EP0993642A1 - Zahlungssystem und verfahren das jetons verwendet - Google Patents

Zahlungssystem und verfahren das jetons verwendet

Info

Publication number
EP0993642A1
EP0993642A1 EP98955880A EP98955880A EP0993642A1 EP 0993642 A1 EP0993642 A1 EP 0993642A1 EP 98955880 A EP98955880 A EP 98955880A EP 98955880 A EP98955880 A EP 98955880A EP 0993642 A1 EP0993642 A1 EP 0993642A1
Authority
EP
European Patent Office
Prior art keywords
tokens
party
token
user
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP98955880A
Other languages
English (en)
French (fr)
Inventor
Mordhai Barkan
Yuval Barkan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP0993642A1 publication Critical patent/EP0993642A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/29Payment schemes or models characterised by micropayments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • This invention concerns systems and methods for collecting payments in a distributed digital communications environment.
  • the invention relates in particular to large networks and the Internet.
  • service providers may find it difficult to collect a fee for services performed.
  • a service provide may possibly devise a software package with an integral module which accounts for the use of the software, so that the service provider may charge the user accordingly.
  • a provider of a registered E-mail service may be paid for services provided.
  • a weak point in such a software is that it is too easy to neutralize the accounting module, to render it inoperable, so that the user may use the software for free. And, if one user does not have the required technical skills for that, he/she may be sure that a hacker somewhere across the globe already did it, and that a "cracked/broken" version of the software is available on the Internet. Thus, a hacker or unauthorized person may spread worldwide a software package to attack the legitimate software. This may result in a large scale misuse of the software, while avoiding the required payment.
  • Another approach to the fee collecting problem may be to channel all transactions through the service provider's facility.
  • the service provider then has control on any and all transactions being performed, and can enforce a payment policy as desired.
  • Still another payment method may include the user using his/her credit card to pay in real time for any transaction.
  • the disadvantage of this method is that the credit card number may be compromised, since the Internet and similar links are not secure. If an unauthorized person intercepts the credit card information, this may be used in fraudulent transactions. The card owner may find it difficult to prove a specific transaction was not authorized, or even to detect some of the unauthorized charges.
  • a provider of walkie-talkie devices or wireless sets cannot collect a fee from each call, since the communication is direct between users, without the manufacturer's mediation.
  • Another example is the use of a software for premium services relating to E-mail. It may be advantageous both to manufacturer and user to charge per use, not a global fee for the software. But how to account for use of the software? The manufacturer may even not be aware of the existence of the user, who may have obtained the software from a third party.
  • the object is basically accomplished using a method of payment including the steps of (a) A transaction management unit receives from a user there a request to perform a service for which payment with tokens is required; (b) The management unit checks whether there are yet unused tokens available in the system. If an unused token was found, go to step (c) ; If there are no available tokens, then the service cannot be performed, END; (c) The management unit requests information on an available token and changes its status to "canceled"; (d) During the subsequent transaction with the second party, the management unit sends information relating to the token now used and canceled to the second party.
  • the invention allows a third party to collect a fee from a transaction between two parties, even though the third party does not participate in transactions between the two parties.
  • a user is provided with electronic tokens or stamps, against a payment.
  • the user while using the service performed by the service provider, destroys a token or stamp as payment for that service.
  • the tokens are all "used” or “destroyed” , so the user has to buy new tokens for future use of the service.
  • the method may be used to pay for various available services or products.
  • the user is required to make public or present proof that he/she indeed did destroy the tokens as required.
  • a party to a transaction and the public in general can monitor the legitimacy of the use of tokens by a specific user.
  • a large number of possible monitoring persons may verify a large number of the service or software, to ensure there are no illegitimate transactions, or at least that the number of these illegitimate transaction will not grow to large numbers.
  • the system and method performs an automatic process of presenting proof of destroying the tokens, and of checking that the other party presented a legitimate proof as well.
  • users will check each other with respect to the performance of payments as required, without requiring a deliberate effort on the part of the users.
  • the software package will include means for automatically displaying and reporting any detected lack of payment or lack of report of tokens being destroyed as required.
