EP1269715A2 - Procede et appareil de verification d'un instrument porteur de valeurs - Google Patents

Procede et appareil de verification d'un instrument porteur de valeurs

Info

Publication number
EP1269715A2
EP1269715A2 EP01923024A EP01923024A EP1269715A2 EP 1269715 A2 EP1269715 A2 EP 1269715A2 EP 01923024 A EP01923024 A EP 01923024A EP 01923024 A EP01923024 A EP 01923024A EP 1269715 A2 EP1269715 A2 EP 1269715A2
Authority
EP
European Patent Office
Prior art keywords
indicium
value
ticket
bearing
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP01923024A
Other languages
German (de)
English (en)
Inventor
Steve Atsushi Okamoto
Steven Miller Schattmaier
Tim Von Kaenel
Mike Todd Zeile
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CMA Business Credit Services
Original Assignee
CMA Business Credit Services
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CMA Business Credit Services filed Critical CMA Business Credit Services
Publication of EP1269715A2 publication Critical patent/EP1269715A2/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Definitions

  • This invention relates to the field of computer software, and more particularly to a method and apparatus for verifying a value-bearing instrument.
  • a value-bearing instrument is an item that has an intrinsic value and thereby represents a right to a valued item or service.
  • Examples of such value-bearing instruments include currency, coupons, tickets, gift certificates, money order, and traveler's checks.
  • a problem with value-bearing instruments is that it is inconvenient to transfer such instruments from one party to another. In most instances value-bearing instruments are exchanged via a physical transfer ofthe instrument itself. For example, a donor gives a gift certificate to a recipient by physically providing it to the recipient.
  • a system that allows users to transfer an authenticated version of a value-bearing instrument from one party to another without requiring that a physical version ofthe instrument be exchanged and/or forwarded to the recipient.
  • value-bearing instruments Most commercial transactions involve the use of value-bearing instruments.
  • a problem with such transactions is that current value-bearing instruments lack flexibility. For example, transferring a value-bearing instrument (e.g., a concert ticket) requires the holder ofthe instrument to physically send the value-bearing instrument to the recipient. If, after receipt, the value-bearing instrument is lost or destroyed the recipient has little recourse. In some instances, loss ofthe value-bearing instrument results in a permanent depravation ofthe right associated with the instrument.
  • Modern commerce lacks a secure and convenient form for creating, storing, and managing value-bearing instruments. Current methods to reissue, transfer, resell, void, and verify value-bearing instruments are fraught with security and management problems.
  • Computers and computer networks are used to exchange information in many fields such as media, commerce, and telecommunications, for example.
  • the exchange of information between computers typically occurs between a "server application” that provides information or services, and a "client application” or device that receives the provided information and services.
  • Multiple server applications are sometimes available on a "system server” such as a single computer server that provides services for multiple clients.
  • system server such as a single computer server that provides services for multiple clients.
  • distributed server systems allow a single client to obtain services from applications residing on multiple servers.
  • client applications are able to communicate with server applications executing on the same computer system or on another computer system accessible via a network, for instance via the Internet.
  • the Internet is a worldwide network of interconnected computers.
  • An Internet client computer accesses a computer on the network via an Internet provider.
  • An Internet provider is an organization that provides a client (computer) with access to the Internet (via analog telephone line or Integrated Services Digital Network line, for example).
  • a client can, for example, read information from, download a file from, or send an electronic mail message to another computer/client using the Internet.
  • a client To retrieve a file or service on the Internet, a client must typically search for the file or service, make a connection to the computer on which the file or service is stored, and download the file or access the service. Each of these steps may involve a separate application and access to multiple, dissimilar computer systems (e.g. Computer systems having operating different systems).
  • the World Wide Web (WWW) was developed to provide a simpler, more uniform means for accessing information on the Internet.
  • the components ofthe WWW include browser software, network links, servers, and
  • the browser software is a tool for displaying a user-friendly interface (i.e., front-end) that simplifies user access to content (information and services) on the WWW.
  • Browsers use standard WWW protocols to access content on remote computers running WWW server processes.
  • a browser allows a user to communicate a request to a WWW server without having to use the more obscure addressing scheme ofthe underlying Internet.
  • a browser typically provides a graphical user interface (GUI) for displaying information and receiving input. Examples of browsers currently available include Netscape Navigator and Communicator, and Microsoft Internet Explorer.
  • GUI graphical user interface
  • HTTP Hypertext Transport Protocol
  • Information servers maintain the information on the WWW and are capable of processing client requests.
  • HTTP has communication methods that allow clients to request data from a server and send information to the server.
  • the client browser contacts the HTTP server and transmits the request to the HTTP server.
  • the request contains the communication method requested for the transaction (e.g., GET an object from the server or POST data to an object on the server).
  • the HTTP server responds to the client by sending a status ofthe request and the requested information. The connection is then terminated between the client and the HTTP server.
  • a client request therefore, consists of establishing a connection between the client and the HTTP server, performing the request, and terminating the connection.
  • the HTTP server typically does not retain any information about the request after the connection has been terminated. That is, a client can make several requests of an HTTP server, but each individual request is treated independent of any other request.
  • the WWW employs an addressing scheme is that uniquely identifies Internet resources (e.g., HTTP server, file, or program) to clients and servers.
  • This addressing scheme is called the Uniform Resource Locator (URL).
  • a URL represents the Internet address of a resource on the WWW.
  • the URL contains information about the protocol, Internet domain name and addressing port ofthe site on which the server is running. It also identifies the location ofthe resource in the file structure ofthe server.
  • HTTP provides a mechanism of associating a URL address with active text.
  • a browser generally displays active text as underlined and color-coded. When activated (by a mouse click, for example) the active text causes the browser to send a client request for a resource to the server indicated in the text's associated URL address.
  • This mechanism is called a hyperlink.
  • Hyperlinks provides the ability to create links within a document to move directly to other information.
  • a hyperlink can request information stored on the current server or information from a remote server.
  • the HTTP server locates the file and sends it to the client.
  • An HTTP server also has the ability to delegate work to gateway programs.
  • CGI Common Gateway Interface
  • a gateway program is referenced using a URL.
  • the HTTP server activates the program specified in the URL and uses CGI mechanisms to pass program data sent by the client to the gateway program.
  • Data is passed from the server to the gateway program via command-line arguments, standard input, or environment variables.
  • the gateway program processes the data and returns its response to the server using CGI (via standard output, for example).
  • the server forwards the data to the client using the HTTP.
  • HTML Hypertext Markup Language
  • Figure 1 illustrates the process utilized by one embodiment ofthe invention to generate a ticket and provide a ticket to a user.
  • Figure 2 generally illustrates the elements ofthe system as utilized by one embodiment ofthe invention.
  • Figure 3 shows one possible structure of a database utilized by one embodiment ofthe invention.
  • Figure 4a illustrates an example implementation of one embodiment ofthe invention.
  • Figure 4b illustrates the elements of a ticket as generated by one embodiment ofthe invention.
  • Figure 4c illustrates a variation on the example implementation of figure 4a of one embodiment ofthe invention.
  • Figure 5 shows the how the elements utilized in one embodiment ofthe invention interconnect.
  • Figure 6 illustrates the process utilized by one embodiment ofthe invention to securely generate and print a ticket via a network connection.
  • Figure 7 illustrates how an embodiment ofthe invention can be implemented as computer software in the form of computer readable program code executed on one or more general-purpose computers.
  • Figure 8 illustrates how an embodiment ofthe invention can be implemented as computer software in the form of computer readable program code executed on one ore more general-purpose computers.
  • Figure 9 illustrates a sequence of events for on-line ticket verification for one embodiment ofthe invention.
  • Figure 10 illustrates the remote verification process for one embodiment ofthe invention.
