WO2015090393A1 - Method to achieve secure data exchanges - Google Patents

Method to achieve secure data exchanges Download PDF

Info

Publication number
WO2015090393A1
WO2015090393A1 PCT/EP2013/077280 EP2013077280W WO2015090393A1 WO 2015090393 A1 WO2015090393 A1 WO 2015090393A1 EP 2013077280 W EP2013077280 W EP 2013077280W WO 2015090393 A1 WO2015090393 A1 WO 2015090393A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
method described
internet
payments
payment
Prior art date
Application number
PCT/EP2013/077280
Other languages
French (fr)
Inventor
Sotirios Melioumis
Original Assignee
Sotirios Melioumis
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sotirios Melioumis filed Critical Sotirios Melioumis
Priority to PCT/EP2013/077280 priority Critical patent/WO2015090393A1/en
Publication of WO2015090393A1 publication Critical patent/WO2015090393A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction

Definitions

  • the current invention relates to Financial Transactions, Mobile Payments, Micro-payments, Virtual credit cards, Environment to Internet affiliate Marketing, Indoors and Outdoors Marketing, Security Access and Security Check Points, Information-based Networking, Data Communications, Loyalty Schemes, Lottery Schemes, Auctions, Wireless devices and contactless or Interactive Data-Carrying encrypted format technologies, Supply Chain Stage Monitoring and Billing.
  • affiliate Marketing e.g., affiliate Marketing, Outdoors Advertising, Un-powered technologies (i.e. QR, NFC, etc.), Billing, Payment Systems including Direct Debit, Mobile Payments, Internet security and Supply Chains.
  • Un-powered technologies i.e. QR, NFC, etc.
  • Billing i.e., Billing, Payment Systems including Direct Debit, Mobile Payments, Internet security and Supply Chains.
  • affiliate marketing is a type of performance-based marketing in which a business rewards one or more affiliates for each visitor or customer brought by the affiliate's own marketing efforts.
  • the industry has four core players: the merchant (also known as 'retailer' or 'brand'), the network (that contains offers for the affiliate to choose from and also takes care of the payments), the publisher (also known as 'the affiliate'), and the customer.
  • the market has grown in complexity, resulting in the emergence of a secondary tier of players, including affiliate management agencies, super-affiliates and specialized third party vendors.
  • affiliates continue to play a significant role in every company's e-marketing strategies.
  • affiliate marketing has grown quickly since its inception.
  • the e-commerce website viewed as a marketing toy in the early days of the Internet, became an integrated part of the overall business plan and in some cases grew to a bigger business than the existing offline business.
  • affiliates worldwide earned billions in bounty and commissions from a variety of sources in retail, personal finance, gaming and gambling, travel, telecom, education, publishing, and forms of lead generation other than contextual
  • Outdoor advertising is made up of more than 100 different formats. Outdoor advertising is essentially any type of advertising that reaches the consumer while he or she is outside the home. This medium fiffers from broadcast, print, and Internet advertising because it is focused on marketing to consumers when they are "on the go" in public places, in transit, waiting (such as in a medical office), and/or in specific commercial locations (such as in a retail venue). Outdoor advertising formats fall into four main categories: billboards, street furniture, transit, and alternative.
  • a private property owner wants to sell advertising space to one of the outdoor advertising companies ('media sellers') he or she directly approaches the company.
  • a media seller may also approach the owner of an interesting property and make a bid.
  • the private property owner is generally paid an annual land rent.
  • the media seller erects a structure for displaying the ads and rents out the space to the clients.
  • QR code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode (or two- dimensional barcode) first designed for the automotive industry in Japan.
  • the information encoded by a QR code may be made up of four standardized types ("modes") of data (numeric, alphanumeric, byte / binary, kanji) or, through supported extensions, virtually any type of data.
  • QR codes have become common in consumer advertising.
  • a smartphone is used as a QR-code scanner, displaying the code and converting it to some useful form (such as a standard URL for a website, whereby avoiding the need for a user to type it into a web browser).
  • some useful form such as a standard URL for a website, whereby avoiding the need for a user to type it into a web browser.
  • QR codes have become a focus of advertising strategy, since it provides quick and effortless access to the brand's website.
  • this capability increases the conversion rate (that is, increases the chance that contact with the advertisement will convert to a sale), by coaxing qualified prospects further down the conversion funnei without any delay or effort, bringing the viewer to the advertiser's site immediately, where a longer and more targeted sales pitch may continue.
  • NFC Near field communication
  • smartphones are set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity, usually no more than a few inches.
  • Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi- Fi.
  • Communication is also possible between an NFC device and an unpowered NFC chip, called a "tag”.
  • NFC devices can be used in contactless payment systems, similar to those currently used in credit cards and electronic ticket smartcards, and allow mobile payment to replace or supplement these systems.
  • Google Wallet allows consumers to store credit card and store loyalty card information in a virtual wallet and then use an NFC-enabled device at terminals that also accept MasterCard
  • NFC stickers based payments in Australia's Bankmecu and card issuer Cuscal have completed an NFC payment sticker trial, enabling consumers to make contactless payments at Visa payWave terminals using a smart sticker stuck to their phone.
  • India is implementing NFC based transactions in box offices for ticketing purposes.
  • An invoice or bill is a commercial document issued by a seller to a buyer, indicating the products, quantities, and agreed prices for products or services the seller has provided the buyer.
  • An invoice indicates the sale transaction only.
  • the payment system is an operational network - governed by laws, rules and standards - that links bank accounts and provides the functionality for monetary exchange using bank deposits.
  • the payment system is the infrastructure (consisting of institutions, instruments, rules, procedures, standards,and technical means) established in effect the transfer of monetary value between parties discharging mutual obligations. Its technical efficiency determines the efficiency with which transaction money is used in the economy, and risk associated with its use.
  • Direct debit or direct withdrawal is a financial transaction in which one person withdraws funds from another person's bank account. After the authorities are set up (the payer must have advised the bank that he or she has authorized the payee to directly draw the funds), the direct debit transactions are usually processed electronically. Direct debits are typically used for recurring payments, such as credit card and utility bills, where the payment amounts vary from one payment to another.
  • Mobile payments also referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation and performed from or via a mobile device. Instead of paying with cash, check, or credit cards, a consumer can use a mobile phone to pay for a wide range of services and digital or hard goods.
  • a mobile phone instead of paying with cash, check, or credit cards, a consumer can use a mobile phone to pay for a wide range of services and digital or hard goods.
  • This invention relates as mentioned above to Financial Transactions, Mobile Payments, Micro-payments, Virtual credit cards, Environment to Internet affiliate Marketing, Indoors and Outdoors marketing, Security Access and Security Check Points, Information-based Networking, Data Communications, Loyalty Schemes, Lottery Schemes, Auctions, Wireless devices and contactless or Interactive Data-Carrying encrypted-format technologies, Supply Chain Stage Monitoring and Billing but it can expand to include any type of process in which an object can be presented in digital or virtual formats i.e. gift card.
  • the invention in order to a. address the need for a commission based remuneration for the advertisement space owner and b. transform physical, virtual (augmented reality) or digital objects into interaction points with the consumers, removing this way the limitations of the existing practices and c. provide the marketing and advertising industries with new ways to utilise information flow towards the consumer, it was structured as a method and as a cloud based platform through which a contactless technology based "trigger" may initiate the transfer of data through the consumer's mobile device connected to the internet.
  • the end to end process in this case has the following characteristics:
  • the triggers need not be of specific type (read specifically build)
  • Remuneration of the advertising space owner can take any of the known forms, rent, pay per click (interaction in this instance), pay per sale, pay per mille, pay per lead etc. or a combination of the above
  • the triggers need not be of specific type (read specifically build)
  • the consumer is not required to be a registered member of the service
  • the invention in order to address the practical needs of the many in developing countries, and offer a solution to the five (a. to e.) above mentioned limitations in the "unbanked” and “underbanked” countries, was structured as a method and as a cloud based platform through which one may initiate the transfer of data needed to complete a transaction, using only one mobile device connected to the internet.
  • the end to end process has the following characteristics:
  • the triggers need not be of specific type (read specifically build)
  • the method is utilised for any other purpose where the end step includes a payment for example, lottery set ups, non-internet based auction set ups, POS rapid or emergency deployments, of the poster ticket sales, downloading video or music etc.
