EP1177516A1 - Verfahren und system zum absichern von on-line einkäufen - Google Patents

Verfahren und system zum absichern von on-line einkäufen

Info

Publication number
EP1177516A1
EP1177516A1 EP00915594A EP00915594A EP1177516A1 EP 1177516 A1 EP1177516 A1 EP 1177516A1 EP 00915594 A EP00915594 A EP 00915594A EP 00915594 A EP00915594 A EP 00915594A EP 1177516 A1 EP1177516 A1 EP 1177516A1
Authority
EP
European Patent Office
Prior art keywords
information
payment
vendor
customer
services
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP00915594A
Other languages
English (en)
French (fr)
Inventor
Ilya Kruglenko
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kruglenko Ilya
Original Assignee
JOELSTAD LARS
Kruglenko Ilya
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JOELSTAD LARS, Kruglenko Ilya filed Critical JOELSTAD LARS
Publication of EP1177516A1 publication Critical patent/EP1177516A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems

Definitions

  • the present invention relates to a method and a system for secure on-line transactions.
  • the invention relates to such transactions performed over a public communications network such as the Internet.
  • the customer may not know if the vendor can be trusted not to use the credit card information unfairl ⁇ . and whether the vendor stores the credit card information gathered from his customers in a secure manner. In many cases it may turn out to be easier to steal an entire database of credit card information through a break in into a vendor's system than to intercept individual card data transmitted over the Internet.
  • the present invention relates to a payment system that provides customer as well as vendor with higher security without introducing unnecessary burden- some tasks for either.
  • a customer is able to pay for goods or services using his credit card with a greatly reduced risk of having his credit card information compromised.
  • the method provides the vendor with an opportunity to accept credit card payment without actually being registered with each and every operator of credit cards, debit cards, smart cards and the like.
  • credit cards it must be understood that this is intended to cover any kind of credit card, debit card, credit or debit account, smart card or the like.
  • a customer has access to a computer network, such as the Internet, through his computer.
  • a computer network such as the Internet
  • computers Also connected to this computer network is a number of computers containing information regarding goods and/or services offered by any number of providers. E.g. this information can be available through so called web pages set up by the providers, hereinafter referred to as vendors, on computers that act as web servers.
  • vendors the providers
  • web pages set up by the providers, hereinafter referred to as vendors
  • vendors computers that act as web servers.
  • Currently the most common way of presenting such information is through hypertext markup language (html) files (often combined with the use of scripts (Perl/CGI) and Java applets), the hypertext transfer protocol (http) and TCP/IP (Transmission Control Protocol/Internet Protocol).
  • HTML hypertext markup language
  • http Hypertext transfer protocol
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • a customer retrieves information regarding the goods or services offered by a vendor from the computer network, this information will be presented to him on his computer.
  • the customer selects any product or service he wants to purchase, and information regarding this is sent from the customer ' s computer to the vendor ' s computer along with any information necessary for shipment, such as the customer ' s name and address and/or shipment address.
  • This information can be provided by the customer at the time, or it can be stored in his computer ahead of time, always ready to be added to any transmission of ordering information.
  • the customer is already registered with the vendor, the customer ' s name and address may already be stored in the vendor ' s computer, and the customer information transmitted will in this case only include a reference to this information. This may be implemented through a so called cookie stored on the user ' s computer.
  • information required for the processing of the payment is sent back to the customer.
  • This information may include the total amount the customer is supposed to pay. a reference identifying the filed order, a reference identifying the vendor and any other relevant information, such as specification of goods ordered etc.
  • the vendor does not have to be registered with any credit card company, but he must have an account with a payment system that consists of one or more payment centers.
  • the vendor identification identifies the vendor uniquely to this payment system.
  • the customer terminates the connection to the vendor. If the customer is connected to the computer network by a modem, the modem simply hangs up. The customer then enters the necessary payment information, which can for example include credit card number, expiration date. or.
  • a connection is then established between the customer ' s computer and a computer at a designated payment center which constitutes or is part of the above mentioned payment system.
  • This connection is not established over the public computer network used for communication between the customer and the vendor, but through a relatively secure data channel, for example the customer ' s modem dials up a direct connection to the payment center using the public telephone network, and preferably encrypted.
  • the information is sent over a public computer network, but strongly encrypted, and possibly in the form of an e- mail message. The ordering information along with the credit card information is now transferred to the payment center.
