AU3108199A - A method for using a telephone calling card for business transactions - Google Patents

A method for using a telephone calling card for business transactions Download PDF

Info

Publication number
AU3108199A
AU3108199A AU31081/99A AU3108199A AU3108199A AU 3108199 A AU3108199 A AU 3108199A AU 31081/99 A AU31081/99 A AU 31081/99A AU 3108199 A AU3108199 A AU 3108199A AU 3108199 A AU3108199 A AU 3108199A
Authority
AU
Australia
Prior art keywords
customer
merchant
invoice
user
telephone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU31081/99A
Inventor
Munir Cochinwala
Ernest Samuel Cohen
Naveen Suri
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iconectiv LLC
Original Assignee
Telcordia Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telcordia Technologies Inc filed Critical Telcordia Technologies Inc
Publication of AU3108199A publication Critical patent/AU3108199A/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
    • G06Q50/60

Description

WO 99/49404 PCT/US99/06195 A METHOD FOR USING A TELEPHONE CALLING CARD FOR BUSINESS TRANSACTIONS FIELD OF THE INVENTION The present invention relates to the field of commercialization for 5 business transactions. More particularly, the present invention relates to the problem of securely and efficiently using a telephone calling card as a credit card for business transactions. BACKGROUND OF THE INVENTION More and more consumers are choosing to consummate purchases o10 without physically entering the location where the service or item is located. This social phenomena has grown in recent years due to the Internet, in particular the World Wide Web, and other electronically based shopping networks, such as the Home Shopping Network. In fact, virtual malls that allow consumers to wander from virtual store to virtual store through the use 15 of a personal computer are available. In addition to home shopping, other areas that may ultimately be widely available via electronic commerce include movies on demand, video games, video libraries, home banking, and music on demand. It is particularly attractive to the consumer to purchase goods and services without the trouble of looking for a parking spot or waiting in line. 20 Indeed, electronic commerce could one day be the dominant means used for purchasing any and all items or services and may very well revolutionize the way business is conducted. In today's economy, a consumer wishing to make a modest electronic purchase (i.e., without being physically present) has only two alternatives. If 25 he is conducting business through the computer, he can use some secure electronic payment scheme, such as eCash or MilliCent. Otherwise, the only instrument available is the ordinary credit card. eCash is a software-based payment system that allows users to make electronic payments from any computer to any other computer over any 30 computer network including the Internet. An eCash purchase requires three participants - a buyer, a seller, and a bank. Initially, the buyer withdraws digital coins, or eCash, from her bank account. The digital coins are in fact messages having strings of digits with each digital string corresponding to a -1- WO 99/49404 PCT/US99/06195 different digital coin. The messages are transmitted to the buyer's computer where eCash software automatically manages the digital coins. A buyer having eCash on hand may then make purchases from a seller or merchant who has previously signed up to the eCash transaction system. Before a sale 5 is consummated between buyer and seller, however, the seller's software automatically sends the digital coins it receives from the buyer to the bank. By sending the coins to the bank the seller is able to protect herself against fraud. As such, the bank is used as a central authority. In order to protect the privacy of the buyer eCash uses "blind signatures", as described in Chaum, 10 David L., U. S. Patent No. 4,759,063, entitled "Blind Signature Systems", and Chaum, David L., U. S. Patent No. 4,949,380, entitled "Returned-Value Blind Signature Systems"'. One drawback of this system is that in order to make a purchase both the buyer and the seller must have accounts on the eCash system. This drawback may be particularly chilling in that the impulse to buy 15 an item or service may not survive the time it takes for a consumer to sign up with such a system. Another drawback is that each purchase requires processing by an intermediary, e.g., a bank, before the purchase is deemed completed. MilliCent is another software based payment system primarily designed 20 for content-based Internet commerce. The MilliCent system is based on the use of "scrip". Scrip is a pre-paid electronic coupon that essentially replaces cash for purchases. Scrip is issued by brokers, that act as intermediaries between consumers and vendors, or by vendors. Basically, a consumer, by way of a credit card, for example, buys vendor specific scrip, i.e., that scrip 25 can only be used to purchase content from a particular vendor, either from a broker or vendor, and then uses the scrip to make purchases. While the MilliCent system does not require user accounts it also has drawbacks. For one, each user must subscribe and use MilliCent software. In addition, scrip is vendor specific thereby limiting the flexibility of the shopping consumer. 