  • One embodiment ofthe present invention comprises a method and apparatus for verifying a value-bearing instrument.
  • the system provides transaction services that let users and vendors securely exchange funds and value-bearing instruments.
  • the present invention provides users the conveniences of electronic transactions, and provides the security of authenticated exchange of funds for goods or services. Users ofthe invention may, among other options, electronically maintain funds on account, exchange purchases with a vendor or other party, auction purchases on the secondary market, restore a lost or destroyed item, create a transaction to be claimed in the future, or forward a purchase to another party.
  • the present invention provides vendors the ability to authenticate transactions the user has made with the invention. If the user generates a value-bearing instrument created with the invention, the vendor is able to interact with the invention to ensure that the generated instrument is authentic. Vendors may use the invention to, among other options, advertise additional goods and services, void transactions, give refunds, create a series of transactions with the user, or offer returned goods or services for resale.
  • the invention comprises a number of elements that could be physically distributed and connected through a network such as the public Internet or Virtual Private Networks. This invention does not define any requirements on the physical form of these connections except to require certain security requirements on the connections as described later in the invention. While certain interactions between these system elements are illustrated, this invention does not preclude other interactions between system elements.
  • the present invention is a method and apparatus for verifying a value-bearing instrument.
  • numerous specific details are set forth to provide a more thorough description ofthe present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well known features have not been described in detail so as not to obscure the present invention.
  • system is used to refer to a device and/or a method for performing a function that embodies the invention.
  • Internet and/or network refers to any type of interconnection fabric that provides computers with a mechanism for transmitting and/or receiving data (e.g., intranets, local area networks, wide area networks, wireless networks, distributed server systems, or client/server architectures).
  • data e.g., intranets, local area networks, wide area networks, wireless networks, distributed server systems, or client/server architectures.
  • an interconnection fabric comprises any of multiple suitable communication paths for carrying data between multiple computational devices.
  • the interconnect fabric may be, for example, a local area network implemented as an Ethernet network, a virtual private network, or any other type of interconnect cable of sending data from one device to another.
  • the interconnect fabric may be implemented with a physical medium such as a wire or fiber optic cable, or it may be implemented in a wireless environment.
  • value-bearing instruments comprise, for example, tickets, coupons, gift certificates, money orders, traveler's checks, and other forms of digital content having an intrinsic value.
  • value-bearing instruments may contain embedded data such as a document, music, videos, advertisements, and/or other types of digital information.
  • Figure 1 illustrates the process utilized by one embodiment ofthe invention to generate a ticket and provide a ticket to a user.
  • the process initiates at step 100 where the user visits a ticketing interface that contains an interface for selecting and purchasing an event ticket.
  • the user may access the ticket interface via a web browser, a kiosk, or any other mechanism that can display an appropriate interface to a user.
  • information associated with the ticket is stored on the ticket as indicium.
  • other embodiments ofthe invention may use other methods of storing or recording such information.
  • secure content will be used to describe a manifestation of a binary string which represents secure data associated with a value-bearing instrument.
  • the user's web browser is switched to a secure web page hosted by a Ticketing Services System (TSS).
  • TSS Ticketing Services System
  • the TSS provides a secure data tunnel between the TSS and the user's system via a network.
  • a Secure Transaction Service System provides security between the STSS, the Ticket Services System, and the user system.
  • the STSS can secure communications between the STSS and the Ticketing Services System by using a secure connection (e.g., 128 bit SSL). Connections between the STSS and the user system are also secure, but may utilize varying forms and/or strengths of security (e.g., differing levels of encryption). Information stored in the STSS is also electronically secure.
  • the hardware and software systems that comprise the STSS are physically protected in a vaulted facility.
  • the STSS maintains a digital certificate for each user that is protected by that user's unique id, password, and shared secret.
  • STSS supports the ability to associate the user with specific client hardware, and security rules related to the user's client hardware can be enforced.
  • the user Before a user is permitted to access the ticketing interface, the user typically registers with the system (e.g., the first time the user wishes to purchase a ticket). During registration, the user determines the user id, password, and shared secret stored in the STSS. Each subsequent use ofthe system requires input ofthe user's id and password. The system will check to see if the version presented by the user matches the version stored in the STSS.
  • the STSS validates the user's client hardware during the registration process and maintains a record ofthe hardware associated with a particular user.
  • other information associated with the user for example, the user's name, address, credit card or other identifying information is stored in a secure database as a user record.
  • Each user record is associated with a unique digital certificate assigned to the user.
  • the digital certificate is used to create a unique digital signature for each transaction and its associated value-bearing instrument, and therefore allows the ability to trace back each transaction to a certain user.
  • the invention records the unique digital signature generated form each user's unique digital certificate along with other ticket content and/or demographic information on the ticket in the form of a manifestation of a secure binary string of data that is representative of value bearing instrument, such as a two dimensional indicium.
  • the user may log in to the Ticketing Services System.
  • the secure data tunnels and other connections associated with the user's request for the ticket interface are established by the TSS during step 100.
  • the TSS presents a list of available tickets to the user.
  • the list may be customized to present certain types of lists and may contain graphical representations of each item in the list.
  • the TSS may present the user with a list of events that will occur during the month of March.
  • the invention contemplates generating lists based on preferences specified by the user and/or preferences derived from data about the user.
  • the TSS obtains purchase information from the user and determines whether the information presented is valid. If, for example, the user presents a credit card, the system verifies the credit card information and obtains an approval code. The system verifies the purchase information, then transmits confirmation data to the user (e.g., step 106) and displays a list of delivery options (e.g., step 108).
  • the delivery options the system presents comprises a mail option, a reserve option, and a generate-now option.
  • the invention also contemplates other options such as delivery to an electronic device (e.g., a cell phone or PDA). The user may select a delivery preference and the system will provide the selected item
  • the ticket (e.g., the ticket) via the preferred method.
  • the ticketing service system through a secure data connection, passes the ticket content to the STSS.
  • a physical and digital version ofthe ticket is generated by the STSS.
  • the ticket comprises secure content that contains a digital signature and/or any other information requested or required by the ticket service system.
  • the secure ticket content comprises information that relates to the transaction being performed.
  • the ticket may contain a seating assignment, an event date, a customer name, and/or any other type of information the ticket producer wishes to include.
  • An embodiment ofthe invention contemplates sale and/or use of available space on the ticket.
  • the providing entity may incorporate advertisements, coupons, and maps on the ticket or on any other type of value-bearing instrument.
  • the ticket may also comprise information associated with the utilization of pre-paid services and/or information related to the acquisition of products, merchandise, and/or services.
  • the ticket comprises a product itself (e.g., if the ticket/value-bearing instrument is a form of currency, a secured instrument, or a stock certificate).
  • the ticketing service system is designed to specify to the STSS which data elements will appear on the ticket as human readable text and which data elements are represented as machine readable secure content.
  • the user selects, via the TSS, a delivery method after generating a ticket.
  • the system determines if the user elected to have the ticket delivered via mail. If so, step 112 executes and the ticket is delivered via mail.
  • the term mail comprises an electronic mail and/or delivery via a postal system such as the U.S. Postal System. If the user did not pick delivery via mail, step 114 executes and the system determines if the user selected the reserve option. If the user selected the reserve option, the system executes step 116, where it provides the ticket and/or the ticket data to a reservation system. The intended recipient ofthe ticket may acquire the ticket by obtaining it from the reservation system.
