WO2000067143A2 - Transaction method and system for data networks - Google Patents

Transaction method and system for data networks Download PDF

Info

Publication number
WO2000067143A2
WO2000067143A2 PCT/NL2000/000278 NL0000278W WO0067143A2 WO 2000067143 A2 WO2000067143 A2 WO 2000067143A2 NL 0000278 W NL0000278 W NL 0000278W WO 0067143 A2 WO0067143 A2 WO 0067143A2
Authority
WO
WIPO (PCT)
Prior art keywords
party
transaction
message
transaction server
data
Prior art date
Application number
PCT/NL2000/000278
Other languages
French (fr)
Other versions
WO2000067143A3 (en
Inventor
Wilhelmus Hendrikus Maria Sipman
Scott Macdonald Ward
Original Assignee
Unicate B.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unicate B.V. filed Critical Unicate B.V.
Priority to EP00925732A priority Critical patent/EP1219088A2/en
Priority to JP2000615914A priority patent/JP2002543523A/en
Priority to CA002371168A priority patent/CA2371168A1/en
Priority to AU44375/00A priority patent/AU761974B2/en
Publication of WO2000067143A2 publication Critical patent/WO2000067143A2/en
Publication of WO2000067143A3 publication Critical patent/WO2000067143A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Definitions

  • the present invention relates to a transaction system for use with data networks, like intranets, extranets, and Internet. Transactions to be performed may include e-commerce, such as shopping and business-to-business transactions, electronic banking, protected emailing, consulting and amending databases, brokerage, and the like.
  • the invention also relates to the authentication of parties and the transactions exchanged.
  • the invention further relates to the preparation of a confidential message.
  • the invention still further relates to the generation of a digital signature as for use in the transmission of secure information.
  • An object of the invention is to provide a secure data network transaction system without the need for cryptography, whilst fulfilling demands for security, particularly privacy, authentication and irrefutability of the messages that constitute a transaction.
  • the privacy requirements are that no information is disclosed to any party, unless needed to perform the basic objective, which within the scope of this invention comprises the execution of a transaction, with or without a payment that might result from the transaction.
  • the authentication requirements are to be able to verify the authenticity of transmitted data and the sender of those data.
  • these data, as well as an identification of the parties concerned, form part of transaction messages .
  • the basis of the invention is to use a secure and trusted computer environment, referred hereinafter as the transaction server.
  • Parties wishing to use the services of the transaction server are registered at the server with a so called profile.
  • profile contains at least the data necessary to provide data integrity, data authentication, authentication of the parties, confidentiality of sensitive data (privacy) and irrefutability.
  • parties there will be two types of parties: a party that demands a service, a product, or information, further referred to as a "customer” ; and a party that offers such services, products, or information, further referred to as a "supplier” .
  • a third type of party may occur: one or more financial institutions that take care of the payment process, further referred to as a "financial institution".
  • financial institution one or more financial institutions that take care of the payment process
  • the number of customers, suppliers and/or financial institutions may range from 1 to many.
  • One or more of the objects of the invention are reached by a method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising: (a) providing a transaction server in the at least one data network;
  • the transaction server issuing a verified transaction approval message to the second party, in case said authenticity verification is required only if the verification is positive, resulting in a verified transaction approval message; and (h) fulfilment of the transaction.
  • An example of such a transaction is a customer to supplier transaction or a business to business transaction, where a customer or business demands a service, a product, or information.
  • the invention further discloses a method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising:
  • Examples of such a method are brokerage or telebanking, where the first party is a customer, and the second party is a supplier of services .
  • Use of the invention for sending and retrieving electronic mail is obtained by a method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising:
  • the transaction server in response to the transaction message, the transaction server verifying the authenticity of the first party; (e) if the verification is positive, the transaction server linking the transaction message to the profile of a second party; (f) if the second party connects to the transaction server, the transaction server verifying the authenticity of the second party; and (g) if the verification is positive, the transaction server issuing the transaction message to the second party.
  • the transaction message is an email.
  • the invention further discloses a method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising: (a) providing a transaction server in the at least one data network;
  • the profile may comprise operation identifiers each identifying an operation which is enabled for the party, and is meaningful only between the party and the transaction server.
  • the need for encryption is eliminated as there are no sensitive data to be exchanged between customer, supplier and transaction server.
  • the sensitive data are replaced by covert coded data, which are significant only to the sender and receiver of the message, thus respecting the privacy.
  • the authentication problems are solved by non-cryptographic methods, hence avoiding the problems of key management and the computing power to perform cryptographic operations. Even, when cryptographic digital signatures are used, the authenticity can be more easily established, using the transaction server concept according to the invention.
  • transaction irrefutability is achieved, since every step in the process can be monitored and verified.
  • the transaction server does not require any adaptations within the existing payment systems, as it uses transparently the network structures, which are in use today for the processing of electronic payment transactions. This is quite a cost saving factor, as changing anything in these systems is not a trivial operation.
  • the use of the transaction server opens new channels for making frequent payments of small amounts of money, as the costs of processing these payments is low.
  • this server may offer other services, like controlled access to services, payment methods based upon pre-authorisation or electronic cash, loyalty schemes, etc. Loyalty schemes can easily be implemented by adding bonus counters to the customer's profile. With the transaction system according to the invention it is possible to add opportunities for l-l marketing between various suppliers (like merchants, issuer banks and acquirer banks) and customers.
  • the loyalty scheme is based upon a data file, added to the customer's profile, which can be accessed e.g. as an Internet HTML page or similar.
  • provisions may be made to enable a user to access the facilities, offered through the transaction system, from another device than his base device (i.e. the device which is standard configured for transactions according to the invention) .
  • FIG. 1 is a diagram of a transaction system according to the present invention.
  • FIG. 2 illustrates how a party applies for participation in the transaction system.
  • FIG. 3 illustrates the relation between the various functional entities .
  • FIG. 4 illustrates the steps in a sample transaction.
  • FIG. 5 illustrates how a party can obtain a temporary profile where a party uses a device not personalised for him.
  • FIG. 6 illustrates the generation of a digital signature used for verifying the authenticity of the data and the sender of those data.
  • FIG. 7 illustrates how a random structure can be used to generate a table of random numbers .
  • FIG. 8 illustrates steps in a sample transaction between parties.
  • FIG. 9 illustrates a transaction, involving a direct payment.
  • FIG. 10 illustrates a supplier controlled environment, e.g. for electronic banking or brokerage, using the transaction server concept .
  • FIG. 11 illustrates steps in exchanging marketing information between parties.
  • FIG. 12 illustrates steps in accessing a service provider anonymously.
  • FIG. 1 is a diagram of a transaction system in accordance with the invention.
  • a transaction server 1 Centrally there is a secure and trusted data processing system, hereinafter to be referred to as a transaction server 1, to which participating parties 2, 3 are connected through a data network 4, e.g. Internet. If the transaction involves a payment, the transaction server 1 connects to one or more financial institutions 6, using the existing payment networks 5.
  • the transaction server holds so-called profiles 7 and 8 for the participating parties, as explained below with reference to FIG. 2.
  • "Users" of the transaction system are parties 2 ("Customer") that want to obtain goods, services and/or information from other parties 3 (“Supplier”), who are suppliers of these goods, services and/or information.
  • the parties 2, 3 are selectively coupled to the data network 4.
  • Financial institutions 6 involved are Issuers (banks issuing payment cards to clients) , Acquirers (banks serving the needs for suppliers of goods, services and/or information), and Schemes (financial institutions managing payment cards, like VISA, Mastercard and the like) .
  • FIG. 2 illustrates how a party 12, 13 will be registered to be able to participate in the transaction system.
  • the party 12, 13 fills in an application form, containing his request to participate m the transaction system, his identification and (if payment is included m his profile) a list of payment methods (which cards, debit or credit, etc.) he wants to use (if he is a payer/consumer 12) or a list of payment accepting methods (which accounts, etc.) he wants to use (if he is a supplier 13) and an authorisation to the transaction server 11 to verify his account/card data at the corresponding bank and receive additional information, required to create the party's profile.
  • the application form then is submitted to the institution, operating the transaction server 11, on paper, by E-mail, by courier, or otherwise.
  • Step B the account/card information together with the identification of the applying party 12, 13 is sent to a Registration Authority 10 (R.A.), e.g. his bank relat ⁇ on(s) to verify the authenticity of the party 12, 13 and the information supplied with his application.
  • R.A. Registration Authority 10
  • the request to participate in the transaction system may also directly be addressed to the Registration Authority 10 (the dashed line in FIG. 2) .
  • the Registration Authority 10 of the party 12, 13 verifies the party positively, .e. party's identity and other information match, it sends an approval message (Step C) to the organisation operating the transaction server 11.
  • the transaction server 11 Using the approval message content of Step C m the transaction server 11 a profile for the party will be built, Step D.
  • Each profile contains at least the party's identification and those other data, which are required to process the transactions as being used.
  • the profile further may contain data, relevant to a personalised token, which has been or will be issued to the party. Although cryptography is not required for the invention, still the profile may contain cryptographic keys, to enhance the security of the communication between the transaction server and the party.
  • the profile may contain a random data string, which acts as a pseudonym for the party identified.
  • the profile further may contain a payment metnod list, indicating the various payment methods permitted for that party. Each payment method in the profile may be identified by a random data string.
  • the profile may contain further data fields for other applications, e.g. electronic cash, loyalty programs, telebanking, stock brokerage, etc.
  • Step E the organisation operating the transaction server 11, which may also be a supplier or a bank, ensures that the party receives a personalised package, required to interface with the transaction system offered, and to be used with the party's data processing system to be coupled to the data networks.
  • the content of this package (data, program and token) mirrors the profile, as registered in the transaction server.
  • Parts of the package may be distributed to the party, using other channels, including electronic means, like electronic mail, or using other suppliers, e.g. a shop, the Registration Authority, or the like.
  • Parties 21, 23 that want to make use of the transaction system may use a token reader 22, 24.
  • This token reader is used to read the token, required for generating a digital signature of (selected parts of) message (s) in the transaction.
  • Parties communicate through a data network 26, e.g. Internet.
  • a secure and trusted transaction server 20 is also connected to the same data network, in order to receive messages from parties 21, 23.
  • the transaction server 20 processes the transactions, after thorough verification of the validity of the transactions, using the party's profiles, as stored in the transaction server 20. If the transaction involves a payment, the payment process (authorisation and settlement) is handled through the payment network 25, using the procedures that apply for such situations.
  • a not at base location could be a workstation at the office, a Cybercafe, a PDA (Personal Digital Assistant) with mobile phone function attached, or otherwise, provided that such a system offers access to the data network and is equipped with a token read facility.
  • PDA Personal Digital Assistant
  • an unknown token i.e. a token, which is not registered with the token reader, data and program, as referred to in step E of FIG. 2
  • the user is prompted to enter data, containing the address of the transaction server, his remote ID and, if required, his password. If the token possesses a memory, these data may be obtained from that memory.
  • a message is built, containing the user data entered and provided with a hash and (token based) signature, similar to the payment order as in (c) of FIG. 9, to be discussed below.
  • the message is now transferred to the transaction server which, after verification of the correctness of the message received and the existence of a profile for that user, will send a temporary set of data and program to the not at base system. Now the not at base system is able to prepare a transaction message, or to authenticate the user, and proceed as normal. Depending of the agreed conditions, the temporary set of data and program will be erased or maintained for a set period.
  • FIG. 4 depicts a sample flow for a typical transaction.
  • a first party 30 and a second party 31 negotiate a transaction.
  • the first party e.g. a customer will through his browser visit a site of the second party (e.g. a supplier) and request for a transaction, e.g. purchase goods, buy and sell stock, obtain information, or the like.
  • a site of the second party e.g. a supplier
  • request for a transaction e.g. purchase goods, buy and sell stock, obtain information, or the like.
  • the second party may require some proof of identity of the first party. He therefore sends a "Who are You" message to the first party.
  • the transaction server verifies the message, received from the first party. If the message and the first party are verified positively, the server sends a message to the second party, confirming the identity of the first party and requesting the second party to identify himself.
  • the second party adds to the message, received from the server, his identity, as registered in his profile 34, a "form" (e.g. a HTML page in case of Internet) in which the first party can fill in the details of his transaction request, a unique transaction number, a Hash total calculated over the previous data items, and his digital signature.
  • a "form” e.g. a HTML page in case of Internet
  • step (f ) Similar to step (d) , the transaction server verifies the message received from the second party and his identity. If verified positively, the form is transferred to the first party.
  • the first party now fills in the form with the transaction details, as requested, adds a unique transaction number, a Hash total and his digital signature, and sends it to the server, (h) The server verifies the message and, if verified positively, transfers the filled in form to the second party, (i) The second party replies to the transaction details, as filled in in the form with a message, completed with a unique transaction number, a Hash total calculated over the previous data items, and his digital signature, (j) The server verifies the message received, and if verified positively, transfers the reply to the first party. Steps (g) to (j) may be repeated, if more transactions are to be performed in the same session.
  • the verification of the messages as in (d) , (f) , (h) and (j) may be executed on the basis of a risk profile. If the risk profile does not demand immediate verification, the verification may be postponed until a request of either party is received to verify the messages, e.g. in case of a dispute about a certain transaction.
  • FIG. 5 depicts a sample flow how a party 40 can obtain a temporary profile, if he uses another system than the one, which has been personalised according to step E in FIG. 2. Where in FIG. 4 step (c) should start, the system detects a token, for which the system has not been personalised.
  • the server 42 It therefore sends a request to the server 42 to receive a temporary profile.
  • the message contains at least the server address and a user identification. These data are either collected from the first party's token, using a token reader 41 or entered manually. To enhance the security the message may be provided with a digital signature, generated in the same way as at the payment order.
  • the first party may have to include a Personal Identification Number (PIN) or any other personal identifier, e.g. a password or biometric quality.
  • PIN Personal Identification Number
  • the server After positive verification of the request for a temporary profile, using the party's profile 43, the server returns a message, containing a temporary personalised package, which is in essence the same as in step E of FIG. 2, but may contain certain usage restrictions, like validity period or services granted.
  • the validity period may be one transaction, a limited number of transactions, or an agreed time period, whatever has been agreed at the time the profile has been set up (step D in FIG. 2) .
  • the server may log the full transaction details, to be collected by the first party at a later time, when he connects to the server from the system, which has initially been personalised for using the transaction method described.