30 Thus, not unlike eCash MilliCent may have a negative impact on the spur of the moment purchase. On the other hand, the low transactional costs associated with systems such as eCash or MilliCent make them particularly attractive for purchasing items or services that cost as little as 10 cents. -2- WO 99/49404 PCT/US99/06195 eCash and MilliCent are just two of the many prior art schemes that provide for secure electronic commercial transactions over computer networks. Other popular schemes include CyberCash, NetBill, NetCash and NetCheck, and systems offered by Netscape, First Virtual Holding, and NTT. 5 Despite the variety of these electronic commerce systems, these systems share a common goal of providing a system that is secure against fraud, security breaches, or counterfeiting, and assures consumer privacy. In order to provide an adequate measure of security almost all electronic commerce systems employ encryption techniques. As such, both public key and private o10 key encryption or decryption schemes are used to establish the identity of the buyer or the merchant, to verify information, and to provide electronic signatures that are legally binding and not likely to be forged. Consumers who use credit cards to remotely shop are afforded greater flexibility in choosing with whom they transact business than are consumers 15 who use electronic commerce systems such as eCash or MilliCent. A consumer using a credit card to make an electronic purchase first requests the purchase from the merchant. The merchant then contacts the institution that issued the consumer's credit card for authorization. If the purchase is authorized, the merchant is eventually given a token which the merchant 20 transfers into its bank account and the consumer is forwarded a bill from the institution. Using a credit card to make an electronic purchase has it own set of problems. First, although encryption is used in credit card transactions to protect information such as credit card numbers, credit card security is poor. Any merchant can take the information given by the user and purchase 25 additional goods from other merchants; even if the fraud is detected, there is little hope of tracing it back to the dishonest merchant. The danger of eavesdropping or snooping by an outsider to the transaction also poses a significant risk. More significant is the risk associated with break-ins at a host where credit card numbers may be stored. Second, and probably more 30 importantly, credit card overheads are typically high ($0.20 + 2% of transaction cost is typical). This makes credit card payment inappropriate for payments under $1.00. Of utility then would be a method and system that allows a consumer to purchase items or services from merchants without requiring either the -3- WO 99/49404 PCT/US99/06195 merchant or consumer to install proprietary software. In addition, such a system or method should be secure by not requiring the consumer to divulge private information, such as credit card numbers, that may be misappropriated. Finally, such a system should be ubiquitous allowing any 5 and all consumers to make purchasers without visiting a store. SUMMARY OF THE INVENTION Our invention is a method and system that uses a telephone card to make payments as part of an electronic commercial transaction. Our system includes an eCard server connected to a public network lo through which a consumer and a merchant can communicate and transact business. In accordance with our system, the public network may be the Internet or the Public Switched Telephone Network (PSTN). Accordingly, our system provides the opportunity for in-home shopping without requiring the consumer to own a personal computer or a credit card. 15 In conducting purchases over the Internet in accordance with our invention, a secret encryption key is shared by the user and the calling card server. In general, when a user or consumer wishes to make a purchase, he contacts the merchant, who prepares an invoice. The user signs the invoice using his telephone calling card number and a PIN code. The merchant then 20 sends the signed invoice to the eCard server. The server authenticates the signature, verifies that the user has sufficient funds for the purchase, and sends a confirmation to the merchant. After receiving confirmation the merchant then informs the user of the successful purchase. The user is later billed for the item on his phone bill, and the invoice is preserved at the eCard 25 server for auditing and to guarantee non-repudiation of the transaction. In accordance with our invention no private information is passed on to the merchant (even the customer name can be hidden). As such, the risk of fraud is reduced. In accordance with an embodiment of our invention purchases may be 30 conducted over the PSTN. In accordance with this embodiment the user first initiates a phone call to the merchant using his telephone calling card. Thus, the user first identifies himself to the telephone network. The telephone network then completes the call to the merchant so that the merchant and the -4- WO 99/49404 PCT/US99/06195 user can negotiate a transaction. Once negotiations are completed either the user or the merchant signals the telephone system to mediate a transaction; for example, the user may use a flash-hook/dialed code, or the merchant may use the Internet. The merchant transfers an audible invoice along with the 5 user's PIN (so the user can authenticate the purchase is actually being made) to the eCard server. The eCard server then plays the audible invoice and the user's pin to the user so that the user can agree to either accept or decline the purchase. If the purchase is agreed to, the user is billed for the item on a subsequent telephone phone bill, and the invoice is again saved for future io auditing and non-repudiation. A further extension of this embodiment of our invention includes the user purchasing a prepaid calling card, thereby removing the additional step of later billing the user. In accordance with another embodiment of our invention transactions may occur via the Internet using the World Wide Web. In this embodiment, 15 the consumer first dials into a server maintained by an Internet Service Provider (ISP), which can be a telephone company. As part of the dial in process the consumer's identity is validated. The user then drags a copy of an invoice or purchase order to an application running on a Web Page. The application appends the user's