  • the system and method include means for diffusing the information on the use of tokens among many users, to allow high visibility of each user's proper conduct.
  • tokens provider Another important aspect of the use of tokens is to pay to a second party for a service or product. Whereas the tokens provider will eventually pay to the second party, there is no need that the tokens provider approve in real time each and every transaction. Moreover, the invention discloses an effective method for dissemination of tokens to users.
  • the special structure and operation of a large-scale, distributed payment system impose special requirements, including inter alia the need to effectively distribute tokens to a huge number of users of these tokens, and to keep track of them all.
  • Fig. 1 illustrates the structure of a system for presenting reports on tokens to other users, and for monitoring other's reports.
  • Fig. 2 details the structure of a token information management and storage database.
  • Fig. 3 illustrates the structure of a report detailing the use of tokens.
  • Fig. 4 illustrates the use of reports on tokens in transactions between various users, with Figs. 4(A), 4(B) and 4(C) illustrating three possible consecutive transactions.
  • Fig. 5 illustrates another embodiment of the structure of a report detailing the use of tokens.
  • Fig. 6 illustrates a structure of a tokens use report, with means for token use diffusion among users.
  • a system for presenting reports on tokens to other users and for monitoring other's reports may include the following parts:
  • a transactions management unit 11 using tokens.
  • the unit 11 is activated when the user requires to perform a service for which payment using tokens is required.
  • a service may include a special type of E-mail or an encryption procedure or other service provided, on the Internet or elsewhere.
  • a tokens database 12 which includes information on tokens acquired from the service provider, which is usually also the tokens issuer.
  • Unit 11 reads tokens from the database 12 each time there is a requirement to use the service and pay with tokens. Only if there are tokens available, will the service be performed. If the service is performed, then the database 12 is instructed to "cancel" the token, that is to indicate that the token was used. Thus, database 12 serves as a storage for tokens, keeping both used and available tokens and additional information related to these tokens.
  • tokens use monitoring unit 13, to verify the correct use of tokens by other parties who connect to the system as shown.
  • Each token also includes status indicating means, which change from "ready” to "used” or "canceled” after a token is used.
  • Channel 15 may include a telephone line and/or a wireless link or a connection to Internet or other means for performing a digital communication session with other users.
  • Tokens may be used as payment means for a wide variety of services, for example including but not limited to registered E-mail, legal E-mail, permits generation and management, certificates generation and management.
  • Tokens may also be used to pay for products in commercial transactions over the Internet.
  • a method for providing service with tokens used as payment means may include the following steps:
  • Transaction management unit 11 receives from the local user a request to perform a service for which payment with tokens is required.
  • Unit 11 checks whether there are yet unused tokens available in the system, that is in tokens database 12, that is tokens whose status is "ready” as opposed to "used” or "canceled".
  • step (c) If an unused token was found, go to step (c) ;
  • Unit 11 requests and/or retrieves information on an available (unused as yet) token from the database or storage unit 12. The status of the token which was retrieved will be automatically changed in the database 12, and will thereafter be designated as "used” or "canceled".
  • unit 11 sends information relating to the used token to that other party, through channel 15.
  • a method for monitoring proper use of tokens by other users may include the following steps:
  • Tokens use monitoring unit 13 receives reports from other users, indicating their use of tokens and cancellation of tokens in each transaction.
  • Unit 13 transfers the received reports to a database of tokens reports 14, which including information on use of tokens by other users.
  • a database of tokens reports 14 which including information on use of tokens by other users.
  • latest information on tokens is store, and oldest information is discarded.
  • Unit 13 requests and/or retrieves information on previous reports from the same user from database 14.
  • Unit 13 processes reports on the use of tokens by the other user, comparing according to predefined criteria.
  • unit 13 stores that information in database 14 and/or displays a violation report and/or reports that to the tokens issuer, and/or sends a note to the user of such token.
  • the abovedetailed system and method allow a third party (the tokens issuer) to collect a fee from a transaction between two parties, even though that third party does not participate in transactions between the two parties.
  • Tokens may be loaded into the wireless set and their use accounted for as detailed above, including a report to the other party for verification purposes.
