4 (en) * | 2001-08-23 | 2004-11-24 | Efunds Corp | Software security control system and method |
US8396756B1 (en) | 2001-09-11 | 2013-03-12 | Shopatron, Inc. | System and method for processing product orders |
US20030065949A1 (en) * | 2001-10-01 | 2003-04-03 | Madeleine Le | International trade system |
US20040268214A1 (en) * | 2001-10-01 | 2004-12-30 | Gabriele Zinssmeister | Transaction monitoring system |
EP1461749A4 (en) * | 2001-12-06 | 2006-05-03 | Manugistics Inc | System and method for managing market activities |
US20030130943A1 (en) * | 2002-01-08 | 2003-07-10 | Bottomline Technologies (De) Inc. | Automated invoice receipt and management system with automated loading systems |
US20040193436A1 (en) * | 2003-02-10 | 2004-09-30 | Stashluk Edward J. | Method and system using return labels with dynamically generated multiple datapoint coding |
US20050108021A1 (en) * | 2003-07-31 | 2005-05-19 | Greg Anderson | System and method for routing and managing service requests |
US7428754B2 (en) * | 2004-08-17 | 2008-09-23 | The Mitre Corporation | System for secure computing using defense-in-depth architecture |
US20060149577A1 (en) * | 2004-12-30 | 2006-07-06 | Newgistics, Inc. | System and method for the customized processing of returned merchandise |
US8060919B2 (en) * | 2007-07-30 | 2011-11-15 | International Business Machines Corporation | Automated password tool and method of use |
US9760924B2 (en) | 2015-02-02 | 2017-09-12 | Kibo Software, Inc. | Automatic search of local inventory |
US9805380B2 (en) | 2015-10-20 | 2017-10-31 | Kibo Software, Inc. | Offline conversion tracking |
EP3682407A1 (en) | 2017-09-12 | 2020-07-22 | David Schnitt | Unified electronic transaction management system |
US11526859B1 (en) | 2019-11-12 | 2022-12-13 | Bottomline Technologies, Sarl | Cash flow forecasting using a bottoms-up machine learning approach |
US11532040B2 (en) | 2019-11-12 | 2022-12-20 | Bottomline Technologies Sarl | International cash management software using machine learning |
US11704671B2 (en) | 2020-04-02 | 2023-07-18 | Bottomline Technologies Limited | Financial messaging transformation-as-a-service |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5434918A (en) * | 1993-12-14 | 1995-07-18 | Hughes Aircraft Company | Method for providing mutual authentication of a user and a server on a network |
US5729528A (en) * | 1994-09-07 | 1998-03-17 | Salingre; Daniel | Data transmission system having a monitoring function for monitoring the congestion of links and node intended to be used in such a system |
US5732137A (en) * | 1994-06-03 | 1998-03-24 | Sun Microsystems, Inc. | Method and apparatus for secure remote authentication in a public network |
US5845074A (en) * | 1996-11-22 | 1998-12-01 | E-Parcel, Llc | Smart internet information delivery system having a server automatically detects and schedules data transmission based on status of clients CPU |
US5845070A (en) * | 1996-12-18 | 1998-12-01 | Auric Web Systems, Inc. | Security system for internet provider transaction |
US5889942A (en) * | 1996-12-18 | 1999-03-30 | Orenshteyn; Alexander S. | Secured system for accessing application services from a remote station |
US5999625A (en) * | 1997-02-27 | 1999-12-07 | International Business Machines Corporation | Method for electronic payment system with issuer control |
US6115040A (en) * | 1997-09-26 | 2000-09-05 | Mci Communications Corporation | Graphical user interface for Web enabled applications |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4780821A (en) * | 1986-07-29 | 1988-10-25 | International Business Machines Corp. | Method for multiple programs management within a network having a server computer and a plurality of remote computers |
US5138712A (en) * | 1989-10-02 | 1992-08-11 | Sun Microsystems, Inc. | Apparatus and method for licensing software on a network of computers |
US5940504A (en) * | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
WO1993011480A1 (en) * | 1991-11-27 | 1993-06-10 | Intergraph Corporation | System and method for network license administration |
US6006199A (en) * | 1991-12-31 | 1999-12-21 | International Business Machines Corporation | Method and system for automated payment within a computer integrated manufacturing system |
US5586260A (en) * | 1993-02-12 | 1996-12-17 | Digital Equipment Corporation | Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms |
JP3263878B2 (en) * | 1993-10-06 | 2002-03-11 | 日本電信電話株式会社 | Cryptographic communication system |
US5495411A (en) * | 1993-12-22 | 1996-02-27 | Ananda; Mohan | Secure software rental system using continuous asynchronous password verification |