digital signature to the invoice and mails it to 20 the merchant. The merchant then presents the signed invoice to the eCard server which authenticates the signature of the user prior to approving the sale. Our invention affords several advantages over the prior art. Some of these advantages include: 25 The widespread availability of calling cards provides more sales opportunities for merchants. Because calling cards are even more widely available than credit cards, a much large segment of the purchasing public are therefore available to merchants as potential electronic commerce customers. More importantly these customers 30 need not be credit worthy as customers may purchase pre-paid cards having different levels of digital money available; Even where billing is necessary practically every telephone customer is already being billed on a monthly basis, making the billing overhead smaller; -5- WO 99/49404 PCT/US99/06195 Calling cards, unlike most credit cards, are secured (with the customer's utility service). Because the telephone service provider has greater leverage than a typical bank, it is less likely to have to spend large amounts of money on collections; 5 The calling card infrastructure is designed to handle much smaller payments than the financial services infrastructure; Telephone companies can leverage the security available from the existing PSTN to provide better security and user authentication; Telephone companies are generally trusted by both the public 10 and merchants, and so they can serve as a suitable "trusted third party" in contract protocols; and User identity can be kept private for those transactions that do not involve shipping (e.g., paying for downloaded maps or videos). Additional objects, advantages and novel features of the invention will 15 be set forth in the description which follows and, in part, will become more apparent to those skilled in the art upon examination of the following or may be learned by practice of the invention. The objects and advantages of the invention may be realized and attained by means of the instrumentalities and combinations particularly pointed out in the appended claims. 20 BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 illustratively depicts the system architecture of the present invention. FIG. 2 is a state diagram depicting the information flow between the 25 elements depicted in FIG. 1 in carrying out a transaction over the PSTN; and FIG. 3 is a state diagram depicting the information flow between the elements depicted in FIG. 1 in carrying out a transaction over the Internet. DETAILED DESCRIPTION OF THE INVENTION Turning to FIG. 1 there is depicted a generalized schematic of a 30 system 100 in accordance with our invention. The system 100 connects users or consumers 101 to various merchants or businesses 105 and financial institutions 106 through either the Public Switched Telephone Network or Internet 111. The user's 101 connection to merchant 105 is established or -6- WO 99/49404 PCT/US99/06195 managed by a service provider or a trusted third party 112, i.e., an Internet Service Provider (ISP) or a telephone company. A calling card or eCard server 115 is also connected to the network 111 and stores a list (illustratively depicted as database 116) of calling card numbers, PINs, user names and 5 addresses, and credit limits, if any. It should be noted that although we illustratively separate the merchant 105 from the service provider 112 the merchant and service provider might be the same entity. For example, some telephone companies already have their own on-line shopping networks. In general, after service provider 112 connects the user 101 to merchant 105, lo the user 101 initiates operation of the system by selecting an item or service offered by merchant. Once a price is negotiated between the user 101 and the merchant 105, the user 101 selects the eCard as the method of payment. Once the method of payment is selected, a series of actions, discussed in detail below, are initiated and managed by eCard server 115, which actions 15 allows the user 101 to be billed for the service or good. Calling cards are issued by all major telephone companies. These cards have proven to be an effective and convenient way for customers to make toll calls when away from home. Typically, the user dials a toll-free number and types his calling card number and a secret code (PIN). The 20 service provider checks the validity of the number and correctness of the PIN and allows the user to place toll calls. Charges for the calls appear on the user's telephone bill. As such, calling cards already provide a secure method of connecting users over the PSTN. Our invention leverages the security already present in the PSTN and enhances this security on computer 25 networks, e.g., Internet, by using cryptographic techniques. The primary cryptographic technique used in our invention is private digital signatures. To use these signatures, the user 101 and the server 115 share a secret key. In order to sign a document, the user 101 appends the secret key to the document and computes a cryptographic checksum, using a 30 standard cryptographic hash function such as MD5 or SHA. The checksum is sent along with the document to the server 115, which performs the same checksumming process. If the checksums agree, the server 115 can be sure that document was signed by the user 101. A private digital signature is the preferred encryption method because each telephone calling card customer -7- WO 99/49404 PCT/US99/06195 can be given a private key at the time the card is disbursed. Private key encryption is also better suited for our invention because here there is no arbitrary person to whom consumers must identify themselves. More importantly, private key encryption is cheaper to implement and takes 5 advantage of the fact that the service provider issues calling cards and serves as