International Business Machines Corporation
Transaction with security integrity and permission management

Last updated:

Abstract:

Methods, computer program products, and systems are presented and can include for instance: The method can include for example, establishing a permission that authorizes a second shopper to act on behalf of a first shopper, the first shopper having a profile that includes first shopper information stored in a secure computing environment; and performing a transaction based on one or more input of the second shopper, the transaction using content of the first shopper information stored in a secure computing environment, wherein the second shopper is restricted from accessing one or more information item of the first shopper information stored in a secure computing environment.

Status:
Grant
Type:

Utility

Filling date:

12 Aug 2016

Issue date:

28 Jun 2022