  • the ticket is delivered to the reservation system electronically and may be obtained from the system when the intended recipient requests delivery of it.
  • the STSS determines whether the user selected the generate-now option (e.g., step 118).
  • the generate-now option provides the user with a mechanism for generating the selected item (e.g., printing a ticket directly to the user's personal printer.) If the generate-now command is not selected, the TSS continues to display the list of delivery options, until the user chooses one. If the user does not select a delivery option, but instead exits the program, the STSS may use a default delivery option. If, however, the user does select the generate-now option then steps 120 and 122 execute.
  • the STSS transmits the ticket data to the user's computer via a network. Once the ticket data resides on the user's computer, it is output to a printer.
  • the invention may also transmit a value-bearing instrument to other types of devices, such as a PDA or cell phone.
  • FIG. 2 illustrates generally the elements ofthe system (shown as boxes with thick borders) as utilized by one embodiment ofthe invention.
  • the system comprises STSS 200, user system 202, ticketing services system 204, and ticket verifier system 206.
  • Functional elements associated with the system elements are shown as boxes with thin lines.
  • the connections between the system elements show possible logical connections between the system elements although in some instances other logical connections may exist.
  • the system elements are assumed secure, and communication between the system elements is achieved through a secure communications channel that mutually authenticates the parties (e.g., SSL or some other secure protocol suite).
  • SSL Secure Sockets
  • These system elements may be physically distributed and connected through a network such as the public Internet, a virtual private network, or any other interconnection fabric configured to allow computers to send and receive data.
  • STSS 200 is configured to issue and distribute one or more tickets 208.
  • Each ticket 208 comprises a machine-readable portion and a human readable portion. The machine-readable portion allows ticket 208 to be uniquely identified.
  • STSS 200 is also responsible for securely maintaining transaction records for transactions performed on the ticket.
  • STSS comprises a transaction server 222 and numerous databases configured to support the system.
  • STSS 200 may contain, for example, a user membership database 212, a transaction and ticket database 214, an account database 216, a ticketing services database 218, and a ticket verifier database 220.
  • a secure ticket generator 226, a ticket formatter 228, and an ad server 224 may also be integrated into STSS 200.
  • transaction server 222 interfaces with transaction logic module 230.
  • Transaction logic module 230 is configured to obtain business rules from business rules module 232.
  • STSS 200 also comprises auditing and reporting server 234 as well as billing and payment processing server 236.
  • transaction server 222 provides the external interface with user system 202, ticketing services system 204, and ticket verifier system 206 so that each of these systems can request various ticketing transactions.
  • the communication channel between transaction server 222 and these other system elements is assumed to be secure and mutually authenticated.
  • Transaction server 222 is configured to dispatch transaction requests (e.g., a request for a ticket) to transaction logic module 230.
  • Transaction logic module 230 is configured to carry out the transactions associated with obtaining, generating, and/or verifying tickets. Transaction logic module 230 ensures that the transactions performed on the ticket are carried out to completion and that the appropriate databases are updated. As such, transaction logic module 230 coordinates the activities of other components that participate in execution ofthe transaction. In one embodiment ofthe invention, transaction logic module 230 is independent of a particular ticketing application. For example, transaction logic module 230 typically obtains application- specific instructions from business rules module 232.
  • Business rules module 232 enables the system to support a wide variety of ticketing applications. For example, event ticketing, coupon generation, or airline ticketing can all be considered different ticketing applications. As such, these different ticketing applications may require different actions to be taken by the system for a particular transaction.
  • business rules module 232 may, for example, determine the application associated with the transaction and provide instructions to perform various application-specific actions that are to be performed by transaction logic module 230.
  • Business rules module 232 is a logical extension to transaction logic module 230. While transaction logic module 230 is generic and independent of specific ticketing application, business rules module 232 is capable of translating application specific semantics into generic form that transaction logic module 230 understands.
  • Business rules module 232 is capable of storing the logic associated with many different types of business transactions. Each set of logic has a unique identifier that can be used to specify the particular business rules to apply to the transaction being processed.
  • the application specific business rules are input into business rules module 232 using a language capable of expressing the semantics ofthe business rules. Business rules module 232 can potentially support several such semantic languages.
  • Secure ticket generator 226 is configured to generate a ticket formatted for a specified ticket output apparatus.
  • the ticket comprises secure content that can uniquely identify the ticket.
  • Secure ticket generator 226 passes the ticket to ticket formatter 228, which in turn generates the formatted ticket for the ticket output apparatus (e.g., a printer).
  • Ticket formatter 228 component enables the system to control the placement of different content on the physical form ofthe ticket.
  • a printed ticket comprises secure content, ticket information, advertisements, secure content for merchandise at a venue, and directions to the venue.
  • Ticket formatter 228 is capable of storing many different formatting rules. Each has a unique identifier that can be used to specify the particular formatting rules to apply for a given ticket.
  • the format rules and constraints are input into ticket formatter 228 using a language capable of expressing the semantics ofthe formatting rules.
  • Ticket formatter 228 can potentially support several such semantic languages.
  • Ad server 224 interacts with ticket formatter 228 to provide advertisement content for the ticket.
  • Ad server 224 can provide different ad content depending on the user or the particular venue that the ticket is intended for.
  • the ad content rules and constrains are input into ticket formatter 228 using a language capable of expressing the semantics for ad selection.
  • Ad server 224 can potentially support several such semantic languages.
  • Transaction and ticket database 214 is a secure database that keeps track of issued tickets and the state ofthe ticket. It also keeps track of all transactions performed on the ticket. There are several logical records in the database.
  • Item record 300 in one embodiment ofthe invention, resides in transaction database 214 and represents each unique good and service tracked by STSS 200.
  • Each item record 300 may, for example, comprise the following information:
  • Item ID A unique identification of the item (i.e., goods or services) generated by STSS 200.
  • Account The account that is the current owner ofthe item.
  • Item Group Data provided by the TSS 204 to group like-items. Can be used to alter a group of records.
  • Item Data Other data provided by the TSS 204 about the item.
  • Start Date The date from which the invention assumes the item is valid.
  • Expiration date The date on which the item and the associated ticket must be automatically deleted by the system.
  • Each ticket record 302 may, for example, comprise the following information:
  • Ticket ID A unique identification ofthe ticket.
  • TSS Ticket Content The content of the ticket that Ticketing Service System 204 provided.
  • TSS Transaction Information The content of the transaction provided by Ticketing Service System 204.
  • Ticket Output Format The output format ofthe ticket.
  • Transaction Record 304 is created for each transaction issued by user system 202 or ticketing services system 206. Transaction record 304 may therefore be used for auditing, billing purposes as well as for recovery purposes. Each transaction record 304 may, for example, comprise the following: • Transaction ID: A unique identification ofthe transaction.
  • Transaction State The state ofthe transaction e.g., pending, completed
  • Target Ticket Ticket ID for which the transaction is intended.
  • Transfer Authorization Record 306 is created by one embodiment ofthe invention whenever a ticket is in the process of being transferred.
  • Transfer authorization 306 may, for example, comprise:
  • Transfer Authorization Information used to authorize the ticket transfer.
  • Transfer Authorization Method Indicates the particular method of authorization for transferring the ticket.
  • Transfer State The state ofthe transfer authorization code: pending, transferred Accounting database 216 comprises a secure database configured to keep track of funds on behalf of the users for the purchase/refund of tickets, services, and merchandise.
  • a user can be associated with several accounts with funds.
  • the database also contains user- specific authentication data that enables the system to sign ticket content on behalf of the user.