  • This information may then include vendor identification, order identification, total amount, customer name, address and credit card information and the customer ' s e- mail address, and constitutes a payment approval request.
  • the payment center directly or through the payment system of which it is part, requests payment authorization from the credit card operator indicated by the customer ' s credit card information, or from some authorization authority approved by the credit card operator.
  • This authorization authority will hereinafter be referred to as the payment authorization system, and this may include a credit card operator, a debit card operator or anyone else with whom the customer has set up some kind of an account, as well as any authority authorized one or more such entities.
  • the payment system is able to choose the relevant authority out of any number of such authorities based on customer information such as for example credit card information.
  • the request is preferably transmitted over a secure connection, such as a dedicated line.
  • the payment system does not receive the requested authorization, the transaction is canceled. Information regarding this could be transmitted to the customer and/or the vendor, or the payment system may simply neglect to respond and the ongoing transaction may be canceled at the customer and vendor locations after a set time limit.
  • the payment system may simply neglect to respond and the ongoing transaction may be canceled at the customer and vendor locations after a set time limit.
  • the payment center does receive the requested authorization, the following actions are performed by the payment system.
  • the payment system transmits a shipment approval to the vendor. It is important that the vendor is able to verity that the shipment approval actually originated with the payment system, so the shipment approval will preferabh be signed digitally. This can be done in a number of s. e.g. through use of a public key/private key system, through some mutual h trusted verification agency or in any other manner of digital signature know n in the art. Since the information transmitted from the payment system to the vendor does not contain confidential information, the connection can be made through a public network such as the Internet. If necessary, the payment system then terminates the connection with the vendor and waits for funds to be transferred from the credit card operator.
  • the vendor delivers the purchased goods or services in exchange for the voucher. If the goods or services purchased are deliverable over the Internet, such as software or information, the exchange can be implemented automatical! ⁇ '. If this is not possible, the customer will hand over the voucher upon delivery of the goods or services.
  • the vendor will of course not have precise knowledge of the voucher in advance. He will however preferably be able to verify that the voucher is indeed issued as part of the relevant transaction. This can be done by including the transaction identification in the voucher, since this will not be known to any third party trying to obtain the goods or services by presenting a false voucher. It is also possible for the payment system to transfer some information relating to the voucher along with the shipment approval, such as the checksum of the voucher number or some other means of verifying that the voucher is a voucher actually relating to the relevant transaction.
  • the vendor transfers the voucher to the payment system, the amount authorized by the credit card company will be transferred to the vendor, possibly less a commission kept by the payment system and any possible fees or royalties to third parties as the result of any licenses or copyrights relating to the product.
  • the ordering information is not sent from the customer computer to the vendor computer directly, but to the payment system along with the payment information.
  • the payment system then forwards this order information to the vendor along with the delivery approval upon receipt of the requested payment authorization, the delivery is then made by the vendor solely based on information received form the payment system.
  • FIG. 1 shows a possible configuration of an on-line shopping system using the method according to the present invention.
  • Fig. 2 shows an alternative configuration of an on-line shopping system where the payment system consists of several local payment centers.
  • Fig. 3 shows a flowchart of the method according to the present invention.
  • Fig. 4 shows a flowchart of an alternative method according to the present invention.
  • a system for on-line shopping includes a customer ' s computer 1 connected to a public network 2 such as the Internet. Also connected to this network is a number of vendors ' computers 3. Only one such computer is shown. These computers contain information presenting goods and/or services available from the vendors, e.g. in the form of web pages. Based on the information available to him in this way. a customer can file an order with the vendor by transmitting this order to the vendor's computer system. This may not necessarily be the same computer used to present the product information; it may also be a different computer set up to handle orders. Included in the on-line shopping system is also a payment system 4.
  • This system is set up to handle payment, and all vendors must be registered with this payment system.
  • a vendor registered with the payment system will receive a unique vendor ID.
  • the system may be a centralized system run by only one operator, or it may be a network of payment centers run by several operators. Of course it may also be run by one operator, but consist of several distributed local payment centers.
