EP1125181A4 - Gerät für und verfahren zur elektronischen währungsgenerierung, transfer und tilgung - Google Patents

Gerät für und verfahren zur elektronischen währungsgenerierung, transfer und tilgung

Info

Publication number
EP1125181A4
EP1125181A4 EP99942146A EP99942146A EP1125181A4 EP 1125181 A4 EP1125181 A4 EP 1125181A4 EP 99942146 A EP99942146 A EP 99942146A EP 99942146 A EP99942146 A EP 99942146A EP 1125181 A4 EP1125181 A4 EP 1125181A4
Authority
EP
European Patent Office
Prior art keywords
ecu
electronic currency
encryption
denomination
currency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99942146A
Other languages
English (en)
French (fr)
Other versions
EP1125181A2 (de
Inventor
Richard C Fuisz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP1125181A2 publication Critical patent/EP1125181A2/de
Publication of EP1125181A4 publication Critical patent/EP1125181A4/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/29Payment schemes or models characterised by micropayments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/381Currency conversion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks

Definitions

  • the present invention is directed to an apparatus for, and a method of, digitally
  • substitutes include credit cards, debit cards, checks and traveler's checks.
  • the system thus knows that user 1 purchased a loaf of
  • the merchant decrypts the information.
  • the merchant then encrypts and sends data to the credit card
  • the credit card company opens the data and charges the user's account.
  • the digital wallet contains all of the user's credit card numbers
  • the encrypted credit card is sent to the merchant.
  • the information is forwarded to the credit card company who decrypts
  • the present invention is designed to be
  • the present invention solves these and other problems.
  • the present invention permits
  • a simple storage device is
  • the present invention is designed to overcome these problems and provide an electronic
  • present invention comprises a new form of electronic money, new forms of electronic
  • counterfeit protection a new storage device that may, but which does not have to be, used with this new form of electronic currency, an electronic currency generator and an
  • FIG 1 is a schematic diagram of an Electronic Currency Unit (ECU);
  • ECU Electronic Currency Unit
  • Figure 2 is a flow chart for issuing ECU
  • Figure 3 is a schematic diagram of ECU structure
  • Figure 4 is a flow chart of ECU generation
  • Figure 5 is a flow chart of ECU generation
  • Figure 6 is a flow chart of ECU generation
  • Figure 7 is a schematic diagram of ECU structure
  • Figure 8 is a schematic diagram of ECU structure
  • FIG. 9 is a schematic diagram of an ECU storage device
  • Figure 10 is a logic chart for ECU transactions
  • FIG. 11 is a schematic of an ECU issuing device.
  • Figure 12 is a schematic diagram of an ECU network. ITL DETAILED DESCRIPTION OF THE DRAWINGS AND OF THE
  • the present invention comprises several different products and methods that are
  • Redemption module and Network maintenance module.
  • the electronic currency unit (ECU) is the basic building block upon which other
  • the present invention solves this problem by using multiple identifiers and
  • ECU 1 at its most basic level may consist of a unique algorithm stored on a tangible
  • An ECU can be issued for anything of value, including but not limited to U.S. currency, stock, bonds, or tangible
  • a denomination identifier 3 is combined with a serial number identifier 4 .
  • Denomination identifiers may vary by issuing institution as well as by time. For
  • the denomination identifier may comprise an algorithm, the length
  • denomination identification as a function of serial number and/or time increases
  • identifier corresponds to may be made publicly available. Fig. 4.
  • an encryption algorithm may be applied to one or
  • a duel identifier may be used for the denomination, serial number or
  • the safety of the electronic currency may be increased even further.
  • Fig. 12 shows a public
  • a re-encryption key may also be provided. If a re-encryption key is not
  • a two-key encryption scheme also assists in preventing tampering by requiring re-
  • the re-encryption keys are also publicly available and may
  • Constantly changing re-encryption and decryption keys will further limit the time period during which a counterfeiter will be able to undermine
  • Two level duel key encryption permits the lowest level of security to be
  • the second level is a secure level that is only to be accessed by the issuing and
  • a third level can also be provided. Issuing institutions may