  • the pointer method As depicted in FIG. 6, it is possible to generate an electronic signature over a given set of data.
  • a table 46 of random numbers The table 46 may be the read result of a token, e.g. a 3DAS ® card.
  • n the number of elements in the table 46 equals n.
  • each number has a value between 0 and 255.
  • the defined length of the signature is m bytes, where m is smaller than n.
  • n 35 and m equals 5.
  • an electronic signature over a given set of data D can be calculated: compress D, using a hashing technique and/or some other method resulting into d; d has the property that it can be split into at least n digits, each representing a value between 1 and m; preferably m is replaced by m' , where m' is the largest power of 2 smaller than m.
  • d becomes the string: 1, 9, 20, 16, 30; identify the elements in the table of random numbers with the values 1 to m.
  • the elements are numbered column by column, starting at the top; the digital signature now is the string of values of the elements taken from the random table, identified by the values in d.
  • the digital signature becomes the string:
  • FIG. 7 illustrates how a table of random numbers may be generated, using a material with a random structure.
  • a token e.g. a credit card
  • a random two dimensional or three dimensional structure e.g. a 3DAS ® card
  • the token is inserted in a token reader 50.
  • an image is taken from the random structure in the token, which is in the case of a 3DAS ® card an image as the sample image 51.
  • In the image empty spaces are visible between the mapping of the random structure as blank areas.
  • the areas are measured, and the n largest areas are selected (52) .
  • For each of the selected areas its Centre of Gravity (CoG) is calculated as a pair of coordinates (53) .
  • a table 54 now is filled with the sizes (first column of the table) and the corresponding coordinates of the CoG (second and third columns of the table) .
  • the values in the table 54 are random.
  • the customer profile may contain, as earlier indicated, among others the account/card related data and data fields for other applications, e.g. electronic cash, loyalty programs, electronic banking, stock brokerage, etc.
  • the customer profile may contain, as earlier indicated, among others the account/card related data and data fields for other applications, e.g. electronic cash, loyalty programs, electronic banking, stock brokerage, etc.
  • To enable 1-1 marketing a further data file is added. It should be noted, that all the information, stored in the customer profile is present with the customer's agreement, as he did sign up for the transaction solution described.
  • any of the parties 2, 3 and 6 may leave a message in the data file, destined for one of the other parties. This message is stored in the format, applicable for the network solution chosen, through which the customer communicates with the transaction server. In case of Internet this will be an HTML page or the like.
  • the destination party connects to the transaction server and the party's authenticity has been established, he will be prompted by the transaction server that a message is present for him. The party may neglect the prompt or decide to read the message.
  • the message itself may link to other messages, stored elsewhere in the data network (e.g. Internet) .
  • the message may contain links to the acquirer's website, containing further information.
  • an acquirer may offer extra bonus miles if the customer selects Mastercard as payment method for paying an international flight.
  • the message then could be an HTML page: 'Dear customer, you may earn extra bonus miles if you pay your international flight, using your Mastercard. If you are interested, visit our website at www.Acquirer.com' . If the customer is interested, he just clicks the website's reference and can access all the relevant data on how to obtain the extra bonus miles and the conditions .
  • the criteria, used to add a message to the customer profile may refer to general attributes, belonging to the profile, e.g. which payment methods are enabled for that customer, or refer to specific attributes, e.g. the current transaction, his collected bonus etc.
  • a first party wishes to send a message to a second party based upon a given selection criterion, applicable to such second party
  • the first party sends the message together with the selection criterion to the transaction server.
  • the transaction server now selects all second parties, that match the criterion and adds to their profiles a data file, containing the message concerned, or if such data file already exists, adds the message to that data file.
  • the criterion may include a validity time, i.e. a time within which this criterion should be applied. In that case the transaction server will monitor changes in the second party's profile. If such a change might result in that the second party meets the criterion, the message is added to his profile as described above.
  • an issuer may offer a special financing arrangement to any customer buying a car during a given month.
  • the criterion is a customer buying a car.
  • the validity time is the given month.
  • the transaction server detects a transaction, in which a customer is buying a car (or might be expected to do so, based upon the supplier's profile, i.e. the supplier is a car seller), the transaction server adds the message to the customer's profile and prompts the customer that there is a message for him.
  • FIG. 8 shows how the transaction will be protected, whereby the authentication of both parties, the transaction messages and the irrefutability of the transaction can be guaranteed, using the same mechanisms as described hereafter with reference to FIG. 9.
  • the first party is the one, requesting a service.
  • the first party may be a consumer, but also a professional (as m business to business electronic commerce, B2B)
  • the second party is the supplier of the requested services .
  • step (50) the first party visits a site of the second party and indicates his desire to perform a certain kind of transaction
  • the second party sends a signed request for log-m to the first party
  • the first party processes the log-in request (52) similar to preparing a payment order, as m step (c) of FIG. 9 and transmits the message to a secure transaction server.
  • the server verifies the message form step (52) , using the profiles of both parties. If verification is positive, the server passes the log-m data to second party (53) . The second party checks the authorisation of the first party to perform the requested transaction and returns a signed application form (54) to the server.
  • the application form is a data file (e.g. an HTML page) the first party can use to enter the transaction data.
  • the server verifies the validity of the application form and transfers it to the first party (55) .
  • the first party fills m the application form and signs it similar to the payment order message as m step (c) of FIG. 9.
  • the form is then transmitted (56) to the server.
  • the application form is passed to the second party, to be further processed.
  • Steps (54) to (57) may be repeated, depending on the context of the transaction.
  • FIG. 9 depicts a sample flow for a typical transaction involving a payment .
  • a first and a second party negotiate a purchase.
  • the first party e.g. a consumer will through his browser visit a site of the second party (e.g. a merchant) and pursue a normal electronic shopping process by picking goods and storing them in a so-called shopping basket.
  • the second party e.g. a merchant
  • a buying order e.g. a buying order to the second party
  • the second party accepts the order, he will prepare an invoice message and transmit this to the first party.
  • the invoice message contains: an identification of the second party, a content of the sale, an amount due, a payment accepting method, a unique transaction number, a Hash total (HashM) calculated over the previous data items, and a digital signature of the second party, calculated over HashM, as exemplified below.
  • HashM Hash total
  • the identification of the second party may be replaced by his pseudonym, as registered at the transaction server, to enhance privacy as his true identity now is covert, without the need for cryptography.
  • the payment accepting method may be replaced by the random selected key, pointing to the required payment accepting method, as registered in the transaction server, to enhance privacy as his payment accepting method data now are covert, without the need for cryptography.
  • the digital signature may be generated using a token.
  • the digital signature may be generated using the pointer method, as elucidated below.
  • the token used in this case may be a 3DAS ® object, such as a card, with an optically scannable three-dimensional pattern of randomly overlying fibres, as disclosed in U.S. Patent Nos . 5,354,097 and 5,719,939, and
  • any jitter in the reading of the mark of the card may be used to make the transaction number unique and guarantees at the same time, that the token has been read and processed.
  • the first party After receiving the invoice, the first party prepares a payment message and transmits this to the transaction server.
  • This message contains: an identification of the first party, a copy of the invoice message, a payment method, a unique transaction number, a Hash total (HashC) calculated over the previous data items, and a digital signature of the first party, calculated over HashC, as exemplified below.
  • the content of the sale may be deleted from the copy of the invoice message, enhancing privacy by not transmitting this information.
  • the HashC may be deleted from the payment message .
  • the identification of the first party may be replaced by his pseudonym, as registered at the transaction server, to enhance privacy as his true identity now is covert, without the need for cryptography.
  • the payment method may be replaced by a random selected key, pointing to the required payment method, as registered in the transaction server, to enhance privacy as his payment method data now are covert, without the need for cryptography.
  • the digital signature may be generated using a token.
  • the digital signature may be generated using the pointer method as elucidated below.
  • the token used in this case may be a card like a 3DAS ® card. This eliminates the need for cryptography. If a 3DAS ® card is used as token, the jitter in the reading of the card may be used to make the transaction number unique and guarantees at the same time, that the token has been read and processed.
  • the digital signature also may include a personal identification, such as a Personal Identification Number (PIN) as is generally used when one wants to withdraw money through an Automated Teller Machine (ATM) , a personal identification code or character string, a biometric feature, or any other feature which is strictly personal.
  • PIN Personal Identification Number
  • ATM Automated Teller Machine
  • the transaction server After receiving the payment message, the transaction server starts verifying the message received. Depending on first party' s payment method and second party' s payment accepting method the authenticity of both parties are verified by the transaction server itself or by a financial institution concerned. If 3DAS ® cards are used as token, the transaction numbers, generated by either party will prove that an actual read has been performed, reducing the chance for counterfeit attacks, such as replay. (e) Using the information in the first and second party's profiles the transaction server now builds an authorisation request message and/or settlement messages as agreed with the financial institution concerned. In the example of FIG. 9 an authorisation request message is build and transmitted to an acquirer bank (a merchant's bank as indicated by his payment accepting method) .
  • acquirer bank a merchant's bank as indicated by his payment accepting method
  • FIG. 10 a configuration for telebanking or electronic banking is described.
  • the client of a bank there is only one party, the client of a bank.
  • the party is via an open network, e.g. Internet, connected to the secure transaction server similar as the situation described in FIG. 1.
  • the client's bank is connected to the server via a closed network.
  • the client When the client wants to perform one or more telebanking transactions, he sends a log- in request to the server, signed and protected in the same way as the payment order message (as (c) in FIG. 4) . (61)
  • the server verifies the authenticity of the client and checks if a relation with the specified bank exists and/or the client is allowed to perform a specific transaction. If so, the log-in request is (via the secure closed network) transmitted to the client's bank.
  • the bank will respond with an Application Form (62) , being a data file, where the client can enter the data concerning the transaction requested.
  • This data file may be in case of Internet an HTML page.
  • the server signs the Application Form and transfers it to the client .
  • the client completes the Application Form with the transaction data required (64), applying the same protection and signature mechanisms, as used in the payment order as in (c) in FIG. 4 and sends it to the server.
  • the server After inspection of the signed Application Form, the server passes it to the client's bank (65) .
  • steps (62) till (65) are repeated, until all transactions are transmitted.
  • parties may exchange marketing information using the profiles (items 7, 8 in FIG. 1) , where a party S is the sender and a party R is the receiver of the information.
  • the identity of party R is hidden to party S, unless party R decides to directly contact party S to further investigate the information transmitted to party R.
  • the party S wants to submit a message to one or more parties R, based upon predefined criteria.
  • party S therefore sets a criteria scheme. This scheme indicates on what basis the one or more parties R have to be addressed, and the time duration of the message to be submitted to the one or more parties R (i.e. the time period during which the message is valid and may be sent) .
  • party S defines the message contents.
  • This message may contain a reference to a special offer and/or references to (in case of Internet) a website of party S.
  • party S then sends the criteria scheme and the message to the server.
  • the server analyses the criteria scheme and selects those one or more parties R, that meet the criteria scheme. If a duration is specified, the server monitors all transaction occurrences of the one or more parties R, to find out if they will fit into the criteria scheme, due to a change in their continuously updated profile. If a transaction occurrence of a party R is found, meeting the criteria scheme, the message is added to his profile together with a "flag", which is an indicator indicating that the criteria scheme is met.
  • a step 73 as soon as an occurrence of a party R contacts the server, e.g. by issuing a payment order, and the "flag" is set, the server informs this party R that a message is present.
  • the party R may decide to read the message or to ignore it. If the party R reads the message, he may react to the contents of the message or neglect it.
  • a party may want to access a certain service provider, without disclosing his true identity.
  • the service provider may or may not want to be sure that the party is entitled to the requested access.
  • FIG. 12 shows how a party can get anonymous access to a service provider.
  • the party sends a signed request to the secure transaction server to access a certain service provider.
  • the server verifies the identity of the party and, if required, its right to access a requested service, using the party's profile. If the party is verified positively, the server transmits an access request message to the service provider, using a pseudonym for the party.
  • the service provider now knows that the access request is legitimate, since the request originates from the transaction server and starts a dialogue (82) with the (anonymous) party through the server, which transfers the messages to the party (83) .
  • the party At the choice of the party, the party might disclose his true identity to the service provider during this dialogue.
  • the bookseller now prepares a digitally signed invoice message. In this message the bookseller's identity is hidden by the reference to his profile at the transaction server, as is his payment accepting method.
  • the invoice message arrives at the computer of the consumer, he is prompted with a "pay" request.
  • the consumer now inserts his token in the token reader and selects his method of payment.
  • the program in his computer prepares a payment message to the transaction server. In this message only the data from the invoice message, which are relevant for the payment process, are copied.
  • the identity and selected method of payment are hidden by referring to his profile at the transaction server.
  • the payment message finally is provided with the consumer's digital signature.
  • the transaction server now can process the payment request in basically three ways. 1. If the payment method selected is a cash payment, the account in the consumer's profile is debited for the amount due, while the account in the bookseller's profile is credited for the same amount. (Note: the cash method is more likely to be used for buying services, like searching a database, or information, like an audio file of the latest top hit) .
  • the payment method selected is a debit or credit transaction
  • the transaction server is entitled by the financial institutions concerned to verify the authenticity of the consumer and the bookseller, then a simple authorisation request message or even a settlement request message will be sent to the corresponding financial institution.
  • the transaction server If the payment method selected is a debit or credit transaction, and the transaction server is not entitled by the financial institutions concerned to verify the authenticity of the consumer and the bookseller, then an authorisation request message is sent to the corresponding financial institution, which then has to verify the authenticity of the consumer and bookseller, and inform the transaction server about the result of the authorisation. Finally, the transaction server informs the consumer and retailer about the result of the payment order and optionally provides them with a random number, to modify the pointers to their profile data.
  • the authentication of the payment transaction and its initiators is done by verifying the digital signatures.
  • Protection against hacking can be offered by changing the pointer values after each payment transaction, at fixed time intervals or after a given number of transactions.
  • the software required for implementing the method according to the invention, or one of the features thereof, is recorded on a computer readable medium, such as a floppy disk, a hard disk, a magnetic tape or other suitable media, to make a data processing system execute procedures in accordance with the method or one of the features thereof.