US5950173A (en) * | 1996-10-25 | 1999-09-07 | Ipf, Inc. | System and method for delivering consumer product related information to consumers within retail environments using internet-based information servers and sales agents |
US5608874A (en) * | 1994-12-02 | 1997-03-04 | Autoentry Online, Inc. | System and method for automatic data file format translation and transmission having advanced features |
US5764890A (en) * | 1994-12-13 | 1998-06-09 | Microsoft Corporation | Method and system for adding a secure network server to an existing computer network |
JP3946275B2 (en) * | 1995-01-10 | 2007-07-18 | 富士通株式会社 | Remote installation system and method |
US5721779A (en) * | 1995-08-28 | 1998-02-24 | Funk Software, Inc. | Apparatus and methods for verifying the identity of a party |
CA2236644A1 (en) | 1995-11-03 | 1997-05-09 | Sterling Commerce, Inc. | Value added network with multiple access methodology |
US5778178A (en) | 1995-11-13 | 1998-07-07 | Arunachalam; Lakshmi | Method and apparatus for enabling real-time bi-directional transactions on a network |
US5893076A (en) * | 1996-01-16 | 1999-04-06 | Sterling Commerce, Inc. | Supplier driven commerce transaction processing system and methodology |
US6006333A (en) * | 1996-03-13 | 1999-12-21 | Sun Microsystems, Inc. | Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server |
US5684951A (en) * | 1996-03-20 | 1997-11-04 | Synopsys, Inc. | Method and system for user authorization over a multi-user computer system |
US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
JP3526688B2 (en) * | 1996-03-29 | 2004-05-17 | 富士通株式会社 | Metered system and method for connectionless communication |
US5794206A (en) * | 1996-05-06 | 1998-08-11 | Sterling Commerce, Inc. | Method and system for displaying electronic data interchanges in a computer |
US6092198A (en) * | 1997-02-25 | 2000-07-18 | International Business Machines Corporation | System and method for enabling and controlling anonymous file transfer protocol communications |
US5864871A (en) * | 1996-06-04 | 1999-01-26 | Multex Systems | Information delivery system and method including on-line entitlements |
US7225142B1 (en) | 1996-08-01 | 2007-05-29 | At&T Corp. | Interactive multimedia advertising and electronic commerce on a hypertext network |
US5794234A (en) | 1996-08-14 | 1998-08-11 | The Ec Company | Method and system for providing electronic commerce between incompatible data processing systems |
US5907621A (en) * | 1996-11-15 | 1999-05-25 | International Business Machines Corporation | System and method for session management |
US5784463A (en) * | 1996-12-04 | 1998-07-21 | V-One Corporation | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method |
US5748890A (en) * | 1996-12-23 | 1998-05-05 | U S West, Inc. | Method and system for authenticating and auditing access by a user to non-natively secured applications |
US5875296A (en) * | 1997-01-28 | 1999-02-23 | International Business Machines Corporation | Distributed file system web server user authentication with cookies |
US6085324A (en) * | 1997-02-05 | 2000-07-04 | Ogram; Mark E. | Monitoring and regulatory system for the internet |
US5930804A (en) * | 1997-06-09 | 1999-07-27 | Philips Electronics North America Corporation | Web-based biometric authentication system and method |
US6088805A (en) * | 1998-02-13 | 2000-07-11 | International Business Machines Corporation | Systems, methods and computer program products for authenticating client requests with client certificate information |
-
1997
- 1997-07-14 US US08/892,580 patent/US6453352B1/en not_active Expired - Lifetime
-
1998
- 1998-07-14 WO PCT/US1998/014447 patent/WO1999004357A1/en active Application Filing
- 1998-07-14 AU AU84826/98A patent/AU8482698A/en not_active Abandoned
-
2002
- 2002-07-08 US US10/191,598 patent/US20020184375A1/en not_active Abandoned
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5434918A (en) * | 1993-12-14 | 1995-07-18 | Hughes Aircraft Company | Method for providing mutual authentication of a user and a server on a network |
US5732137A (en) * | 1994-06-03 | 1998-03-24 | Sun Microsystems, Inc. | Method and apparatus for secure remote authentication in a public network |
US5729528A (en) * | 1994-09-07 | 1998-03-17 | Salingre; Daniel | Data transmission system having a monitoring function for monitoring the congestion of links and node intended to be used in such a system |
US5845074A (en) * | 1996-11-22 | 1998-12-01 | E-Parcel, Llc | Smart internet information delivery system having a server automatically detects and schedules data transmission based on status of clients CPU |