the trusted third party. Nonetheless, public key cryptographic techniques may also be used to authenticate the signature of the customer. Turning now to FIG 2., there is illustrated the method steps of a first embodiment of our invention which allows a consumer to make a purchase o10 over the PSTN. As FIG. 2 shows the process begins when a consumer or customer 101 places a telephone call 202 to a merchant 105 from either the consumer's home, or by using a calling card, or through some other mechanism identifies himself to the PSTN. Once the consumer's identity is established, the consumer's service provider system or PSTN 11 establishes 15 the call 202 between the consumer 101 and the merchant 105. The consumer 101 and merchant 105 then negotiate a transaction 208. Once negotiations are completed the consumer 101 hits a predetermined sequence of keys 210 on the telephone pad, e.g., flash hook followed by *678, to signal the service provider system 111 that a consumer 20 wishes to make a purchase. When the service provider system 111 receives this sequence or signal 210 the system 111 temporarily disconnects both the merchant 105 and the consumer 101 and establishes two new calls, one 212 to the consumer 101 and the other 214 to the merchant 105. Alternatively, instead of temporarily disconnecting the merchant 105 and consumer 101 the 25 system may alternate temporarily disconnecting the merchant 105 and the consumer 101 from the call. If the consumer is using a calling card, the consumer is queried for his PIN, step 216. Of course, if the consumer is calling from home a PIN may not be necessary. While the customer is queried for his PIN, step 216, the merchant is also queried to enter the 30 transaction amount, step 218. The consumer and merchant then each return the information requested, steps 220 and 222, respectively. In returning the information requested both the consumer and the merchant may also be requested or allowed to return additional information pertaining to the transaction. For example, the consumer may input his name and address, -8- WO 99/49404 PCT/US99/06195 step 224, and have this information recorded by the service provider 111. Likewise, the merchant may input its name and the items purchased, step 226, and have this information recorded by the service provider 111. This additional information provided by the merchant may be disclosed to the 5 consumer or vice versa. Furthermore, the merchant may forward the information by way of an audible invoice or an invoice on the Internet to the service provider. However, the additional information is not needed to consummate the sale. This is the case because both parties to the transaction already know the item selected and the price. 10 The service provider then checks the consumer and merchant records to select an appropriate form of payment and the availability of funds on the part of the consumer, step 227. As illustrated by FIG. 2, step 227 involves the service provider accessing the eCard server 115. It should be noted that although in the above description the service provider system 111 is 15is described as collecting information from the consumer and the merchant, the service provider system 111 may also function as traffic cop allowing the eCard server 115 to request, collect, and manage the entire transaction. Once the method of payment is selected the service provider plays the product description and price to the consumer, step 230, and receives 20 confirmation from the consumer, step 232. Once confirmation is received the consumer and merchant are then reconnected, step 235. In a second embodiment of our invention, and as illustrated in FIG. 3, the consumer may also purchase items over the Internet using an application available on the World Wide Web (Web). The consumer begins the 25 transaction by dialing into an Internet Service Provider (ISP) modem pool, inputting a user identification code and password, step 302. The ISP then validates the user and establishes a connection to a Web page from which the customer negotiates an item and price, step 304. The consumer then clicks on a eCard icon, step 306, on the Web page used to negotiate the 30 transaction; note that the Web page may be the Web page of the consumer or some other trusted third party. As a result two new connections are created, one from the consumer to the eCard server, connection 308, and one from the eCard server to the merchant, step 310. The eCard server then queries the consumer for his calling card PIN, step 312. At the same time, the -9- WO 99/49404 PCT/US99/06195 merchant is requested to enter the amount of the transaction on an invoice or purchase order 314. As was the case in the previous embodiment of our invention, the consumer and merchant may optionally record a message indicating any other specific terms related to the transaction, steps 318 and 5 320, respectively. Using voice, a Web page, or off-line email the service provider system may optionally play a recording of the customer's voice and name. The system then checks the customer and merchant records , step 330, to select an appropriate form of payment (typically on the calling card account, but possibly on a credit card, ATM, etc.). The system then confirms o10 to the customer, step 336, the product description and price and also receives confirmation from the customer, step 338. After customer confirmation, step 338, the consumer is again free to roam the Web and make another purchase. The above description has been presented only to illustrate and 15 describe the invention. It is not intended to be exhaustive or to limit the invention to any precise form disclosed. Many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application to enable others skilled in the art to best utilize the 20 invention on various embodiments and with various modifications as are suited to the particular use contemplated. -10-