  • the system provides to user A details for programming or printing the "triggers" or they are
  • the User A places subsequently these "triggers" in strategic positions for example at the back of his mobile device or embeds them on printed materials or any virtual or digital files
  • User B (the consumer) uses these "trigger" in the presence or absence of user A and without the need of the user A participation to connect to the cloud based remote server
  • the server recognises the "trigger's" owner and initiates a multiple-choice internet based dialogue with User B
  • User(s) A in the case of affiliate Marketing there are three participants
  • User B receive confirmation of the transaction in real time on their mobile devices be means of an SMS message or email
  • User B chooses another option, except paying, he is automatically redirected to another user interface where he is given additional options like, for example, watching a video advertisement, the video of a property, the terms and conditions of a lottery, the product of an auction he wants to participate, download a company presentation, create a social link through Linkedlnith User A, accept an invitation for a lecture or a party, accept a voucher, buy a ticket etc.
  • Drawing 1 describes the high level end to end process of the method
  • Drawing 2 describes the actions of User B in the initial stage whereby a tagged object is directing him to the server and the choices offered to him. I call this step "from the physical world to the internet”.
  • Drawing 3 describes two of the options offered to User B. One that allows him to create a personal or a business link with User A and another that allows him to view/review or download marketing materials
  • Drawing 4 describes three additional choices of User B namely - Review and accept an invitation, Review and accept a voucher, Review and buy a ticket.
  • Drawing 5 describes two additional User B choices of which one is to pay User A and the second is to pay for a piece of media.
  • Drawing 6 describes User A choices namely Change my details; Create an invitation, a ticket, a voucher; Edit my invitation, my ticket, my voucher; Create a trigger; Pay a person or a company.
  • Drawing 7 describes the detailed process that User A should undergo in order to change his details
  • Drawing 7a describes the process by which an invitation, a ticket or a voucher are redeemed
  • Drawing 8 describes the process by which User A can create a voucher, an invitation or a ticket
  • Drawing 9 describes the process by which User A can pay( transfer money) another person or a company
  • Drawing 10 describes the process by which User A can manage invitations , tickets and vouchers that he created or order a new trigger(tag)
  • Drawing 11 describes an advanced option of redeeming invitation/ticket by the use of a third party (User C), who is acting on behalf of User A
  • Drawing 12 describes the "environment to the internet” commission based affiliate marketing remuneration method.
  • Drawing 13 describes the possible use of the method for security and emergency purposes.
  • Drawing 14 describes the use of the method as a means for a paperless supply chain process.
  • Drawing 15 describes the use of the method as the underlying mechanism for loyalty schemes.
  • Drawing 16 describes the use of the method for auctions or Dutch type auctions.
  • Drawing 17 describes the use of the method as an underlying mechanism for secure access to physical or virtual sensitive areas.
  • Drawing 18 describes the use of the method for the deployment of lottery schemes.
  • the essence of this invention is to achieve secure data exchanges between two points A and B where A resides in the physical world or its projections (augmented reality) and B within the worldwide web by the means of interaction between contactless technology based tags or their virtual representations and mobile devices connected to the internet.
  • These secure data exchanges can be used for informational exchanges (networking), marketing, environment to internet (E2In) commission based (Pay per Click, Pay per Lead, Pay per Sale etc.) affiliate marketing , security (i.e. check points), supply chains (i.e. a paperless point of transfer monitoring and end point payment process), loyalty schemes (i.e. instead of loyalty cards), lottery set ups (i.e. by charities), auctions (i.e. price falling Dutch type auctions), financial exchanges in the form of transactions including micro- payments in either environment to Internet or Internet to Internet set ups.
  • E2In environment to internet
  • commission based Pay per Click, Pay per Lead, Pay per Sale etc.
  • affiliate marketing i.e. check points
  • supply chains i.e. a paperless point of transfer monitoring and end point payment process
  • loyalty schemes i.e. instead of loyalty cards
  • lottery set ups i.e. by charities
  • auctions i.e. price falling Dutch type auctions
  • financial exchanges in the form of transactions including micro
  • User B is directed to a payment gateway where he completes the action. On completion [800] both user A and User B receive confirmation of the payment made in a form of an email or SMS message. If choice of User B was to accept data - on completion of the transmission of the data he is given the option to choose another action[400] or exit[1000].
  • Drawing 2 describes in detail the options given to User B [300] after interacting with one of the above mentioned contactless technologies or virtual elements which can be embodied in the form of
  • drawing 3 If drawings 1&2 can be assumed as the first and second levels of the description hierarchy then drawing 3 describes the next level down and two of the many choices of User B.
  • a script [411] (depending on the information contained in the tag based on User A predefined choices) redirects User B [412] to User A's social profile, where he can request from User A to accept the link.
  • User B is given the option [414] to return to multiple choices page [400] or to exit.
  • a script recognises the embedded in the tag code and redirect User B to a predefined by User A webpage.
  • a second script triggers the start of a piece of media (animation, video, presentation, etc.) and gives the option to User B [453] to download it. Subsequently User B may choose to return to [400] or exit.
  • tags can be used instead of a business card utilising services like Linkedln, Facebook or Google+ and eliminatie this way the inherited deficiencies of the business card as a method of storing data.
  • the tagged object can be used for electronic distribution of marketing materials on the international fairs and exhibitions eliminating the need for printed materials.
  • User B's records are updated to reflect his acceptance[425] if he is a registered user or if he is not registered user the service gives him an option to download it or to receive it by email[226].
  • a script recalls the ticket from the database[441] which User B can review[442].
  • User B is redirected [444] to a payment gateway to complete the process.
  • User A [445] and User B[446] receive SMS or email with details of the transaction.
  • User B subsequently is redirected to [424] where depending of his status( being registered user or not) he follows the path described above.
  • Examples of practical applications of this two options are:in regards to ticketing - Digimarc- watermarked street event-advertising-poster that allows consumers to buy tickets; in regards to vouchers - semitransparent shop window sticker that allow the shop owner to offer passer-by consumer shopping vouchers; and in regards to invitation - audiotagged digital broadcast of a song that allows the distribution of invitations for an open air fundraising concert on behalf of the charity.
  • Drawing 5 describes two additional options of User B [480] and [490].
  • a script[492] recalculates a final amount payable taking into consideration existence of the voucher (or not) and updates the records in the database for reporting purposes.
  • a script marks the voucher as used (invalidates it).
  • User B is redirected by a script [493] to the payment gateway where he completes the payment process.
  • User A and User B are receiving by email or SMS confirmation of the transaction successfully completed[495][496] respectively.
  • Pay &View digital elements advertising- poster or banner in the train containing the QR code that passengers can scan to access a media- streaming library for movies and songs.
  • Drawing 6 describes the options given to User A by the service[1100]. This are [1110]a choice to alter his details and preferences, [1120] to create invitation or a ticket, [1130] to create a voucher, [1140] and [1150] to edit any of the last three elements,[1180] to create a trigger,[1190] pay or transfer money to a person or a company. Additional options can be added on demand without limitations either on demand or based on customised choices menus.
  • Drawing 7 describes the process by which User A can modify his details and preferences through a form [1111] which can be reviewed and approved [1112] and cause a records update [1113].
  • Drawing 7a describes the process by which User A can redeem already distributed invitation, ticket or voucher by: User A [1201] interacting with it [1202] landing in the server reviewing and redeeming by clicking on it and [1203]by a script deleting it from User A's list.
  • a real life scenario may be the case when a consumer presents a ticket he purchased in advance and stored on his mobile to the porter of a movie theatre acting as a representative of a User A.
  • the porter by scanning the embedded on the ticket QR code lands in the server where his is given the ability to check its validity and redeem it.
  • Drawing 8 describes the process by which User A can create a voucher, an invitation or a ticket. I this case User A visit the site [1100] and enter his credentials if needed. In all cases [1120], [1130] User A is offered [1121] a form which may include the description of the event for which all this elements are created, and he is allowed to upload the necessary materials. On completion of this process User A is given the option [1122 ] to review the materials created before he approves them an action which will result[1123] in the system,storing them in his personal dedicated storage space.
  • FIG. 9 describes how such a process can be fulfilled when the person or the company that transfers the money is a registered user of the Service .
  • the steps needed are following: [1191] User A is presented with the payform where he chooses the currency and the amount he wants to transfer as well as the details of the person (User B) that the money is directed to. On submission of this form User A is redirected [1192] to the payment gateway where he complete the process. There is the option for this redirection process to be transparent for User A provided that the participating gateway allows for this part of the process to be integrated within the service. Subsequently both User A and User B receive SMS or email with details of the transaction. Post this step User A may choose to exit or return to the options page described in Drawing 6.
  • User A can review through a dedicated list [1141] all active invitations or tickets issued and can decide if he chooses to[1142] modify or delete any of the unused invitations or tickets.
  • User A can review through a dedicated list [1151] all active vouchers issued and can decide if he chooses to[1152] modify or delete any of the unused vouchers.
  • Drawing 11 describes an advanced option of redeeming invitation/ticket purchased by User B who is registered user of the Service by a third party (User C) who is acting on behalf of User A.
  • the process entails User C scanning Users B's trigger [1210], User C lands [400] in the cloud server where he is offered choices.
  • the Service [441] through the script request and receives geolocation of User Cs mobile.
  • a second script checks a list of active invitations or tickets belonging to User B and provided the time and place correspond render the colour of the button [1202] green.
  • User C subsequently presses the green now button to redeem the invitation or ticket.
  • the system updates the records and invalidates the ticket or invitation.
  • the option is suitable for application in any event-involving-real-life-scenario.
  • Drawing 12 describes the "environment to the internet" commission based affiliate marketing remuneration method.
  • User A(the advertiser)[1300] and User B(the publisher) [1310] need to be registered with the Service.
  • the Service in this instance takes the form of an affiliate network.
  • the process starts[1320] with User A requesting from the Service an authorisation to run marketing campaign (which can be approved or rejected), if approved - declaring his desired budget.
  • An internal or external creative organisation [1330] designs the campaign and places it details in the affiliate network virtual announcement board inviting publishers to participate (detailed description of how it happening is omitted deliberately because it is established practice and possibly patented already).
  • a script acting in the background ⁇ 1382] redirects User C to the affiliate network.
  • a second script 1383] acting as well in the background redirects User C to either User A external site Or to a hosted area within the Service dedicated to User A.
  • another script within the affiliate network [390] distributes the pre-agreed rewords between the Service and itself.
  • Drawing 13 describes the possible use of the method for security and emergency purposes.
  • the process starts with User A entering the service [1400], creating predefined number of tags and advising the system about geolocation of each one of them.
  • User A places the tags and tests the geolocation accuracy using his mobile device.
  • User B patrols or comes in proximity with the site [1420] where the tag is located and interacts with the tag.
  • User B is transferred [1430] to the Service site where he or an automated script logs the interaction [1440] and time-stamps it.
  • the service site allows UserB to initiate an alarm and define the nature of it .
  • a script remotely activates alarms controlled by WiFi, or by mobile network or satellite based infrastructure, while simultaneously alerts security organisations.
  • a predefined cycle [1470] which can be the duration of a shift or any other time scale the service generates a report which can be retrieved by User A.
  • Drawing 14 describes the use of the method as a means for a paperless supply chain process. This is initiated by User A(the entity responsible for the end to end delivery or an agent of a collaborating company) entering the Service and creating a tag(s) for an object for which he additionally input the sender and recipient details [1500].
  • a script creates and stores the accompanying documents and invoices in a database.
  • User A attaches the tag [1510] to the object and despatches it using any postal or courier services.
  • User C interacts with the tag using his mobile device [1520] and enters the Service where he records the stage's completion, at the same time the Service records geolocation of User C.
  • the sender and the recipient can enter the Service and monitor the progress [1530] using the unique tag ID generated at stage [1500] (the ID has been emailed to every of them [1501]).
  • the recipient interacts of the tag [1540] and access the shipment documents and invoice.
  • the recipient acting as User B in [443] pays the sender or inputs the voucher code if an advance payment was made.
  • the Service deducts from sender an amount of money and pays User A and itself [1560].
  • a practical example of the service would be a shipment of a tagged object from China to Europe without the need of any accompanying documentation. All documentation is stored in the cloud based Service and can be accessed by any authority or agent by the use of a mobile device eliminating this way: a. the possibility of falsified documents b. accidental loss of documents c. possibility of unsolicited deviation on the delivery route.
  • Drawing 15 describes the use of the method as the underlying mechanism for loyalty schemes. This process is initiated ones more by User A interacting with User B's tag [1600].
  • User A lands [1610] on User B's Welcome page where he can check [1620] the available amounts of rewards expressed in monetary value or points. If rewards are sufficient to cover User B's purchase [1630] then User B is advised. If User B authorises the use of the rewards [ 1640] the the service deducts from User B's account the value needed [1660] and closes the transaction. If either rewards are insufficient or User B is reluctant to use his credits then the Service adds in User B's account the amount[1650] of rewards earned as a result of the transaction[1670].
  • Drawing 16 describes the use of the method for auctions or Dutch type auctions.
  • the process starts with User A entering the Service and creating an Auction page [1700] by choosing the type, setting the initial price, the timescale and the rules.
  • the Service is generating the Auction tag in the form requested [1710] and forward it to User A (i.e. by email).
  • User A presents the Auction tag through a medium of his choice (i.e. Digimarc embedded in the printed description of the object, or an Audiotag or QR code embedded in a projected video).
  • a medium of his choice i.e. Digimarc embedded in the printed description of the object, or an Audiotag or QR code embedded in a projected video.
  • Any number of consumers [1730]...[1739] can interact with this tag and all will land in User's A Auction page where the Service will request from each one of them their email address [1740] or any other information according to User's A request.
  • an internal clock can be activated depending on the rules set by User A (i.e. simultaneously with expressed interest of the first User or from the moment that the Auction page was created).
  • the Service allows every user that interacts with the tag to view a presentation or additional details of the item, to place a bid as many time as he wants and of course allows for the highest bid to be visible or not by all [1761].
  • the System advises the winner that he won.
  • the Auction type is of a Dutch type the price starts from its highest point and is reduced in time intervals set by User A [1750].
  • the Service advises the participants of the auction, by some means (i.e. by a string of emails or a visible by all projection) about the new price.
  • the first user to interact with the tag after the clock start ticking is the winner [1770] and he is advised about that by the Service.
  • the User who won the bidding process is directed to the Payment page of the User A.
  • the process can be used, for example, for personal artist exhibitions, for renting a flat, for live-stock auctions, for charity events or when bidding for a shipment of muscles in both open, virtual, augmented reality or closed spaces.
  • Drawing 17 describes the use of the method as an underlying mechanism for secure access to physical or virtual sensitive areas.
  • User A enters the Service and creates an Authentication page [1800], defines the Authentication codes for accessing it and the rules of changing them.
  • the Service then creates necessary tags [1801]. This tags normally in the form of tokens are sent by User A [1802] to those needed access to the protected area.
  • the Server stores the Access codes and rules of change in the secure location in the cloud. If the protected area is a physical space [1810] then User A needs to input the IP address of the locking mechanism [1820]. And, of course, User A or its representative [1821] needs to connect the Server with the locking mechanism and test that the link is active. Subsequently, User A [1830] places the access tag controlling the physical or virtual, or digital space in place.
  • Drawing 18 describes the use of the method for the deployment of lottery schemes.
  • the Service generates a lottery tag in any form requested and sends it or emails it to User A [1910] .
  • User A places copies of this lottery tag and places them in various mediums.
  • User B[1930] ..to...User N[1939] interacts with the tag and lands on User A's Lottery page.
  • User B to User N while there ⁇ 1940] enter their details and pay for credit using the above described method.
  • a script initiates a preset automation, generates random numbers for as many cycles as it takes to exhaust User B credit.
  • An algorithm [1970] compares the generated numbers against a predefined set or the generated numbers from another random numbers generator. For every comparison made [1971] a script checks if there is a match. If there is one User B is credited from the Service the amount of price won [1980]. And then the loop starts again provided sufficient credit still exists.
  • one(a charity, for example) may set a lottery in minutes and run it in paperless way.