Abstract

A method and a system for performing a transaction between at least one first party and at least one second party are disclosed. A data network connects data input/output terminals of the parties. In the data network a secure and trusted transaction server is provided, in which a profile of the parties is registered, having a party identifier identifying a particular party, and authentication data for authenticating the party and data sent by the party. The parties communicate with each other through the transaction server by means of various transaction messages, which are digitally signed using a table of random numbers and a hashing operation, wherein the table of random numbers is generated by reading a token.

Description

TRANSACTION METHOD AND SYSTEM FOR DATA NETWORKS, LIKE INTERNET
FIELD OF THE INVENTION
The present invention relates to a transaction system for use with data networks, like intranets, extranets, and Internet. Transactions to be performed may include e-commerce, such as shopping and business-to-business transactions, electronic banking, protected emailing, consulting and amending databases, brokerage, and the like. The invention also relates to the authentication of parties and the transactions exchanged. The invention further relates to the preparation of a confidential message. The invention still further relates to the generation of a digital signature as for use in the transmission of secure information.
BACKGROUND OF THE INVENTION
When using data networks, like Internet, for transactions between parties, that want to exchange information, that want to buy goods, enjoy services or receive information and other parties offering those goods, services or information, one of the problems observed is the lack of secure and at the same time simple transaction methods. Secure systems, such as SET, SSL, etcetera exist, but are felt as being cumbersome to use, involving heavy message traffic,
(complex) cryptographic procedures, and key management including key recovery.
SUMMARY OF THE INVENTION
An object of the invention is to provide a secure data network transaction system without the need for cryptography, whilst fulfilling demands for security, particularly privacy, authentication and irrefutability of the messages that constitute a transaction. The privacy requirements are that no information is disclosed to any party, unless needed to perform the basic objective, which within the scope of this invention comprises the execution of a transaction, with or without a payment that might result from the transaction.
The authentication requirements are to be able to verify the authenticity of transmitted data and the sender of those data. Within the scope of this invention these data, as well as an identification of the parties concerned, form part of transaction messages .
The basis of the invention is to use a secure and trusted computer environment, referred hereinafter as the transaction server. Parties wishing to use the services of the transaction server, are registered at the server with a so called profile. Such profile contains at least the data necessary to provide data integrity, data authentication, authentication of the parties, confidentiality of sensitive data (privacy) and irrefutability.
In such an environment, there will be two types of parties: a party that demands a service, a product, or information, further referred to as a "customer" ; and a party that offers such services, products, or information, further referred to as a "supplier" .
In case the transaction involves a payment, a third type of party may occur: one or more financial institutions that take care of the payment process, further referred to as a "financial institution". In the system according to the invention, the number of customers, suppliers and/or financial institutions may range from 1 to many.
One or more of the objects of the invention are reached by a method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising: (a) providing a transaction server in the at least one data network;
(b) in the transaction server, registering a profile of the at least one first party and the at least one second party, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the authentication data comprising a table of random data for verifying a digital signature;
(c) the first party issuing at least one transaction message to the second party;
(d) in response to the transaction message, the second party issuing a digitally signed transaction confirmation message to the first party;
(e) on the basis of the transaction confirmation message, the first party issuing a digitally signed transaction approval message to the transaction server;
(f) if required by the first or the second party, the transaction server verifying the authenticity of the first party and the second party, and the transaction data, in response to the transaction approval message;
(g) the transaction server issuing a verified transaction approval message to the second party, in case said authenticity verification is required only if the verification is positive, resulting in a verified transaction approval message; and (h) fulfilment of the transaction.
An example of such a transaction is a customer to supplier transaction or a business to business transaction, where a customer or business demands a service, a product, or information.
The invention further discloses a method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising:
(a) providing a transaction server in the at least one data network; (b) in the transaction server, registering a profile of the at least one first party and the at least one second party, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the authentication data comprising a table of random data for verifying a digital signature;
(c) the first party issuing at least one transaction message to the transaction server;
(d) in response to the transaction message, the transaction server verifying the authenticity of the first party, and the transaction data;
(e) if the verification is positive, the transaction server issuing a verified transaction message to the second party; and
(f) the second party and the first party performing the at least one transaction through the transaction server by means of digitally signed messages, the validity of which is verified by the transaction server.
Examples of such a method are brokerage or telebanking, where the first party is a customer, and the second party is a supplier of services .
Use of the invention for sending and retrieving electronic mail is obtained by a method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising:
(a) providing a transaction server in the at least one data network;
(b) in the transaction server, registering a profile of the at least one first party and the at least one second party, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the authentication data comprising a table of random data for verifying a digital signature; (c) the first party issuing at least one digitally signed transaction message to the transaction server;
(d) in response to the transaction message, the transaction server verifying the authenticity of the first party; (e) if the verification is positive, the transaction server linking the transaction message to the profile of a second party; (f) if the second party connects to the transaction server, the transaction server verifying the authenticity of the second party; and (g) if the verification is positive, the transaction server issuing the transaction message to the second party.
Here, the transaction message is an email.
The invention further discloses a method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising: (a) providing a transaction server in the at least one data network;
(b) in the transaction server, registering a profile of the at least one first party, the profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the profile further comprising operation identifiers each identifying an operation that is enabled for the party, and is meaningful only between the party and the transaction server;
(c) the first party issuing at least one transaction message to the transaction server;
(d) in response to the transaction message, the transaction server verifying the authenticity of the first party, and the transaction data;
(e) if the verification is positive, the transaction server issuing a verified transaction message to the second party; and
(f) the second party and the first party performing the at least one transaction through the transaction server. Such a method is particularly suitable for a party desiring to gain access to a service provider anonymously. Yet the service provider can be sure that the party is entitled to the requested access.
Instead of using a table of random data for verifying a digital signature, the profile may comprise operation identifiers each identifying an operation which is enabled for the party, and is meaningful only between the party and the transaction server.
In the system according to the invention, the need for encryption is eliminated as there are no sensitive data to be exchanged between customer, supplier and transaction server. The sensitive data are replaced by covert coded data, which are significant only to the sender and receiver of the message, thus respecting the privacy.
The authentication problems are solved by non-cryptographic methods, hence avoiding the problems of key management and the computing power to perform cryptographic operations. Even, when cryptographic digital signatures are used, the authenticity can be more easily established, using the transaction server concept according to the invention.
Additionally, transaction irrefutability is achieved, since every step in the process can be monitored and verified.
If the transaction involves payments, the transaction server does not require any adaptations within the existing payment systems, as it uses transparently the network structures, which are in use today for the processing of electronic payment transactions. This is quite a cost saving factor, as changing anything in these systems is not a trivial operation. At the same time, the use of the transaction server opens new channels for making frequent payments of small amounts of money, as the costs of processing these payments is low.
FURTHER ASPECTS OF THE INVENTION Having the secure and trusted transaction server, this server may offer other services, like controlled access to services, payment methods based upon pre-authorisation or electronic cash, loyalty schemes, etc. Loyalty schemes can easily be implemented by adding bonus counters to the customer's profile. With the transaction system according to the invention it is possible to add opportunities for l-l marketing between various suppliers (like merchants, issuer banks and acquirer banks) and customers. The loyalty scheme is based upon a data file, added to the customer's profile, which can be accessed e.g. as an Internet HTML page or similar.
Furthermore, provisions may be made to enable a user to access the facilities, offered through the transaction system, from another device than his base device (i.e. the device which is standard configured for transactions according to the invention) .
The invention and its advantages will be more readily appreciated as the same becomes better understood by reference to the following detailed description and considered in connection with the accompanying drawings in which like reference symbols designate like parts .
BRIEF DESCRIPTION OF THE FIGURES
FIG. 1 is a diagram of a transaction system according to the present invention.
FIG. 2 illustrates how a party applies for participation in the transaction system. FIG. 3 illustrates the relation between the various functional entities .
FIG. 4 illustrates the steps in a sample transaction.
FIG. 5 illustrates how a party can obtain a temporary profile where a party uses a device not personalised for him. FIG. 6 illustrates the generation of a digital signature used for verifying the authenticity of the data and the sender of those data. FIG. 7 illustrates how a random structure can be used to generate a table of random numbers .
FIG. 8 illustrates steps in a sample transaction between parties. FIG. 9 illustrates a transaction, involving a direct payment. FIG. 10 illustrates a supplier controlled environment, e.g. for electronic banking or brokerage, using the transaction server concept .
FIG. 11 illustrates steps in exchanging marketing information between parties. FIG. 12 illustrates steps in accessing a service provider anonymously.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
FIG. 1 is a diagram of a transaction system in accordance with the invention. Centrally there is a secure and trusted data processing system, hereinafter to be referred to as a transaction server 1, to which participating parties 2, 3 are connected through a data network 4, e.g. Internet. If the transaction involves a payment, the transaction server 1 connects to one or more financial institutions 6, using the existing payment networks 5. The transaction server holds so-called profiles 7 and 8 for the participating parties, as explained below with reference to FIG. 2. "Users" of the transaction system are parties 2 ("Customer") that want to obtain goods, services and/or information from other parties 3 ("Supplier"), who are suppliers of these goods, services and/or information. The parties 2, 3 are selectively coupled to the data network 4.
Financial institutions 6 involved are Issuers (banks issuing payment cards to clients) , Acquirers (banks serving the needs for suppliers of goods, services and/or information), and Schemes (financial institutions managing payment cards, like VISA, Mastercard and the like) .
FIG. 2 illustrates how a party 12, 13 will be registered to be able to participate in the transaction system. In Step A the party 12, 13 fills in an application form, containing his request to participate m the transaction system, his identification and (if payment is included m his profile) a list of payment methods (which cards, debit or credit, etc.) he wants to use (if he is a payer/consumer 12) or a list of payment accepting methods (which accounts, etc.) he wants to use (if he is a supplier 13) and an authorisation to the transaction server 11 to verify his account/card data at the corresponding bank and receive additional information, required to create the party's profile. The application form then is submitted to the institution, operating the transaction server 11, on paper, by E-mail, by courier, or otherwise.
Next, Step B, the account/card information together with the identification of the applying party 12, 13 is sent to a Registration Authority 10 (R.A.), e.g. his bank relatιon(s) to verify the authenticity of the party 12, 13 and the information supplied with his application.