US5845070A (en) * | 1996-12-18 | 1998-12-01 | Auric Web Systems, Inc. | Security system for internet provider transaction |
US5889942A (en) * | 1996-12-18 | 1999-03-30 | Orenshteyn; Alexander S. | Secured system for accessing application services from a remote station |
US5999625A (en) * | 1997-02-27 | 1999-12-07 | International Business Machines Corporation | Method for electronic payment system with issuer control |
US6115040A (en) * | 1997-09-26 | 2000-09-05 | Mci Communications Corporation | Graphical user interface for Web enabled applications |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050288005A1 (en) * | 2004-06-22 | 2005-12-29 | Roth Daniel L | Extendable voice commands |
US8019324B2 (en) * | 2004-06-22 | 2011-09-13 | Voice SignalTechnologies, Inc. | Extendable voice commands |
US20100046392A1 (en) * | 2005-01-20 | 2010-02-25 | International Business Machines Corporation | Controlling Software Distribution or File Transfer |
US7978730B2 (en) * | 2005-01-20 | 2011-07-12 | International Business Machines Corporation | Controlling software distribution or file transfer |
US9531722B1 (en) | 2013-10-31 | 2016-12-27 | Google Inc. | Methods for generating an activity stream |
US9542457B1 (en) | 2013-11-07 | 2017-01-10 | Google Inc. | Methods for displaying object history information |
US9614880B1 (en) | 2013-11-12 | 2017-04-04 | Google Inc. | Methods for real-time notifications in an activity stream |
US9509772B1 (en) | 2014-02-13 | 2016-11-29 | Google Inc. | Visualization and control of ongoing ingress actions |
US9536199B1 (en) | 2014-06-09 | 2017-01-03 | Google Inc. | Recommendations based on device usage |
US9507791B2 (en) | 2014-06-12 | 2016-11-29 | Google Inc. | Storage system user interface with floating file collection |
US10078781B2 (en) | 2014-06-13 | 2018-09-18 | Google Llc | Automatically organizing images |
US9870420B2 (en) | 2015-01-19 | 2018-01-16 | Google Llc | Classification and storage of documents |
Also Published As
Publication number | Publication date |
---|---|
AU8482698A (en) | 1999-02-10 |
WO1999004357A1 (en) | 1999-01-28 |
US6453352B1 (en) | 2002-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6453352B1 (en) | Integrated electronic commerce system and method | |
US11539781B2 (en) | Editing an unhosted third party application | |
US6029245A (en) | Dynamic assignment of security parameters to web pages | |
US6647531B2 (en) | Customization of network documents | |
US8694588B2 (en) | Facility for distributing and providing access to electronic mail message attachments | |
US7796640B2 (en) | Data management system and method | |
US5732219A (en) | Computer system and computer-implemented process for remote editing of computer files | |
US5961590A (en) | System and method for synchronizing electronic mail between a client site and a central site | |
EP1173977B1 (en) | Video conferencing system | |
US6182222B1 (en) | Secure data storage system and method | |
US6633913B1 (en) | Scan system and method for scanning images to an online web page | |
AU734533B2 (en) | Apparatus and method for identifying clients accessing network sites | |
KR100264535B1 (en) | Computer devices and methods for communicating between software applications and computers on the World Wide Web | |
US6615353B1 (en) | User authentication method and user authentication system | |
US20020046279A1 (en) | Methods and systems for call processing utilizing a uniform resource locator | |
US20020059402A1 (en) | Server-sided internet-based platform independent operating system and application suite | |
US20020029228A1 (en) | Remote access of archived compressed data files | |
US20060168645A1 (en) | Apparatus and method for a personal cookie repository service for cookie management among multiple devices | |
US6216121B1 (en) | Web page generation with subtemplates displaying information from an electronic post office system | |
EA007778B1 (en) | Application generator | |
JP2000231544A (en) | Method for transmitting web site user information anonymously | |
US6446117B1 (en) | Apparatus and method for saving session variables on the server side of an on-line data base management system | |
EP0815518A1 (en) | Computer system and computer-implemented process for creation and maintenance of on-line services | |
CA2437273C (en) | Network conduit for providing access to data services | |
WO1999009658A2 (en) | Server-sided internet-based platform independent operating system and application suite |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |