GB2422935A - Pre-payment system for facilitating electronic commerce and anonymous transactions - Google Patents

Pre-payment system for facilitating electronic commerce and anonymous transactions Download PDF

Info

Publication number
GB2422935A
GB2422935A GB0502211A GB0502211A GB2422935A GB 2422935 A GB2422935 A GB 2422935A GB 0502211 A GB0502211 A GB 0502211A GB 0502211 A GB0502211 A GB 0502211A GB 2422935 A GB2422935 A GB 2422935A
Authority
GB
United Kingdom
Prior art keywords
data
strings
client
offeror
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0502211A
Other versions
GB0502211D0 (en
GB2422935B (en
Inventor
Marc Mckenzie
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0502211A priority Critical patent/GB2422935B/en
Publication of GB0502211D0 publication Critical patent/GB0502211D0/en
Publication of GB2422935A publication Critical patent/GB2422935A/en
Application granted granted Critical
Publication of GB2422935B publication Critical patent/GB2422935B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/343Cards including a counter
    • G06Q20/3433Cards including a counter the counter having monetary units
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/28Pre-payment schemes, e.g. "pay before"
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/02Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Pre-payment system for facilitating electronic commerce and anonymous transactions based on the use of unique data strings that can be purchased by a user and then used at eg online shops instead of credit cards. In one embodiment the data strings 3-9 are recorded on a card 1 under scratch off panels. Data string 3 represents the full value of the card whilst data string 4-9 represents subdivision of the value. The card also contains master data string 2 used to further validate the card. The systems does not need to be card based and may be eg computer implemented.

Description

I
PAYMENT MEANS AND SYSTEM
This invention relates to a payment means and system that may be utilised by anyone regardless of their age or other personal status.
A consumer wishing to shop on the internet or by telephone or mail order generally requires the facility of a traditional bank account or a credit or debit card to authorise payment for their desired purchases. Many consumers do not have the provision of such a resource. Also, these payment methods allow no provision for consumer anonymity and often there are other restrictions that apply, e.g. the shipping address must be that of the registered account holder. Further, these existing payment methods may allow unscrupulous companies or individuals unauthorised access to clients' funds. The aforementioned shortcomings may render such payment methods unsatisfactory, inconvenient or inaccessible to many adults and children alike. In addition, the rapid development of internet services whereby for example copyrighted material can be illegally acquired may partly be due to many clients' inability to make simple electronic payments to enable their legal acquisition of such goods or services, e.g. the downloading of mp3 music tracks or albums. It may be anticipated therefore that the RIAA, large online vendors and other companies may provide some backing for this invention.
It is an object and advantage of the present invention to facilitate the exchanging and transferring of clients' resources by a secure clientcontrolled method, without the need to know someone's bank details or true identity and by means of mobile device, computer system or voice transmission by telephone, which may readily be used by anyone, and without the need of either party having a traditional bank account or a credit or debit card.
Accordingly, to overcome some of the shortcomings of existing payment methods such as those mentioned above, the present invention proposes a new system for electronic commerce that enables a client to approve specific secure electronic payment transactions online over the internet/intranet, by telephone, mail or mobile apparatus by using a device incorporating secure data in the form of complex unique alphanumeric data sequences or data-strings'.
Data-strings may for example be embodied in a card or other device that can be sold at stores and petrol stations for the clients' convenience. The card may contain an activation code that is transmitted to the central system of the card offeror for verification and validation at the point of sale (POS), or a card or device may be offered pre-activated.
The following paragraphs will outline some of the features and advantages of the current invention: Use of this system and card or device negates the usual requirement for a client to hold a traditional bank account or a registered credit or debit card to enable them to authorise payment over the internet or by telephone or mail and offers enhanced client and vendor transaction security.
This method and device allows clients to exercise personal control over the release of a payment as the sum of a client's approved payment cannot be exceeded. The client can locally control the maximum amount of their expenditure, i.e. it need not be controlled by a card offeror or guarantor.
A person or vendor cannot subsequently access clients' funds by using clients' previously disclosed or transmitted data-strings or authorisation information.
The data-strings are easily transmissible over the internet or communicable by telephone or mobile communications devices.
Preferably, a card or device containing data-strings may be available at banks and common Consumer outlets in various data capacities, with datastrings which are pre-valued in units of all major currencies. The card may be made available to the client direct from the offeror.
Preferably the card or device can be activated or authenticated at a point of sale after the client has paid for it, although it may be desirable to allow the client to acquire an inactive card and to activate it over the telephone or internet by paying for the data-strings using a bank account or an existing credit or debit card. It may be possible to activate the data on a card by using other suitable means, e.g. at 24 hr ATM machines, cash deposit machines mobile phone or approved outlets. This would allow a client to carry an inactive spare card or device for emergency use'. It may also be desirable to issue pre-activated cards to outlets unable to establish a suitable activation request with the offeror. It may be preferable to deliver a client's data-strings over a mobile operator's wireless network, directly to a mobile phone or similar device and, with a phone service provider's consent, receive payment from the client's existing phone credit balance. This could also be achieved by charging a client a premium text' fee or a client could text their requirements and other payment details to the offeror, e.g. credit card details.
The data-strings are flexible in that the data can be copied and stored in another suitable device of the client's preference and the original client's data securely destroyed without affecting the value of the stored data.
Preferably, the system and card or device may be made available to anyone, regardless of personal status.
Preferably, the card or device may be produced in easily distinguished colour-coded adult and child versions or some age-restriction data may be associated to the data-strings at the time of sale to prevent inappropriate trade and to safeguard children from adult-only services.
In use, this system and device can permit user anonymity.
There may be additional security advantages for a client who registers some personal information with the offeror and is in return issued with a pass-code that may be used for authentication purposes. The personal information supplied may be anonymous.
Preferably, a minimum of two data-strings may be required per transaction, at least one of which may subsequently be voided by the offeror, although in some embodiments of the current invention it may be preferred to permit the client's authorisation of a transaction by using one data- string.
Preferably, consenting parties may be allowed to confer data-strings freely, within legal constraint of the concerned countries' policies.
The current invention can allow people a mutual cash resource without necessitating the duplication of any card or account data and without having to give any one person access to all of that resource.
The card or device containing the data-strings may be represented by or contained in a computer graphic or data file, or embodied in or controlled by a software program.
The card or device containing the data-strings may also contain data for authentication purposes in a magnetic strip or bar code and it may be a smart card of known design with integrated circuitry and may additionally be rechargeable with data. The card or data may or may not have an expiration date.
The system may employ a card-reader connected to a client or vendor's computer and further connected to the internet.