  • encryption form may be provided to the merchants daily, weekly or for each purchase
  • the ECU system either has to be of a uniform structure or provision for
  • non-uniform structures must be made.
  • a preferred option in the ECU is the ability for different institutions to have different
  • the ECU is provided with a header 5, a table of
  • a standardized header identifies, issuing institution type, the
  • Additional information can also be provided.
  • ECU may vary from issuing institution to issuing institution so long as certain standards
  • All ECU must have a value identifier and a denomination, which may
  • the identification header tells the transfer
  • the header may then identify if any program information, such as
  • serial identifier or denomination identifiers may contain information about that level
  • the second level header may contain selected
  • verification methods such as the location and value of a string on data in the first level of data. If the data in the second header does not match that present in the first data,
  • tampering may be present.
  • Re-organizing ECU structure may be used as yet another basic verification tool or
  • organization of a given ECU may contain information as to the currency's authenticity.
  • a known merchant may interleave denomination and serial number
  • identifiers using a predetermined pattern may change over time.
  • the security protection for a twenty-five cent denomination may be
  • the size may still prohibit a portable holding device from carrying one
  • ECU size is more of an issue when change needs to be made or transmitted.
  • the transaction module will in effect devalue the
  • a hundred dollar denomination may de devalued through the creation of one hundred identical denominations each
  • ECUs do not have to be devalued uniformly, non-uniform devaluation is contemplated.
  • ECU may also be purposefully introduced to encourage timely redemption or exchange
  • denomination algorithm might also include an
  • ECU may be time dependent, such that it has a life span. In its most crude form, the
  • encryption keys may be phased out rendering ECU useless.
  • ECU may have a life of one month. If ECU is not decrypted and re-encrypted each
  • Time dependent ECU may have a short life span of a long life span. ECU may also be
  • This feature provides for interest or other increases in an assets
  • changes in value may involve an increase in the denomination amount.
  • ECU may also be embedded in, or contain embedded, programs that are self-executing,
  • a time sensitive program can be attached to
  • embedded self-executing program may activate after one month has expired in
  • Time sensitive currency may be used to force ECU back through the issuing network to
  • the encryption of a self-destruct program or virus may also be used by issuing institutions to guard against counterfeiters.
  • protection may be obtained by interleaving the two identifiers based on yet another
  • a second denomination and serial number packet is made and
  • the header contains a small data string and its location
  • a third denomination and serial number packet is made and attached to
  • the second encryption packet together with a header that identifies the second packet
  • This third packet is then encrypted using a single key
  • a header identifies the issuing institution and denomination information.
  • the second encryption packet may be accessed.
  • the level of encryption may be varied depending on memorv
  • ECU is stored on any form of generally available storage medium, including but not
  • Optical storage is not limited to ROM, RAM, DRAM, SRAM, floppy disc or hard drive.
  • Optical storage is not limited to ROM, RAM, DRAM, SRAM, floppy disc or hard drive.
  • any electronic or optical storage medium may be used. If the
  • ECU is not on a storage medium it is in a transfer stage between two storage medium.
  • Storage medium may come in a variety of forms from ECU on a floppy disc, that is
  • Network storage in accounts or depositories is perhaps the safest form of ECU storage.
  • Network storage may comprise, at its most a basic, a form of electronic safe deposit
  • Network storage can be implemented on a user anonymous basis. Users are allocated
  • time-dependent ECU can be built in. It is contemplated that the storage networks may be established to operate automatically, deducting the cost of storage direcdy from the
  • ECU monitoring can be tied in with the network storage such that the
  • Fig. 9 shows a typical storage device.
  • the device 8 has an input port 9 that may
  • bus is preferable provided that has both male 10 and female bus 11. This permits any combination