  • wireless sets like citizen band systems can now be sold at a discount or even distributed for free, like cellular sets.
  • cellular sets connect through a center and bring a fee to the manufacturer each time the set is used, wireless sets are used directly between users and a fee policy could not be enforced.
  • Another example - now a software package for premium services relating to E-mail may be freely distributed, and the provider may get paid as the package is used.
  • the package is used directly between users, without the intervention of the software provider, the use of tokens as per the present invention ensures that the software provider will be paid for the service.
  • the invention may be advantageously used to pay for services on a network, especially for services required irregularly, where the user desires to pay per use.
  • a user may desire to connect to a database.
  • the prevalent method of payment now in use is a subscription for a fixed period, so that during that period the user is permitted unlimited access to the database, or a given amount of time. This may not be a satisfactory solution, since there are so many databases and other services now available, that a user may desire to use just a short time in each of them. But it may not be economical to subscribe to all of them, and to pay for a long time in each, where the user expects not to fully utilize all that time.
  • resources in a net may be hardcopy printers belonging to a third party.
  • a user may use the printer and pay with tokens, according to the volume of use, or the number of pages printed.
  • Another example would be for network computers.
  • a new concept in computers relates to a system where each user will have just a simple, low cost computer, and will use software resources available in the net. For a commercially viable system, there should be a payment for the use of these resources.
  • Resources may include advanced word processors, database systems, super fast signal processors and much more. There are so many resources available, and so many users. There is the difficult problem of paying for the use of these resources, and for accounting for actual use of each resource by each user.
  • the provider of the services may offer the services through many outlets. Separately, the provider sells tokens for the use of these resources. Then the provider does not have to take part in every transaction, but the tokens will be used and new tokens will have to be bought by users, as detailed above.
  • the abovedetailed applications refer to payments to a third party for services rendered.
  • tokens may each represent a fixed amount of money or time of use of resource, or a specific number of calls using a resource.
  • a token may represent a prepaid amount of money, or a credit to that specific amount.
  • An example involves not the Internet, but a local net, like a net in a business center. Many firms may have offices in the center, and they all may occasionally use services provided by other firms there, like printing or copying or data archiving or CD-ROM programming or ordering products like office supplies.
  • Another example is in motels where a counter is activated for the use of electricity or gas.
  • the counter is coin operated, and the guest pays in advance for a specific amount of the service to be used.
  • tokens are used to actually pay to a second party for a service or product. Unlike prior systems, here there is no need that the tokens provider approve in real time each and every transaction. Thus, no huge centers are required to support all the transactions in the world.
  • Fig. 2 details the structure of a token information management and storage database.
  • Database 12 may include token identification part 21 , which includes (not shown) token unique serial number and optional additional information, all signed or encrypted with the private key of the service provider and/or the tokens issuer.
  • the optional information may include the value of a token, if several products/services are available.
  • Tokens may be presented to various providers of services or products. If token is presented to a third party, that party may require payment from the tokens issuer, so in effect the issuer performs the actual payment between users.
  • a token status part 22, indicates whether the token was already used or not. If not - it is ready and available for the next use.
  • Tokens are preferably arranged in chronological order of use, with last used token placed first in the list, as shown.
  • Unused tokens are preferably arranged in chronological order with earliest token first. This structure allows for more efficient, faster processing by recipient.
  • Tokens T-103 to T-1 1 1 , T-903 and T-903 are ready to use.
  • Tokens T-100 to T-1 1 1 may have been issued at a specific date, with tokens T-903 and T-903 issued at a later date. Hence the different serial number and the relative location in the table.
  • Fig. 3 illustrates the structure of a report detailing the use of tokens. This is sent to another user during a transaction therebetween which requires that User-1 will "spend” or “use” or “lose” a token. The report is sent so as to show the other party that indeed payment was performed for the transaction.
  • This report enables the second party to verify that indeed User-1 had a token available prior to the transaction, and did destroy that token during the transaction, as required.