The request to participate in the transaction system may also directly be addressed to the Registration Authority 10 (the dashed line in FIG. 2) . If the Registration Authority 10 of the party 12, 13 verifies the party positively, .e. party's identity and other information match, it sends an approval message (Step C) to the organisation operating the transaction server 11. Using the approval message content of Step C m the transaction server 11 a profile for the party will be built, Step D. Each profile contains at least the party's identification and those other data, which are required to process the transactions as being used.
The profile further may contain data, relevant to a personalised token, which has been or will be issued to the party. Although cryptography is not required for the invention, still the profile may contain cryptographic keys, to enhance the security of the communication between the transaction server and the party The profile may contain a random data string, which acts as a pseudonym for the party identified. The profile further may contain a payment metnod list, indicating the various payment methods permitted for that party. Each payment method in the profile may be identified by a random data string.
The profile may contain further data fields for other applications, e.g. electronic cash, loyalty programs, telebanking, stock brokerage, etc.
Finally, in Step E, the organisation operating the transaction server 11, which may also be a supplier or a bank, ensures that the party receives a personalised package, required to interface with the transaction system offered, and to be used with the party's data processing system to be coupled to the data networks. The content of this package (data, program and token) mirrors the profile, as registered in the transaction server. Parts of the package may be distributed to the party, using other channels, including electronic means, like electronic mail, or using other suppliers, e.g. a shop, the Registration Authority, or the like.
In FIG. 3 various entities are indicated.
Parties 21, 23 that want to make use of the transaction system may use a token reader 22, 24. This token reader is used to read the token, required for generating a digital signature of (selected parts of) message (s) in the transaction. Parties communicate through a data network 26, e.g. Internet. A secure and trusted transaction server 20 is also connected to the same data network, in order to receive messages from parties 21, 23. The transaction server 20 processes the transactions, after thorough verification of the validity of the transactions, using the party's profiles, as stored in the transaction server 20. If the transaction involves a payment, the payment process (authorisation and settlement) is handled through the payment network 25, using the procedures that apply for such situations.
When the customer 2 in FIG. 1 wants to perform a transaction from another location than his base location (the location equipped with standard configured/personalized means for performing transactions according to the invention) , or otherwise is requested to authenticate himself, this can be achieved by downloading a temporary set of data and program, as depicted in step E in FIG. 2 at the not at base location. A not at base location could be a workstation at the office, a Cybercafe, a PDA (Personal Digital Assistant) with mobile phone function attached, or otherwise, provided that such a system offers access to the data network and is equipped with a token read facility.
As soon as an authentication request is due and the not at base system detects an unknown token (i.e. a token, which is not registered with the token reader, data and program, as referred to in step E of FIG. 2) , the user is prompted to enter data, containing the address of the transaction server, his remote ID and, if required, his password. If the token possesses a memory, these data may be obtained from that memory. A message is built, containing the user data entered and provided with a hash and (token based) signature, similar to the payment order as in (c) of FIG. 9, to be discussed below. The message is now transferred to the transaction server which, after verification of the correctness of the message received and the existence of a profile for that user, will send a temporary set of data and program to the not at base system. Now the not at base system is able to prepare a transaction message, or to authenticate the user, and proceed as normal. Depending of the agreed conditions, the temporary set of data and program will be erased or maintained for a set period.
FIG. 4 depicts a sample flow for a typical transaction.
(a) A first party 30 and a second party 31 negotiate a transaction. In an Internet environment the first party, e.g. a customer will through his browser visit a site of the second party (e.g. a supplier) and request for a transaction, e.g. purchase goods, buy and sell stock, obtain information, or the like.
(b) The second party may require some proof of identity of the first party. He therefore sends a "Who are You" message to the first party.
(c) The first party adds his identity, as registered in his profile 33 at the transaction server 32 to the "Who are You" message and completes the message with a unique transaction number, a Hash total calculated over the previous data items, and his digital signature. This message ("I am") is then transferred to the transaction server.
(d) The transaction server verifies the message, received from the first party. If the message and the first party are verified positively, the server sends a message to the second party, confirming the identity of the first party and requesting the second party to identify himself.
(e) The second party adds to the message, received from the server, his identity, as registered in his profile 34, a "form" (e.g. a HTML page in case of Internet) in which the first party can fill in the details of his transaction request, a unique transaction number, a Hash total calculated over the previous data items, and his digital signature.
(f ) Similar to step (d) , the transaction server verifies the message received from the second party and his identity. If verified positively, the form is transferred to the first party.
(g) The first party now fills in the form with the transaction details, as requested, adds a unique transaction number, a Hash total and his digital signature, and sends it to the server, (h) The server verifies the message and, if verified positively, transfers the filled in form to the second party, (i) The second party replies to the transaction details, as filled in in the form with a message, completed with a unique transaction number, a Hash total calculated over the previous data items, and his digital signature, (j) The server verifies the message received, and if verified positively, transfers the reply to the first party. Steps (g) to (j) may be repeated, if more transactions are to be performed in the same session.
The verification of the messages as in (d) , (f) , (h) and (j) may be executed on the basis of a risk profile. If the risk profile does not demand immediate verification, the verification may be postponed until a request of either party is received to verify the messages, e.g. in case of a dispute about a certain transaction.
The creation of the digital signature may be performed as described in FIG. 9 below. FIG. 5 depicts a sample flow how a party 40 can obtain a temporary profile, if he uses another system than the one, which has been personalised according to step E in FIG. 2. Where in FIG. 4 step (c) should start, the system detects a token, for which the system has not been personalised.
(a) It therefore sends a request to the server 42 to receive a temporary profile. The message contains at least the server address and a user identification. These data are either collected from the first party's token, using a token reader 41 or entered manually. To enhance the security the message may be provided with a digital signature, generated in the same way as at the payment order. For further security the first party may have to include a Personal Identification Number (PIN) or any other personal identifier, e.g. a password or biometric quality.
(b) After positive verification of the request for a temporary profile, using the party's profile 43, the server returns a message, containing a temporary personalised package, which is in essence the same as in step E of FIG. 2, but may contain certain usage restrictions, like validity period or services granted. The validity period may be one transaction, a limited number of transactions, or an agreed time period, whatever has been agreed at the time the profile has been set up (step D in FIG. 2) .
As an additional service, the server may log the full transaction details, to be collected by the first party at a later time, when he connects to the server from the system, which has initially been personalised for using the transaction method described.
POINTER METHOD
With the pointer method, as depicted in FIG. 6, it is possible to generate an electronic signature over a given set of data. Assume a table 46 of random numbers. The table 46 may be the read result of a token, e.g. a 3DAS® card. Assume the number of elements in the table 46 equals n. Further assume that each number has a value between 0 and 255. Assume the defined length of the signature is m bytes, where m is smaller than n.
In the example, depicted in FIG. 6, n equals 35 and m equals 5. hen an electronic signature over a given set of data D can be calculated: compress D, using a hashing technique and/or some other method resulting into d; d has the property that it can be split into at least n digits, each representing a value between 1 and m; preferably m is replaced by m' , where m' is the largest power of 2 smaller than m. In the example d becomes the string: 1, 9, 20, 16, 30; identify the elements in the table of random numbers with the values 1 to m. In the example the elements are numbered column by column, starting at the top; the digital signature now is the string of values of the elements taken from the random table, identified by the values in d. In the example the digital signature becomes the string:
128, 27, 5, 99, 38.
FIG. 7 illustrates how a table of random numbers may be generated, using a material with a random structure.
Assume a token (e.g. a credit card) , which is provided with a random two dimensional or three dimensional structure (e.g. a 3DAS® card) . The token is inserted in a token reader 50. In the token reader 50 an image is taken from the random structure in the token, which is in the case of a 3DAS® card an image as the sample image 51. In the image empty spaces are visible between the mapping of the random structure as blank areas. The areas are measured, and the n largest areas are selected (52) . For each of the selected areas its Centre of Gravity (CoG) is calculated as a pair of coordinates (53) . A table 54 now is filled with the sizes (first column of the table) and the corresponding coordinates of the CoG (second and third columns of the table) . As the original material used is random, also the values in the table 54 are random.
Referring again to FIG. 1, the customer is indicated with 2 and the supplier with 3. The customer profile may contain, as earlier indicated, among others the account/card related data and data fields for other applications, e.g. electronic cash, loyalty programs, electronic banking, stock brokerage, etc. To enable 1-1 marketing a further data file is added. It should be noted, that all the information, stored in the customer profile is present with the customer's agreement, as he did sign up for the transaction solution described. Upon given criteria, any of the parties 2, 3 and 6 may leave a message in the data file, destined for one of the other parties. This message is stored in the format, applicable for the network solution chosen, through which the customer communicates with the transaction server. In case of Internet this will be an HTML page or the like.
As soon as the destination party connects to the transaction server and the party's authenticity has been established, he will be prompted by the transaction server that a message is present for him. The party may neglect the prompt or decide to read the message. The message itself may link to other messages, stored elsewhere in the data network (e.g. Internet) .
E.g., if an acquirer wants to make an offer to the customer, the message may contain links to the acquirer's website, containing further information. As an example, an acquirer may offer extra bonus miles if the customer selects Mastercard as payment method for paying an international flight. The message then could be an HTML page: 'Dear customer, you may earn extra bonus miles if you pay your international flight, using your Mastercard. If you are interested, visit our website at www.Acquirer.com' . If the customer is interested, he just clicks the website's reference and can access all the relevant data on how to obtain the extra bonus miles and the conditions . The criteria, used to add a message to the customer profile, may refer to general attributes, belonging to the profile, e.g. which payment methods are enabled for that customer, or refer to specific attributes, e.g. the current transaction, his collected bonus etc.
If a first party wishes to send a message to a second party based upon a given selection criterion, applicable to such second party, the first party sends the message together with the selection criterion to the transaction server. The transaction server now selects all second parties, that match the criterion and adds to their profiles a data file, containing the message concerned, or if such data file already exists, adds the message to that data file. The criterion may include a validity time, i.e. a time within which this criterion should be applied. In that case the transaction server will monitor changes in the second party's profile. If such a change might result in that the second party meets the criterion, the message is added to his profile as described above. As an example, an issuer may offer a special financing arrangement to any customer buying a car during a given month. The criterion is a customer buying a car. The validity time is the given month. As soon as the transaction server detects a transaction, in which a customer is buying a car (or might be expected to do so, based upon the supplier's profile, i.e. the supplier is a car seller), the transaction server adds the message to the customer's profile and prompts the customer that there is a message for him.
When applying this method the privacy of the customer is guaranteed: no information is disclosed to (in the example) the issuer, unless the customer decides to contact the issuer and apply for the special financing arrangement.
If no direct payment is involved between a first and a second party, FIG. 8 shows how the transaction will be protected, whereby the authentication of both parties, the transaction messages and the irrefutability of the transaction can be guaranteed, using the same mechanisms as described hereafter with reference to FIG. 9. The first party is the one, requesting a service. The first party may be a consumer, but also a professional (as m business to business electronic commerce, B2B) The second party is the supplier of the requested services .
