[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


Vollen Text ber:
nach Nummer 5,960,411 suchen.

Eingereicht: September 12, 1997
Erteilt: September 28, 1999 
Klage: ?

> [..]
> The selection of the various items from the electronic
> catalogs is generally based on the "shopping cart"
> model. When the purchaser selects an item from the
> electronic catalog, the server computer system
> metaphorically adds that item to a shopping cart. When the
> purchaser is done selecting items, then all the items in the
> shopping cart are "checked out" (i.e., ordered) when the
> purchaser provides billing and shipment information. In some
> models, when a purchaser selects any one item, then that
> item is "checked out" by automatically prompting the user
> for the billing and shipment information. Although the
> shopping cart model is very flexible and intuitive, it has a
> downside in that it requires many interactions by the
> purchaser.  For example, the purchaser selects the various
> items from the electronic catalog, and then indicates that
> the selection is complete. The purchaser is then presented
> with an order Web page that prompts the purchaser for the
> purchaser-specific order information to complete the
> order. That Web page may be prefilled with information that
> was provided by the purchaser when placing another
> order. The information is then validated by the server
> computer system, and the order is completed. Such an
> ordering model can be problematic for a couple of
> reasons. If a purchaser is ordering only one item, then the
> overhead of confirming the various steps of the ordering
> process and waiting for, viewing, and updating the
> purchaser-specific order information can be much more than
> the overhead of selecting the item itself. This overhead
> makes the purchase of a single item cumbersome. Also, with
> such an ordering model, each time an order is placed
> sensitive information is transmitted over the Internet. Each
> time the sensitive information is transmitted over the
> Internet, it is susceptible to being intercepted and
> decrypted.
> An embodiment of the present invention provides a method and
> system for ordering an item from a client system. The client
> system is provided with an identifier that identifies a
> customer. The client system displays information that
> identifies the item and displays an indication of an action
> (e.g., a single action such as clicking a mouse button) that
> a purchaser is to perform to order the identified item. In
> response to the indicated action being performed, the client
> system sends to a server system the provided identifier and
> a request to order the identified item. The server system
> uses the identifier to identify additional information
> needed to generate an order for the item and then generates
> the order.
> The server system receives and stores the additional
> information for customers using various computer systems so
> that the server system can generate such orders. The server
> system stores the received additional information in
> association with an identifier of the customer and provides
> the identifier to the client system. When requested by the
> client system, the server system provides information
> describing the item to the requesting client system. When
> the server system receives a request from a client system,
> the server system combines the additional information stored
> in association with the identifier included in the request
> to effect the ordering of the item.

Ach Herz! wie s ist Liebe selbst begabt,
Da schon so reich an Freud' ihr Schatten ist.