  • processor 12 is connected to the BUS 9 that is in turn connected to a memory device
  • Multiple memory devices 13a & 13b may be provided all, or
  • memory 15 which may be connected to an input device, such as a modem or network,
  • a transaction log memory may be also provided in memory 13 or as a separate memory.
  • a transaction log memory may be also provided in memory 13 or as a separate memory.
  • a processor 16 is also provided and is connected to a digital signal
  • the device may be designed to be handheld
  • ECU cash registers and electronic currency ATM machines likewise contain similar
  • the storage medium is thus tied into a processor, which may likewise be tied into a network through a modem etc.
  • the network connection may be periodic or
  • Transactions can be carried out in a number of different ways.
  • the transferring machine designates the ECU to transfer though an input device. Fig.
  • a touch pad or similar input device maybe used. An execution key is then pressed.
  • the receiving device may be placed in the reception mode or the exact amount of ECU
  • the transferring device first sets
  • the transferring unit searches its memory and locates the ECU to be
  • This information is transmitted to the receiving device.
  • the receiving device will transfer the ECU into an authentication memory.
  • receiving device will perform an initial analysis of the currency header to determine the
  • a search is then initiated of the receiving device's authentication memory
  • authenticity of the ECU can be determined. If the authenticity does not meet a user
  • the ECU is rejected.
  • a rejection code is also stored in the receiving device.
  • the rejection codes are
  • the receiving device transmits an erase command to the
  • the receiving unit informs the receiving device of the need for change or devaluation.
  • the units proceed in the normal manner. After, receipt and acceptance of the
  • receiving unit transmits the change. A similar verification process is performed. If both
  • the transmitting machine erases the original currency'.
  • a copy of the ECU for non-transactional purposes may also be stored and transmitted to the user network.
  • the user network will be described in detail below.
  • ECU storage devices may also be provided with storage device identifier.
  • device identifiers may be fixed or may be changed each time authentication information
  • This identifier may be stored in the transaction log.
  • key network may download transaction log information and process it for fraudulent
  • the ECU storage device information can be transmitted to all of the ECU storage device information
  • the transaction program may also be built into an interactive TV. Alternately, an
  • interactive or home shopping TV program may be use din conjunction with an internet
  • connection or traditional telephone system to provide for ECU transactions.
  • the issuing device in its most basic form may comprise a computer 17 and a storage
  • Additional modules may include multiple
  • currency re-generation modules tracking module; multi-level authorization module;
  • the issuing institution must also be able to redeem the ECU and in that regard
  • the asset may be invested in a varietv of
  • a supplemental assets management module may be operationally
  • Issuing institutions may use different currency generation programs so long as its ECU
  • the level of encryption may vary from institution to
  • an institution may chose to use one or multiple algorithms
  • An issuing institution may chose to attach time sensitive
  • the network 19 is used to provide the public with access 23 to currency information
  • the network is also used to collect log information.
  • a network monitoring module 21 can be provided that tracks currency usage, including
  • Rejected transactions can also be tracked based on
  • the issuing institutions 22 may be directed to issue multiple lower denomination
  • Redemption of ECU involves presenting a ECU to a receiving device that
  • the redemption devices is connected to the asset allocation module, either through as
  • ECU that has been redeemed may be re-used, including partial or full re-encrypted.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
EP99942146A 1998-08-13 1999-08-12 Gerät für und verfahren zur elektronischen währungsgenerierung, transfer und tilgung Withdrawn EP1125181A4 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US133824 1987-12-16
US13382498A 1998-08-13 1998-08-13
PCT/US1999/018356 WO2000010068A2 (en) 1998-08-13 1999-08-12 Apparatus for and method of electronic currency generation, transfer and redemption