Abstract

A method to achieve secure data exchanges between legal entities like individuals, businesses, organisations, institutions or groups of the above, initiated by means of interaction between contactless technology based tags like QR codes or NFC tags, containing intelligent encryption which are integrated into physical, virtual or digital objects and mobile devices connected to the internet and is accomplished by means of a. the utilisation of scripts-controlled data-flow b. conditional intelligent redirection based on relational databases and c. integration with payment gateways or other third party systems and databases, all located in remote servers ("internet cloud"). These secure data exchanges can be used for: informational exchanges, marketing, environment to internet (E2ln) commission based (Pay per Click, Pay per Lead, Pay per Sale etc.) affiliate marketing, security (i.e. check points), supply chains (i.e. a paperless point of transfer monitoring and end point payment process), loyalty schemes (i.e. instead of loyalty cards), lottery set ups (i.e. by charities), auctions (i.e. price falling Dutch type auctions), financial exchanges in the form of transactions including micro-payments in either environment to Internet or Internet to Internet set ups.

Description

METHOD TO ACHIEVE SECURE DATA EXCHANGES
Field of invention
the current invention relates to Financial Transactions, Mobile Payments, Micro-payments, Virtual credit cards, Environment to Internet Affiliate Marketing, Indoors and Outdoors Marketing, Security Access and Security Check Points, Information-based Networking, Data Communications, Loyalty Schemes, Lottery Schemes, Auctions, Wireless devices and contactless or Interactive Data-Carrying encrypted format technologies, Supply Chain Stage Monitoring and Billing.
Background of the invention
There were several concepts that combined to create this invention, namely Affiliate Marketing, Outdoors Advertising, Un-powered technologies (i.e. QR, NFC, etc.), Billing, Payment Systems including Direct Debit, Mobile Payments, Internet security and Supply Chains.
Affiliate marketing is a type of performance-based marketing in which a business rewards one or more affiliates for each visitor or customer brought by the affiliate's own marketing efforts. The industry has four core players: the merchant (also known as 'retailer' or 'brand'), the network (that contains offers for the affiliate to choose from and also takes care of the payments), the publisher (also known as 'the affiliate'), and the customer. The market has grown in complexity, resulting in the emergence of a secondary tier of players, including affiliate management agencies, super-affiliates and specialized third party vendors.
Affiliates continue to play a significant role in every company's e-marketing strategies.
The concept of revenue sharing— paying commission for referred business— pre-dates affiliate marketing and the Internet. The translation of the revenue share principles to mainstream e-commerce happened in November 1994, almost four years after the origination of the World Wide Web.
Affiliate marketing has grown quickly since its inception. The e-commerce website, viewed as a marketing toy in the early days of the Internet, became an integrated part of the overall business plan and in some cases grew to a bigger business than the existing offline business. Affiliates worldwide earned billions in bounty and commissions from a variety of sources in retail, personal finance, gaming and gambling, travel, telecom, education, publishing, and forms of lead generation other than contextual
advertising programs.
Eighty percent of affiliate programs today use revenue sharing or pay per sale (PPS) as a compensation method, nineteen percent use cost per action (CPA), and the remaining programs use other methods such as cost per click (CPC) or cost per mille (CPM, cost per estimated 1000 views)
Outdoor advertising is made up of more than 100 different formats. Outdoor advertising is essentially any type of advertising that reaches the consumer while he or she is outside the home. This medium fiffers from broadcast, print, and Internet advertising because it is focused on marketing to consumers when they are "on the go" in public places, in transit, waiting (such as in a medical office), and/or in specific commercial locations (such as in a retail venue). Outdoor advertising formats fall into four main categories: billboards, street furniture, transit, and alternative.
Here, in antithesis with Internet Advertising, compensations are offered in the traditional way by selling advertisement space. If a private property owner wants to sell advertising space to one of the outdoor advertising companies ('media sellers') he or she directly approaches the company. A media seller may also approach the owner of an interesting property and make a bid. The private property owner is generally paid an annual land rent. The media seller erects a structure for displaying the ads and rents out the space to the clients.
QR code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode (or two- dimensional barcode) first designed for the automotive industry in Japan. The information encoded by a QR code may be made up of four standardized types ("modes") of data (numeric, alphanumeric, byte / binary, kanji) or, through supported extensions, virtually any type of data.
Originally designed for industrial uses, QR codes have become common in consumer advertising. Typically, a smartphone is used as a QR-code scanner, displaying the code and converting it to some useful form (such as a standard URL for a website, whereby avoiding the need for a user to type it into a web browser). In the shopping industry, knowing what causes the consumers to be motivated when approaching products by the use of QR codes, advertisers and marketers can use the behaviour of scanning to get consumers to buy, causing it to have the best impact on ad and marketing design. As a result, the QR code has become a focus of advertising strategy, since it provides quick and effortless access to the brand's website. Beyond mere convenience to the consumer, the importance of this capability is that it increases the conversion rate (that is, increases the chance that contact with the advertisement will convert to a sale), by coaxing qualified prospects further down the conversion funnei without any delay or effort, bringing the viewer to the advertiser's site immediately, where a longer and more targeted sales pitch may continue.
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity, usually no more than a few inches. Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi- Fi. Communication is also possible between an NFC device and an unpowered NFC chip, called a "tag". NFC devices can be used in contactless payment systems, similar to those currently used in credit cards and electronic ticket smartcards, and allow mobile payment to replace or supplement these systems.
For example, Google Wallet allows consumers to store credit card and store loyalty card information in a virtual wallet and then use an NFC-enabled device at terminals that also accept MasterCard
PayPass transactions.
NFC stickers based payments in Australia's Bankmecu and card issuer Cuscal have completed an NFC payment sticker trial, enabling consumers to make contactless payments at Visa payWave terminals using a smart sticker stuck to their phone. India is implementing NFC based transactions in box offices for ticketing purposes.
An invoice or bill is a commercial document issued by a seller to a buyer, indicating the products, quantities, and agreed prices for products or services the seller has provided the buyer. An invoice indicates the sale transaction only.
The payment system is an operational network - governed by laws, rules and standards - that links bank accounts and provides the functionality for monetary exchange using bank deposits. The payment system is the infrastructure (consisting of institutions, instruments, rules, procedures, standards,and technical means) established in effect the transfer of monetary value between parties discharging mutual obligations. Its technical efficiency determines the efficiency with which transaction money is used in the economy, and risk associated with its use.
What makes it a "system" is that it employs cash-substitutes; traditional payment systems are negotiable instruments such as drafts (e.g., checks) and documentary credits such as letter of credits. With the advent of computers and electronic communications a large number of alternative electronic payment systems have emerged. These include debit cards, credit cards, electronic funds transfers, direct credits, direct debits, internet banking and e-commerce payment systems.
Direct debit or direct withdrawal is a financial transaction in which one person withdraws funds from another person's bank account. After the authorities are set up ( the payer must have advised the bank that he or she has authorized the payee to directly draw the funds), the direct debit transactions are usually processed electronically. Direct debits are typically used for recurring payments, such as credit card and utility bills, where the payment amounts vary from one payment to another.
Mobile payments, also referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation and performed from or via a mobile device. Instead of paying with cash, check, or credit cards, a consumer can use a mobile phone to pay for a wide range of services and digital or hard goods. Although the concept of using non-coin-based currency systems has a long history, it is only recently that the technology to support such systems has become widely available.
Mobile payment is being adopted all over the world in different ways.
In developing countries mobile payment solutions have been deployed as a means of extending financial services to the community known as the "unbanked" or "underbanked," which is estimated to be as much as 50% of the world's adult population, according to Financial Access' 2009 Report "Half the World is
Unbanked".
There are five primary models for mobile payments:
•Premium SMS based transactional payments
•Direct Mobile Billing
•Mobile web payments (WAP)
•Contactless NFC (Near Field Communication)
•Direct carrier/bank co-operation. Each one of them has its pros and cons and the overall percentage of their use per region varies, depending mainly on the local infrastructure and local cultural habits. The plurality of the solution means that no solution yet has significant distinct advantage over the rest.
Despite the technological advances and the many innovative ways to address the issues, a series of limitations remains. For example:
In regards to outdoor and indoors advertising, one may find solution providers which utilise QR encoding and NFC tagging on elements of outdoors advertising and will offer statistics of consumer interaction with them, however there is no provider currently able to offer commission based remuneration for the advertisement space owner and market boost such an option will offer to the industry.
In regards to billing there are really so many ways one can pay his bill depending on his country of residence. There are several schemes that were put in place by the banks to improve consumer experience and make it easy for them to pay, like Direct Debit in UK, however, none of them is universal (agreed by all banks across continents). In similar manner the channels per country a consumer may pay his bill through vary widely. If the offline practices were not complex enough the online ones are equally if not more complex as not all organisations that issue bills have the same type of facilities to support online payments, nor utilise similar methodologies, resulting in an endless cycle of online subscriptions and security arrangements and an endless list of passwords need memorising by the consumer in order to pay his bills every month. The need for a simple Universal method that requires no registration by the consumer which can be set up by any organisation, that utilises printed bills, in minutes and can be paid by the consumer in the cosiness of his home, is due/
In regards to mobile payments recently one may observe two phenomena, the proliferation of solutions containing elements of the contactless technologies mostly NFC in combination with the traditional Mobile Web Payments, which is driven by a. the abilities of new generation of smartphones and b. the changing habits of the consumers in these countries but at the same time the inability of the existing solutions to address the needs of the majority of the development countries.