Preferably, the data card or device may be of a temporary or disposable construction.
Communications between the data offeror, client and vendor may be made secure by using a known method of Private and Public Key Encryption and/or Secure Sockets Layer protocol or by other suitable security methods.
Those of ordinary skill in the relevant art will understand that the invention may have additional embodiments which may be practiced without several of the details described below. In other instances, those of ordinary skill in the relevant art will appreciate that the methods and systems described can include additional details without departing from the spirit or scope of the disclosed embodiments. In addition, some wellknown structures and systems often associated with payment and transaction methods and associated computer networks have not been shown or described in detail below to avoid unnecessarily obscuring the description of the various embodiments of the invention.
The description that follows is presented to enable one skilled in the art to make and use the present invention and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be apparent to those skilled in the art and the general principles discussed below may be applied to other embodiments and applications without departing from the scope and spirit of the invention. Therefore, the invention is not intended to be limited to the embodiments disclosed, but the invention is to be given the largest possible scope which is consistent with the principles and features described herein.
Unless otherwise indicated in the description the term offeror' refers to the person who offers the data-strings for sale or under agreement; the term agent' also refers to the offeror; the term vendor' refers to any person, trader, seller, wholesaler, merchant or electronic service provider offering for sale any goods, service, facility, commodity, wares or merchandise; the term client' refers to any consumer intending to utilise this invention legitimately to accomplish a secure monetary transaction.
A preferred embodiment of the invention will now be described solely by way of example and with reference to the accompanying drawings in which: * Figure 1 shows a data card embodying a 20.00 value; * Figure 2 shows an alternative card design of 10.00 value; * Figure 3 shows an alternative card design of 100.00 value; * Figure 4 shows an alternative card design of 100.00 value; * Figure 5 shows an alternative card design; * Figure 6 shows an alternative card design of 100.00 value; The system comprising: a) Secure data in the form of complex unique alpha-numeric data-strings stored in a database on a server connected to the internet. The datastrings have fixed monetary values as associated by the offeror or originator of said data-strings and can be sold for that price.
b) A data offeror and agent offering secure data for sale to a client, with the agreement to buy the data back from the client if the client requests to sell the data and to then deposit the client's proceeds from the sale of their data into the client's bank account or to act as their agent and to deposit their proceeds into a bank account or suitable type of monetary account of the client's nomination if requested to do so by the client.
c) A client, purchasing or owning secure data from an offeror with the proviso: if the data should be sold by the client, the offeror is permitted first refusal of the purchase of that data.
d) A vendor offering goods, services or facilities for sale to a customer, with agreement to facilitate acceptance of payment from a customer's agent to thus enable the offeror to pay for a customer's desired purchases.
While the principles of the invention have been made clear in illustrative embodiments, there will be immediately obvious to those skilled in the art many modifications of structure, arrangement, proportions, the elements, materials, and components used in the practice of the invention, and otherwise, which are particularly adapted to specific environments and operative requirements without departing from those principles. The appended claims are intended to cover and embrace any and all such modifications, with the limits only of the true purview, spirit and scope of the invention.
In the following example a card has an appointed monetary value by way of containing several valuable and secreted data-strings. If a client wishes to sell any of their data-strings, the data can be revealed and transferred back to the offeror by the client communicating those datastrings to the offeror via secure internet, intra net or telecommunications networks. The client may then request that appropriate payment be made by the offeror to a vendor of the client's choosing, thus enabling payment for the client's desired purchases.
In figure 1, a card 1 of 20 value, has several panels 2 -9 containing data in the form of complex interdependent alpha-numeric data-strings.
The data-strings may be concealed by a tamper-proof removable covering of known design.
There is a master data-string 2, a data-string representing the full 20 value of the card 3, a 10 data-string 4, two 5 data-strings 5 and 6, five 2 data-strings shown in a group 7 and ten 1 data-strings shown in groups 8 and 9.
The card embodies its fixed monetary value by means of these data- strings each having associated monetary values. The data-strings 4, 5, 6, are shown linked to other data-strings 7, 8, 9, that represent subdivisions of their monetary value. Data-string 3 is at the top of the hierarchy.
A payment transaction can be restricted to a client's authorised sum by virtue of the limited monetary value of each data-string. A varying combination of these data-strings may be redeemed concurrently to enable the required payment.
* With a 20 card as shown in fig 1, to authorise a payment of 18, the master data-string 2 can be revealed along with a 10 data- string 4, a 5 data-string 5 and three 1 data-strings from the group of data-strings 9. These data-strings can then be submitted to the offeror's secure website for authentication and subsequent redemption. This would leave 2 worth of valid data-strings on the card, within the group 9. When the value of the data-strings is completely spent the card may be disposed of by the client.
* With a 20 card as shown in fig 1, if any of the five 2 data-strings from the group 7 are redeemed, the value of the associated 10 datastring 4 and 20 data-string 3 is annulled but the value of the unused data-strings remaining in groups 7, 8 and 9, plus data- strings 5 and 6 remain valid.
* With a 20 card as shown in fig 1, by redeeming the 5 data-string 5, the associated group of data-strings 8 and the 20 data-string 3 is annulled but the other 5 data-string 6, and its five related datastrings 9, plus the data-string 4 and the group 7 remain valid. If any combination of data-strings to the value of 20, or data-string 3 is redeemed, the values of all remaining strings will be annulled.
It may be preferred that the value of the data-string 3 is not annulled but is instead reduced to the maximum remaining value of the sum of the other remaining data-strings.
A client may confirm the minimum current value of this type of card without employing electronic means, simply by examining the card to see which data-strings have an intact removable covering and which datastrings have been revealed.
Figure 2 shows an alternative embodiment of the invention in which a card 1 of 10 value, has a master data string 2, a string representing the full 10 value of the card 3, a group of ten 1 strings 4 and twenty 50 pence strings in two groups of ten 5 and 6.
As can be seen, groups 4, 5 and 6 are in an arrangement of columns and rows and the data-strings in any row are linked laterally. If any datastring is redeemed, the 10 data-string 3 is annulled, if any 1 string is redeemed, the two linked 50 pence strings are annulled. If a 50 pence string is redeemed, the linked 1 string in that row becomes annulled but the linked 50 pence string remains valid. If string 3 is redeemed the value of all other strings is annulled. It will be seen that the datastrings share interdependency.
Figure 3 shows another alternative embodiment of the invention in which a card 1 of 100 value, has a master data string 2, ten 10 data- strings 4 all connected to one 100 data-string 3, eighteen 5 data- strings 5 being linked two to each of nine of the 10 data-strings, it also has fifteen Li. data-strings 6 and 7, ten of which are linked to one of the 10 data-strings and five are linked to one of the 5 data-strings, there are also ten 10 pence data-strings 8 all linked to one of the 1 datastrings. Any data-string being redeemed will automatically annul the value of any linked data-string of a greater potential value.
Figure 4 shows yet another alternative embodiment of the invention in which a card 1 of 100 value, has a master data-string 2, a group of five 20 data-strings 4, a group of ten 10 data-strings 5, a group of twenty 5 data-strings 6, a group of fifteen 1 data-strings 7 and a group of data-strings 8 with individual values from 30 - 100 inclusive in increments of 10. This embodiment has no particular linked arrangement and allows for much permutation. The value of the card is annulled when the first 100 worth of data-strings has been redeemed.
Figure 5 shows an alternative embodiment of the invention in which a card 1 contains data-strings associated in pairs rather than one master datastring being associated with several other valuable data strings, i.e. for each master data-string there is one associated valuable data-string.
The value of the card could for example be 25, with each of the valuable data-strings being worth 1.
Figure 6 shows yet another alternative embodiment of the invention in which a card 1 of 100 value, has a master data-string 2, one 100 datastring 3, five 20 data-strings 4, ten 10 data strings 5 and twenty 5 data-strings 6, all in a hierarchical arrangement. Any data-string being redeemed will automatically annul the value of any linked data-string of a greater potential value that is located above it on the card.
Preferably, these and other types of data-strings cards may be made to encompass any fixed monetary value and may contain on one or more sides, a variety of data-strings of various values and arrangements to permit a client maximum payment flexibility. Cards may be combined to provide more payment permutations.
Alternatively, it may be preferred to utilise a card design with a variable maximum monetary limit, to be established at the point of sale (POS) by the amount of money paid by the client for the card.
A preferred embodiment of the current invention and its modus operandi will now be described to illustrate an online transaction process. The transaction may be accomplished using TCP/IP and SSL protocols over a secure network essentially including a client's computer, a vendor's computer and an offeror's database server containing a secure database of data-strings and related records, further connected to a transaction server capable of querying the database and containing suitable software for controlling secure payment and data transactions. Security measures such as a firewall and data encryption may be employed.
A client wishes to purchase a card containing data-strings of a design depicted in figure 6 from a retailer approved by the offeror. The retailer scans the data contained in the card's bar code or magnetic strip and communicates that data along with the retailer's unique ID to the offeror whereupon the offeror activates the card by authenticating the value of the data strings contained in the card and verifies its maximum value with the retailer. The retailer exchanges the card for the client's money and provides a receipt. The retailer makes the relevant payment to the offeror. The client then browses the internet, selects desired goods from a vendor's website and wishes to purchase those goods. The client informs the vendor of their agent's agreement to make payment on their behalf and sends details including both offeror and client IP addresses and email addresses. The vendor in mutual concord sends a communication to the client's agent, the offeror, including their bank details, their IP address and the IP address of the client requesting goods from them and stating their asking price for those goods. The offeror may be able to check the legitimacy of a known vendor's IP address and can then send an email to the client's email address or a secure web page to the client's IP address with the name, IP address and bank payment request details of the vendor that requested payment for the client's desired purchases. The client, if approving the source and amount of the requested payment may then enter their master data-string onto the offeror's web page along with valid data-strings totalling an equal or greater value than the sum of the vendor's requested payment. The payment request page can then be returned by the client to the central computer system of the offeror for verification. The control and authentication preferably takes place by querying against the database of the offeror stored on a database server communicating with a transaction server. The client's valid data-strings can now be annulled by the offeror and any linked data-string of a greater potential value which is positioned above any redeemed data-string on the client's card (as depicted in the layout shown in figure 6) is also annulled. The authorised payment sum as specified by the vendor and approved by the client may now be made by the offeror into an account of the vendor as agreed. A message confirmation of the successful transact,on is sent to both parties. The vendor may now release the client's desired purchases. The vendor by prior arrangement with the offeror may endorse and facilitate such a payment method.
If the offeror having made an authorised payment to a vendor, still has some of a client's funds remaining from that transaction, these funds may either be paid to a charity of the client's choice as facilitated by the offeror, paid into the client's chosen bank account or, a data-string of the same value as the remaining funds may be dispatched to a registered client in encrypted data form and may be accompanied by an associated master data-string. Alternatively, vendors may be allowed to bank clients' funds on their behalf.
It may be found that making electronic payment to a charitable organisation can be less straightforward than a client may wish and generally takes a dedicated transaction to be completed by the client to accomplish that payment, therefore, in a preferred embodiment of the invention, a client wishing to maintain complete anonymity throughout a transaction and without a registered offeror's account may wish to donate any surplus change from a transaction to a charity of their choice as facilitated by the offeror, thus enabling a client to authorise two payment transactions with one communication. In the event of a registered client wishing to make payment to a registered charity, the offeror may wish to acknowledge the payment by allowing the client to accrue points or stamps in a system whereby the person with the most stamps or points at a prescribed moment in time is awarded a gift.
It may be preferable to offer an online data exchange scheme whereby clients may sell a data-string of 1 value to the offeror and request in return a new string of 1 value, i.e. for security reasons, or a client may request ten strings of 10 pence value or one hundred strings of 1 pence value, i.e. to permit a client fine control over an exact payment sum.
These data-strings may be delivered to a client in an encrypted data form.
It may be preferable to allow selected retailers to exchange clients' data- strings and pay them the value in cash. This could be achieved by the retailer acquiring the data-strings from the client and requesting the offeror to swap them for new ones or to pay their redeemable value into the retailer's account.
It may be preferable to store many data-strings of small individual values on a smart-card' or swipe-card' and utilise a card reader to enable a client to perform transactions. These types of card and system may also be more suitable for performing transactions through local retailers whereby, upon making a purchase at a participating P05, the card is electronically read by a retailer's card reader/writer preferably connected to the offeror's central computer system, data-strings are automatically deducted or erased to the sum of the required purchase and the card may be updated with new information by the offeror via the retailer's card reader/writer and returned to the client along with a receipt showing details of the offeror's and the retailer's transactions. A card of this type may for example contain 200 x 50 pence data-strings, 1000 x 10 pence data-strings or any combination of data-strings with values as required.
Custom data-strings may be made to order.
It may be desirable for a client to allow preferred vendors payment in advance for ongoing services, or when it may be inconvenient to make numerous small separately authorised payments to a vendor.
The vendor need not be greatly concerned about security nor be responsible for authenticating or determining the value of such a data- strings card or device. The need for vendor security is minimised because a vendor need never have access to clients' accounts or data-strings, the sensitive information being sent direct to the offeror. If a vendor is allowed access to client data, any client data that a vendor may be allowed to access will be in the process of being annulled by the offeror and its value already being paid to that vendor. Subsequently that data will be of no monetary value to vendor or client.
It need not be necessary for the offeror to hold an account total for a card nor to update a user account with a new balance. Unredeemed datastrings can easily be collated using a master data-string to render the remaining maximum value of a card or account holder's data-strings at any time. The offeror merely needs to establish the validity of the datastrings To offer clients further protection against the risk of pecuniary loss, a client may be allowed to register private personal details with the offeror, including an email address and a secret pass-code and to create an account with the offeror whereupon they may be issued with a unique ID and allowed to register their data with the offeror. The personal details required may be anonymous or may include traceable or verifiable information on the client's identity and whereabouts, e.g. mailing address, bank details and passport number. Traceable information may offer the client additional security. These and other security measures may be especially beneficial to safeguard data-strings being communicated via mobile phones and other mobile communications devices. It may also be preferred that a client registers a unique nickname' to enhance security and simplify transactions. A client may be allowed to lock and unlock data-strings using such security methods.
The security method may also entail a client logging into their account as provided by the offeror, to register the data contained in their card's master data-string before first use of that card thereby necessitating their secret pass-code be entered into the offeror's web page before subsequent transactions involving that card's registered master datastring can be authorised. This can provide additional benefits, e.g. if a client's data or data card is lost or stolen it cannot be used without the client's secret pass-code and the client may log into their account to put a stop on a registered data card by supplying the pass-code. The stopped data card can then be annulled by the offeror and new pass-code protected data-strings sent to the client's registered address by encrypted email attachment or by other means, e.g. large quantities of data could be encrypted and concealed in an audio or a graphic file, that may only be unlocked by a client having the appropriate pass-code or key.
Someone unrightfully gaining possession of a client's registered master data-string and other valuable data-strings would be unable to redeem their value without also knowing the client's secret pass-code. In the case of the data being contained on an intact data-string card, if a person unrightfully in possession of a data-string card were to pose as the card's rightful owner and post the valid card to the offeror claiming to have lost their pass-code and requesting a replacement card, the replacement card would be posted to the rightful owner's address which wasregistered with the offeror at the time the pass-code was established. Therefore if a client loses their pass-code they may be allowed to post their data-string card to the offeror to request a new one to be sent to their registered mailing address.
If a genuine client's hitherto unregistered card's master data-string is discovered, this in itself doesn't allow someone access to a client's valuable data-strings or funds but may allow the master data-string to be inappropriately registered by a devious person in an attempt to block the legitimate client's card. The legitimate card holder may be allowed to log into their account with their pass-code and supply the details of the master data-string along with one other valid data-string from that card to demonstrate rightful ownership. The master data-string may then be annulled by the offeror and a new one supplied to the client. The use of clients' registered data-strings therefore cannot be lost unless they lose the master data-strings, the other data-strings and the pass-code.
It may be preferred during the registration process, to associate a client's mobile phone number or other device number for security purposes and to enable or enhance services, e.g. the transmission of transaction confirmations automatically by text, voice message or other compatible data format. With a client's approval, using this contact information the offeror would be able to send approved advertising or special offers and accept a simple yes or no answer from the client to facilitate a transaction or purchase of goods. This may be enabled or enhanced by incorporating appropriate software to facilitate a client's data management.
A client or vendor may be allowed to register with the offeror to allow them to check the validity of particular data-strings owned by them or offered to them and to be able to bank the value of these data-strings as required or surrender them for annulment and receive new secret data strings of the same or a similar value. It may be preferable for a client to be allowed by the offeror to check the validity of data-strings by utilising mobile phone text or other mobile communications device and to perform further transactions using that device or a combination of devices.
The offeror may provide a secure vault for the safe storage of their clients' data-strings.
To help protect a client from the real or imagined risk of data corruption of the offeror's database or from spurious data transactions, the client, by quoting a card's master data-string, may be allowed to confirm the remaining value of the secreted data-strings on the card without having to remove their protective covering, thereby enabling the client to check before use that no data has been elicited from their card without their knowledge and in the event of query to be able to prove the remaining value of the data existing on the card. e.g. if a client manually checked the value of a card optically and could see that data- strings of 20 value were left and the client then checked with the offeror's database online and discovered that data-strings of only 10 value were reportedly left, the client could prove that data-strings of 20 value still exist on their card by supplying the card to the offeror, thereby proving that the spurious 10 transaction hadn't been carried out by the client themselves and may be allowed to claim refund.
The present invention may also function as a system for deriving a source of revenue, e.g. incentives or pecuniary return in the form of agreed commission deductions or rebates from a vendor.
The offeror may allow a client to present their data-strings for sale to a broker who may purchase the client's data, redeem and store the value of that data and in return offer the client various payment or financial schemes other than those already presented by the offeror.
The data-strings may have other use or function integrated or applied, which in itself may bestow value on that data, e.g. the data-strings may be compiled to make or substantiate a larger entity like a software program or a digital art-form by utilising a suitable compiler or an appropriate software program, or the data-strings may be employed to enable other types of software or hardware function, e.g. used as a serial number that enables a software function or extends the capability of an existing software function in a software application, or used as a key to unlock a desirable encrypted audio or graphics file. The data- strings may have other associated incentives, advantages or uses, e.g. a data-string may win a prize if entered in a prize draw or may be employed as a marketing means, e.g. a television advert or program may clearly show the details of a master data-string on-screen then briefly flash the characters of valuable data-strings on-screen in a challenge to see who can redeem the value of those data-strings for their own use.
It may be preferable to incorporate into the system, a software application program that manages a client's or a vendor's data and presents it to them via a simplified functional user-interface to permit easy management of multiple complex electronic transactions and associated documentation.
It may be preferred to incorporate into the system a service dispensed by vending machines whereby a client may use a control panel on the machine or otherwise, to type in their data-strings thereby causing the vending machine to dispense the client's required goods or services. The conveying of the client's data-strings may also be achieved by radio transmission via Bluetooth, Wi-Fi, or other mobile communications network or protocol, either directly to the vending machine or to an operator of the vending machine that can remotely control the vending machine, e.g. a client sends data-strings and an ID to the vending machine's communications number or address which then responds by sending that data to the offeror to redeem its value; the data is checked against the offeror's database and annulled then the value of the data is paid by the offeror to the vending company's account; the vending machine is then sent a communication by the controller of the vending machine to thereby authorise the release of goods or provision of services to the client, within the value of the data-strings redeemed.
Further, it may be preferable for the vending machine to send the client a menu or a system facilitating the purchase of specific goods or services.
Suitable software may be incorporated into the system to enable or enhance the functioning of any of the methods described.
A vendor may be allowed to register a phone number, text services number, network address or other information as necessary to enable data communications and business transactions to be facilitated, e.g. a vendor being a mobile services operator may register a text services number with the offeror to be enabled to accept data strings by text message, and request the offeror to permit a client using a mobile phone to text their data-strings and ID or other necessary information direct to the vendor's registered number to thereby cause services or goods to be obtained from the vendor by the client and paid for by the offeror.
Marketing flyers or product catalogues could be sent to a registered client's address, containing the vendor's text services number and simple product codes for consumer items. The client may then be allowed to text these product codes to the vendor's text services number along with datastrings of an equivalent value to simplify the purchasing of required goods.
In an alternative embodiment, the invention may contain data-strings of no actual or prescribed monetary value, which may be used to reference certain sums of money belonging to a client and contained in the offeror's bank account.
In an alternative embodiment, the invention may utilise data-strings of low actual or prescribed monetary value, which may be used to reference certain larger sums of money belonging to the offeror. In this method, the client buys data-strings from the offeror and pays the offeror's asking price which is greater than the actual value of the data-strings. The offeror in return agrees to buy the client goods or services of a certain value not exceeding the price paid by the client for the data- strings and to give the client those goods or services free of charge if the client can verify the information contained in the data-strings with the offeror in a prescribed manner.
Data-strings may be represented, exchanged and conveyed using a variety of means or device including mobile communications device and the scope of the present invention is not intended to be restricted in any way to those means or devices as illustrated in this document.
While the present invention has been shown and described herein in what are considered to be the preferred embodiments thereof, the invention is not limited to those specific embodiments. Thus, the forms of the invention shown and described herein are to be taken as illustrative and other embodiments may be selected without departing from the spirit and scope of the present invention.

Claims (160)

1. A system wherein strings of data or data-strings, originated or offered by an offeror' of the system or offeror's agent and comprising unique distinguishing data or characters in the system, possesses specific qualities in said system; and wherein, by way of said offeror or offeror's agent examining said data-strings for said distinguishing data or characters, data-strings of said system are recognisable by said offeror or offeror's agent, thus, data-strings are verifiable as being data-strings of said system; and wherein, said specific qualities of said data-strings can include one or more of the following: to embody or represent an individual or specific monetary value; to function as authentication or security means for other associated data-strings; and wherein, said data-strings can be acquired or purchased by a client of the system; and wherein, data-strings can be transmitted, conveyed or submitted singularly or in plurality by clients, to an offeror of datastrings or an offeror's agent, in a prescribed manner to request the authenticating of said data-strings; data-strings submitted to an offeror or offeror's agent by a client and authenticated by an offeror or offeror's agent, consequently cause the offeror or offeror's agent to offer further services to a client, as controlled by the quantity and attributes of said client's communicated data- strings; and wherein, said further services can include one or more of the following: to grant a client control over a sum of currency; to allow a client to request that funds be transferred to an account of a client's choosing, the sum of said transferred funds being controlled by the sum of the values of submitted data-strings and with payment consequently being transferred by the system to an account of a client's choosing; to allow a client to exchange a data- string for a data-string of equal or equivalent value containing different data; to allow a client to exchange a data-string for multiple data-strings having a sum value which is equal or equivalent to the value of a data-string exchanged; to allow a client to store data-strings in a vault; to allow a client to lock or unlock functions of a data-string by supplying or confirming information as registered with the offeror or offeror's agent.
2. The system of claim 1, incorporating a control system which can comprise one or more of the following: a website; a user-interface; S * * S S * * S S 5 * S ** * : * *.. * * * S * S S *S. * * * S S S.. S * *S. * a vendor-interface; a transaction server; system, accounting and transaction software; a database server; a secure searchable database containing data-strings and associated information.
3. The system of claim 2, wherein said account can be selected from a group comprising: bank account; credit or debit card account; mutual funds account; money market account; margin account; line of credit account; sweeps card account; stock account; user account; web-based account; information account.
4. A system according to claim 3, wherein one or more data-strings can be offered to clients by an offeror, agent or vendor.
5. A system according to claim 4, wherein one or more data-strings offered may be acquired by a client from an offeror, agent or vendor.
6. A system according to claim 5, wherein one or more data-strings offered for sale may be purchased by a client from an offeror, agent or vendor.
7. A system according to claim 6, wherein data-strings can be of any length or complexity.
8. A system according to claim 7, wherein data-strings can utilise characters from any character set.
9. The system of claim 8, wherein said distinguishing data comprising said unique characteristics of data-strings can include data of various types, components or characters.
10. The system of claim 9, wherein said distinguishing data can include one or more of the following types of data: alphabetic; numeric; alphanumeric; symbolic; source code; binary code; object code; machine code; computer code; bar code; cipher; numeral; colour; electronic; waveform; sound; pattern; frequency; and said data can be of unpredictable, unsystematic or random arrangement, design or combination.
11. A system according to claim 10, wherein data-strings can contain black and white or other colour components; e.g. a data-string may comprise the following characters: a red 5, green t, blue h, black N, yellow Q, purple a, green, red C, blue 4, black s, blue x; or, a data- string may comprise a row of coloured shapes; i.e. a red triangle, blue circle, blue square, red crescent, green star, black rectangle, green hexagon, red ellipse, green star, blue pentagon. * *
* * S * S * * * * S 5 * S S S S. 5 * * *SS * * * * S * * * S.. * *** . S 5 S.. *
12. A system according to claim 11, wherein components or characters comprising data-strings can be in unique, specific or random composition or arrangement.
13. The system of claim 12, wherein data-strings can be protected by utilising various security or encryption methods or algorithms which can include one or more of the following; data encryption standard (DES); pretty good privacy (PGP); secure sockets layer (SSL); firewall; pass-code; password; security key or dongle'.
14. The system of claim 13, wherein data-strings and supplementary data such as software, client data and security data can be supplied, communicated, stored, converted, utilised or conveyed using various methods or devices which can include one or more of the following: computer; database; internet; intranet; mobile communication networks or protocols; Wi-Fi (802.lla/b/g); Bluetooth; telephony; telegraphy; verbally; fax; postal services; infrared (IR); wireless application protocol (WAP); optical scanning device; photographic device; data file; pictographic file; bar-code; email; television; magnetic storage device; smart card; mobile communications apparatus; subscriber identification module (SIM card); computer disk; USB; integrated circuit (IC); memory module; flash module; computer dongle; punch card; Morse code; point-ofsale equipment; text services; local area network (LAN); personal area network (PaN); wide area network (WAN); electronically; digitally; optically; telecommunications network; software; hardware device; dedicated device; electron transfer; and wherein data-strings may be supplied, encrypted, stored, concealed or transmitted within other files such as data, audio, graphics, video, text or computer files.
15. A system according to claim 14, wherein data-strings exchanged or submitted can be annulled in consequence.
16. A system according to claim 15, wherein one or more data-strings may be activated' or valid, and one or more of said activated or valid datastrings may be annulled by the offeror after first-use or
disclosure of said data-strings.
17. A system according to claim 16, wherein data-strings may function singly.
18. A system according to claim 17, wherein two or more data-strings may be linked or interdependent in function.
19. A system according to claim 18, incorporating data-strings that function as master' data-strings and permit activation,
S
* S S S * S * S * * * S * * * * * * * * S 5 * S * * * S *.* S * * S.. * authentication, security or control over one or more data-strings that may be associated or dependent data-strings.
20. A system and device according to claim 19, wherein data-strings may be hierarchically or interdependently linked to other data- strings.
21. A system and device according to claim 20, wherein data-strings may be hierarchically or interdependently linked to other data- strings that may represent multiples or divisions in monetary value thereof.
22. A system according to claim 21, wherein data-strings may be offered in various combinations or arrangements of data-string types or values.
23. A system according to claim 22, wherein one or more valid datastrings may be required to authorise a transaction and wherein one or more valid data-strings submitted during a transaction, may become annulled and unusable for subsequent transactions.
24. A system according to claim 23, wherein one or more valid datastrings not submitted during a transaction, may become annulled and unusable for subsequent transactions.
25. A system according to claim 24, wherein one or more valid datastrings submitted to authorise a transaction may remain valid to authorise one or more subsequent transactions.
26. A system according to claim 25, wherein a data-string may include a prefix or suffix to enable clients to ascertain the qualities of a datastring by referring to one or more defining characters or symbols at the beginning or end of a data-string, and where a prefix or suffix of two or more linked data-strings may have one or more characters or symbols matching to generally indicate linked data-strings.
27. A system according to claim 26, wherein during a transaction datastrings may be communicated separately to provide a level of security; e. g. dependent data-strings may be communicated together, followed separately by related master data-strings.
28. A system according to claim 27, wherein authorised specific transactions involving clients' funds can entail no risk to clients' funds uninvolved or unconnected with said authorised specific transactions, as each successful transaction can comprise an element of new data, i.e. at least one data-string hitherto undisclosed.
I
: : : * * * Il. * . * : : S S 5 S 5 * 5 I * * *e. *
29. A system according to claim 28, which may be used to transfer, exchange or share funds or assets, without need of a credit or debit card, bank account or user account and without a client being required to have an account number, PIN number or pass- code.
30. A system according to claim 29, which may be used to transfer, exchange or share funds or assets without requiring client-identity verification details.
31. A system according to claim 30, wherein data-strings may be contained in a card, certificate, booklet or receipt and wherein data-strings may initially be concealed from ocular view, such as by having a removable tamper-proof covering that may fully or partially be removed by a client wishing to reveal some or all of the data contained in a data-string or data-strings.
32. A system according to claim 31, wherein data-strings may be supplied, contained or utilised in or by any suitable device or method.
33. A system according to claim 32, wherein data-strings are not supplied or contained within a specific device or card.
34. A system and device according to claim 33, where a device or card may be of a temporary or disposable construction.
35. A system according to claim 34, wherein data-strings may be removed from a card or device whilst remaining optically concealed; a card or device may facilitate this, e.g. a data-strings card containing perforated removable sections of concealed data which may be removed before being optically revealed.
36. A system and device according to claim 35, wherein data-strings may be visually portrayed in an optically obscured fashion which requires a specific layer or film to be superimposed on obscured data-strings to thereby render data-strings optically legible.
37. A system according to claim 36, wherein data-strings may be ocularly illegible unless specific conditions are met which can render datastrings ocularly legible.
38. A system according to claim 37, wherein said specific conditions can be lighting or temperature dependent.
39. A system according to claim 38, wherein a balance of a card, device or account need not be updated.
:. :. *. . *. . : **. * : * * . . : :
S S
40. A system according to claim 39, wherein a balance of a data- strings card or device may be determined by visual examination of said card or device to ascertain the cost of the card or device and to confirm which data-strings have been revealed and which data- strings remain concealed, thereby enabling persons to calculate the minimum balance remaining without reference to the offeror's control facility.
41. A system according to claim 40, wherein a client may check and confirm a card or device's remaining balance before a transaction and before removing an existing tamper-proof covering from any remaining datastrings, by using the offeror's database, thus enabling a client in the event of query, to prove the value of data- strings remaining unused on a card or device, and in the event of a spurious transaction, a client may prove a transaction was not carried out by their authority.
42. A system according to claim 41, wherein data-strings or a datastrings card or device may have a potential fixed monetary value, determined by said data-strings.
43. A system to claim 42, wherein data-strings or a data-strings card or device may be activated upon payment of a fixed price for said datastrings card, device or data-strings.
44. A system according to claim 43, wherein a data-strings or a datastrings card or device may have a potential variable maximum monetary value, to be established at a point-of-sale by the price paid by a client for a card, device or data-strings.
45. A system and device according to claim 44, wherein some data- strings can remain invalid upon purchase of a card or device whilst some data-strings can become activated.
46. A system according to claim 45, wherein data-strings may be transferred to a client's existing device.
47. A system according to claim 46, wherein a client is not required to have a dedicated data-strings card or device physically present during a transaction.
48. A system according to claim 47, wherein if data-strings submitted by a client during a transaction are of a greater value than the sum of a vendor's requested payment, a data-string or data- strings equal in value to the difference between a vendor's requested sum and the value of a client's submitted data-strings, may be conveyed to a client by appropriate means.
* * *, * :: ::: ;:.
49. A system according to claim 48, wherein, if data-strings submitted by a client during a transaction are of a greater value than the sum of a vendor's requested payment, a vendor may be allowed by the offeror or offeror's agent and subsequently by a client, to store a client's change' on their behalf for future purchases, by way of a client registering appropriate information with a vendor.
50. A system according to claim 49, further comprising data-string control data' which can be utilised to enable secure possession, transit or control of data-strings.
51. A system according to claim 50, wherein data-strings may be validated upon purchase by transmitting validation control data to the central system of an offeror.
52. A system according to claim 51, wherein said validation control data can utilise one or more of the following: a data-string; bar- code; password; pass-code; telephone number; IP address; vendor ID; digital signature.
53. A system according to claim 52, wherein data-strings may be supplied to distributors pre-validated.
54. A system according to claim 53, wherein the functioning of datastrings may be restricted, locked or unlocked by means of control data being communicated to the control system of a data-strings offeror.
55. A system according to claim 54, wherein said control data can utilise one or more of the following: a pass-code; password; data- string; telephone or communications number; IP address; digital signature; user-name; nickname.
56. A system according to claim 55, wherein control data can be of a biometric nature.
57. A system according to claim 56, wherein a client may redeem the value of data-strings by submitting them direct to a guarantor, offeror, agent or source, or via a participating body, vendor or service provider.
58. A system according to claim 57, wherein data-strings may function in a manner analogous to denominations of a currency.
59. A system according to claim 58, wherein data-strings may be directly exchanged for cash or goods by a vendor; this may be achieved by a vendor acquiring data-strings from a client and : : *. . *. . : *. *.. * : : * * * * S * * * * S *** * S 5 *** * requesting the offeror to swap them for new ones or to pay their redeemable value into said vendor's account.
60. A system and device according to claim 59, wherein data-strings may have an activation or expiration date.
61. A system according to claim 60, wherein data-strings may be represented, embodied or communicated by varied and mixed means.
62. A system according to claim 61, incorporating a device or software to produce data-strings in various formats.
63. A system according to claim 62, incorporating a device or software to read data-strings in various formats.
64. A system according to claim 63, wherein a functioning data-string comprises a data or computer file.
65. A system according to claim 64, wherein a functioning data-string may be represented in any convenient or suitable format.
66. A system according to claim 65, whereby if a client conveys invalid data more than an allowed number of times, the offeror may penalise a client by restricting or disallowing further data processing or services for a specific or indefinite period of time.
67. A system according to claim 66, wherein a data-string or data- strings may be represented by a bar-code.
68. A system according to claim 67, which may incorporate a card reader, device reader or data-strings reader connected to a client's computer or communications device, further connected to the internet or other communications network.
69. A system according to claim 68, incorporating a bar-code reader and writer with appropriate software to read data contained in data-strings of bar-code format and to print data-strings in bar- code format.
70. A system according to claim 69, wherein data-strings may be convertible from one format to another without losing transactional capability by using appropriate or dedicated software or hardware.
71. A system according to claim 70, incorporting a device or software to convert data-strings between formats, *. Is. *I.
* . * I * * 5 a * * * * * * * * * * **. I S *.. S
72. A system according to claim 71, incorporating a device or software to print, send, check or receive data-strings in various formats.
73. A system according to claim 72, wherein a data-string file can change its structure or data upon use.
74. A system according to claim 73, wherein a data-string file can change its structure or data upon first-use.
75. A system according to claim 74, wherein a functioning data-string comprises a graphics file or pictorial image.
76. A system according to claim 75, wherein data-strings may be presented as a grid, mesh or matrix of shapes, where each of a data-string's characters or symbols are associated with a readily discernable colour and a position on a grid, mesh or matrix; e.g. in a grid of 25 x 25 square shapes, where x = vertical axis and y = horizontal axis, and where the first character of a data-string is represented on the xl' row of the grid and the second character on the x2' row and so on, and the character k' is represented by a red shape at the position y14'; if the first and fifth characters of a data-string represented in the grid are both k', the grid will have a square shape at xl y14' and a square shape at x5 y14' both coloured red, thus forming a unique graphic of colour, shape, pattern and data, and a viewable image, from a data-string; this image may be optically scanned or photographed by a client and the resultant recognisable data may subsequently be transmitted to the offeror in a prescribed manner for authentication and annulment; this type of data representation may incorporate common colour data to support optical calibration; this process may be carried out in reverse where characters of a data-string may be generated by plotting colours at certain positions in an existing graphic or image.
77. A system according to claim 76, wherein the plotting of colours at certain positions in a graphic or image to generate data-strings may be facilitated by the superimposition of a grid, mesh or matrix of shapes.
78. A system according to claim 77, wherein, an optical scanning or photographic device may be used to scan data-strings as tontained in a card or otherwise, the resultant data may be iansmitted to the offeror; the offeror may subject the data to a ttection process, e.g. optical character recognition (OCR), to thereby ascertain the characteristics of data-strings contained therein; or, a scanning device, associated equipment or related software may perform a detection process and data conversion
S
S * * * S S * * S S S a * * S.. * S S * * . * : : S.. S * * S.. * before transmitting the resulting data to the offeror; a client or vendor may optically scan data-strings.
79. A system according to claim 78, wherein a functioning data-string comprises an audio file.
80. A system according to claim 79, wherein a data-string may be presented in audio waveform or digital sound, contained and offered in a data file that may have a unique or specific digital fingerprint' as a consequence of the specific data-string data contained or embedded therein.
81. A system according to claim 80, wherein a data-string of audio format, may contain music or other audio content; e.g. an audio file when played, may audibly express the attributes of an enclosed data-string: "this data-string file has a value of ten euros"; or, "the characters contained in this data-string are, capital k, two, b, a, ampersand, space, c, seven, star, eight, dash, t, y".
82. A system according to claim 81, wherein a data-string may be transmitted by a client, to the offeror's database control facility in acoustically auditory format, such as, by a way of a client using an audio microphone connected to a communications device and further connected to the offeror's system, and by reading a data- ring's characters aloud into said microphone; e.g. "start, a alpha, h hotel, number three, symbol star, capital u uncle, space, number one, symbol dash, f foxtrot, k kilo, number seven, capital d delta, stop", to thereby cause voice data to be transmitted to the offeror's control system for voice recognition analysis and further processing.
83. A system according to claim 82, wherein a data-string presented by the offeror in a graphic or audio file may be copied by a client before being transmitted for annulment and a copy of said file may be kept by a client solely for its audio or graphic content value.
84. A system according to claim 83, wherein a vault may be provided for the safe storage of clients' data-strings, and wherein registered clients may bank' data-strings.
85. A system according to claim 84, by which anonymous monetary payment may be controlled or authorised.
86. A system according to claim 85, which may be limited in function by design; e.g. to prohibit authorisation of payment for products or services deemed unsuitable for persons below certain age limits.