Claims (9)

1. A method for electronic commerce using a trusted third party comprising the steps of: a customer identifying himself to a network using a telephone calling 5 card and the network completing a connection between the customer and a merchant; negotiating, between the buyer and merchant, the terms for sale of an item selected by the customer; signaling the trusted third party that the identified customer wishes to 10 make a purchase; forwarding, by the customer, a PIN to the trusted third party; forwarding, by the merchant, an invoice having information on the selected item to the customer; forwarding the invoice to a server for validation of the customer's 15 approval and availability of funds; securely signaling, by the customer, approval of the merchant's invoice; and signaling, by the server, to the customer and the merchant approval of funds disbursement. 20
2. The method of claim 1 further comprising the step of billing the purchase to the customer's telephone or calling card bill.
3. The method of claim 2, wherein the step of customer identification comprises the steps of the user dialing a number for a telephone service provider, said dialed number having a PIN code uniquely associated 25 with the customer, and the telephone service provider validating the identity of the customer based on the dialed PIN code.
4. The method of claim 3, where said customer signaling approval step comprises the substeps of: the telephone service provider establishing two independent telephone 30 calls, one call each to the customer and merchant; the telephone system playing a recording of the merchant invoice for the customer; and the telephone system collecting a keyed or spoken approval response from the user. -11- WO 99/49404 PCT/US99/06195
5. The method of claim 4, where the customer approval of an invoice comprises the substeps of the user obtaining a copy of the invoice and the user signing the invoice using a digital signature, created using either public or private key cryptography. 5
6. The method of claim 1, wherein the step of the customer identifing himself to the network comprises dialing into an Internet Service Provider modem pool.
7. The method of claim 6, wherein the step of the customer identifying himself to the network further comprises the steps of the user using 1o a computer to dial into said Internet Service Provider modem pool, inputting of a unique identification code by the user, and the Internet Service Provider validating the identity of the customer based on the inputted unique identification code.
8. The method of claim 7 where the step of the customer signaling 15 approval of an invoice comprises the step of: the customer placing a copy of the invoice into an eCard application running at the customer's computer; the eCard application querying the customer for a password; the eCard application creating a customer digital signature based on 20 the password; the eCard application appending the digital signature to the invoice; the eCard application mailing a copy of said appended invoice to the merchant; submitting, on the part of the merchant, of the signed invoice to an 25 eCard server; and validating, at the eCard server, the signature of the customer.
9. The method of claim 8, wherein said step of creating a customer digital signature is done using either public or private key cryptography. -12-
AU31081/99A 1998-03-24 1999-03-22 A method for using a telephone calling card for business transactions Abandoned AU3108199A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US7915698P 1998-03-24 1998-03-24
US60079156 1998-03-24
PCT/US1999/006195 WO1999049404A1 (en) 1998-03-24 1999-03-22 A method for using a telephone calling card for business transactions