  • User of service ID 331 contains the name or nickname or other information to identify the user who pays with tokens.
  • the name should be understood or traceable by the service provider and/or tokens issuer, since they are the ultimate party who monitors the use of their tokens. In this example, a nickname "User-1 " is reported.
  • Tokens are preferably arranged in chronological order of use, with the last used token (the token used in the present transaction) being placed first in the list, as shown.
  • the report may otherwise indicate which token was used last, and the order of use of previous tokens. This information is helpful to allow monitoring for correct use of tokens, as detailed below. There may be a limit on the number of used tokens reported, to keep the communications effective. Then - only the last token(s) may be transmitted to other users, for example one or five or ten or 100 for example. Here, only three previous tokens are shown, however the actual number of tokens may be much larger.
  • the date of use 332 indicates the date of use of the service, that is the day when a specific token (to be detailed as well) was destroyed or canceled. In the example, the date is 10.26.97.
  • the time of use 333 is the time when the token was canceled, here 19.55 .
  • a common time may be used by all the users in the system, for example Greenwich time.
  • each user presents his/her local time. Since time of various reports is compared separately for each user, there is no need to compare time reports among different users, so there is no need for a uniform time base.
  • the token ID 334 indicates the specific token which was used in the present transaction, in this example the value was T-103.
  • Token ID 334 may include (not shown) an unique serial number, together with the signature of the tokens issuer. The signature may use the private key of the issuer. Alternatively, an unique combination of serial code and date may be used. In still another embodiment, a digital code indicative of time of issue may be used.
  • Additional optional information may include the details of the buyer of that token (to whom it was sold), an expiry date and/or other information. All the information may be signed by the tokens provider.
  • Previous token ID 335 indicates the token which was used in a previous transaction by User-1 , that is the last token used before token T-103. In the example, this was token T-102.
  • a report including this information allows the other party to the transaction to verify that the tokens reported to be used are changing with time, that is that User-1 updates his/her tokens database and presents each time a different token, thus User-1 pays for the transaction with tokens, as required.
  • the date of use 336 may be useful for monitoring the use of tokens, here its value is 10.22.97 .
  • the time of use 337 allows a more precise comparison and evaluation of reports, here it was 14.50 .
  • a plurality of previously used tokens is preferable since it increases the chance that the other party has in their database a related report, and can detect discrepancies if the use of tokens was not proper.
  • previous token ID 338 is T-101
  • date of use 339 is 10.22.97
  • Time of use 340 is 13.15.
  • the date of use 342 was 10.22.97, and the time of use 343 was 11 .05 .
  • the signature of user 344 is proof that User-1 sent that report. It may include a hash or CRC of the abovementioned information, encrypted with the private key of User-1 .
  • a tokens use monitoring unit 13 (See Fig. 1 ) at another user's facility may monitor the transaction for proper use of tokens.
  • the monitoring unit 13 uses information in a database of tokens reports 14 attached thereto.
  • An implementation of a monitoring routine is illustrated as Method 13 below. The method is automatically performed by computer means (not shown) at another user's facility.
  • a second user upon receiving a tokens use report, can evaluate the report to determine whether improper use of tokens has been made by User-1 , by performing the following steps:
  • step (z) store, display and/or report misuse of tokens ).
  • step (z) store, display and/or report misuse of tokens ).
  • Each token in the report is compared with tokens stored in the database of tokens reports 14 (see Fig. 1) , for User-1 .
  • step (z) If a token with the same ID was detected, but with a different time/date, or a token with an identical time/date but with a different token ID was found in the database, then a discrepancy was detected, go to step (z) . d.
  • the time span of the tokens in the report is evaluated, that is the time between the first used token and the last used token.
  • step (z) If a token report was found in the database, whose time is within the above time span but for which there is no corresponding token report in the report, then a token report is missing, thus a discrepancy was detected, go to step (z).
  • the method can thus effectively prevent large scale fraud and avoidance of payments due.
  • Fig. 4 illustrates the use of reports on tokens in transactions between various users.
  • a first user 1 User-1
  • a first user 1 connects through communication channel 15 to a second user 18 (User-2 in the example) .
  • a tokens use report 3 is sent from first user 1 to the second user 18.
  • Report 3 includes details on token T-104 (the presently used token) as well as previously used tokens T-103, T-102, T-101 and T-100.
  • a report 3 may be more detailed, to include for example information as detailed in Fig. 3 above.