The fact remains that all these solutions are build to address the needs of people with a specific socio-economic profile. One may observe this by simply visiting the current solution providers' sites and look at their intended customers and the countries they operate within. Of course the unwillingness of the service providers to support the needs of not developed ("unbanked" and "underbanked") countries can be justified by several additional factors the major of which appear to be a. the infrastructure needed for the end to end processes to exist like card-readers, WANs, broadband, etc), b. the need for dedicated software installed on mobile devises which presuppose the need for the latest models of smartphones and a culture adept to the internet c. the assumed need of a "wallef'-caring culture where all your personal information including the financial one is stored and the use of credit cards, d. that the "merchant" has a website and finally e. the need of both participants of an exchange to be registered with the same service provider.
Once more the need to a universal simple and secure system mobile payment applicable to the vast majority of earth's population and businesses with as few restriction and conditions as possible,
Brief description of the invention
This invention relates as mentioned above to Financial Transactions, Mobile Payments, Micro-payments, Virtual credit cards, Environment to Internet Affiliate Marketing, Indoors and Outdoors marketing, Security Access and Security Check Points, Information-based Networking, Data Communications, Loyalty Schemes, Lottery Schemes, Auctions, Wireless devices and contactless or Interactive Data-Carrying encrypted-format technologies, Supply Chain Stage Monitoring and Billing but it can expand to include any type of process in which an object can be presented in digital or virtual formats i.e. gift card.
In regards to Outdoors and Indoors Marketing the invention in order to a. address the need for a commission based remuneration for the advertisement space owner and b. transform physical, virtual (augmented reality) or digital objects into interaction points with the consumers, removing this way the limitations of the existing practices and c. provide the marketing and advertising industries with new ways to utilise information flow towards the consumer, it was structured as a method and as a cloud based platform through which a contactless technology based "trigger" may initiate the transfer of data through the consumer's mobile device connected to the internet. The end to end process in this case has the following characteristics:
1. Can be initiated by any form of contactless technology trigger including and without the list to be exclusive QR codes, NFC tags, Bluetooth, Audio tags etc. or contactable passive technologies like Touchcode, similarly attached to any physical object or digital representation of one (virtual) or digital file.
2. It does not need the participation of the user to create these triggers
3. The creation of specific type of tags, for example, a digital form of a QR code, is practically
instantaneous.
4. The triggers need not be of specific type (read specifically build)
5. It requires only one phone with internet connection to participate in the process
6. It does not require any process-specific dedicated to the method software installed in the mobile device
7. It is mobile platform agnostic able to utilise all types of smartphones
8. The consumer is not required to be a registered member of the service
9. Remuneration of the advertising space owner can take any of the known forms, rent, pay per click (interaction in this instance), pay per sale, pay per mille, pay per lead etc. or a combination of the above
10. For the first time, creative agencies and outsourced marketing activities related to outdoors and indoors (public spaces) advertising can be rewarded by the results they produce
In regards to billing, in order to fulfil the need for a universal simple method that a. requires no registration by the consumer, b. can be setup by any organisation that uses printed bills in minutes and c. can be paid by the consumer in the cosiness of his home, a similar to affiliate marketing method was utilised, with the same cloud based platform through which the consumer can initiate the transaction using only one mobile device connected to the internet. The end to end process of which has the following characteristics:
1. Can be initiated by any form of contactless technology trigger including and without the list to be exclusive QR codes, NFC tags, Bluetooth, Audio tags etc. or contactable passive technologies like Touchcode, similarly attached to the bill irrespectively of the form this may be presented in including any digital representational forms(virtual) or digital files.
2. It does not need the participation of the issuing company to create these triggers
3. The creation of specific type of tags for examples a digital form of a QR code is practically
instantaneous.
4. The triggers need not be of specific type (read specifically build)
5. It does not require any process-specific dedicated to the method software installed in the mobile device
6. It is mobile platform agnostic able to utilise all types of smartphones
7. The consumer is not required to be a registered member of the service
In regards to payments, the invention in order to address the practical needs of the many in developing countries, and offer a solution to the five (a. to e.) above mentioned limitations in the "unbanked" and "underbanked" countries, was structured as a method and as a cloud based platform through which one may initiate the transfer of data needed to complete a transaction, using only one mobile device connected to the internet. The end to end process has the following characteristics:
1. Can be initiated by any form of contactless technology trigger including and without the list to be exclusive QR codes, NFC tags, Bluetooth, Audio tags etc. or contactable passive technologies like Touchcode, similarly attached to the bill irrespectively of the form this may be presented in including any digital representational forms(virtual) or digital files.
2. It does not need the participation of the user to create these triggers
3. The triggers need not be of specific type (read specifically build)
4. It requires only one phone with internet connection to conclude the process
5. It does not require any process specific dedicated software installed in the consumer or the user's mobile devices
6. It is mobile platform agnostic
7. Only the payee need to be registered in the system (platform / server)
The same is true if the method is utilised for any other purpose where the end step includes a payment for example, lottery set ups, non-internet based auction set ups, POS rapid or emergency deployments, of the poster ticket sales, downloading video or music etc.
In all of the above mentioned solutions the end to end process can be described with the following steps:
1. User A register in the system and requests his preferred "trigger"
2. If user A wishes to use his "trigger" to receive payments, using the method for example to create one or more points of sale (POS) for goods or services or to sell tickets, he is asked for his permission to register him/her with a payment gateway on his behalf or he registers himself.
3. The system provides to user A details for programming or printing the "triggers" or they are
programmed and send to him/her by post or other means
4. The User A places subsequently these "triggers" in strategic positions for example at the back of his mobile device or embeds them on printed materials or any virtual or digital files
5. User B (the consumer) uses these "trigger" in the presence or absence of user A and without the need of the user A participation to connect to the cloud based remote server
6. The server recognises the "trigger's" owner and initiates a multiple-choice internet based dialogue with User B
7. If User B chooses to pay User A then he is presented with an option to input the currency and the amount he wishes to pay, the invoice number (if one exists) or his account number if the payment refers to a bill or any other recognisable reference as well as a voucher number (if one exist) in order for the system to calculate the final payable amount.
User B is choosing the means he wishes to pay depending if he owns an account with the specific payment gateway or else by any recognised credit or debit or virtual card and finalises the transaction
User(s) A (in the case of Affiliate Marketing there are three participants) and User B receive confirmation of the transaction in real time on their mobile devices be means of an SMS message or email
8. If User B chooses another option, except paying, he is automatically redirected to another user interface where he is given additional options like, for example, watching a video advertisement, the video of a property, the terms and conditions of a lottery, the product of an auction he wants to participate, download a company presentation, create a social link through Linkedlnith User A, accept an invitation for a lecture or a party, accept a voucher, buy a ticket etc.
9. User B exits the interface or chooses an additional action by returning to the interface of step 6
Brief description of the drawings
Drawing 1 describes the high level end to end process of the method
Drawing 2 describes the actions of User B in the initial stage whereby a tagged object is directing him to the server and the choices offered to him. I call this step "from the physical world to the internet".
Drawing 3 describes two of the options offered to User B. One that allows him to create a personal or a business link with User A and another that allows him to view/review or download marketing materials Drawing 4 describes three additional choices of User B namely - Review and accept an invitation, Review and accept a voucher, Review and buy a ticket.
Drawing 5 describes two additional User B choices of which one is to pay User A and the second is to pay for a piece of media.
Drawing 6 describes User A choices namely Change my details; Create an invitation, a ticket, a voucher; Edit my invitation, my ticket, my voucher; Create a trigger; Pay a person or a company.
Drawing 7 describes the detailed process that User A should undergo in order to change his details
Drawing 7a describes the process by which an invitation, a ticket or a voucher are redeemed
Drawing 8 describes the process by which User A can create a voucher, an invitation or a ticket
Drawing 9 describes the process by which User A can pay( transfer money) another person or a company Drawing 10 describes the process by which User A can manage invitations , tickets and vouchers that he created or order a new trigger(tag)
Drawing 11 describes an advanced option of redeeming invitation/ticket by the use of a third party (User C), who is acting on behalf of User A
Drawing 12 describes the "environment to the internet" commission based affiliate marketing remuneration method.
Drawing 13 describes the possible use of the method for security and emergency purposes.
Drawing 14 describes the use of the method as a means for a paperless supply chain process.
Drawing 15 describes the use of the method as the underlying mechanism for loyalty schemes.
Drawing 16 describes the use of the method for auctions or Dutch type auctions. Drawing 17 describes the use of the method as an underlying mechanism for secure access to physical or virtual sensitive areas.
Drawing 18 describes the use of the method for the deployment of lottery schemes.
Detailed description of the drawings
The essence of this invention is to achieve secure data exchanges between two points A and B where A resides in the physical world or its projections (augmented reality) and B within the worldwide web by the means of interaction between contactless technology based tags or their virtual representations and mobile devices connected to the internet.
These secure data exchanges can be used for informational exchanges (networking), marketing, environment to internet (E2In) commission based (Pay per Click, Pay per Lead, Pay per Sale etc.) affiliate marketing , security (i.e. check points), supply chains (i.e. a paperless point of transfer monitoring and end point payment process), loyalty schemes (i.e. instead of loyalty cards), lottery set ups (i.e. by charities), auctions (i.e. price falling Dutch type auctions), financial exchanges in the form of transactions including micro- payments in either environment to Internet or Internet to Internet set ups.