Publications (1)

Publication Number Publication Date
AU3108199A true AU3108199A (en) 1999-10-18

Family

ID=22148789

Family Applications (1)

Application Number Title Priority Date Filing Date
AU31081/99A Abandoned AU3108199A (en) 1998-03-24 1999-03-22 A method for using a telephone calling card for business transactions

Country Status (8)

Country Link
EP (1) EP1064611A1 (en)
JP (1) JP2002508547A (en)
KR (1) KR20010034629A (en)
CN (1) CN1298526A (en)
AU (1) AU3108199A (en)
CA (1) CA2324114A1 (en)
ID (1) ID28328A (en)
WO (1) WO1999049404A1 (en)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU763571B2 (en) 1998-12-23 2003-07-24 Chase Manhattan Bank, The System and method for integrating trading operations including the generation, processing and tracking of and trade documents
CA2293098A1 (en) * 1998-12-23 2000-06-23 Nortel Networks Corporation Arrangement for billing or billing authorization using a telecommunication network
ITMI992363A1 (en) * 1999-11-11 2001-05-11 Roberto Colli NETWORK PAYMENT TRANSACTION PROCEDURE THROUGH PREPAID CARD AND RELATED CARD
SE516782C2 (en) 1999-11-23 2002-03-05 Ericsson Telefon Ab L M Method of payment of goods in an electronic trading system as well as a payment system
AU780943B2 (en) * 1999-12-30 2005-04-28 International Business Machines Corporation Method of payment by means of an electronic communication device
GB2357730A (en) * 1999-12-30 2001-07-04 Ben Block Pre-paid internet card
AU2000226388A1 (en) * 2000-01-10 2001-07-24 Robert John Powell Internet business method
US7822656B2 (en) 2000-02-15 2010-10-26 Jpmorgan Chase Bank, N.A. International banking system and method
US6871140B1 (en) 2000-02-25 2005-03-22 Costar Group, Inc. System and method for collection, distribution, and use of information in connection with commercial real estate
SG103279A1 (en) * 2000-04-11 2004-04-29 Sony Corp Business management method, business management apparatus and data broadcast delivery method
US7778934B2 (en) 2000-04-17 2010-08-17 Verisign, Inc. Authenticated payment
KR20010106586A (en) * 2000-05-22 2001-12-07 송용근 Electric billing system using pay phone card and the method
US20010047334A1 (en) * 2000-05-24 2001-11-29 Victor Nappe System and method for using existing prepaid card systems for making payments over the internet
GB2362979A (en) * 2000-06-02 2001-12-05 Nokia Mobile Phones Ltd Enabling provision of goods or services
WO2001097554A2 (en) 2000-06-12 2001-12-20 Xacct Technologies Ltd. System, method and computer program product for charging for competitive ip-over-wireless services
DE10039569C5 (en) * 2000-08-09 2007-04-26 Vodafone Ag Procedure for payment at any sales or service points with mobile phone
WO2002017181A1 (en) * 2000-08-22 2002-02-28 Payperfect Pte Ltd. Electronic payment methods
US7107248B1 (en) * 2000-09-11 2006-09-12 Nokia Corporation System and method of bootstrapping a temporary public-key infrastructure from a cellular telecommunication authentication and billing infrastructure
FI20002139A (en) * 2000-09-29 2002-03-30 Pasi Kapiainen System for controlling a motorized door or electric lock and for access control using a telephone device
US7174301B2 (en) 2000-10-23 2007-02-06 Costar Group, Inc. System and method for accessing geographic-based data
US7487114B2 (en) 2000-10-23 2009-02-03 Costar Group, Inc. System and method for associating aerial images, map features, and information
US7076452B2 (en) 2000-10-23 2006-07-11 Costar Group, Inc. System and method for collection, distribution, and use of information in connection with commercial real estate
US7640204B2 (en) 2000-10-23 2009-12-29 Costar Group, Inc. System and method for collection, distribution, and use of information in connection with commercial real estate
GB0028729D0 (en) * 2000-11-24 2001-01-10 Nokia Oy Ab Improvement in and relating to transaction security
US8805739B2 (en) 2001-01-30 2014-08-12 Jpmorgan Chase Bank, National Association System and method for electronic bill pay and presentment
FI20011498A0 (en) * 2001-07-09 2001-07-09 Ericsson Telefon Ab L M Method and system for verification of electronic signatures
US8280793B1 (en) * 2001-07-16 2012-10-02 West Corporation Prepaid calling card accounts linked to credit card accounts, with methods for creating and managing the same
KR20030049304A (en) * 2001-12-14 2003-06-25 신용균 Business method and system for settling an account by cash credit cyber gifts card and computer readable medium stored thereon computer program for performing the method
US7689482B2 (en) 2002-05-24 2010-03-30 Jp Morgan Chase Bank, N.A. System and method for payer (buyer) defined electronic invoice exchange
US20030220863A1 (en) 2002-05-24 2003-11-27 Don Holm System and method for varying electronic settlements between buyers and suppliers with dynamic discount terms
JP4843503B2 (en) 2004-01-20 2011-12-21 カール・ツァイス・エスエムティー・ゲーエムベーハー Microlithographic projection exposure apparatus and measuring apparatus for projection lens
US8554673B2 (en) 2004-06-17 2013-10-08 Jpmorgan Chase Bank, N.A. Methods and systems for discounts management
US9058626B1 (en) 2013-11-13 2015-06-16 Jpmorgan Chase Bank, N.A. System and method for financial services device usage

