International Business Machines Corporation
Transaction with security integrity and permission management
Last updated:
Abstract:
Methods, computer program products, and systems are presented and can include for instance: The method can include for example, establishing a permission that authorizes a second shopper to act on behalf of a first shopper, the first shopper having a profile that includes first shopper information stored in a secure computing environment; and performing a transaction based on one or more input of the second shopper, the transaction using content of the first shopper information stored in a secure computing environment, wherein the second shopper is restricted from accessing one or more information item of the first shopper information stored in a secure computing environment.
Status:
Grant
Type:
Utility
Filling date:
12 Aug 2016
Issue date:
28 Jun 2022