I. Overview:
For the purposes of this document we will use the words User A to describe a registered member of the service (the merchant or service provider), User B to describe the consumer of product or services provided by User A, and the word User C to describe a representative of User A
The overall end to end process (E2E) is described in Drawing 1 and starts [100] by User A registering with the Service. Normally there are 2 more steps that precede this registration - Stepl being the expression of interest by User A to utilise the Service and Step2 being the creation and download or postage of the tags (preprogrammed virtual or physical contactless technology elements). On receiving the tags User A positions them [200] in his preferred places or [1700] in his website or his virtual environment. With the tags in place User B [300] can enact an interaction or connection. The end result of this action is to "land " User B in [400] an cloud-based-internet-server where he is offered several choices and between them [500] to pay User A or [700] to accept data from User A. If he chooses to pay [600] User B is directed to a payment gateway where he completes the action. On completion [800] both user A and User B receive confirmation of the payment made in a form of an email or SMS message. If choice of User B was to accept data - on completion of the transmission of the data he is given the option to choose another action[400] or exit[1000].
II. Drawing 2 describes in detail the options given to User B [300] after interacting with one of the above mentioned contactless technologies or virtual elements which can be embodied in the form of
QR codes embedded in physical, virtual or digital objects or websites
NFC tag attached to the poster or any other object or surface
OR code embedded Points of Sale (POS)
• NFC tagged POS
Bluetooth transmission
Audiotagged sound
Direct WiFi transmission
Touchcode printed material
...any other form of contactless or Near Field Communication technology elements.
These options are [810] create a personal or business link, [420] accept an invirtation, [430]accept a voucher, [440] buy a ticket, [450] view and download marketing materials, [480] pay and view anything that can be presented in digital format, [490] pay user A. The method allow for any number of additional choices to be added by User A on demand, for example, the participation of User B in a loyalty scheme, in an auction, in a lottery ,etc.
Drawing 3 If drawings 1&2 can be assumed as the first and second levels of the description hierarchy then drawing 3 describes the next level down and two of the many choices of User B. In the first instance, [410] where User B intention is to create a Personal or Business Link with User A, in the aftermath of user B interaction with one of the tags and his subsequent "landing" in the {400], a script [411] (depending on the information contained in the tag based on User A predefined choices) redirects User B [412] to User A's social profile, where he can request from User A to accept the link. Post that action User A accepts the request [413] and the link is established. In the meantime User B is given the option [414] to return to multiple choices page [400] or to exit. In the same drawing another choice of user B is described [450] that request to download marketing materials. In this case [451] a script recognises the embedded in the tag code and redirect User B to a predefined by User A webpage. There[452] a second script triggers the start of a piece of media (animation, video, presentation, etc.) and gives the option to User B [453] to download it. Subsequently User B may choose to return to [400] or exit.
Examples of practical applications of this two options are: for the first one the tags can be used instead of a business card utilising services like Linkedln, Facebook or Google+ and eliminatie this way the inherited deficiencies of the business card as a method of storing data. For the second one the tagged object can be used for electronic distribution of marketing materials on the international fairs and exhibitions eliminating the need for printed materials.
Drawing 4.describes three additional options given to User B namely [430] accept a voucher, [420] accept an invitation, [440] buy a ticket . If User B chooses [420] or [430] a script [421] recalls the appropriate voucher or invitation from the database. Subserviently User B is given the option after reviewing to accept it [422] or decline. If User B chooses to accept he is redirected [424] to a form where he is asked to insert either his account number with the service or his email address if he is not registered user. Subsequently User B's records are updated to reflect his acceptance[425] if he is a registered user or if he is not registered user the service gives him an option to download it or to receive it by email[226]. In case User B choose to buy a ticket[440] a script recalls the ticket from the database[441] which User B can review[442]. Provide that User B chooses to buy a ticket[443] he is presented with a payform within which he can choose the currency and the amount. On submission of the form User B is redirected [444] to a payment gateway to complete the process. At the end of this process User A [445] and User B[446] receive SMS or email with details of the transaction. User B subsequently is redirected to [424] where depending of his status( being registered user or not) he follows the path described above.
Examples of practical applications of this two options are:in regards to ticketing - Digimarc- watermarked street event-advertising-poster that allows consumers to buy tickets; in regards to vouchers - semitransparent shop window sticker that allow the shop owner to offer passer-by consumer shopping vouchers; and in regards to invitation - audiotagged digital broadcast of a song that allows the distribution of invitations for an open air fundraising concert on behalf of the charity.
Drawing 5 describes two additional options of User B [480] and [490].
[480]where User B can pay to gain access to or ownership of anything that can be presented in digital format. And [490] is to pay another person or legal entity. In the case of [480] a script redirects User B[481] to a choices webpage [483]. On arrival, provided payment has gone through[482],[491],...[494], a second script triggers the start of a piece of media the specifications of which were preset by User A. While in the same choices page User B is allowed to download [484] the piece of media that he already paid for.
On choosing[490] User B is presented with the payform[491] where he is given the options a. to enter the invoice or account number in case the payment is for goods or services provided or a payment for a bill respectively.
b. to enter the currency and the amount he wishes to pay
c the voucher number if he possesses one
Subsequently a script[492] recalculates a final amount payable taking into consideration existence of the voucher (or not) and updates the records in the database for reporting purposes.
Simultaneously, if the voucher number entered was a valid one [497] a script marks the voucher as used (invalidates it). After this step User B is redirected by a script [493] to the payment gateway where he completes the payment process. User A and User B are receiving by email or SMS confirmation of the transaction successfully completed[495][496] respectively.
Examples of practical applications of this two options is Pay &View digital elements advertising- poster or banner in the train containing the QR code that passengers can scan to access a media- streaming library for movies and songs.
Drawing 6 describes the options given to User A by the service[1100]. This are [1110]a choice to alter his details and preferences, [1120] to create invitation or a ticket, [1130] to create a voucher, [1140] and [1150] to edit any of the last three elements,[1180] to create a trigger,[1190] pay or transfer money to a person or a company. Additional options can be added on demand without limitations either on demand or based on customised choices menus. Drawing 7 describes the process by which User A can modify his details and preferences through a form [1111] which can be reviewed and approved [1112] and cause a records update [1113].
Practical application of which would be the change of User A's URL destination during the period of international fair to direct Users B that scan his QR code to marketing materials instead of his personal profile.
Drawing 7a describes the process by which User A can redeem already distributed invitation, ticket or voucher by: User A [1201] interacting with it [1202] landing in the server reviewing and redeeming by clicking on it and [1203]by a script deleting it from User A's list.
A real life scenario may be the case when a consumer presents a ticket he purchased in advance and stored on his mobile to the porter of a movie theatre acting as a representative of a User A. The porter by scanning the embedded on the ticket QR code lands in the server where his is given the ability to check its validity and redeem it.
Drawing 8 describes the process by which User A can create a voucher, an invitation or a ticket. I this case User A visit the site [1100] and enter his credentials if needed. In all cases [1120], [1130] User A is offered [1121] a form which may include the description of the event for which all this elements are created, and he is allowed to upload the necessary materials. On completion of this process User A is given the option [1122 ] to review the materials created before he approves them an action which will result[1123] in the system,storing them in his personal dedicated storage space.
Several gateways like PayPal allow as an option to their registered users money transfer from person to person or from person to company , or from company to the person for no commercial purposes . Drawing 9 describes how such a process can be fulfilled when the person or the company that transfers the money is a registered user of the Service . The steps needed are following: [1191] User A is presented with the payform where he chooses the currency and the amount he wants to transfer as well as the details of the person (User B) that the money is directed to. On submission of this form User A is redirected [1192] to the payment gateway where he complete the process. There is the option for this redirection process to be transparent for User A provided that the participating gateway allows for this part of the process to be integrated within the service. Subsequently both User A and User B receive SMS or email with details of the transaction. Post this step User A may choose to exit or return to the options page described in Drawing 6.
Drawing 10 describes the three simple processes by which:
[1140] User A can review through a dedicated list [1141] all active invitations or tickets issued and can decide if he chooses to[1142] modify or delete any of the unused invitations or tickets.
[1150] User A can review through a dedicated list [1151] all active vouchers issued and can decide if he chooses to[1152] modify or delete any of the unused vouchers.
[1180]User A chooses to create a trigger and this action redirects him to a form [1181] where he can input the characteristics, the type and URL of the trigger he needs.
Subsequently User A redirected [1182] to a payment gateway where he pays for the trigger. After finalising this process the system creates the trigger[1183] and depending on its nature allows User A to download it or request it to be delivered by mail or email.
Drawing 11 describes an advanced option of redeeming invitation/ticket purchased by User B who is registered user of the Service by a third party (User C) who is acting on behalf of User A. The process entails User C scanning Users B's trigger [1210], User C lands [400] in the cloud server where he is offered choices. The Service [441] through the script request and receives geolocation of User Cs mobile. A second script checks a list of active invitations or tickets belonging to User B and provided the time and place correspond render the colour of the button [1202] green. User C subsequently presses the green now button to redeem the invitation or ticket. At the next step [444] the system updates the records and invalidates the ticket or invitation. The option is suitable for application in any event-involving-real-life-scenario.