In step (50) the first party visits a site of the second party and indicates his desire to perform a certain kind of transaction The second party sends a signed request for log-m to the first party
(51) , whereby his signature is generated similarly to the invoice message as m step (b) of FIG. 9 to be described hereafter.
The first party processes the log-in request (52) similar to preparing a payment order, as m step (c) of FIG. 9 and transmits the message to a secure transaction server.
The server verifies the message form step (52) , using the profiles of both parties. If verification is positive, the server passes the log-m data to second party (53) . The second party checks the authorisation of the first party to perform the requested transaction and returns a signed application form (54) to the server. The application form is a data file (e.g. an HTML page) the first party can use to enter the transaction data.
The server verifies the validity of the application form and transfers it to the first party (55) .
The first party fills m the application form and signs it similar to the payment order message as m step (c) of FIG. 9. The form is then transmitted (56) to the server.
After verification by the server (57) the application form is passed to the second party, to be further processed.
Steps (54) to (57) may be repeated, depending on the context of the transaction.
Authenticity of the parties, the transaction and its irrefutability are thus guaranteed by the secure transaction server.
FIG. 9 depicts a sample flow for a typical transaction involving a payment .
(a) A first and a second party negotiate a purchase. In an Internet environment the first party, e.g. a consumer will through his browser visit a site of the second party (e.g. a merchant) and pursue a normal electronic shopping process by picking goods and storing them in a so-called shopping basket. When he has completed the shopping process, he sends a buying order to the second party, (b) If the second party accepts the order, he will prepare an invoice message and transmit this to the first party. The invoice message contains: an identification of the second party, a content of the sale, an amount due, a payment accepting method, a unique transaction number, a Hash total (HashM) calculated over the previous data items, and a digital signature of the second party, calculated over HashM, as exemplified below.
The identification of the second party may be replaced by his pseudonym, as registered at the transaction server, to enhance privacy as his true identity now is covert, without the need for cryptography. The payment accepting method may be replaced by the random selected key, pointing to the required payment accepting method, as registered in the transaction server, to enhance privacy as his payment accepting method data now are covert, without the need for cryptography. The digital signature may be generated using a token.
The digital signature may be generated using the pointer method, as elucidated below. The token used in this case may be a 3DAS® object, such as a card, with an optically scannable three-dimensional pattern of randomly overlying fibres, as disclosed in U.S. Patent Nos . 5,354,097 and 5,719,939, and
Dutch Patent No. 1,000,330, which documents are incorporated herein by reference. The card can be read with an appropriate reading device. This eliminates the need for cryptography.
If a 3DAS® card is used as token, any jitter in the reading of the mark of the card may be used to make the transaction number unique and guarantees at the same time, that the token has been read and processed.
(c) After receiving the invoice, the first party prepares a payment message and transmits this to the transaction server. This message contains: an identification of the first party, a copy of the invoice message, a payment method, a unique transaction number, a Hash total (HashC) calculated over the previous data items, and a digital signature of the first party, calculated over HashC, as exemplified below. The content of the sale may be deleted from the copy of the invoice message, enhancing privacy by not transmitting this information.
The HashC may be deleted from the payment message . The identification of the first party may be replaced by his pseudonym, as registered at the transaction server, to enhance privacy as his true identity now is covert, without the need for cryptography.
The payment method may be replaced by a random selected key, pointing to the required payment method, as registered in the transaction server, to enhance privacy as his payment method data now are covert, without the need for cryptography. The digital signature may be generated using a token. The digital signature may be generated using the pointer method as elucidated below. The token used in this case may be a card like a 3DAS® card. This eliminates the need for cryptography. If a 3DAS® card is used as token, the jitter in the reading of the card may be used to make the transaction number unique and guarantees at the same time, that the token has been read and processed. The digital signature also may include a personal identification, such as a Personal Identification Number (PIN) as is generally used when one wants to withdraw money through an Automated Teller Machine (ATM) , a personal identification code or character string, a biometric feature, or any other feature which is strictly personal.
(d) After receiving the payment message, the transaction server starts verifying the message received. Depending on first party' s payment method and second party' s payment accepting method the authenticity of both parties are verified by the transaction server itself or by a financial institution concerned. If 3DAS® cards are used as token, the transaction numbers, generated by either party will prove that an actual read has been performed, reducing the chance for counterfeit attacks, such as replay. (e) Using the information in the first and second party's profiles the transaction server now builds an authorisation request message and/or settlement messages as agreed with the financial institution concerned. In the example of FIG. 9 an authorisation request message is build and transmitted to an acquirer bank (a merchant's bank as indicated by his payment accepting method) . (f) If the authorisation for the payment is granted, the financial institution concerned (in the example of FIG. 9 the acquirer bank) will prepare for settlement of the payment transaction. (g) The financial institution concerned will inform the transaction server whether the payment is authorised, (h) Finally the transaction server informs both parties about the result of the authorisation. These messages may contain a random number, which then is used to modify the party's pseudonym and the keys, identifying the payment methods. This will reduce the possibilities for possible attackers to replay a transaction or to act as impostor.
In FIG. 10 a configuration for telebanking or electronic banking is described. In this case there is only one party, the client of a bank. The party is via an open network, e.g. Internet, connected to the secure transaction server similar as the situation described in FIG. 1. Similarily the client's bank is connected to the server via a closed network.
(60) When the client wants to perform one or more telebanking transactions, he sends a log- in request to the server, signed and protected in the same way as the payment order message (as (c) in FIG. 4) . (61) The server verifies the authenticity of the client and checks if a relation with the specified bank exists and/or the client is allowed to perform a specific transaction. If so, the log-in request is (via the secure closed network) transmitted to the client's bank.
The bank will respond with an Application Form (62) , being a data file, where the client can enter the data concerning the transaction requested. This data file may be in case of Internet an HTML page.
(63) The server signs the Application Form and transfers it to the client .
The client completes the Application Form with the transaction data required (64), applying the same protection and signature mechanisms, as used in the payment order as in (c) in FIG. 4 and sends it to the server.
After inspection of the signed Application Form, the server passes it to the client's bank (65) .
If required, steps (62) till (65) are repeated, until all transactions are transmitted.
Authenticity of the party, the transaction (s) and the irrefutability are thus guaranteed by the secure transaction server.
Referring to FIG. 11, parties may exchange marketing information using the profiles (items 7, 8 in FIG. 1) , where a party S is the sender and a party R is the receiver of the information. The identity of party R is hidden to party S, unless party R decides to directly contact party S to further investigate the information transmitted to party R. According to a step 70, the party S wants to submit a message to one or more parties R, based upon predefined criteria. For this purpose, party S therefore sets a criteria scheme. This scheme indicates on what basis the one or more parties R have to be addressed, and the time duration of the message to be submitted to the one or more parties R (i.e. the time period during which the message is valid and may be sent) . Furthermore, party S defines the message contents. This message may contain a reference to a special offer and/or references to (in case of Internet) a website of party S. According to a step 71, party S then sends the criteria scheme and the message to the server. According to a step 72, the server analyses the criteria scheme and selects those one or more parties R, that meet the criteria scheme. If a duration is specified, the server monitors all transaction occurrences of the one or more parties R, to find out if they will fit into the criteria scheme, due to a change in their continuously updated profile. If a transaction occurrence of a party R is found, meeting the criteria scheme, the message is added to his profile together with a "flag", which is an indicator indicating that the criteria scheme is met. According to a step 73, as soon as an occurrence of a party R contacts the server, e.g. by issuing a payment order, and the "flag" is set, the server informs this party R that a message is present. The party R may decide to read the message or to ignore it. If the party R reads the message, he may react to the contents of the message or neglect it.
A party may want to access a certain service provider, without disclosing his true identity. The service provider, in turn, may or may not want to be sure that the party is entitled to the requested access. FIG. 12 shows how a party can get anonymous access to a service provider. In step (80) the party sends a signed request to the secure transaction server to access a certain service provider. The server verifies the identity of the party and, if required, its right to access a requested service, using the party's profile. If the party is verified positively, the server transmits an access request message to the service provider, using a pseudonym for the party. The service provider now knows that the access request is legitimate, since the request originates from the transaction server and starts a dialogue (82) with the (anonymous) party through the server, which transfers the messages to the party (83) . At the choice of the party, the party might disclose his true identity to the service provider during this dialogue.
EXAMPLES OF THE USE OF THE INVENTION
A consumer wants to buy a book via Internet at an Internet bookseller. He selects the book wanted from the inventory of the bookseller and places an order. The bookseller now prepares a digitally signed invoice message. In this message the bookseller's identity is hidden by the reference to his profile at the transaction server, as is his payment accepting method. As the invoice message arrives at the computer of the consumer, he is prompted with a "pay" request. The consumer now inserts his token in the token reader and selects his method of payment. Next, the program in his computer prepares a payment message to the transaction server. In this message only the data from the invoice message, which are relevant for the payment process, are copied. The identity and selected method of payment are hidden by referring to his profile at the transaction server. The payment message finally is provided with the consumer's digital signature.
The transaction server now can process the payment request in basically three ways. 1. If the payment method selected is a cash payment, the account in the consumer's profile is debited for the amount due, while the account in the bookseller's profile is credited for the same amount. (Note: the cash method is more likely to be used for buying services, like searching a database, or information, like an audio file of the latest top hit) .
2. If the payment method selected is a debit or credit transaction, and the transaction server is entitled by the financial institutions concerned to verify the authenticity of the consumer and the bookseller, then a simple authorisation request message or even a settlement request message will be sent to the corresponding financial institution.
3. If the payment method selected is a debit or credit transaction, and the transaction server is not entitled by the financial institutions concerned to verify the authenticity of the consumer and the bookseller, then an authorisation request message is sent to the corresponding financial institution, which then has to verify the authenticity of the consumer and bookseller, and inform the transaction server about the result of the authorisation. Finally, the transaction server informs the consumer and retailer about the result of the payment order and optionally provides them with a random number, to modify the pointers to their profile data.
The privacy of the payment transaction m the above examples is guaranteed simply by not transmitting privacy sensitive information, but only references to data, already available at the transaction server.
The authentication of the payment transaction and its initiators is done by verifying the digital signatures.
Protection against hacking can be offered by changing the pointer values after each payment transaction, at fixed time intervals or after a given number of transactions.
The software required for implementing the method according to the invention, or one of the features thereof, is recorded on a computer readable medium, such as a floppy disk, a hard disk, a magnetic tape or other suitable media, to make a data processing system execute procedures in accordance with the method or one of the features thereof.