Publications (2)

Publication Number Publication Date
EP1125181A2 EP1125181A2 (de) 2001-08-22
EP1125181A4 true EP1125181A4 (de) 2001-10-17

Family

ID=22460451

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99942146A Withdrawn EP1125181A4 (de) 1998-08-13 1999-08-12 Gerät für und verfahren zur elektronischen währungsgenerierung, transfer und tilgung

Country Status (5)

Country Link
EP (1) EP1125181A4 (de)
JP (1) JP2002522840A (de)
AU (1) AU5558999A (de)
CA (1) CA2340055A1 (de)
WO (1) WO2000010068A2 (de)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2003268739A1 (en) * 2002-10-18 2004-05-04 Matsushita Electric Industrial Co., Ltd. Electronic money processing device
JP2006187344A (ja) * 2004-12-28 2006-07-20 Sankyo Kk 遊技用システム
EP2823446A1 (de) * 2012-03-06 2015-01-14 Giori, Roberto Verfahren zur erzeugung einer elektronischen/digitalen banknote und maschine zur durchführung des verfahrens
GB2539430A (en) * 2015-06-16 2016-12-21 The Provost Fellows Found Scholars & The Other Members Of Board Of The College Of The Holy & Unidv T Digital token exchange system
CN106845950A (zh) * 2017-02-06 2017-06-13 吕文华 一种符合二元体系的数字币

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5644727A (en) * 1987-04-15 1997-07-01 Proprietary Financial Products, Inc. System for the operation and management of one or more financial accounts through the use of a digital communication and computation system for exchange, investment and borrowing
US5453601A (en) * 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5557518A (en) * 1994-04-28 1996-09-17 Citibank, N.A. Trusted agents for open electronic commerce
US5590038A (en) * 1994-06-20 1996-12-31 Pitroda; Satyan G. Universal electronic transaction card including receipt storage and system and methods of conducting electronic transactions
JP3614480B2 (ja) * 1994-11-18 2005-01-26 株式会社日立製作所 電子チケット販売・払戻システム及びその販売・払戻方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
No Search *

Also Published As

Publication number Publication date
CA2340055A1 (en) 2000-02-24
JP2002522840A (ja) 2002-07-23
EP1125181A2 (de) 2001-08-22
WO2000010068B1 (en) 2000-06-22
WO2000010068A3 (en) 2000-05-18
AU5558999A (en) 2000-03-06
WO2000010068A2 (en) 2000-02-24

Similar Documents

Publication Publication Date Title
US5903880A (en) Self-contained payment system with circulating digital vouchers
US5943423A (en) Smart token system for secure electronic transactions and identification
US5839119A (en) Method of electronic payments that prevents double-spending
US5878138A (en) System and method for detecting fraudulent expenditure of electronic assets
AU748558B2 (en) Credit card system and method
AU658233B2 (en) Electronic-monetary system
US5623547A (en) Value transfer system
EP1153375B1 (de) Kreditkartensystem und -verfahren
US7003501B2 (en) Method for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
CA2232791A1 (en) Method, apparatus, system and firmware for secure transactions
CA2266976A1 (en) Improvements relating to electronic transactions
JPS6061863A (ja) 暗号キー管理方法とシステム
WO2000010068A2 (en) Apparatus for and method of electronic currency generation, transfer and redemption
Havinga et al. Survey of electronic payment methods and systems
JP2007065727A (ja) Icカード利用システム
MXPA01001407A (en) Apparatus for and method of electronic currency generation, transfer and redemption
AU753159B2 (en) Credit card system and method
JPS63168771A (ja) 手形カ−ド決済システム
Rico-Novella et al. CREDO: A Secure System for the Remote Certification of Documents
MXPA00009309A (en) Credit card system and method
ZA200106639B (en) Credit card system and method.

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20010202

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

A4 Supplementary search report drawn up and despatched

Effective date: 20010830

AK Designated contracting states

Kind code of ref document: A4

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

RIC1 Information provided on ipc code assigned before grant

Free format text: 7G 06F 1/00 A, 7G 06F 17/60 B

17Q First examination report despatched

Effective date: 20010122

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20030301