Drawing 12 describes the "environment to the internet" commission based affiliate marketing remuneration method. For this to work both User A(the advertiser)[1300] and User B(the publisher) [1310] need to be registered with the Service. The Service in this instance takes the form of an affiliate network. The process starts[1320] with User A requesting from the Service an authorisation to run marketing campaign (which can be approved or rejected), if approved - declaring his desired budget. An internal or external creative organisation [1330] designs the campaign and places it details in the affiliate network virtual announcement board inviting publishers to participate (detailed description of how it happening is omitted deliberately because it is established practice and possibly patented already).
User B chooses to participate in the campaign of User A [1340] and agreeing on Prices and Terms&Conditions. Then Affiliate network generates one or more traceable codes[1350] for each promotional element of the campaign. The service stores this traceable codes[1360] in the database against the profile of both User A and User B and generates a new Trigger(Tag) Cod for each one of the traceable codes requested by User B linking this way User A and User B. The creative organisation "embeds" the tag codes [1370] into marketing materials of the campaign creating this way a series of publicly accessible Social Objects. User C (the consumer) interacts with this Social objects [1380] through the tags and getting transferred to the Service site[1381] . A script acting in the background {1382] redirects User C to the affiliate network. A second script 1383] acting as well in the background redirects User C to either User A external site Or to a hosted area within the Service dedicated to User A. Depending on the action of User C another script within the affiliate network [390] distributes the pre-agreed rewords between the Service and itself.
Drawing 13 describes the possible use of the method for security and emergency purposes. The process starts with User A entering the service [1400], creating predefined number of tags and advising the system about geolocation of each one of them. There is an option for the creation of each tag by the User A or by the Service in which case the Service sends them to User A by post or other means depending on the nature of the tags and the location of User A. On reception [1410] User A places the tags and tests the geolocation accuracy using his mobile device. User B patrols or comes in proximity with the site [1420] where the tag is located and interacts with the tag. User B is transferred [1430] to the Service site where he or an automated script logs the interaction [1440] and time-stamps it. If the interaction is related to an alert [1450] the service site allows UserB to initiate an alarm and define the nature of it . In this case [1460] a script remotely activates alarms controlled by WiFi, or by mobile network or satellite based infrastructure, while simultaneously alerts security organisations. At the end of a predefined cycle [1470] which can be the duration of a shift or any other time scale the service generates a report which can be retrieved by User A.
Practical examples of the above can be:
a. the rapid deployment of security checkpoint using NFC tags which a patrol can interact with using only their mobile devices eliminating the need for costly infrastructure
b. Security incidents wary in severity, impact and demand for social services needed to get involved. An emergency call in any country normally generates a disproportional response from the emergency services decreasing this way the operational efficiency. In antithesis, a set up with a series of specifically assigned to the particular event buttons ( Fire,Ambulance, Flood, Earthquake, Industrial accidents, etc.), each one generating based on statistics various severity alerts for different emergency services can optimise distribution of valuable public resources. This happens in three ways:l - by alerting only the specific services required and advising them on the units needed to be despatched; 2 - by alerting services simultaneously and avoiding the need for coordination and minimising this way the time between the first and the last despatch; 3.- by eliminating "hawks calls" due to the ability of the service to recognise User B's mobile number.
Drawing 14 describes the use of the method as a means for a paperless supply chain process. This is initiated by User A(the entity responsible for the end to end delivery or an agent of a collaborating company) entering the Service and creating a tag(s) for an object for which he additionally input the sender and recipient details [1500]. A script creates and stores the accompanying documents and invoices in a database. User A attaches the tag [1510] to the object and despatches it using any postal or courier services. In every subsequent step of the supply chain User C interacts with the tag using his mobile device [1520] and enters the Service where he records the stage's completion, at the same time the Service records geolocation of User C. User A, the sender and the recipient can enter the Service and monitor the progress [1530] using the unique tag ID generated at stage [1500] (the ID has been emailed to every of them [1501]). At the end of the process the recipient interacts of the tag [1540] and access the shipment documents and invoice. Subsequently, [1550] the recipient acting as User B in [443] pays the sender or inputs the voucher code if an advance payment was made. The Service deducts from sender an amount of money and pays User A and itself [1560]. At the end of the process [1570] the Service email transaction details to all involved in the supply chain. A practical example of the service would be a shipment of a tagged object from China to Europe without the need of any accompanying documentation. All documentation is stored in the cloud based Service and can be accessed by any authority or agent by the use of a mobile device eliminating this way: a. the possibility of falsified documents b. accidental loss of documents c. possibility of unsolicited deviation on the delivery route.
Drawing 15 describes the use of the method as the underlying mechanism for loyalty schemes. This process is initiated ones more by User A interacting with User B's tag [1600]. User A lands [1610] on User B's Welcome page where he can check [1620] the available amounts of rewards expressed in monetary value or points. If rewards are sufficient to cover User B's purchase [1630] then User B is advised. If User B authorises the use of the rewards [ 1640] the the service deducts from User B's account the value needed [1660] and closes the transaction. If either rewards are insufficient or User B is reluctant to use his credits then the Service adds in User B's account the amount[1650] of rewards earned as a result of the transaction[1670].
Drawing 16 describes the use of the method for auctions or Dutch type auctions.
The process starts with User A entering the Service and creating an Auction page [1700] by choosing the type, setting the initial price, the timescale and the rules. When concluded, the Service is generating the Auction tag in the form requested [1710] and forward it to User A (i.e. by email). On reception User A presents the Auction tag through a medium of his choice ( i.e. Digimarc embedded in the printed description of the object, or an Audiotag or QR code embedded in a projected video). Any number of consumers [1730]...[1739] can interact with this tag and all will land in User's A Auction page where the Service will request from each one of them their email address [1740] or any other information according to User's A request.
If the type of auction User A has chosen [1750] is a standard one then an internal clock can be activated depending on the rules set by User A (i.e. simultaneously with expressed interest of the first User or from the moment that the Auction page was created). The Service allows every user that interacts with the tag to view a presentation or additional details of the item, to place a bid as many time as he wants and of course allows for the highest bid to be visible or not by all [1761]. When the time of the Auction set by User A expires, the System advises the winner that he won. In case the Auction type is of a Dutch type the price starts from its highest point and is reduced in time intervals set by User A [1750]. Every time the price drops the Service advises the participants of the auction, by some means (i.e. by a string of emails or a visible by all projection) about the new price. The first user to interact with the tag after the clock start ticking is the winner [1770] and he is advised about that by the Service.
In both cases the User who won the bidding process is directed to the Payment page of the User A. There are no limitations regarding the use of the process and it, indeed, can be used, for example, for personal artist exhibitions, for renting a flat, for live-stock auctions, for charity events or when bidding for a shipment of muscles in both open, virtual, augmented reality or closed spaces.
Drawing 17 describes the use of the method as an underlying mechanism for secure access to physical or virtual sensitive areas.
At the beginning User A enters the Service and creates an Authentication page [1800], defines the Authentication codes for accessing it and the rules of changing them. The Service then creates necessary tags [1801]. This tags normally in the form of tokens are sent by User A [1802] to those needed access to the protected area. In response to [1800] the Server stores the Access codes and rules of change in the secure location in the cloud. If the protected area is a physical space [1810] then User A needs to input the IP address of the locking mechanism [1820]. And, of course, User A or its representative [1821] needs to connect the Server with the locking mechanism and test that the link is active. Subsequently, User A [1830] places the access tag controlling the physical or virtual, or digital space in place. After this point User B can interact with either tags placed by User A or a token sent to him and lands on the Authentication page [1840] where he enters Authentication codes. The Service checks if the Authentication codes is about a physical site's lock and the codes are correct [1852] . Then it provides User B with an access to the protected area by remotely unlocking the mechanism. If ,on the other hand, the Authentication codes refer to a non-physical location and the codes are valid [ 1853] User B is granted with an access to the sensitive data or bill located at that area. If the action regards the payment of a bill [1854] after the payment is made a script will record the action or send email to User B and User A confirming that payment was made. The above method is ideal where the risk of tampering the visible unlocking mechanism is high. In contrast, by utilising this method one may locate the locking mechanism inside the protected area this way rendering tampering improbable.
Similarly, significant benefits can be materialised when tokens are used as a "key" to unlock protected virtual areas.
Drawing 18 describes the use of the method for the deployment of lottery schemes.
Ones more User A and creates a Lottery page [1900] within which he can choose the type of lottery, set the prices and define the rules. The Service generates a lottery tag in any form requested and sends it or emails it to User A [1910] . User A places copies of this lottery tag and places them in various mediums. User B[1930] ..to...User N[1939] interacts with the tag and lands on User A's Lottery page. User B to User N while there {1940] enter their details and pay for credit using the above described method. On successful completion of the payment a script initiates a preset automation, generates random numbers for as many cycles as it takes to exhaust User B credit. An algorithm [1970] compares the generated numbers against a predefined set or the generated numbers from another random numbers generator. For every comparison made [1971] a script checks if there is a match. If there is one User B is credited from the Service the amount of price won [1980]. And then the loop starts again provided sufficient credit still exists.
Using this mechanism one(a charity, for example) may set a lottery in minutes and run it in paperless way.