  • FIG. 4(B) A subsequent transaction is illustrated in Fig. 4(B).
  • the first user 1 (User-1 ) connects to a third user 19 (User-51 ), through communication channel 152.
  • the communication channels may be different, or the same channel may be used.
  • a tokens use report 38 is sent from first user 1 to third user 19.
  • Report 38 is an updated version of report 3 above, to indicate token T-105 as the presently used token.
  • Token T-104 now belongs to the previously used tokens list, together with T-103, T-102 and T-101 . Assuming that the reports are limited to four previous tokens, then token T-100 (the oldest) is now removed from the report.
  • the list may include many more tokens, however it should preferably be limited anyway, to prevent waste of communication time and of storage space. Thus, a limit will be reached eventually, and then the oldest tokens will be removed from subsequently transmitted reports.
  • FIG. 4(C) A later transaction is illustrated in Fig. 4(C).
  • the first user 1 (User-1 ) connects again to the second user 18 (User-2).
  • a communication channel 152 may be used, maybe a channel different than that used in the previous transaction illustrated in Fig 4(A).
  • a tokens use report 39 is sent from first user 1 to second user 18.
  • report 39 is an updated version of report 38, to indicate token T-106 as the presently used token.
  • Tokens T-105, T-104 now belong to the previously used, tokens list, together with T-103 and T-102. Token
  • T-101 (the oldest) is now being removed from the report 39.
  • step (z) store, display and/or report misuse of tokens ).
  • report 3 indicates that token T-104 was used, whereas later report 39 indicates the use of token T-105. Therefore, there appear to be no discrepancy in this respect.
  • step (z) store, display and/or report misuse of tokens .
  • each token in one report 39 is compared with the tokens stored in the other report 3. If there is an overlap between the tokens, then the tokens should appear in the same order, with none missing, otherwise a discrepancy is declared.
  • report 39 details used tokens as T-107, T-106, T-105, T-103 and T-102, whereas report 3 indicated tokens T-104, T-103, T-102, T-101 and T-100, then a discrepancy was found - in the later report 39 the use of token T-104 between T-103 and T-105 is missing.
  • the method is efficient in a statistical sense. However, by comparing two or more reports from the same user, a higher probability of detecting fraud by the first user 1 is achieved.
  • Fig. 5 illustrates another embodiment of the structure of a report detailing the use of tokens, with means for transferring information on use of tokens between users.
  • the logical parts of the report in column 31 with an example of possible specific values assigned to these parts in column 32.
  • the report here differs from that illustrated in Fig. 3 in that now the sender signs each token used, separately.
  • the report includes
  • User of service ID 331 contains the name or nickname or other information to identify the user who pays with tokens. Again, tokens are preferably arranged in chronological order of use, with the last used token placed first in the list, as shown.
  • Date of use 332 indicates the date of use of the service, that is the day when a specific token (to be detailed as well) was destroyed or canceled. In the example, the date is 10.26.97.
  • Time of use 333 is the time when the token was canceled, here 19.55 .
  • Token ID 334 indicates the specific token which was used in the present transaction, in this example the value was T-103.
  • Signature-3 346 is the signature of the sender (User-1 ) on the last token used, that is T-103 and related information. In the example, its value is 359771 1 .
  • This structure allows the recipient to distribute part of the token information to other users, so as to diffuse the information relating to the use of tokens.
  • This allows each user to store information on the use of tokens from various users in their respective database of tokens reports 14, and to subsequently compare the information with other reports from other users or from a user directly reporting to them on the use of tokens.
  • Fig. 6 illustrates a structure of a tokens use report, with means for diffusion of reports about token use among other users.
  • the report includes two parts, a report on own use of tokens 41 and a report on other's use of tokens 42
  • the report 41 includes information on last tokens used by the present sender, as detailed in Fig. 5 above and the related description. It includes an indication of the user of service ID 331 , with the name or nickname or other information to identify the sender. Date of use 332 indicates the date of use of the service, that is when the token 334 was canceled.
  • Time of use 333 is the time when the token 334 was canceled.
  • Token ID 334 indicates the specific token which was used in the present transaction.
  • Signature-3 346 is the signature of the sender (User-1 ) on the last token used.
  • report 41 further includes information on previously used tokens as illustrated in Figs. 6 and 5.
  • a report on others' use of tokens 42 is a collection of token reports from various user, as sent by other users when they connected to the present sender and reported their use of tokens.
  • user of service ID 421 refers to an user designated as User-5, who had previously reported the use of a token on the Date of use 422, that is the date when the token 424 was canceled in the User-5 tokens database.