  • payment system will be used to refer to the whole payment system whether this is distributed or centralized, and payment center will be used to refer to the local payment center where vendor ' s are registered and to which customers connect, whether such a center constitutes the whole of the payment system or only a part of it.
  • the payment system 4 is able to communicate with one or more payment authorization systems 5.
  • the dotted lines surrounding the payment authorization system 5 shown in Fig. 1 indicates that there may be only one such authorization center, or there may be several, e.g. one for each credit card the payment system is able to accept.
  • the communication channel between the customer computer 1 and the payment system 4 is preferably a relatively secure line, such as a dial up connection using the customers modem l b.
  • the communication channel between the payment system 4 and the payment authorization center is preferably a secure channel such as a dedicated line.
  • the communication channel between the payment system 4 and the vendor computer 3. need normally not be a secure line, and can be a public network such as the Internet.
  • Fig. 2. where a possible alternative configuration of an on-line shopping system is shown. Reference numbers identical to those found in Fig. 1 refer to the same or similar parts of the system.
  • the payment system 4 consists of several local payment centers 1 1. 12 as well as a database 13 and a computer network 14 connecting these.
  • a customer connects to the payment system 4.
  • he connects to his local payment center 1 1 .
  • a vendor w ishing to register with the payment system 4. registers with his local payment center 12. and receives a vendor ID that identifies him uniquely to the payment system 4. It is of course possible for all the local payment centers 1 1.
  • the database may contain all vendor IDs or only a table relating a given vendor ID to the right payment center. Information from the payment system 4 to a given vendor will then be sent to the vendor ' s payment center to be distributed.
  • the network 14 connecting the local payment centers 1 1 , 12 and database(s) 13 that constitutes the payment system 4. will normally not need to be a secure network, since all confidential information is transmitted between the customer computer 1 and the local payment center 1 1 and between the local payment center 1 1 and the payment authorization system 5. It is however possible to modify the payment system by distributing tasks in a different manner, and the need for secure communication may then arise within the payment system. It is for instance possible to let the local payment center connect to the payment authorization center through other computers in the payment system.
  • a potential customer is connected to a public computer network 2 such as the Internet, through his computer 1.
  • a public computer network 2 such as the Internet
  • the customer retrieves information that is available on the network from a vendor computer 3.
  • this information may be presented in the form of HTML documents, or in any other convenient format, and transferred over the computer network by way of any well known protocol, such as TCP/IP.
  • a next step 102 the customer selects any goods and/or services he might be interested in. and transfers order information to the vendor. Again there are several options for transferring this information. If the customer is already registered with the vendor, he may be identified to the vendor e.g. by so called cookies already stored on his computer and the customer may simply click on the items he wants to purchase. Other options include for example filling in an order form with necessary order data such as customer name, address and delivery address, and pressing a send button. The information may be transferred by way of the http protocol, or by any other suitable protocol.
  • the vendor computer 3 receives the order information from the customer computer 1.
  • an order ID is generated and transferred to the customer computer 1 along with a vendor ID. a total amount and any other relevant information.
  • the customer may disconnect from the public computer network 2 that interconnects his computer 1 and the vendor computer 3. This may be done automatically by software running on his computer 1.
  • the customer is ready to pay. he will be presented with a dialog box where he is requested to fill in personal information such as name, address and credit card information (referred to collectively as customer ID in Fig. 3 ).
  • customer ID in Fig. 3 Some of this information may already be present in the information transmitted from the vendor computer to the customer computer, and in that case the customer will only have to supply the information not already available in this way.
  • This payment information may already be stored on the customer computer in a preferably encrypted file. In that case all the customer has to do is to confirm his intention to pay. Alternatively the customer may be registered with the payment system 4 or a payment authorization system 5 with a debit account, a credit account or something similar, but for convenience it will be assumed in the following description that he is paying with a credit card. Actually any combination of information being entered by the customer, information being extracted from the information received from the vendor computer 3. information being pre stored on the customer computer 1 and information being pre stored in the payment system 4 or payment authorization system 5 is possible. The main thing is to make sure that the credit card information is not made available to the vendor and that the order information from the vendor is accurate when processed by the payment system. The payment information entered by the customer, along with the vendor ID, the order ID and the total amount, is then transferred 104 to the payment system 4. preferably in encrypted form.
  • the payment system 4 Upon receiving this information, the payment system 4 requests authorization from the payment authorization system 5 by transferring 105 credit card information and total amount to the payment authorization system 5.
  • the payment authorization system 5 may be one out of many, depending on what system has authority to authorize payment on the credit card specified by the customer.
  • a next step 106 the payment system will either receive the requested authorization, or authorization is denied. If authorization is denied, the transaction is terminated 107. This may be communicated to the user and possibly also the vendor, or the transaction may simply be terminated in the different computers if the transaction does not proceed within a given time. If the transaction is authorized by the payment authorization system 5, the payment system in a next step 108 generates a voucher and transfers this to the customer computer. The connection between the payment system and the customer computer may then be terminated. The payment system also generates a delivery approval and transfers this to the vendor. If the payment system is distributed, the payment center 1 1 that is handling the transaction may have to look up the address of the vendor in a database 13.
  • This address may include a network address for the vendor computer, an actual mail address, an e-mail address, a telefax number or any other vendor address to which the payment system 4 is able to send a message.
  • the payment center 1 1 may be able to retrieve this address directly, or the vendor ID will only refer to the address of another payment center 12. If the latter is the case, the payment center 1 1 handling the transaction will transfer the delivery approval to the payment center 12 referred to by the vendor ID. and this payment center 12 w ill forward the delivery approval to the vendor 3.
  • the delivery approval does not contain confidential information, and may therefore be transferred over a public network such as the Internet.
  • the delivery approval is therefore preferably signed by a digital signature.
  • a digital signature can be generated in a number of well known ways. e.g. by way of a public key/private key encryption algorithm.
  • the vendor delivers goods and/or services to the customer, preferably in exchange for the voucher. If the goods and/or services constitutes information, software or something else that may be transferred over a computer network, this exchange may be done automatically. If not. the goods or services may be exchanged for the voucher manually. In some implementations of the invention it may however be necessary to forego the exchange and simply deliver the goods and/or services simply based on the delivery information and the delivery approval. This might for instance be the case when the delivery address is not the same as the address of the customer.
  • the vendor After receiving the voucher, the vendor transfers 1 10 this to the payment system.
  • the payment system 4 receives the voucher, the funds will be transferred to the vendor, and the transaction is completed. If the vendor has not received the voucher, he will simply make a claim that the delivery has been made. In this case the payment center will credit the vendor for example after a given period of time unless the customer does not make a counterclaim stating that the ordered goods and/or services has not been delivered.
  • Figure 4 shows a flowchart that represents an alternative to the embodiment as described with reference to Fig. 3.
  • the customer receives information from the vendor regarding available goods and/or services as well as prices in a first step 201. This information includes vendor information such as a vendor ID. Based on this information the customer selects 202 goods and/or services he wants to purchase.
  • the customer When the customer is ready to order, he provides the necessary customer information as mentioned above, and this information along w ith the ordering information is transferred 203 to the payment system.
  • the ordering information regarding the ordered product is not filed directly with the vendor, but with the payment system.
  • a next step 204 the payment system requests payment authorization in the same manner as described above. If the payment system receives positive payment authorization information in step 205. a voucher is generated 207 and transferred to the customer computer as described above. Likewise a delivery approval is generated and transferred to the vendor computer, along with the ordering information, such as delivery address and information identifying the ordered goods and/or services.
  • the vendor delivers 208 - the ordered goods and/or services, preferably in exchange for the voucher.
  • the vendor transfers 209 a claim, preferably including the voucher, to the payment center.
  • the payment system then credits 210 the vendor, possibly after a certain period that gives the customer a chance to claim that the goods and/or services have not been delivered.
  • This particular embodiment is particularly convenient when the vendor is selling products that are deliverable over a public computer network such as the Internet.
  • the customer may then download such a product in a trial version, possibly as part of retrieving information from the vendor in step 201. or in advance of the whole process described. This trial version.
  • a product may include computer software, music, data, multimedia presentations etc.