Claims

1. A method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising:
(a) providing a transaction server in the at least one data network ; (b) in the transaction server, registering a profile of the at least one first party and the at least one second party, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the authentication data comprising a table of random data for verifying a digital signature;
(c) the first party issuing at least one transaction message to the second party;
(d) in response to the transaction message, the second party issuing a digitally signed transaction confirmation message to the first party;
(e) on the basis of the transaction confirmation message, the first party issuing a digitally signed transaction approval message to the transaction server;
(f) if required by the first or the second party, the transaction server verifying the authenticity of the first party and the second party, and the transaction data, in response to the transaction approval message;
(g) the transaction server issuing a transaction approval message to the second party, in case said authenticity verification is required only if the verification is positive, resulting in a verified transaction approval message; and (h) fulfilment of the transaction.
2. The method of claim 1, wherein the profile further comprises operation identifiers each identifying an operation which is enabled for the party, and is meaningful only between the party and the transaction server.
3. A method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising:
(a) providing a transaction server in the at least one data network;
(b) in the transaction server, registering a profile of the at least one first party and the at least one second party, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the profile further comprising operation identifiers each identifying an operation which is enabled for the party, and is meaningful only between the party and the transaction server;
(c) the first party issuing at least one transaction message to the second party;
(d) in response to the transaction message, the second party issuing a digitally signed transaction confirmation message to the first party;
(e) on the basis of the transaction confirmation message, the first party issuing a digitally signed transaction approval message to the transaction server;
(f) in response to the transaction approval message, the transaction server verifying the authenticity of the first party and the second party, and the transaction data;
(g) if the verification is positive, the transaction server issuing a verified transaction approval message to the second party; and
(h) fulfilment of the transaction.
4. The method of claim 1 or 3 , wherein the profiles further comprise payment method identifiers identifying authorized methods of payment, the method further comprising before fulfilment of the transaction: (gl) the transaction server requesting an authorisation to at least one financial institution for authorising a payment from the first party to the second party; (g2) in response to the authorisation request, the financial institution informing the transaction server whether the payment is authorised; and
(g3) the transaction server informing the first party and the second party about the result of the authorisation.
5. The method of claim 4, wherein step (b) comprises:
(bl) each party providing payment information to the transaction server about each method of payment to be used in conjunction with the party;
(b2) the transaction server verifying the payment information with at least one financial institution;
(b3) the at least one financial institution providing the transaction server with transaction data necessary for the method of payment to be performed;
(b4) the profiles further comprising the transaction data for each method of payment .
6. The method of claim 1 or 3 , wherein the parties each establish an account held by the transaction server, the method further comprising before fulfilment of the transaction:
(a) for settling a payment from the first party to the second party, the transaction server debiting the account of the first party, and crediting the account of the second party; and (b) the transaction server informing the first party and the second party about the result of the payment.
7. A method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising:
(a) providing a transaction server in the at least one data network; (b) in the transaction server, registering a profile of the at least one first party and the at least one second party, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the authentication data comprising a table of random data for verifying a digital signature;
(c) the first party issuing at least one transaction message to the transaction server;
(d) in response to the transaction message, the transaction server verifying the authenticity of the first party, and the transaction data ;
(e) if the verification is positive, the transaction server issuing a verified transaction message to the second party; and
(f) the second party and the first party performing the at least one transaction through the transaction server by means of digitally signed messages, the validity of which is verified by the transaction server.
8. The method of claim 7, wherein the profile further comprises operation identifiers each identifying an operation which is enabled for the party, and is meaningful only between the party and the transaction server.
9. A method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising:
(a) providing a transaction server in the at least one data network;
(b) in the transaction server, registering a profile of the at least one first party and the at least one second party, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the profile further comprising operation identifiers each identifying an operation that is enabled for the party, and is meaningful only between the party and the transaction server; (c) the first party issuing at least one transaction message to the transaction server; (d) in response to the transaction message, the transaction server verifying the authenticity of the first party, and the transaction data;
(e) if the verification is positive, the transaction server issuing a verified transaction message to the second party; and
(f) the second party and the first party performing the at least one transaction through the transaction server by means of digitally signed messages, the validity of which is verified by the transaction server.
10. A method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising:
(a) providing a transaction server in the at least one data network;
(b) in the transaction server, registering a profile of the at least one first party, the profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the profile further comprising operation identifiers each identifying an operation that is enabled for the party, and is meaningful only between the party and the transaction server; (c) the first party issuing at least one transaction message to the transaction server;
(d) in response to the transaction message, the transaction server verifying the authenticity of the first party, and the transaction data,- (e) if the verification is positive, the transaction server issuing a verified transaction message to the second party; and (f) the second party and the first party performing the at least one transaction through the transaction server.
11. A method for performing at least one transaction between at least one first party and at least one second party using at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party, the method comprising
(a) providing a transaction server m the at least one data network; (b) m the transaction server, registering a profile of the at least one first party and the at least one second party, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the authentication data comprising a table of random data for verifying a digital signature;
(c) the first party issuing at least one digitally signed transaction message to the transaction server ;
(d) in response to the transaction message, the transaction server verifying the authenticity of the first party; (e) if the verification is positive, the transaction server linking the transaction message to the profile of a second party; (f) if the second party connects to the transaction server, the transaction server verifying the authenticity of the second party; and (g) if the verification is positive, the transaction server issuing the transaction message to the second party.
12. The method of claim 11, wherein, if the verification of the authenticity of the second party is positive, the transaction server issues a transaction confirmation message to the first party.
13. The method of claim 1, 3, 7, 9, 10 or 11, wherein the at least one first party and the at least one second party are provided with personalized means for assembling electronic messages, including transaction data associated thereto.
14. The method of claim 13 , wherein for each party the means for assembling electronic messages are personalized by:
(a) the party issuing a personalization message to the transaction server;
(b) on the basis of the personalization message, the transaction server verifying the authenticity of the party; and (c) if the verification is positive, the transaction server issuing a set of data and program to the party
15 The method of claim 14, wherein the personalization message comprises •
- an address of the transaction server,
- the party identifier, and
- an optional password code.
16 The method of any of claims 1-4 and 7-11, wherein the identifiers are randomly selected
17 The method of any of claims 1-4 and 7-11, wherein before the last step the transaction server modifies at least one of the identifiers, and subsequently informs each party concerned about the at least one modified identifier
18 The method of claim 1, 3, 7, 9, 10 or 11, wherein at least one of the first party identifier and the second party identifier comprises a random data string.
19. The method of claim 1, 3, 7, 9, 10 or 11, wherein at least one message from a member of the group comprising the at least one first party and the at least one second party to any of the other members of said group is stored at the transaction server, and transmitted to said any of the other members of said group upon connection of said any of the other members of said group with the transaction server.
20. The method of claim 19, wherein the message is associated with at least one criterion, the method further comprising:
(a) selecting any member of said group matching said at least one criterion, and
(b) issuing said message to said selected member of said group.
21. The method of claim 19, wherein the message is associated with a message validity time period, the method further comprising (a) selecting any member of said group connecting to the transaction server within the message validity time period, and
(b) issuing said message to said selected member of said group.
22. The method of claim 19, wherein the group comprises a financial institution.
23. The method of claim 1, 3, 7, 9, 10 or 11, wherein at least one of the messages is signed by: (a) subjecting message data to a hashing operation, resulting n a hashing code ;
(b) providing a digital signature on the basis of the hashing code ,- and
(c) adding the digital signature to the message.
24. The method of claim 23, wherein the digital signature includes a personal identification.
25. The method of claim 23, wherein the digital signature is generated by:
(a) providing a table of n random numbers, each having a predetermined position in the table,
(b) dividing the hashing code into m digits, each representing a value between 1 and n, where m is smaller than n; and (c) assembling a string of the random numbers of which the position m the table is indicated by the digits.
26. The method of claim 25, wherein the table of random numbers is generated by reading a token.
27. The method of claim 25 or 26, wherein the table of random numbers is generated by optically scanning geometrical configurations of a randomly shaped twodimensional or threedimen- sional mark.
28. A method for signing a message containing data, comprising: (a) subjecting the message data to a hashing operation resulting in a hashing code ;
(b) providing a digital signature on the basis of the hashing code; and (c) adding the digital signature to the message.
29. The method of claim 28, wherein the digital signature is generated by:
(a) providing a table of n random numbers, each having a predeter- mined position in the table;
(b) dividing the hashing code into m digits, each representing a value between 1 and m, where m is smaller than n; and
(c) assembling a string of the random numbers of which the position in the table is indicated by the digits.
30. A method for generating a digital signature over a message, comprising:
(a) providing a table of n random numbers, each having a predetermined position in the table; (b) splitting the message into m digits, each representing a value between 1 and n, where m is smaller than n; and
(c) assembling a string of the random numbers of which the position in the table is indicated by the digits.
31. A data processing system for performing at least one transaction between at least one first party and at least one second party, the system comprising:
(a) at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party;
(b) a transaction server in the at least one data network;
(c) means for registering a profile of the at least one first party and the at least one second party in the transaction server, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the authentication data comprising a table of random data for verifying a digital signature; (d) means for assembling electronic messages by the first party and the second party;
(e) means for issuing at least one transaction message by the first party to the second party; (f) means for issuing a digitally signed transaction confirmation message by the second party to the first party in response to the transaction message;
(g) means for issuing a digitally signed transaction approval message by the first party to the transaction server on the basis of the transaction confirmation message;
(h) means for verifying the authenticity of the first party and the second party, and the transaction data by the transaction server in response to the transaction approval message; (i) means for issuing a verified transaction approval message by the transaction server to the second party, if the verification is positive .