  • Time of use 423 is the time when the token 424 was canceled.
  • Token ID 424 indicates the specific token which was then used.
  • Signature-37 425 is the signature of the sender (User-5) on the report relating to the use of that token, T-788 used.
  • report 42 further includes information on other users' use of tokens, like User-19 illustrated there.
  • Each such token report is extracted from a report from another user, in the form as illustrated in Fig. 5.
  • each token can be included by recipient in his/her reports to other users.
  • the advantage of the method is that the public becomes the watchdog over the proper use of the tokens.
  • the process is automatic, thus fast and effective, and does not require an effort on the part of the user.
  • a. unit 11 requests and/or retrieves information on an available (unused as yet) token from the database or storage unit 12, as well as information on previously used tokens;
  • unit 11 prepares a first part of a token use report, including information on the last token used as well as previous tokens used by the present user;
  • tokens use monitoring unit 13 request and/or retrieves from unit 14 reports on the use of tokens by other users, and transfers these reports to unit 11 ;
  • unit 11 prepares a second part of a token use report, including information on the use of tokens by other users;
  • a report including the first part prepared in step (b) and a second part prepared in step (d) is sent to another user during a paid transaction.
  • the second part of the report in step (d) may be performed by unit 13, then sent to unit 1 1 or directly to the other user.
  • information relating to violation of token use rules by others is always included in the token use report. Thus the information on violations or fraud is diffused throughout the system, until it reaches the tokens issuer or other party with enforcing capabilities.
  • Tokens use monitoring unit 13 receives reports from other users, indicating their use of tokens, as well as information on the use of tokens by others;
  • Unit 13 transfers the received reports to a database of tokens reports 14;
  • Unit 13 organizes the information in database 14 according to chronological order and separately for each user;
  • step (z) store, display and/or report misuse of tokens .
  • step (z) store, display and/or report misuse of tokens .
  • step (z) store, display and/or report misuse of tokens ).
  • Each token in the report is compared with tokens stored in the database of tokens reports 14 (see Fig. 1) , for User-1 .
  • step (z) If a token with the same ID was detected, but with a different time/date, or a token with an identical time/date but with a different token ID was found in the database, then a discrepancy was detected, go to step (z) .
  • the time span of the tokens in the report is evaluated, that is the time between the first used token and the last used token. If a token report was found in the database, whose time is within the above time span but for which there is no corresponding token report in the report, then a token report is missing, thus a discrepancy was detected, go to step (z).
  • the present invention discloses an effective method for dissemination of tokens to users.
  • One possible method is to create a file "token" , to include an indication of the value of the token, signed or encrypted with the private key of the tokens provider.
  • Each token may represent a fixed amount of money or time of use of resource, or a specific number of calls using a resource, as the need be.
  • a disadvantage of the above method is that, for huge amounts of tokens distributed to many users, it may be difficult for the tokens issuer to keep track of them all, to prevent duplicates and to detect fraud. Thus the tokens issuer may become a bottleneck in the digital commerce.
  • the above special requirements stem from the structure and operation of a large-scale, distributed payment system.
  • K a specific number of tokens. User pays for the tokens or uses credit, as per the business arrangement between user and tokens issuer;
  • Token issuer prepares a digital document, allowing the user to generate K tokens, with specific parameters. These may include the value of each token, and the serial number of the first and last token.
  • the digital information in the document may effectively say:
  • the above digital document is signed or encrypted with the private key of the tokens issuer, and delivered to the user.
  • the document is delivered to a software package at the user's facility, a software which is responsible for tokens issuing and accounting for, that is unit 11 , see Fig. 1 ;
  • the user software (unit 11 ) checks whether a token can be issued, according to the permit/digital document. If positive, a counter of used tokens is incremented, and a token prepared with a serial number which is the successor of the last token generated, all within the serial numbers according to the digital document.
  • a token may effectively include the following: "Token No. 256, value $10, generated by User-73, according to permit from lssuer-9" .
  • the token is signed or encrypted with the private key of User-73. If encrypted, then an indication to identify User-73 should be left en clair, to allow decryption of the message. Go to step (d). If all the tokens were already generated according to the digital document issued in step (a), then no token is generated, and the user is informed accordingly "no more tokens available". END.