  • the goods actually purchased through the method according to the present invention, and delivered from the vendor after receipt of a delivery approval from the payment system, may then be a key that unlocks the trial version after the expiry of the trial period and converts it to a regular version of the product. It should be pointed out that this scheme may be used also regarding trial versions that are distributed by other means, such as on CD ROM or diskettes.
  • the second embodiment may also be used for any other goods or services as an alternative to the first embodiment. It is important to note some of the security features as well as the flexibility provided by the method according to the present invention. Vendors that wish to offer their products over a computer network such as the Internet only have to set up an account with the payment system, without any approval from credit card companies. The payment system, however, will be registered with credit card companies, and the credit card companies makes the payments to the operator or one of the operators of the payment system. In this way. any company, small or large, or even a private individual, that wishes to sell almost anything over the Internet, may do so fairly simply.
  • the customer may not withhold payment by not handing over the voucher after receiving the ordered goods and/or services.
  • the payment will be held by the payment system until the voucher is received from the vendor. If the vendor does not receive the voucher in exchange for delivered goods, he may make a claim to the payment system, which may then hold the money until any conflict between customer and vendor has been resolved, or the payment system may release the payment to the vendor if the customer does not respond within a given time after having been notified that the vendor demands payment without being able to present the voucher.
  • the customer may make such a claim to the payment system which will then return the funds to the customer, unless the payment system receives the voucher or a claim that delivery has been made from the vendor within a given time. In case of a conflict, the payment system may withhold the funds until the conflict has been resolved.
  • the voucher In order for the vendor to make sure that the voucher he is given in exchange for the goods or services is genuine, the voucher should identify the order ID, since this will not be known to any impostor trying to obtain the goods or services in the name of the actual customer. Additional security can be provided by including with the approval information transferred from the payment system to the vendor, information that allows for the authentication of the voucher.
  • the order information transferred from the vendor computer to the customer computer and forwarded to the payment system by the customer may be tamper proof such that any modification to this information will be detected by the payment system.
  • the delivery approval information transferred from the pay ment system to the vendor may include information on paid amount so that the vendor is able to confirm that the funds held by the payment system corresponds with the total amount for the given order. Any combination of such security functions may also be implemented, so that any transaction containing inaccurate information may be terminated as soon as possible.
  • any number of communication protocols may be used for transferring information between the different computers and systems that perform the method.
  • what above is described as being one computer, for instance the vendor computer, may in fact be several computers that are interconnected by some well known means and that perform different steps of the method.
  • the payment authorization system and the payment system may be operated by the same organization or legal entity, and may even be running on the same system or the same computer. If encryption and/or digital signatures are used, any of the well known algorithms or methods known in the art may be employed as well as future improvements and modifications to such algorithms and methods.
  • Another possible modification that lies within the scope of the invention is to include certain contract information along with the order information transmitted from the vendor computer to the customer computer and forwarded to the payment system.
  • This contract information may specify how a certain amount of the payment should not be credited the vendor, but some third party that collects royalty or some other fee from sales of a given product.
  • the third party e.g. a publishing company, an artist, an inventor or anyone else who owns rights related to the product delivered by the ⁇ endor. will not be dependent on the honesty of the vendor, since all sales w ill involve the payment center.
  • the individual or organization claiming the fee will be able to check that the vendor actually sends the correct contract information as part of the order information simply by placing an order and checking the order information received from the vendor.
  • Funds may be transferred immediately upon receipt of the voucher, or a certain period of time after a claim has been made by the vendor and no counter claim has been made by the customer. It is also possible to wait until funds have actually been transferred from the credit card company to the payment system. A number of modifications to this scheme is possible and will be realized by anyone with the relevant skills for implementing the method according to the invention.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
EP00915594A 1999-03-16 2000-03-16 Verfahren und system zum absichern von on-line einkäufen Withdrawn EP1177516A1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
NO991278 1999-03-16
NO19991278A NO311468B1 (no) 1999-03-16 1999-03-16 Fremgangsmåte og system for sikker netthandel
PCT/NO2000/000092 WO2000055777A1 (en) 1999-03-16 2000-03-16 Method and system for secure on-line shopping

