Claims
- 1. A method of commerce over the internet between a user computer and a merchant computer, the user computer reading a document including an embedded watermark, said method comprising the steps of:
at the user computer, extracting identifying data from the watermark, and passing the identifying data to a central computer; at the central computer, identifying a financial institution identifier associated with the document and passing the identifier and a session ticket to the user computer; contacting the financial institution via the financial institution identifier and passing to the financial institution the session ticket to obtain an authentication ticket; passing the authentication ticket from the user to the merchant computer to facilitate a transaction; and providing the authentication ticket from the merchant computer to the financial institution.
- 2. The method according to claim 1, wherein the identifying data comprises a document identifier and a document type identifier.
- 3. The method according to claim 2, wherein said identifying step comprises the step of identifying the financial institution via the document type identifier.
- 4. The method according to claim 1, wherein the session ticket comprises a document identifier, a timestamp and an address for the user computer.
- 5. The method according to claim 1, further comprising the step of encrypting the session ticket.
- 6. The method according to claim 1, further comprising the step of encrypting the authorization ticket.
- 7. The method according to claim 2, wherein the document identifier is encrypted to allow access to the document identifier only by the financial institution.
- 8. The method according to claim 1, wherein the financial institution identifier comprises a URL, and wherein the financial institution comprises a computer.
- 9. The method according to claim 1, wherein said authorization ticket comprises a document identifier, an address of the merchant computer, an address of the user, a timestamp and an amount of the transaction.
- 10. The method according to claim 1, wherein said extracting step is initiated by the step of selecting a secure purchase option from the merchant computer.
- 11. The method according to claim 1, wherein said providing step verifies that the authorization is authentic.
- 12. A method of verifying data comprising the steps of:
digitally capturing an image; computing a first hash of the captured image; and comparing the first hash with a database of hashes, the database of hashes comprising hashes corresponding to previously captured images.
- 13. The method of claim 12, further comprising the step of:
enabling further processing when the first hash fails to match any of the hashes in the database.
- 14. The method of claim 12, further comprising the step of:
identifying an attack when the first hash matches at least one hash in the database.
- 15. The method of claim 12, wherein the image comprises an embedded watermark, said method further comprising the steps of:
extracting data from the watermark; encrypting a request, the request comprising the extracted data and the first hash; and sending the encrypted request to an external computer, wherein said comparing step is performed at said external computer.
- 16. The method of claim 12, wherein the image comprises an embedded watermark, said method further comprising the steps of:
extracting data from the watermark; encrypting a request comprising a block of image data from the image; sending the encrypted request to an external computer; wherein said computing step and said comparing step are performed at the external computer.
- 17. A system for exchanging data comprising:
a user terminal comprising a watermark reader, and a capturing device to capture an image of a watermarked document; and a central site comprising a database of image hashes, wherein said user terminal communicates with said central site, and wherein said reader reads a watermark and computes a hash of a captured image and passes the hash to said central site for comparison with said database of image hashes.
- 18. A method of commerce over a communications system between a user and a merchant, the system including a central computer, a user computer, a merchant computer and a financial institution computer, the user computer comprising a reader, the computers communicating via a network, said method comprising the steps of:
accessing the merchant computer from the user computer; launching on the user computer the reader to read a document comprising embedded data, the reader extracting identifying data from the embedded data; accessing the central computer from the user computer to obtain a URL for the financial institution computer and a ticket, the URL being identified from the extracted identifying data; passing the ticket from the user computer to the financial institution computer to obtain an authorization; after receipt of the authorization, passing the authorization from the user computer to the merchant computer; and passing the authorization from the merchant computer to the financial institution computer.
- 19. A method of gaining permissions comprising the steps of:
launching on a first computer a reader to read a document comprising embedded data, the reader extracting identifying data from the embedded data; accessing the central computer from the first computer to obtain a URL for a permission granting computer and a ticket, the URL identified from the extracted identifying data; passing the ticket from the first computer to the permission granting computer to obtain a permission; and upon receipt of the permission, passing the permission from the first computer to a computer requesting the permission.
- 20. A method of preventing online attacks, comprising the steps of:
capturing an encoded image; extracting data from the encoded image; computing a hash of the captured image; and comparing the hash against previously determined hashes.
- 21. The method according to claim 20, further comprising the step of:
linking the extracted data to other data when the hash does not match any of the previously determined hashes.
- 22. The method according to claim 20, further comprising the step of:
disregarding the extracted data when the hash matches at least one of the previously determined hashes.
- 23. A computer readable medium having a data structure stored thereon, said data structure comprising:
a document identifier; a document type identifier; and a hash of an image from which the document identifier and document type identifier were extracted from.
- 24. The computer readable medium according to claim 23, wherein said data structure is encrypted.
- 25. the computer readable medium according to claim 23, wherein said document identifier is encrypted.
- 26. A method of gaining permissions comprising the steps of:
launching on a first computer a reader to read a document comprising identifying data; accessing a central computer to obtain a location of a permission computer and a ticket, the location identified from the identifying data; passing the ticket to the permission computer to obtain a permission; and upon receipt of the permission, passing the permission to a computer requesting the permission.
- 27. A method of verifying data comprising the steps of:
verifying physical possession of an identifying document; and comparing provided verification data with predetermined verification data.
RELATED APPLICATION DATA
[0001] This application claims the benefit of U.S. Provisional Application No. 60/257,822, filed Dec. 21, 2000. This patent application is also a continuation-in-part of U.S. application Ser. No. 09/562,049, filed May 1, 2000. These applications are hereby incorporated by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60257822 |
Dec 2000 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
09562049 |
May 2000 |
US |
Child |
09790322 |
Feb 2001 |
US |