  • a measure of safety is achieved in the above method, since the user issuing these tokens may have to sign with his/her private key, so that each token is traceable to source, and if there is suspicion of fraudulent use, then a user may be held accountable. On the other hand, this very possibility may prevent users from misusing the tokens in the first place, thus achieving the desired safety.
  • the safety in this method is achieved not in a centralized system with the center having "dictatorial" powers and intervening in each transaction, but a distributed system “democratic” , where users participate in enforcing the tokens and payment policy, and in checking that other users do the same.
  • Method 7 a user will not report to others about the use of tokens, however the system assigns to each token a serial number, with number in ascending order.
  • a recipient of a token may compare the serial number of the presently received token with the serial number of a previous token or previous tokens. If the serial numbers are not all different from each other and in ascending order, this is an indication of tokens misuse. A tokens misuse is thus displayed for others to see.
  • the method is detailed below as Method 8.
  • Token issuer prepares a digital document, allowing the user to generate K tokens, with specific parameters. These may include the value of each token, and the serial number of the first and last token.
  • the digital information in the document may effectively say:
  • the above digital document is signed or encrypted with the private key of the tokens issuer; c.
  • the user software (unit 1 1 ) checks whether a token can be issued, according to the permit/digital document. If positive, a counter of used tokens is incremented, and a token is prepared with a serial number which equals the previous serial number plus a fixed increment (for example, the previous number plus 1 ), where all the serial numbers are within the serial numbers according to the digital document.
  • a token may effectively include the following:
  • step (a) If all the tokens were already generated according to the digital document issued in step (a), then no token is generated, and the user is informed accordingly "no more tokens available". END.
  • tokens of various value where the value of each token is embedded in the token ID as created by the token issuer. This allows the user to pay various amounts for different services or products, as the need be. This is equivalent to the use of different money bills, each having a different value.
  • the tokens may also be arranged in the order of their value.
  • the tokens database 12 may also be arranged in the order of their value.
  • several separate sections may be used in tokens database 12, each section including only tokens of a specific value.
  • the methods may be updated to permit the use of a plurality of tokens at one time/date. Such an activity will then be considered as valid.
  • the recipient has the ability to verify that the tokens are valid, by performing a hash or CRC, then decrypting the hash or CRC in the token with the known, public key of the tokens issuer, and comparing results. If the results do not correspond, then the tokens are false.
  • the recipient also has the ability to verify the signature of the reports sending party, again by verifying the signature of that party as detailed above: perform a hash or CRC, then decrypt the hash or CRC in the report with the known, public key of the other user issuer, and compare results.
  • signature by a party involves the computation of a hash or CRC of a piece of information, and encryption of the hash or CRC with the private key of the sender.
  • a token may include additional information, for example a picture and/or graphics and/or an audio message.
  • additional information for example a picture and/or graphics and/or an audio message.
  • a digital token may resemble an ordinary coin, by having a value attached thereto as well as additional information.
  • a token may be used as letterhead or paper for a firm.
  • the firm assigns tokens to employees, who can use these tokens in official letters, for example in E-mail messages.
  • the token becomes the letterhead of the company in this electronic paper application.
  • the company may authorize employees to use a token in each E-mail message sent in the course of their work.
  • the token is used as digital paper, to "write" messages thereon.
  • the tokens need not be prepaid by the user. It is possible to include advertising in the token, with the firm benefiting from the advertising paying for the use of tokens. This approach may be better suited for the Internet environment, where services are generally free. Other methods to replace direct payment by the user may be used.
  • the advertising may be implemented in the additional information in the token, which may include pictures, graphics, audio and/or other information.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
EP98955880A 1997-11-20 1998-11-19 Zahlungssystem und verfahren das jetons verwendet Withdrawn EP0993642A1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
IL12226397 1997-11-20
IL12226397A IL122263A0 (en) 1997-11-20 1997-11-20 Payment system and method using tokens
PCT/IL1998/000563 WO1999027475A1 (en) 1997-11-20 1998-11-19 Payment system and method using tokens