  • a unique digital certificate is generated for the user at the time of membership registration and stored into accounting database 216.
  • User membership database 212 keeps track ofthe users that have registered with the system.
  • User membership database 212 typically contains general information about the user. Fields include, for example: unique user ID, user name, password, shared secret, email address, last user system (i.e., the id ofthe user system that was used last), and any other fields the entity generating the database wished to collect.
  • Ticketing services database 218 is configured to keep track of registered ticketing services.
  • the database stores general information as well as authentication data to enable authenticated and secure communication between STSS and the ticketing services system 204.
  • the fields ofthe database comprise, for example, the unique id of TSS 204, TSS 204 authentication data, email address of TSS 204, postal mailing address of TSS 204, and any other fields the entity generating the database wished to collect.
  • Ticket verifier database 220 keeps track of registered ticket verifier systems 206 by storing general information about each ticket verifier as well as authentication data to enable authenticated and secure communication between STSS 200 and ticket verifier system 206.
  • the fields ofthe database may comprise, for example, the unique id ofthe verifier, verifier authentication data, email ofthe venue (if applicable), venue address, and any other fields the entity generating the database wished to collect.
  • Auditing and reporting server 234 enables external systems to generate auditing and other general reports about transactions that occur on the system.
  • the client computer that communicates with the auditing and reporting server 234 ofthe server is, in one embodiment ofthe invention, an authenticated system. This precaution is intended to prevent unauthorized access to the data.
  • Billing and payment server 236 interfaces with the external billing and payment services to enable financial transactions to take place (e.g. credit card companies and/or banks).
  • the client that communicates with the billing and payment server may be an authenticated system.
  • Customer support server 210 interfaces with the internal customer support systems to enable access to data and modification thereof on behalf of customers.
  • the client that communicates with customer support server 210 may also be an authenticated system.
  • Ticketing services system 204 is an agent ofthe vendor who provides items of value that can be redeemed using a valid ticket.
  • ticketing services system 204 is capable of controlling ticket output apparatus 240. This is the case where ticketing services system 204 itself prints and distributes "secure" tickets with unique secure content added to the standard printed output. However, other systems (e.g., user system 202) may also transmit output to ticket output apparatus 240.
  • Item database 242 optionally keeps track of goods, services and other items of value that the ticket can be redeemed for.
  • Ticketing service system 204 typically maintains the database.
  • User system 202 provides user interface 244 that enables the user to perform various transactions associated with tickets such as issuing ticket 208.
  • User system 202 can be a PC with a Web browser and a printer. User system 202 can also be a mobile phone, personal digital assistant, smart card, or any other computer system configured to interface with STSS 200.
  • Ticket verifier system 206 typically resides at the location where the ticket is redeemed for goods and services. It has the capability to read the ticket information and, in some embodiments, to contact the STSS 200 to verify the validity of ticket 208. Ticket verifier system 206 is also capable of receiving the results ofthe ticket verification from transaction server 222, and take appropriate action based on the returned results.
  • ticket verifier system 206 may provide a user interface to the operator to display appropriate message to the operator.
  • the component may also provide the interface to devices such as a gate or turnstile to control entry into a venue.
  • Ticket output apparatus 240 creates the physical form ofthe ticket.
  • a printer is a ticket output apparatus 240 for printing ticket, and/or any other value-bearing instrument, from a computer such as a PC.
  • a smart card programming device could also be a ticket output apparatus 240.
  • Ticket input apparatus 246 reads the physical form ofthe ticket.
  • a scanner may act as ticket input apparatus 246 for printed tickets.
  • a smart card reader may also be configured to acts as ticket input apparatus 246.
  • Figure 4 A illustrates an example implementation of one embodiment ofthe invention.
  • the system comprises multiple user systems 400, ticketing services system 408 and ticket verifier system 402. Each system is configured to interact with one another.
  • user system 400 may be a browser that is connected with the ticketing services system 408 and STSS 404.
  • STSS 404 may download a plugin into user system 400 in order to provide additional security beyond what is available through the browser. This plugin can establish a secure connection to STSS 404.
  • User system 400 interacts with ticketing services system 408 to reserve or purchase something of value through a computer network such as the Internet. User system 400 then communicates with STSS 404 to obtain ticket 418 and may use ticket output apparatus 442 to reduce ticket 418 to a tangible form. At the location where ticket 418 is redeemed, ticket input apparatus 420 reads the ticket. Ticket verifier system 402 communicates with STSS 404 to verify ticket 418.
  • STSS 404 comprises a plurality of elements each configured to add functionality to the system.
  • STSS 404 may comprise the following elements: auditing and reporting element 422, secure ticket generator 424, ad server 426, customer support server 428, business rule module 430, billing and payment server 432, ticket formatter 434, transaction server 414, transaction logic module 436, transaction and ticket database 438, user membership database 410, account database 412, ticketing services database 406, and ticket verifier database 440.
  • Figure 5 shows how one embodiment ofthe invention interconnects.
  • STSS 500, ticket verifier system 502, and ticketing services system 504 do not connect to one another through Internet 506.
  • This invention does not preclude utilizing the Internet to make such connection as long as transactions sent across such a network are secured.
  • Browser 508, using secure plugin 510 typically interfaces with ticketing services system 504 via Internet 506.
  • ticket 514 is a tangible representation ofthe ticket created by interfacing with ticketing services system 504.
  • Ticket 514 may be verified by scanning the ticket with scanner 516.
  • Scanner 516 communicates with ticket verifier system 502 to determine if the ticket is authentic (e.g., by verifying the digital signature associated with the ticket).
  • One embodiment ofthe invention comprises one or more data objects.
  • token is used in its broadest sense, to indicate an element of data that may be comprised of one or more sub-elements.
  • TSS confirmation token is an object that uniquely identifies the goods or services that the user has reserved or purchased.
  • the TSS confirmation token and detailed information about the transaction may be stored into the ticketing services database 406.
  • the token can be a simple number, or some other digital form of information.
  • TSS ticket content (TTC) 452 (see e.g., figure 4B) is an object comprising ticketing services system 408 specific information that will be recorded on a ticket. Ticketing services system 408 and ticket verifier system 402 can interpret the content and act on the information. TSS ticket content objects fit into the ticket.
  • TSS transaction information is an object comprising the data supplied by ticketing services system 408 that are be interpreted by and acted upon STSS 404.
  • the data comprises: • Ticket Printable Displayable Information: The specification as to what information is to be put into the output format of the ticket that can be visible to the user.
  • Verifier ID One or more verifiers that can verify the ticket.
  • Item Data Data to store into the Item Record. For example, Start Date, Expiration Date, Purge Date, Item Group.
  • Transaction system ticket content (TSTC) 450 object comprises content put into the ticket that is specific to STSS 404.
  • the information may include, but is not limited to:
  • STSS ID Uniquely identifies the transaction system that issued the ticket. It may be used in cases where there are multiple transaction systems on the network.
  • User ID Identifies the user ofthe ticket.
  • TSS ID ID ofthe TSS that supplied the ticket. • Item ID: The item to which the ticket is issued for.
  • Verifier ID The verifier of the ticket
  • Secure Content (SC) 454 object comprises the signed digital content ofthe secure content that is to be put into the ticket.
  • Secure content may contain the following content:
  • S y (X) represents the output of a digital signature function where message X is signed by entity Y.
  • U refers to the user and STSS refers to STSS 404.
  • Secure content typically indicates which digital signature algorithm is used.
  • digital signature algorithms include, but are not limited to, the Digital Signature Standard (DSS) or the Elliptic Curve Digital Signature Algorithm.
  • DSS Digital Signature Standard
  • Elliptic Curve Digital Signature Algorithm the invention contemplates the use of other methods for generating a digital signature.
  • Secure content for a ticket is typically formatted for a particular ticket output format.
  • ticket secure content may take on the form of printable symbologies such as a 2-D barcode.
  • the ticket is formatted to support the particular ticket output format that is to be used.