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4759063A (en) 1983-08-22 1988-07-19 Chaum David L Blind signature systems
US4949380A (en) 1988-10-20 1990-08-14 David Chaum Returned-value blind signature systems
US5353335A (en) * 1992-08-03 1994-10-04 At&T Bell Laboratories Multilingual prepaid telephone system
US5825863A (en) * 1995-12-11 1998-10-20 Walker Asset Management Limited Partnership Prepaid limited usage calling card

Also Published As

Publication number Publication date
KR20010034629A (en) 2001-04-25
WO1999049404A1 (en) 1999-09-30
JP2002508547A (en) 2002-03-19
CN1298526A (en) 2001-06-06
EP1064611A1 (en) 2001-01-03
ID28328A (en) 2001-05-10
CA2324114A1 (en) 1999-09-30

Similar Documents

Publication Publication Date Title
AU3108199A (en) A method for using a telephone calling card for business transactions
US7483858B2 (en) Network-based system
US8650126B2 (en) Method, apparatus and program to make payment in any currencies through a communication network system using pre-paid cards
AU2005201681B2 (en) Method and apparatus for conducting commerce between individuals
US6805289B2 (en) Prepaid card payment system and method for electronic commerce
US10185936B2 (en) Method and system for processing internet payments
US7835960B2 (en) System for facilitating a transaction
US6594647B1 (en) Real time bank-centric universal payment system
US6704714B1 (en) Virtual private lock box
CN100359531C (en) Secure authentication and payment system
US20090327133A1 (en) Secure mechanism and system for processing financial transactions
US20010051902A1 (en) Method for performing secure internet transactions
US20030140004A1 (en) Method and system for processing internet payments using the electronic funds transfer network
KR20050057211A (en) A method and system for transferring funds
WO1997019414A1 (en) Computer network value payment system
WO2000067178A2 (en) Anonymous on-line payment system and method
KR20020041867A (en) The electronic authentication and payment method using CID(caller identification disply) in electronic transaction
MXPA00009080A (en) A method for using a telephone calling card for business transactions
WO2001046922A2 (en) Method and apparatus for securely conducting financial transactions over an insecure network
Gelinas Jr et al. Internet payment mechanisms: acceptance and control issues
WO2002029740A1 (en) Network oriented payment service
JP2012178172A (en) Method and system for transferring funds

Legal Events

Date Code Title Description
MK5 Application lapsed section 142(2)(e) - patent request and compl. specification not accepted