Publications (1)

Publication Number Publication Date
EP0993642A1 true EP0993642A1 (de) 2000-04-19

Family

ID=11070873

Family Applications (1)

Application Number Title Priority Date Filing Date
EP98955880A Withdrawn EP0993642A1 (de) 1997-11-20 1998-11-19 Zahlungssystem und verfahren das jetons verwendet

Country Status (5)

Country Link
EP (1) EP0993642A1 (de)
AU (1) AU1256799A (de)
CA (1) CA2314098A1 (de)
IL (1) IL122263A0 (de)
WO (1) WO1999027475A1 (de)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU1539501A (en) * 1999-12-02 2001-06-25 Oakington Technologies Limited Transaction system and method
US7328189B2 (en) 2000-01-26 2008-02-05 Paybyclick Corporation Method and apparatus for conducting electronic commerce transactions using electronic tokens
EP1360661A2 (de) * 2000-03-29 2003-11-12 CMA Business Credit Services Verfahren und vorrichtung zum verwalten von einem oder mehreren werttragenden instrumenten
FR2815206B1 (fr) * 2000-10-10 2003-01-10 Canon Kk Procede d'execution a distance d'une fonction dans un reseau de communication
US7240024B2 (en) 2000-10-10 2007-07-03 Canon Kabushiki Kaisha Method for remote execution of a function in a communication network
AU2002252137A1 (en) * 2001-02-27 2002-09-12 Visa International Service Association Distributed quantum encrypted pattern generation and scoring
EP1241562A1 (de) * 2001-03-16 2002-09-18 Richler Graphics Ltd Drucksteuerung auf einem Netzwerk
DE10121726A1 (de) * 2001-05-04 2002-11-14 Giesecke & Devrient Gmbh Verfahren und Anordnung zum Bezahlen von über ein Datennetz abrufbaren Datenangeboten
EP1265200A1 (de) * 2001-06-04 2002-12-11 Orbis Patents Limited Kreditkartensystem und dazugehöriges Verfahren
GB2378780B (en) * 2001-08-14 2003-07-09 Elan Digital Systems Ltd Data integrity
US6804687B2 (en) 2002-09-30 2004-10-12 Scott E. Sampson File system management with user-definable functional attributes stored in a token action log
US20040073688A1 (en) * 2002-09-30 2004-04-15 Sampson Scott E. Electronic payment validation using Transaction Authorization Tokens
US8051172B2 (en) 2002-09-30 2011-11-01 Sampson Scott E Methods for managing the exchange of communication tokens
US8740069B2 (en) 2005-01-26 2014-06-03 Heng Kah Choy Fraud-free payment for internet purchases
US20110314054A1 (en) * 2010-06-18 2011-12-22 Mytelehealthsolutions, Llc System and Method for a Single Session Assessment Tool
CN112184192A (zh) 2016-12-12 2021-01-05 创新先进技术有限公司 资源调配方法和装置以及电子支付方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5826245A (en) * 1995-03-20 1998-10-20 Sandberg-Diment; Erik Providing verification information for a transaction
US5839119A (en) * 1996-09-27 1998-11-17 Xerox Corporation Method of electronic payments that prevents double-spending

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9927475A1 *

Also Published As

Publication number Publication date
WO1999027475A1 (en) 1999-06-03
CA2314098A1 (en) 1999-06-03
AU1256799A (en) 1999-06-15
IL122263A0 (en) 1998-04-05

Similar Documents

Publication Publication Date Title
US7555460B1 (en) Payment system and method using tokens
EP0796480B1 (de) Verfahren und vorrichtung zum durchführen von elektronischem handel
US6353812B2 (en) Computer-based method and system for aiding transactions
CA2322356C (en) Credit card system and method
US7778924B1 (en) System and method for transferring items having value
US6385731B2 (en) Secure on-line PC postage metering system
US9418381B2 (en) Method and system for notifying customers of transaction opportunities
US5757917A (en) Computerized payment system for purchasing goods and services on the internet
US20090254476A1 (en) Method and system for managing personal and financial information
EP1026644A1 (de) Verfahren und Vorrichtung zur Ausführung von elektronischen Transaktionen
US20030050882A1 (en) System and method for detecting fraudulent calls
US20010037467A1 (en) Controlled transfer of information in computer networks
EP0993642A1 (de) Zahlungssystem und verfahren das jetons verwendet
KR19990022620A (ko) 데이터 저장 매체용 액세스 제어 시스템 및 방법
KR20000069468A (ko) 전자 거래 시스템을 위한 신용 서버
CA2457688A1 (en) System for managing and reporting financial account activity
US20010044778A1 (en) Electronic commercial transaction system
US7958546B2 (en) Identity access management system
JPH1091705A (ja) 電子商取引におけるデータ伝送システムおよび方法
WO2001055921A1 (en) Personal information data storage system and its uses
CN1153582A (zh) 在商业密码系统中安全使用数字签字的方法
KR20030010817A (ko) 인터넷을 이용한 민원 증명서 발급 시스템 및 그 방법
JP2003507824A (ja) 電子商取引を行うための保証システムおよびそれに用いる方法
KR20050014617A (ko) 통합정산 지원 시스템
WO2000021008A1 (en) An on-line incentive system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20000211

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LI LU MC NL SE

RIN1 Information on inventor provided before grant (corrected)

Inventor name: BARKAN, YUVAL

Inventor name: BARKAN, MORDHAI

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Withdrawal date: 20021115