  • the format typically comprises a ticket secure content and may include additional information requested by TSS 204.
  • TSS 204 may request that an advertisement be included in the printed form ofthe ticket.
  • the user accomplishes this by registering with ticketing service system 408 and STSS 404.
  • User system 400 may authenticate the user before it can participate in any transaction on behalf of the user. If the user has an account in user membership database 410, user system 400 provides the user's authentication data to STSS 404 in order to establish the identity ofthe user.
  • the authentication data could be, for example, a user name and password.
  • STSS 404 may request user system 400 to provide registration info and unique authentication data.
  • the authentication data may include a unique user name, password and shared secret.
  • a unique digital certificate is generated for the user, and an account (i.e., an entry) is created in the account database 412. Following registration, the user logs in and proceeds with the transaction.
  • STSS 404 may elect to store the identification ofthe user system 400 that last accessed the user account in user membership database 410. If transaction server 414 detects that user system 400 is different from the one used last, the system will warn the user if the user account indicates that the user wants such a warning.
  • a software module may be downloaded into user system to facilitate future secure connection with STSS 404.
  • a software module may be downloaded into user system to facilitate future secure connection with STSS 404.
  • user system 400 is a browser
  • a plugin may be downloaded into the browser.
  • the invention in one or more embodiments, provides the user a mechanism to generate an initial value-bearing instrument.
  • Figure 6 illustrates the process utilized by one embodiment ofthe invention, where for example the user uses the invention to securely generate and print a ticket via an interconnection fabric.
  • the sequence of events associated with the initial ticket issuance begins at step 600 where user system 700, on behalf of the user, interacts with ticketing services system 704 to purchase or reserve certain goods or services. (See figure 7.)
  • step 603 executes and ticketing services system 704 returns a 7SS confirmation token and TSS identification for the transaction that occurred between the user and ticketing services system 704.
  • a TSS confirmation token uniquely identifies an item that the user has reserved or purchased. Typically, the item is stored in an item database associated with ticketing services system 704.
  • This TSS confirmation token and detailed information about the transaction is stored into a ticketing services database 406.
  • the token can be formatted as a simple number, or some other structured, digital form of information.
  • user system 700 establishes a secure connection to the STSS, and the two systems are mutually authenticated.
  • step 607 executes and user system 700 provides the user authentication information to STSS 702.
  • STSS 702 authenticates the user.
  • the authentication information could be a user name and a password.
  • step 609 executes and user system 700 transmits a request for a ticket to STSS 702.
  • user system 700 may send a message to STSS 702 requesting that a ticket be issued for the transaction that the user had with ticketing services system 704.
  • the TSS confirmation token is typically provided with the message.
  • the output format ofthe ticket the user wants may also be indicated.
  • the output format for example, can be a print-ready format appropriate for a printer. It could also be an output format appropriate for a smart card or personal digital appliance.
  • STSS 702 and ticketing services system 704 connect and exchange ticket information.
  • STSS 702 may send a message to ticketing services system 704 requesting information about ticketing services system 704's transaction identified by the confirmation token. While the scenario described here assumes that the information is pulled from ticketing services system 704, ticketing services system 704 may be configured to push the information onto STSS 702.
  • ticketing services system 704 returns the requested information.
  • the information may comprise, but is not limited to: • TSS Ticket Content (TTC): The content that is stored on the ticket. STSS does not interpret this data.
  • TSS Transaction Information TTI
  • STSS 702's transaction logic module performs the requested transaction and generates a ticket.
  • a ticket generator creates a unique secure content with the digital signature ofthe user and the digital signature ofthe STSS.
  • Ticket secure content appropriate for the specified ticket output format, is created.
  • a ticket output format is created using a ticket formatter. The ticket output format is dependent on the ticket output format.
  • a ticket output format may comprise visible data indicated by ticketing services system 704 to be included in the ticket. It could also include advertisement information.
  • Once the ticket is generated the ticket is returned to user system 700 and the transaction and ticket database is updated appropriately.
  • user system 700 outputs ticket 706 using ticket output apparatus 708. Note that ticketing services system 704 can also output ticket 706 directly.
  • Ticketing services system 204 communicates with STSS 200 to provide the formatting rules to ticket formatter 228.
  • the format rules and constraints are input into ticket formatter 228 using a language that expresses the semantics ofthe formatting rules.
  • Ticket formatter 228 can potentially support several such semantic languages.
  • Ticket formatter 228 also may include a database that contains additional information (e.g., maps).
  • Ad server 224 is also populated with different advertisement information.
  • Ticketing service and item e.g., venue
  • specific rules and constraints that specify the advertisement content are supplied.
  • transaction logic module 230 instructs secure ticket generator 226 to generate ticket 208.
  • Secure ticket generator 226 in turn instructs ticket formatter 228 to format the ticket based on the information supplied to it.
  • Ad server 224 interacts with ticket formatter 228 to provide advertisement content for ticket 208.
  • ad server 224 can provide different advertisement content depending on the user or the particular venue that the ticket is intended for.
  • Ad server 224 may also provide data that relates to pre-paid services and/or products.
  • Ticket output apparatus 240 provides the ticket that is an input to the verification subsystem ofthe invention.
  • Ticketing services system 204 controls the ticket output apparatus.
  • Ticket input apparatus 246 reads the ticket, and presents the data to ticket verifier system 206.
  • ticket verifier system 206 is located at the place of vending.
  • Ticketing service system 204 is an agent ofthe vendor who provides items of value that can be redeemed using a valid ticket. Ticketing service system 204 may be configured to control the ticket output apparatus. This is the case where the vendor itself prints and distributes "secure" tickets with unique indicium added to the standard printed output. Item database 242 keeps track of goods, services and other items of value that the ticket can be redeemed for. Ticketing service system 204 typically maintains item database 242. However, not all embodiments ofthe invention require item database 242 Ticket Verifier System
  • Ticket verifier system 206 is typically located where the ticket can be redeemed for goods and services. It has the capability to read the ticket information and to contact secure transaction services system 200 to verify the validity ofthe ticket. Ticket verifier system 206 is also capable of receiving the results ofthe ticket verification from transaction server 222, and taking appropriate action based on the results returned.
  • the action taken by ticket verifier system 206 after receiving the results of ticket verification is vendor dependent.
  • the component may provide a user interface to the operator to display appropriate message to the operator indicating the validity ofthe ticket.
  • the component may also provide an interface to devices such as a gate or turnstile to control entry into a venue.
  • Ticket output apparatus 240 creates the physical form ofthe ticket.
  • a printer is a ticket output apparatus for printed tickets.
  • a smart card programming device could also be ticket output apparatus.
  • Ticket input apparatus 246 reads the physical form ofthe ticket.
  • a scanner is a ticket input apparatus for printed tickets.
  • a smart card reader could also be a ticket input apparatus.
  • Figure 4a gives an example configuration. This figure shows multiple user systems
  • ticketing service system 432 and ticket verifier system 402 interacting with a ticketing service system 432.
  • user system 400 may be a browser that is connected with the ticketing service system 432 and secure transaction services system 404.
  • Figure 5 illustrates this example.
  • secure transaction services system 500 may download a plugin 510 into user system 508 in order to provide additional security beyond what is available through the browser. This plugin can establish a secure connection to secure transaction services system 500.
  • the user system 508 interacts with the ticketing service system 504 to reserve or purchase something of value through the Web.
  • the user system 508 then communicates with secure transaction services system 500 to obtain the ticket.
  • ticket input apparatus 420 reads the ticket.
  • the ticket verifier system 402 communicates with secure transaction services system 404 to verify the ticket.
  • Figure 5 shows that the connections between secure transaction services system 500 and the Ticket Verifier System, and between secure transaction services system 500 and ticketing service system 204 do not go through the Internet. This invention, however, does not preclude the connection going through the Internet as long as the security requirements can be met through the Internet.