32. The system of claim 31, wherein the profile further comprises operation identifiers each identifying an operation which is enabled for the party, and is meaningful only between the party and the transaction server.
33. A data processing system for performing at least one transaction between at least one first party and at least one second party, the system comprising:
(a) at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party;
(b) a transaction server in the at least one data network; (c) means for registering a profile of the at least one first party and the at least one second party in the transaction server, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the profile further comprising operation identifiers each identifying an operation which is enabled for the party, and is meaningful only between the party and the transaction server; (d) means for assembling electronic messages by the first party and the second party,
(e) means for issuing at least one transaction message by the first party to the second party, (f) means for issuing a digitally signed transaction confirmation message by the second party to the first party m response to the transaction message;
(g) means for issuing a digitally signed transaction approval message by the first party to the transaction server on the basis of the transaction confirmation message;
(h) means for verifying the authenticity of the first party and the second party, and the transaction data by the transaction server in response to the transaction approval message; (l) means for issuing a verified transaction approval message by the transaction server to the second party, if the verification is positive .
34. The system of claim 31 or 33, wherein the profiles further comprise payment method identifiers identifying authorized methods of payment, the system further comprising
(a) means for requesting an authorisation by the transaction server to at least one financial institution for authorising a payment from the first party to the second party;
(b) means for informing the transaction server by the financial institution whether the payment is authorised, m response to the authorisation request; and
(c) means for informing the first party and the second party by the transaction server about the result of the authorisation.
35 The system of claim 34, wherein the profile registering means comprises :
(bl) means for providing payment information by each party to the transaction server about each method of payment to be used m conjunction with the party, (b2) means for verifying the payment information by the transaction server with at least one financial institution; (b3) means for providing the transaction server by the at least one financial institution with transaction data necessary for the method of payment to be performed, wherein the profiles further comprise the transaction data for each method of payment.
36 The system of claim 31 or 33, further comprising:
(a) means for establishing an account held by the transaction server by each party,
(b) means for debiting the account of the first party, and crediting the account of the second party by the transaction server, for settling a payment from the first party to the second party; and
(c) means for informing the first party and the second party by the transaction server about the result of the payment.
37 A data processing system for performing at least one transaction between at least one first party and at least one second party, the system comprising:
(a) at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party;
(b) a transaction server in the at least one data network;
(c) means for registering a profile of the at least one first party and the at least one second party m the transaction server, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the authentication data comprising a table of random data for verifying a digital signature ;
(d) means for assembling electronic messages by the first party and the second party; (e) means for issuing at least one transaction message by the first party to the transaction server,
(f) means for verifying the authenticity of the first party, and the transaction data by the transaction server in response to the transaction message; (g) means for issuing a verified transaction message by the transaction server to the second party, if the verification is positive; (h) means for performing the at least one transaction by the second party and the first party through the transaction server by means of digitally signed messages; and
(i) means for verifying the validity of the digitally signed messages by the transaction server.
38. The system of claim 37, wherein the profile further comprises operation identifiers each identifying an operation which is enabled for the party, and is meaningful only between the party and the transaction server.
39. A data processing system for performing at least one transaction between at least one first party and at least one second party, the system comprising: (a) at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party;
(b) a transaction server in the at least one data network;
(c) means for registering a profile of the at least one first party and the at least one second party in the transaction server, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the profile further comprising operation identifiers each identifying an operation that is enabled for the party, and is meaningful only between the party and the transaction server;
(d) means for assembling electronic messages by the first party and the second party;
(e) means for issuing at least one transaction message by the first party to the transaction server; (f) means for verifying the authenticity of the first party, and the transaction data by the transaction server in response to the transaction message;
(g) means for issuing a verified transaction message by the transaction server to the second party, if the verification is positive; (h) means for performing the at least one transaction by the second party and the first party through the transaction server by means of digitally signed messages; and
(i) means for verifying the validity of the digitally signed messages by the transaction server.
40. A data processing system for performing at least one transaction between at least one first party and at least one second party, the system comprising: (a) at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party;
(b) a transaction server in the at least one data network;
(c) means for registering a profile of the at least one first party in the transaction server, the profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the profile further comprising operation identifiers each identifying an operation that is enabled for the party, and is meaningful only between the party and the transaction server;
(d) means for assembling electronic messages by the first party and the second party;
(e) means for issuing at least one transaction message by the first party to the transaction server,- (f) means for verifying the authenticity of the first party, and the transaction data by the transaction server in response to the transaction message;
(g) means for issuing a verified transaction message by the transaction server to the second party, if the verification is positive; and
(h) means for performing the at least one transaction by the second party and the first party through the transaction server.
41. A data processing system for performing at least one transaction between at least one first party and at least one second party, the system comprising: (a) at least one data network for interconnecting data input/output devices of the at least one first party and the at least one second party,
(b) a transaction server m the at least one data network, (c) means for registering a profile of the at least one first party and the at least one second party m the transaction server, each profile comprising a party identifier identifying the party, and authentication data for authenticating the party and data sent by the party, the authentication data comprising a table of random data for verifying a digital signature;
(d) means for assembling electronic messages by the first party and the second party;
(e) means for issuing at least one digitally signed transaction message by the first party to the transaction server; (f) means for verifying the authenticity of the first party by the transaction server in response to the transaction message; (g) means for linking the transaction message by the transaction server to the profile of a second party, if the verification is positive; (h) means for verifying the authenticity of the second party by the transaction server, if the second party connects to the transaction server; and
(l) means for issuing the transaction message by the transaction server to the second party, if the verification is positive.
42. The system of claim 41, further comprising means for issuing a transaction confirmation message by the transaction server to the first party, if the verification of the authenticity of the second party is positive.
43. The system of any of claims 31-34 and 37-41, comprising means for randomly selecting the identifiers
44. The system of any of claims 31-34 and 37-41, further comprising.
(a) means for modifying at least one of the identifiers by the transaction server, and (b) means for informing each party concerned about the at least one modified identifier.
45. The system of claim 31, 33, 37, 39, 40 or 41, wherein at least one of the first party identifier and the second party identifier comprises a random data string.
46. The system of claim 31, 33, 37, 39, 40 or 41, wherein the transaction server comprises a server message section for storing at least one message from a member of the group consisting of the at least one first party and the at least one second party to any of the other members of said group.
47. The system of claim 46, wherein the public data network has a network message section stored on it, and the message contains a link to said network message section.
48. The system of claim 46, wherein the message is associated with at least one criterion, the system further comprising: (a) means for selecting any member of said group matching said at least one criterion,- and
(b) means for issuing said message to said selected member of said group .
49. The system of claim 46, wherein the message is associated with a message validity time period, the system further comprising:
(a) means for selecting any member of said group connecting to the transaction server within the message validity time period; and
(b) means for issuing said message to said selected member of said grou .
50. The system of claim 31, 33, 37, 39, 40 or 41, wherein the means for assembling electronic messages comprise:
(a) means for issuing a personalization message by the first party and the second party to the transaction server; (b) means for verifying the authenticity of the first party and the second party by the transaction server on the basis of the personalization message from the first party and the second party,-
(c) means for issuing a set of data and program by the transaction server to the first party and the second party.
51. The system of claim 31, 33, 37, 39, 40 or 41, comprising means for signing at least one message by:
(a) subjecting message data to a hashing operation, resulting in a hashing code;
(b) providing a digital signature on the basis of the hashing code; and
(c) adding the digital signature to the message.
52. The system of claim 51, comprising means for generating the digital signature by:
(a) providing a table of n random numbers, each having a predetermined position in the table,-
(b) dividing the hashing code into m digits, each representing a value between 1 and n, where m is smaller than n; and
(c) assembling a string of the random numbers of which the position in the table is indicated by the digits.
53. The system of claim 52, comprising a token and a token reader for generating the table of random numbers.
54. The system of claim 53, wherein the token is an object provided with an optically scannable randomly shaped twodimensional of threedimensional mark.
55. A data processing system for signing an message containing data, comprising:
(a) means for subjecting the message data to a hashing operation resulting in a hashing code; (b) means for providing a digital signature on the basis of the hashing code ; and (c) means for adding the digital signature to the message.
56. The system of claim 55, comprising means for generating the digital signature having:
(a) means for providing a table of n random numbers, each having a predetermined position in the table;
(b) means for dividing the hashing code into m digits, each representing a value between 1 and m, where m is smaller than n,- and
(c) means for assembling a string of the random numbers of which the position in the table is indicated by the digits.
57. A data processing system for generating the digital signature, comprising:
(a) means for providing a table of n random numbers, each having a predetermined position in the table; (b) means for dividing the hashing code into m digits, each representing a value between 1 and m, where m is smaller than n; and (c) means for assembling a string of the random numbers of which the position in the table is indicated by the digits.
58. A computer program product comprising at least one computer readable medium, having thereon computer program code means, when said program is loaded, to make a data processing system execute procedure according to claim 1, 3, 7, 9, 10 or 11.
59. A computer program element comprising computer program code means to make a data processing system execute procedure according to claim 1, 3, 7, 9, 10 or 11.
60. The computer program element of claim 59, embodied on a computer readable medium.
61. A computer readable medium having a program recorded thereon, where the program is to make a data processing system execute procedure according to claim 1, 3, 7, 9, 10 or 11.
PCT/NL2000/000278 1999-04-28 2000-04-28 Transaction method and system for data networks WO2000067143A2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP00925732A EP1219088A2 (en) 1999-04-28 2000-04-28 Transaction method and system for data networks
JP2000615914A JP2002543523A (en) 1999-04-28 2000-04-28 Transaction method and system for a data network such as the Internet
CA002371168A CA2371168A1 (en) 1999-04-28 2000-04-28 Transaction method and system for data networks, like internet
AU44375/00A AU761974B2 (en) 1999-04-28 2000-04-28 Transaction method and system for data networks, like internet

