摘要:
Processes are disclosed for enabling a user to purchase a digital product from a first computer system (e.g., a merchant web site), and to then initiate electronic delivery of the digital product from a second computer system without revealing personal information to the second computer system or its operator. The first and second computer systems communicate with each other to track fulfillment/delivery statuses of orders, and to limit the number of times the user can download the purchased digital product from the second computer system.
摘要:
A method and system for achieving the delivery of a digital product from an Internet vendor to a customer, while maintaining customer anonymity with respect to the vendor. After the purchase of a digital product from an on-line merchant, the merchant sends to the customer a receipt containing a link that allows the customer to request delivery of their electronic product. Accessing the link then triggers the merchant to verify the validity of the request, based upon information securely encoded in the link sent to the customer. Upon verification of the delivery request, the merchant requests that the vendor fulfill the product delivery request. The identity of the customer and transaction information about the purchase of the digital product is not revealed to the vendor.
摘要:
Processes and systems are disclosed for enabling a user to purchase a digital product from a first computer system (e.g., a merchant web site), and to then initiate electronic delivery of the digital product from a second computer system without revealing personal information to the second computer system or its operator. In one embodiment, the user initiates the anonymous delivery from the second computer system using a link received from the first computer system. The first and second computer systems communicate with each other to track fulfillment/delivery statuses of orders, and to limit the number of times the user can download the purchased digital product from the second computer system.
摘要:
A method and system for controlling access of a resource among several users of a resource. A plurality of service queues are established, each service queue handling requests for a predetermined range of the resource. A plurality of time slots are also established, and each service queue has a number of time slots in proportion to the amount of resource handled by that queue. One or more requestors request access to the resource, indicating a desired amount of the resource. Each request is assigned to one of the service queues based on the requested amount of the resource. A reference to the request is inserted in a number of slots associated with the queue to which the requestor was assigned. The references in the slots establish a service order which controls the order and frequency with which a requestor can access the resource. A quota can be established for each requestor to prevent any requestor from using a disproportionate amount of the resource. The method and system of the present invention is highly efficient and provides Quality of Service guarantees for multimedia traffic.