  • This invention provides three fundamental ways in which the ticket verifier system 402 can verify a ticket.
  • tickets are verified by on-line verification. This is the most secure method described in the invention.
  • Ticket verifier system 402 contacts the secure transaction services system 404 for ticket verification. A typical sequence of events for this function is shown in Figure 9.
  • step 900 ticket verifier system 402 establishes a connection to the secure transaction services system 404, and the two systems are mutually authenticated. This step may be done only once if many tickets are to be verified.
  • step 902 ticket verifier system 402 reads the indicium on the ticket using ticket input apparatus 420.
  • Next ticket verifier system 402 performs a preliminary check to see if secure transaction services system 404 has signed the indicium. (See step 904.)
  • step 906 ticket verifier system 402 sends a message to the secure transaction services system 404 to request that the ticket to be verified.
  • the Indicium Content is sent with the message. If the transaction involves increases or decreases the funds in the user account, then the amount ofthe fund increase or decrease is communicated via the Indicium Content.
  • step 908 secure transaction services system 404 checks to make sure the Indicium Content has been signed by the proper user as well as by ticket verifier system 402. Transaction and ticket database is checked to ensure that the ticket is still valid. If the transaction involved changes to the account fund balance, the account balance is checked and, if appropriate, the account balance is changed.
  • a response is sent back by secure transaction services system 404 to ticket verifier system 402.
  • the response is dependent on the particular ticketing application. In a typical embodiment, the response will indicate whether or not the ticket is valid and whether or not there were duplicate records ofthe ticket.
  • ticket verifier system 402 checks the response from secure transaction services system 404 and takes appropriate action. For example, for an invalid ticket, ticket verifier system 402 may not let the ticket holder obtain the goods or services.
  • the vendor can use remote verification to validate a ticket. This method is less secure than on-line verification.
  • Figure 10 illustrates the remote verification process.
  • Figure 4c shows the elements of this embodiment ofthe invention.
  • step 1000 a snapshot ofthe appropriate subset of transaction and ticket database 438 is downloaded to the ticket verifier system 402's secure local database 460. This step is performed either periodically or once in different embodiments ofthe invention.
  • step 1002 ticket verifier system 402 reads the indicium on the ticket using ticket input apparatus 420.
  • step 1004 ticket verifier system 402 checks for the correct digital signature from STSS 400.
  • Ticket verifier system 402 performs a preliminary check to see if the indicium has been signed by the secure transaction services system 404.
  • Step 1006 shows that ticket verifier system 402 checks to make sure the Indicium Content has been signed by the proper user as well as by ticket verifier system 402.
  • Ticket verifier system 402 checks secure local database 460 to ensure that the Ticket State and the Item State are still valid.
  • Step 1008. Handling of transactions that involve fund balance changes to the user account is not recommended in a remote verification embodiment since the transaction is not done by the secure transaction services system 404. However, it can be done if the business policy allows it. However, if user account balance changes are made offline transaction and ticket database 438 at the secure transaction services system 404 may be updated later.
  • the response from the validation check is dependent on the particular invention embodiment. In a typical embodiment, the response will indicate whether or not the ticket is valid and whether or not there were duplicates.
  • ticket verifier system 402 checks the response from secure transaction services system 404 and takes appropriate action. For example, for an invalid ticket, ticket verifier system 402 may not let the ticket holder obtain the goods or services.
  • This method does not rely on secure transaction services system 404 or a local snapshot of transaction and ticket database 438. A local database that tracks the ticket usage is created on the fly. This is the least secure method used in an embodiment ofthe invention.
  • ticket verifier system 402 reads the indicium on the ticket using ticket input apparatus 420.
  • Ticket verifier system 402 performs the check to see if the indicium has been signed by the secure transaction services system 404.
  • Next ticket verifier system 402 checks to make sure the ticket has not been read in yet by checking the local data base that it is dynamically creating. The ticket information is put into the local database. Handling of transactions involving fund balance change to the user account is not recommended in offline verification case since account balances can not be verified by the secure transaction services system 404, and is therefore not as secure as online methods of ticket verification. However, offline verification can be done if the business policy allows it.
  • Transaction and ticket database 438 at the secure transaction services system 404 may be updated later.
  • a local database may be created and dynamically updated to provide offline verification as a contingency for situations where the communication with the secure transaction services system 404 is not available.
  • An embodiment ofthe invention can be implemented as computer software in the form of computer readable program code executed on one or more general-purpose computers such as the computer 800 illustrated in Figure 8.
  • a keyboard 810 and mouse 811 are coupled to a bi-directional system bus 818 (e.g., PCI, ISA or other similar architecture).
  • the keyboard and mouse are for introducing user input to the computer system and communicating that user input to central processing unit (CPU) 813.
  • CPU central processing unit
  • I/O (input/output) unit 819 coupled to bi-directional system bus 818 represents possible output devices such as a printer or an A/V (audio/video) device.
  • Computer 800 includes video memory 814, main memory 815, mass storage 812, and communication interface 820. All these devices are coupled to the bi-directional system bus 818 along with keyboard 810, mouse 811 and CPU 813.
  • the mass storage 812 may include both fixed and removable media, such as magnetic, optical or magnetic optical storage systems or any other available mass storage technology.
  • the system bus 818 provides a means for addressing video memory 814 or main memory 815.
  • the system bus 818 also provides a mechanism for the CPU to transferring data between and among the components, such as main memory 815, video memory 814 and mass storage 812.
  • the CPU 813 is a microprocessor manufactured by Motorola, such as the 680X0 processor, an Intel Pentium III processor, or an UltraSparc processor from Sun Microsystems. However, any other suitable processor or computer may be utilized.
  • Video memory 814 is a dual-ported video random access memory. One port of the video memory 814 is coupled to video accelerator 816.
  • the video accelerator device 816 is used to drive a CRT (cathode ray tube), and LCD (Liquid Crystal Display), or TFT (Thin- Film Transistor) monitor 817.
  • the video accelerator 816 is well known in the art and may be implemented by any suitable apparatus. This circuitry converts pixel data stored in video memory 814 to a signal suitable for use by monitor 817.
  • the monitor 817 is a type of monitor suitable for displaying graphic images.
  • the computer 800 may also include a communication interface 820 coupled to the system bus 818.
  • the communication interface 820 provides a two-way data communication coupling via a network link 821 to a network 822.
  • the communication interface 820 is a modem
  • the communication interface 820 provides a data communication connection to a corresponding type of telephone line, which comprises part of a network link 821.
  • the communication interface 820 is a Network Interface Card (NIC)
  • NIC Network Interface Card
  • Physical network links can include Ethernet, wireless, fiber optic, and cable television type links.
  • communication interface 820 sends and receives electrical, electromagnetic or optical signals which carry digital data streams representing various types of information.
  • the network link 821 typically provides data communication through one or more networks to other data devices.
  • network link 821 may provide a connection through local network 822 to a host computer 823 or to data equipment operated by an Internet Service Provider (ISP) 824.
  • ISP 824 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the "Internet" 825.
  • Internet 825 uses electrical, electromagnetic or optical signals that carry digital data streams to files.
  • the signals through the various networks and the signals on network link 821 and through communication interface 820, which carry the digital data to and from computer 800, are exemplary forms of carrier waves for transporting the digital information.
  • the computer 800 can send messages and receive data, including program code, through the network(s), network link 821, and communication interface 820.
  • server 826 might transmit a requested code for an application program through Internet 825, ISP 824, local network 822 and communication interface 820.
  • the computer systems described above are for purposes of example only. An embodiment ofthe invention may be implemented in any type of computer system or programming or processing environment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