Publications (1)

Publication Number Publication Date
EP1177516A1 true EP1177516A1 (de) 2002-02-06

Family

ID=19903094

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00915594A Withdrawn EP1177516A1 (de) 1999-03-16 2000-03-16 Verfahren und system zum absichern von on-line einkäufen

Country Status (4)

Country Link
EP (1) EP1177516A1 (de)
AU (1) AU3683300A (de)
NO (1) NO311468B1 (de)
WO (1) WO2000055777A1 (de)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6928420B1 (en) 2000-03-30 2005-08-09 Fujitsu Limited Automated transaction apparatus
DE10049164A1 (de) * 2000-09-27 2002-04-18 H A S E Hamburger Anwendungs & Verfahren zur gesicherten Durchführung einer Transaktion im elektronischen Zahlungsverkehr
EP1202195A1 (de) * 2000-09-27 2002-05-02 H.A.S.E. Hamburger Anwendungs- & Systementwicklung GmbH & Co.KG Verfahren zur gesicherten Durchführung einer Transaktion im elektronischen Zahlungsverkehr
EP1348191A4 (de) * 2000-11-06 2005-03-09 Tran Systems Proprietary Ltd I Datenverarbeitungssystem
US20020069165A1 (en) * 2000-12-06 2002-06-06 O'neil Joseph Thomas Efficient and secure bill payment via mobile IP terminals
DE10061560A1 (de) 2000-12-07 2002-06-20 Fiducia Ag Karlsruhe Stuttgart Verfahren zur automatischen Abwicklung von Zahlungsvorgängen im Electronic Commerce sowie zugehörige Vorrichtung
AU2001297801A1 (en) * 2000-12-22 2002-11-11 Cqr Technologies Limited A transaction and logistics integrated management system (talisman) for secure credit card payment and verified transaction delivery
GB2372616A (en) * 2001-02-23 2002-08-28 Hewlett Packard Co Transaction method and apparatus using two part tokens
DE10136414A1 (de) 2001-07-26 2003-02-20 Giesecke & Devrient Gmbh Verfahren zum Bezug einer über ein Datennetz angebotenen Leistung
US8112328B2 (en) 2001-11-05 2012-02-07 Hewlett-Packard Development Company, L.P. Secure and mediated access for E-services
FR2912579B1 (fr) * 2007-02-09 2009-05-29 Ahmed Djoudi Procede de transfert securise via un reseau de communication d'un flux monetaire, systeme de transfert et produit programme correspondants
WO2013158081A1 (en) * 2012-04-17 2013-10-24 Intel Corporation Dynamic payment service
US10521791B2 (en) 2014-05-07 2019-12-31 Mastercard International Incorporated Systems and methods for communicating liability acceptance with payment card transactions
US10482468B2 (en) 2016-11-11 2019-11-19 Mastercard International Incorporated Systems and methods of improved electronic messaging

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5822737A (en) * 1996-02-05 1998-10-13 Ogram; Mark E. Financial transaction system
US5903880A (en) * 1996-07-19 1999-05-11 Biffar; Peter C. Self-contained payment system with circulating digital vouchers
GB9624127D0 (en) * 1996-11-20 1997-01-08 British Telecomm Transaction system
US5899980A (en) * 1997-08-11 1999-05-04 Trivnet Ltd. Retail method over a wide area network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0055777A1 *

Also Published As

Publication number Publication date
WO2000055777A1 (en) 2000-09-21
AU3683300A (en) 2000-10-04
NO311468B1 (no) 2001-11-26
NO991278L (no) 2000-09-18
NO991278D0 (no) 1999-03-16

Similar Documents

Publication Publication Date Title
AU777762B2 (en) Electronic transactions and payments system
AU2006236243B2 (en) Network commercial transactions
US6675153B1 (en) Transaction authorization system
US7734527B2 (en) Method and apparatus for making secure electronic payments
JP3133243B2 (ja) オンラインショッピングシステム
US7849020B2 (en) Method and apparatus for network transactions
US7318047B1 (en) Method and apparatus for providing electronic refunds in an online payment system
US20140351146A1 (en) Authentication for a commercial transaction using a mobile module
US20060235795A1 (en) Secure network commercial transactions
US20030208406A1 (en) Method and apparatus for processing one or more value bearing instruments
US20010032878A1 (en) Method and system for making anonymous electronic payments on the world wide web
US20040128257A1 (en) Method and apparatus for administering one or more value bearing instruments
WO1999046720A1 (en) Automatically invoked intermediation process for network purchases
JP2942478B2 (ja) ネットワーク課金方法
PL179928B1 (pl) Sposób otwartego handlu elektronicznego PL PL PL PL PL PL PL PL
JP2003531447A (ja) バーチャル安全のための方法およびシステム
JPH11511876A (ja) コンピュータネットワーク上での購買関連取引の電子的な支払い方法
US6868402B1 (en) Document transmit system and document transmitting method
EP1177516A1 (de) Verfahren und system zum absichern von on-line einkäufen
US20040029566A1 (en) Method and apparatus for controlling or monitoring access to the content of a telecommunicable data file
JPH10171887A (ja) オンラインショッピングシステム
US20040078331A1 (en) Payment system using electronic stamps
KR100481152B1 (ko) 온라인 선물카드 시스템 및 이 선물카드의 제공 방법
WO1997019414A1 (en) Computer network value payment system
US20030187797A1 (en) Method for issuing and settling electronic check

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20011016

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: KRUGLENKO, ILYA

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20031001