Claims

CLAIMS(27)
1. A method comprising: secure data exchanges between legal entities like individuals, businesses, organisations, institutions or groups of the above, initiated by means of interaction between contactless technology based tags like QR codes or NFC tags, containing intelligent encryption which are integrated into physical, virtual or digital objects and mobile devices connected to the internet , and accomplished by means of a. the utilisation of scripts-controlled data-flow b.
conditional intelligent redirection based on relational databases and c. integration with payment gateways or other third party systems and databases, all located in remote servers (" internet cloud" )
2. The method of claim 1, further comprising: use any object tagging technology that can store digital information in combination with any mobile operating system to fulfil the E2E process
3. The method of claim 1 and 2, further comprising: the absence of any dedicated software installed on the consumer device
4. The method of claim 1 and 2, further comprising: the absence of dedicated software installed on the merchants device or additional hardware like card readers participating in the process
5. The use of method described in claim 1 to 4 for financial transactions when the payer intention is to use credit or debit cards, existing gateway accounts (i.e. PayPal account) or e-wallets
6. The use of method described in claim 1 to 4 as a remote payments terminal or point of sale (POS)
7. The use of method described in claim 1 to 4 as an emergency payments terminal or mass POS
deployments
8. The use of method described in claim 1 to 4 as a method for mobile micro-payments
9. The use of method described in claim 1 to 4 as a method for networking i.e. instead of business cards
10. The use of method described in claim 1 to 4 as a method for the distribution of marketing materials
11. The use of method described in claim 1 to 4 as a method for the distribution, validation and
redemption of invitations
12. The use of method described in claim 1 to 4 as a method for the distribution, validation and
redemption of vouchers
13. The use of method described in claim 1 to 4 as a method for the distribution/sale, and redemption of tickets
14. The use of method described in claim 1 to 4 as a method for offering commission based
remuneration to the hosts or owners of the tagged with contactless technology physical object ("environment to internet" affiliate marketing)
15. The use of method described in claim 1 to 4 as a method for security and emergency purposes whereby contactless technology tags, created and geolocated (geotagged) by the system, can act as check points or emergency alerts
16. The use of the method in conjunction with claim 15 as an emergency/public services resource- optimisation method
17. The use of method described in claim 1 to 4 and 10 as a method for reducing paper waste in
exhibitions and international fairs
18. The use of method described in claim 1 to 3 as a method, deployed by any distribution or supply network, to achieve a paperless E2E delivery which includes confirmation (sign off) for all check points between a warehouse and the consumer or invoice payment when the product reaches the consumer
19. The use of method described in claim 1 to 4 as a method for bill or invoice payments
20. The use of method described in claim 1 to 5 as a recording mechanism to counteract tax evasion
21. The use of method described in claim 1 to 8, 12 and 14 as a mechanism for loyalty schemes (i.e. automated vouchers accumulation in one's profile)
22. The use of method described in claim 1 to 4 as a zero implementation-time internet payment
mechanism
23. The use of method described in claim 1 to 4 for secret auctions or time tagged Dutch type auctions (falling price auctions)
24. The use of method described in claim 1 to 4 for secure access to sensitive data and reduce the risk of tampering with access-granting mechanisms
25. The use of method described in claim 1 to 5 and 20 as backup POS system for retailers
26. The use of method described in claim 1 to 5 in conjunction with Google Glass or similar devices for one-action (i.e. eye wink) mobile payments
27. The use of method described in claim 1 to 4, 12 and 20 for the deployment of lottery schemes
PCT/EP2013/077280 2013-12-19 2013-12-19 Method to achieve secure data exchanges WO2015090393A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/EP2013/077280 WO2015090393A1 (en) 2013-12-19 2013-12-19 Method to achieve secure data exchanges

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2013/077280 WO2015090393A1 (en) 2013-12-19 2013-12-19 Method to achieve secure data exchanges

Publications (1)

Publication Number Publication Date
WO2015090393A1 true WO2015090393A1 (en) 2015-06-25

Family

ID=50390035

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2013/077280 WO2015090393A1 (en) 2013-12-19 2013-12-19 Method to achieve secure data exchanges

Country Status (1)

Country Link
WO (1) WO2015090393A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833390A (en) * 2018-06-05 2018-11-16 中国人民解放军国防科技大学 Matrix transformation-based packet physical layer encryption method
US10949725B1 (en) 2019-10-03 2021-03-16 Popl Co. Method and device for sharing social media profile

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070022058A1 (en) * 2002-08-08 2007-01-25 Fujitsu Limited Wireless computer wallet for physical point of sale (POS) transactions

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070022058A1 (en) * 2002-08-08 2007-01-25 Fujitsu Limited Wireless computer wallet for physical point of sale (POS) transactions

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Half the World is Unbanked", FINANCIAL ACCESS, 2009

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833390A (en) * 2018-06-05 2018-11-16 中国人民解放军国防科技大学 Matrix transformation-based packet physical layer encryption method
US10949725B1 (en) 2019-10-03 2021-03-16 Popl Co. Method and device for sharing social media profile
WO2021067414A1 (en) * 2019-10-03 2021-04-08 Popl Co. Method and device for sharing social media profile
US11487982B2 (en) 2019-10-03 2022-11-01 Popl Co. Method and device for sharing social media profile

Similar Documents

Publication Publication Date Title
US11687950B2 (en) Generation online e-commerce and networking system transform scattered assets data on the internet into centralized assets data and generate my assets ratings for internet users
US11341818B2 (en) Systems and methods for authenticated blockchain data distribution
US20150348169A1 (en) System and method for marketplace software platform
US20130262316A1 (en) Securely Selling and Purchasing of Goods through Social Network Sites Using a Secure Mobile Wallet System as a Mobile Commerce
US20140122327A1 (en) Cross border gift cards
US20150206128A1 (en) Contactless wireless transaction processing system
US20120179531A1 (en) Method and System for Authenticating and Redeeming Electronic Transactions
US20140040001A1 (en) System and Method for Managing Merchant-Consumer Interactions
US20120232981A1 (en) Contactless wireless transaction processing system
US20140025470A1 (en) Method and system for facilitating merchant-customer retail events
CA2815362A1 (en) System and method for managing merchant-consumer interactions
WO2014108910A2 (en) Products & services card and global card or payments network(s) mediated e-commerce & marketing service(s)
US9508093B2 (en) Apparatus, method and system for electronic gifting
US20220084015A1 (en) Methods and systems for ethical cryptocurrency management
US20120173402A1 (en) Stored value exchange method and apparatus
WO2013133763A1 (en) A consolidated merchant programs system
US11790444B2 (en) Systems and methods for distributed encoding and global exchange architecture
US20200334711A1 (en) Online E Commerce and Networking System with an Instant Payment and Settlement Digital Currency Application for Realizing Internet of Values
US20130006856A1 (en) Flexible payment instrument
US20220261716A1 (en) System and method for localized prepaid gift account program utilizing open loop network systems without local merchant approval
WO2015090393A1 (en) Method to achieve secure data exchanges
TW201942837A (en) A method of denying duplicate reward for dissemination of information, and a system thereof for monitoring purchaser-relationship
KR101082069B1 (en) Business method and system for encouraging social commerce using settlement information of client through settlement service server when buying items discounted by group purchase
KR102439477B1 (en) Coupon issuance system that allows users to selectively issue coupons
US11715152B2 (en) System and method for localized prepaid gift account program utilizing open loop network systems with local merchant approval and branding

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13843021

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13843021

Country of ref document: EP

Kind code of ref document: A1