L'invention porte sur un système informatique de distribution sûre d'instruments porteur de valeurs tels que des coupons, des tickets, des chèques cadeaux, des mandats ou des chèques de voyage. Ledit système est en trois parties: l'utilisateur de l'instrument, le fournisseur de l'instrument, et la sécurité (service assurant la sécurité des transactions). L'utilisateur s'annonce à la sécurité qui vérifie son identité soit avant soit après le lancement de la transaction par le fournisseur de produits ou de services, ladite vérification pouvant se faire à tout niveau souhaité. Dans une exécution le fournisseur donne à l'utilisateur un jeton de confirmation qu'il doit présenter à la sécurité ainsi que son information d'identification car seul un utilisateur agréé peut effectuer la transaction. Le jeton permet à la sûreté d'obtenir du fournisseur de produits ou de services des informations par extraction ou émission de données. Dans certains cas, la sécurité crée le produit demandé ou le prestataire de services, puis le transmet de manière sûre à l'utilisateur agréé. On peut également utiliser des signatures numériques pendant toute l'opération pour garantir l'intégrité des données et l'identité de l'expéditeur. Le système comporte en outre de multiples procédés de vérification des instruments qui sont émis puis validés dans un site de vérification.
EP01923024A 2000-03-29 2001-03-28 Procede et appareil de verification d'un instrument porteur de valeurs Withdrawn EP1269715A2 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US19317300P 2000-03-29 2000-03-29
US193173P 2000-03-29
PCT/US2001/010593 WO2001074031A2 (fr) 2000-03-29 2001-03-28 Procede et appareil de verification d'un instrument porteur de valeurs