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
EP99201334.2 1999-04-28
EP99201334 1999-04-28
US54360200A 2000-04-05 2000-04-05
US09/543,602 2000-04-05

Publications (2)

Publication Number Publication Date
WO2000067143A2 true WO2000067143A2 (en) 2000-11-09
WO2000067143A3 WO2000067143A3 (en) 2001-04-26

Family

ID=26153311

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NL2000/000278 WO2000067143A2 (en) 1999-04-28 2000-04-28 Transaction method and system for data networks

Country Status (5)

Country Link
EP (1) EP1219088A2 (en)
JP (1) JP2002543523A (en)
AU (1) AU761974B2 (en)
CA (1) CA2371168A1 (en)
WO (1) WO2000067143A2 (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002031712A1 (en) * 2000-10-09 2002-04-18 A & Mt Projects Pty Limited Wireless transactions
WO2002042935A2 (en) 2000-11-21 2002-05-30 International Business Machines Corporation Anonymous access to a service
EP1316168A1 (en) * 2000-08-04 2003-06-04 First Data Corporation Method and system for using electronic communications for an electronic contact
WO2005052822A1 (en) * 2003-11-26 2005-06-09 A & Mt Projects Pty Limited Closed loop wireless transactions
EP1546957A2 (en) * 2002-09-10 2005-06-29 Visa International Service Association Data authentication and provisioning method and system
EP1550066A2 (en) * 2002-10-10 2005-07-06 Intercomputer Corporation Secure electronic payment messaging system with reconcilable finality
WO2006121322A1 (en) * 2005-05-10 2006-11-16 Dts Ltd. Transaction method and verification method
US7424616B1 (en) * 1999-09-10 2008-09-09 Identrus System and method for facilitating access by sellers to certificate-related and other services
FR2924880A1 (en) * 2007-12-07 2009-06-12 France Telecom METHOD AND SYSTEM FOR TRANSFERRING OBJECTS
US7734924B2 (en) 2000-09-08 2010-06-08 Identrust, Inc. System and method for transparently providing certificate validation and other services within an electronic transaction
CN102449652A (en) * 2009-06-04 2012-05-09 聚积公司 A method for secure transactions
WO2013156076A1 (en) * 2012-04-20 2013-10-24 Payfair International Gmbh Transfer connector
WO2015022553A1 (en) * 2013-08-16 2015-02-19 Arm Ip Limited Reconciling electronic transactions
US9684889B2 (en) 1999-02-12 2017-06-20 Identrust, Inc. System and method for providing certification-related and other services
US9769134B2 (en) 2002-04-17 2017-09-19 Visa International Service Association Mobile account authentication service
US9864993B2 (en) 2000-04-24 2018-01-09 Visa International Service Association Account authentication service with chip card
EP3229099B1 (en) 2003-06-13 2018-08-29 Ward Participations B.V. Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
US11063766B2 (en) 2003-06-13 2021-07-13 Ward Participations B.V. Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001290725A1 (en) 2000-09-08 2002-04-22 Paul Donfried System and method for providing authorization and other services
US20160342989A1 (en) * 2015-05-21 2016-11-24 Mastercard International Incorporated Method and system for processing blockchain-based transactions on existing payment networks
US10963881B2 (en) * 2015-05-21 2021-03-30 Mastercard International Incorporated Method and system for fraud control of blockchain-based transactions

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5684950A (en) * 1996-09-23 1997-11-04 Lockheed Martin Corporation Method and system for authenticating users to multiple computer servers via a single sign-on
US5706427A (en) * 1995-09-08 1998-01-06 Cadix Inc. Authentication method for networks
WO1999000958A1 (en) * 1997-06-26 1999-01-07 British Telecommunications Plc Data communications

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS59200363A (en) * 1983-04-27 1984-11-13 Hitachi Ltd Pass word certifying system
JPH0827812B2 (en) * 1986-04-28 1996-03-21 株式会社日立製作所 Electronic trading method
EP0483424A1 (en) * 1990-10-30 1992-05-06 International Business Machines Corporation Key hashing in data processors
JPH08123759A (en) * 1994-10-27 1996-05-17 Oki Electric Ind Co Ltd Secret protection system based upon data exchange using random numbers
JP3361661B2 (en) * 1995-09-08 2003-01-07 株式会社キャディックス Authentication method on the network
JPH0981520A (en) * 1995-09-08 1997-03-28 Kiyadeitsukusu:Kk Collation server used for authentication on network
JPH09204480A (en) * 1996-01-26 1997-08-05 Hitachi Ltd Transaction place management method in finance transaction system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5706427A (en) * 1995-09-08 1998-01-06 Cadix Inc. Authentication method for networks
US5684950A (en) * 1996-09-23 1997-11-04 Lockheed Martin Corporation Method and system for authenticating users to multiple computer servers via a single sign-on
WO1999000958A1 (en) * 1997-06-26 1999-01-07 British Telecommunications Plc Data communications

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9684889B2 (en) 1999-02-12 2017-06-20 Identrust, Inc. System and method for providing certification-related and other services
US7424616B1 (en) * 1999-09-10 2008-09-09 Identrus System and method for facilitating access by sellers to certificate-related and other services
US10572875B2 (en) 2000-04-24 2020-02-25 Visa International Service Association Online account authentication service
US9864993B2 (en) 2000-04-24 2018-01-09 Visa International Service Association Account authentication service with chip card
US7784106B2 (en) 2000-08-04 2010-08-24 First Data Corporation Manufacturing unique devices that generate digital signatures
EP1316168A1 (en) * 2000-08-04 2003-06-04 First Data Corporation Method and system for using electronic communications for an electronic contact
EP1316168A4 (en) * 2000-08-04 2006-05-10 First Data Corp Method and system for using electronic communications for an electronic contact
US7734924B2 (en) 2000-09-08 2010-06-08 Identrust, Inc. System and method for transparently providing certificate validation and other services within an electronic transaction
WO2002031712A1 (en) * 2000-10-09 2002-04-18 A & Mt Projects Pty Limited Wireless transactions
WO2002042935A2 (en) 2000-11-21 2002-05-30 International Business Machines Corporation Anonymous access to a service
EP1336285A2 (en) * 2000-11-21 2003-08-20 International Business Machines Corporation Anonymous access to a service
US9769134B2 (en) 2002-04-17 2017-09-19 Visa International Service Association Mobile account authentication service
US10672215B2 (en) 2002-09-10 2020-06-02 Visa International Service Association Data authentication and provisioning method and system
SG152061A1 (en) * 2002-09-10 2009-05-29 Visa Int Service Ass Data authentication and provisioning method and system
EP1546957A2 (en) * 2002-09-10 2005-06-29 Visa International Service Association Data authentication and provisioning method and system
US10679453B2 (en) 2002-09-10 2020-06-09 Visa International Service Association Data authentication and provisioning method and system
EP1546957A4 (en) * 2002-09-10 2006-03-29 Visa Int Service Ass Data authentication and provisioning method and system
EP1550066A4 (en) * 2002-10-10 2006-09-13 Intercomp Corp Secure electronic payment messaging system with reconcilable finality
US8380622B2 (en) 2002-10-10 2013-02-19 Intercomputer Corporation Secure electronic payment messaging system with reconcilable finality
EP1550066A2 (en) * 2002-10-10 2005-07-06 Intercomputer Corporation Secure electronic payment messaging system with reconcilable finality
US20200044865A1 (en) * 2003-06-13 2020-02-06 Ward Participations B.V. Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
EP3229099B1 (en) 2003-06-13 2018-08-29 Ward Participations B.V. Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
EP1634140B1 (en) 2003-06-13 2019-01-16 Ward Participations B.V. Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
US10992480B2 (en) 2003-06-13 2021-04-27 Ward Participations B.V. Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
US11063766B2 (en) 2003-06-13 2021-07-13 Ward Participations B.V. Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
WO2005052822A1 (en) * 2003-11-26 2005-06-09 A & Mt Projects Pty Limited Closed loop wireless transactions
WO2006121322A1 (en) * 2005-05-10 2006-11-16 Dts Ltd. Transaction method and verification method
WO2009077705A1 (en) * 2007-12-07 2009-06-25 France Telecom Method and system for transferring objects
FR2924880A1 (en) * 2007-12-07 2009-06-12 France Telecom METHOD AND SYSTEM FOR TRANSFERRING OBJECTS
CN102449652A (en) * 2009-06-04 2012-05-09 聚积公司 A method for secure transactions
WO2013156076A1 (en) * 2012-04-20 2013-10-24 Payfair International Gmbh Transfer connector
WO2015022553A1 (en) * 2013-08-16 2015-02-19 Arm Ip Limited Reconciling electronic transactions
US10657523B2 (en) 2013-08-16 2020-05-19 Arm Ip Limited Reconciling electronic transactions

Also Published As

Publication number Publication date
WO2000067143A3 (en) 2001-04-26
JP2002543523A (en) 2002-12-17
EP1219088A2 (en) 2002-07-03
AU4437500A (en) 2000-11-17
AU761974B2 (en) 2003-06-12
CA2371168A1 (en) 2000-11-09

Similar Documents

Publication Publication Date Title
US6889325B1 (en) Transaction method and system for data networks, like internet
AU761974B2 (en) Transaction method and system for data networks, like internet
RU2438172C2 (en) Method and system for performing two-factor authentication in mail order and telephone order transactions
US8924310B2 (en) Methods and apparatus for conducting electronic transactions
CA2753375C (en) Methods and apparatus for conducting electronic transactions
US7734527B2 (en) Method and apparatus for making secure electronic payments
US5883810A (en) Electronic online commerce card with transactionproxy number for online transactions
US20010034725A1 (en) Electronic payment system and method using anonymous representative payment means
US20040254848A1 (en) Transaction system
US20070185781A1 (en) Method for anonymous purchase of goods by providing a plurality of account numbers
US20050027617A1 (en) Third party privacy system
EP1421732B1 (en) Transaction system
WO2003003155A2 (en) Consolidated payment account system and method
KR20100032935A (en) Online payer authentication service
JP2003531447A (en) Methods and systems for virtual safety
CN111819825B (en) Method for providing data security using one-way tokens
Tan E-payment: The digital exchange
KR100458526B1 (en) System and Method for the wire·wireless complex electronic payment
KR100405628B1 (en) Electronic Commercial Transaction Methodd Using Storage Means
EP1744518A2 (en) Transaction system
Peters Emerging ecommerce credit and debit card protocols
Uchil Digital Marketing using Transaction Security Application
Daoud Security Issues in the Open Electronic Marketplace
CA2304338A1 (en) Method and system for providing debit card services over a credit card infrastructure

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

ENP Entry into the national phase in:

Ref country code: CA

Ref document number: 2371168

Kind code of ref document: A

Format of ref document f/p: F

Ref document number: 2371168

Country of ref document: CA

ENP Entry into the national phase in:

Ref country code: JP

Ref document number: 2000 615914

Kind code of ref document: A

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 2000925732

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2000925732

Country of ref document: EP