Publications (1)

Publication Number Publication Date
EP1269715A2 true EP1269715A2 (fr) 2003-01-02

Family

ID=22712514

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01923024A Withdrawn EP1269715A2 (fr) 2000-03-29 2001-03-28 Procede et appareil de verification d'un instrument porteur de valeurs

Country Status (3)

Country Link
EP (1) EP1269715A2 (fr)
AU (1) AU2001249763A1 (fr)
WO (1) WO2001074031A2 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2445172A (en) * 2006-12-29 2008-07-02 Symbian Software Ltd Use of an interaction object in transactions
WO2010007334A1 (fr) * 2008-07-17 2010-01-21 Digital Locksmiths Ltd. Distribution sécurisée de jetons électroniques

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6336098B1 (en) * 1997-12-11 2002-01-01 International Business Machines Corp. Method for electronic distribution and redemption of coupons on the world wide web
JP3574559B2 (ja) * 1998-01-27 2004-10-06 株式会社エヌ・ティ・ティ・データ 電子チケットシステム、回収端末、サービス提供端末、利用者端末、電子チケット回収方法及び記録媒体
AU6955198A (en) * 1998-04-06 1999-10-25 Craig W. Barnett Method and system for electronic distribution of product redemption coupons

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0174031A3 *

Also Published As

Publication number Publication date
WO2001074031A3 (fr) 2002-05-16
AU2001249763A1 (en) 2001-10-08
WO2001074031A2 (fr) 2001-10-04

Similar Documents

Publication Publication Date Title
US20030208406A1 (en) Method and apparatus for processing one or more value bearing instruments
US20040128516A1 (en) Method and apparatus for verifying bearing instruments
US20040128257A1 (en) Method and apparatus for administering one or more value bearing instruments
US7395242B2 (en) Method and system for restricting the usage of payment accounts
AU2001248198B2 (en) A method and system for a virtual safe
US7318047B1 (en) Method and apparatus for providing electronic refunds in an online payment system
US7702578B2 (en) Method, system and computer readable medium for web site account and e-commerce management from a central location
US7177830B2 (en) On-line payment system
US20020023053A1 (en) System, method and apparatus for international financial transactions
US20040230536A1 (en) Method, system and computer readable medium for web site account and e-commerce management from a central location
US20040114766A1 (en) Three-party authentication method and system for e-commerce transactions
WO1998019224A2 (fr) Transfert dirige d'information dans des reseaux informatiques
CN1399753A (zh) 用于对通过计算机网络的购买进行授权的方法和系统
AU2001251286A1 (en) System, method and apparatus for international financial transactions
WO2001001286A2 (fr) Systeme, procede et article manufacture destines a une architecture de distribution fondee sur l'internet
US20030126033A1 (en) System, method and article of manufacture for software source authentication for return purposes
US20170337604A1 (en) Method, system and computer readable medium for web site account and e-commerce management from a central location
EP1360663A2 (fr) Procede et appareil de creation d'un ou plusieurs instruments porteur de valeurs
US20040143554A1 (en) Method and apparatus for generating a value bearing instrument
WO2001001319A1 (fr) Systeme, procede et article de fabrication d'interface de soutien adaptee au profil du client dans un environnement de distribution de logiciel electronique
WO2001073644A2 (fr) Procede et appareil de creation d'un instrument porteur de valeurs
EP1269715A2 (fr) Procede et appareil de verification d'un instrument porteur de valeurs
WO2001073707A2 (fr) Procede et dispositif de gestion d'un ou de plusieurs instruments de valeur
JP2004500643A (ja) 電子的ライセンスを提供するシステム及び方法
WO2001001316A2 (fr) Systeme, procede et article de fabrication permettant de distribuer un logiciel electronique, mecanisme de paiement apres telechargement a capacites de cryptage

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20021029

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20031118