**. .a. * * a a * * * * S S. * a * **a * * a * S S * S * S a.. * . a Sas S a a.. *
87. A system according to claim 86, wherein clients are permitted to query a database of data-strings records to ascertain the current status of specific data-strings.
88. A system according to claim 87, wherein clients are permitted to query a database of data-strings records and to convert valid data- strings and whereby valid data-strings submitted by a client may be annulled on request and data-strings of equivalent exchange may be issued as replacement.
89. A system according to claim 88, wherein valid data-strings submitted by a client may be annulled on request and data-strings of equivalent exchange may be issued as replacement, thus enabling clients or vendors to effectively and securely claim funds as data-strings are acquired, without necessitating the use of a user account or the transferring of funds to or from a bank account.
90. A system according to claim 89, whereby clients may exchange valuable data between themselves in any appropriate manner as mutually trusted, to allow payment, loan, sharing or transfer of funds.
91. A system according to claim 90, whereby custom data-strings may be made-to-order.
92. A system according to claim 91, incorporating software to manage a client or vendor's data or transactions.
93. A system according to claim 92, incorporating into the system, software that presents a client or vendor's data to them via a functional user-interface.
94. A system according to claim 93, wherein a client may pay a specific chosen sum to a vendor for a specific data-string as offered to a client in the form of a ticket or receipt; this may be accomplished by having a registered vendor transmit vendor ID plus the price of a sum received from a client for a requested data- string; a data-string may consequently be conveyed by the offeror's system to the vendor's system to be printed for the client's use; the data-string subsequently may be conveyed by the client to the offeror's database control facility where a client may exchange a data-string for other data-strings of desired value; a data-string acquired by a client from a local vendor may be of a known value as required by an online vendor for purchase of a client's specific requisites.
* a *S a a * * * * a 4 *. * : *. . * a * S * 4 1 $ *S. S * a a * * *I. a
95. A system according to claim 94, wherein data-strings may be made available representing various currencies and clients may be permitted to convert data-strings from one currency to another.
96. A system according to claim 95, further comprising one or more currency conversion software applications for performing transactions involving multiple currencies.
97. A system according to claim 96, wherein a client may exchange a datastring for multiple data-strings of lower individual values, the sum of which may equal the value of a data-string exchanged.
98. A system according to claim 97, wherein a client may exchange multiple data-strings for one data-string, the value of which may equal the sum of the values of data-strings exchanged.
99. A system according to claim 98 where two or more clients may each hold one or more unique or specific data-strings which collectively employed may allow control of a pre-determined sum of money or resource.
100. A system according to claim 99, wherein a client may be allowed to register personal details with the offeror and to create an account with the offeror whereupon a client may be issued with a unique ID, pass-code or other information and allowed to register data with the offeror for protection.
101. A system according to claim 100, wherein said registered personal details of a client can include traceable or verifiable information on a client's identity or whereabouts and can be one or more of the following: mailing address; bank or credit card details; passport number; IP address; communications number.
102. A system according to claim 101, wherein a client's said registered personal details can be anonymous and may include an email address.
103. A system according to claim 102, wherein a client's said registered personal details and may include: mailing address; bank details; passport number.
104. A system according to claim 103, wherein a client may be allowed to register a unique nickname'.
105. A system according to claim 104, wherein a client may be allowed to lock or unlock an account or data-strings by using registered information. * *
* : * * * a,. ** * a S.. . S a
106. A system according to claim 105, wherein a security method employed may entail a client logging into an account as provided by the offeror, to register data contained in a data-string before first-use and to request that a secret pass-code or other registered information subsequently be submitted or conveyed beforetransactions involving said registered data-string may be authorised.
107. A system according to claim 106, wherein a security method employed may be that data-strings can be pass-code protected, either when issued or thereafter.
108. A system according to claim 107, wherein a security method employed can be that data may be encrypted or concealed within an image, audio or other type of file and may only be unlocked or revealed by a client having an appropriate pass-code or key.
109. A system according to claim 108, whereby someone unrightfully gaining possession of a client's registered or locked master data- string and other valuable data-strings may be unable to redeem any value without knowing a client's secret security information.
110. A system according to claim 109, wherein if a genuine client's hither-to unregistered data card's master data-string is discovered, this in itself doesn't allow access to a client's valuable data-strings or funds.
111. A system according to claim 110, wherein data-strings may have additional use, value or function integrated or applied which may bestow value on that data.
112. A system according to claim 111, wherein said additional use, value or function of a data-string may be to make or substantiate a larger entity, e.g. a software program or a digital art-form, by utilising a suitable compiler or appropriate software or, a data- string may be employed to enable software or hardware function, e.g. used as a serial number that enables a software function or extends the capability of an existing software function in a software application or, may be used as a key to unlock a desirable encrypted audio or graphics file.
113. A system according to claim 112, wherein said additional use, value or function of data-strings may be that a data-string can win a prize if entered in a prize draw.
114. A system according to claim 113, wherein data-strings may be employed as a marketing means; e.g. a television advert or program may clearly show the details of a master data-string on-
S I * S
S SS * a . . : * * I * S S a
I
III
screen then briefly flash the characters of valuable linked data- strings on-screen in a challenge to see who can redeem the value of data- strings for their own use.
115. A system and device according to claim 114, wherein registration information may include mobile communications device number or other information to enable enhanced services'.
116. A system according to claim 115, wherein enhanced services may be that transaction confirmations can be sent to a client by text message, voice message or other suitable data format or enhanced services may be that goods ordered via a mobile communications device may automatically be allocated for delivery to a mailing address associated with the phone number of a mobile communications device as used for said ordered goods.
117. A system according to claim 116, wherein enhanced services may be that a client can have product advertising or special offers sent to a mobile communications device to permit a client's affirmative response and communication of appropriate data-strings to complete a desired transaction.
118. A system according to claim 117, wherein the operation or use of said system or device can be enabled or enhanced by incorporating appropriate software or hardware.
119. A system according to claim 118, wherein data-strings or associated devices can be utilised in any appropriate way within any system pertaining to said data-strings.
120. A system according to claim 119, which may fully or partly be represented, incorporated or made manifest in any suitable form.
121. A system according to claim 120, wherein a vendor may be allowed to register contact information with the offeror to enable data-string communications and business transactions to be facilitated.
122. A system according to claim 121, wherein a vendor's registered contact information may be a phone number, text-services number, network address or any other appropriate information as required by the offeror.
123. A system according to claim 122, wherein a vendor's registered contact information may be a text services number to enable acceptance of clients' data strings by text message.
* S * S * * S S * S S S * S S S S S S 555 5 5 5
SI I S S S S S S
S * S S S S S S.. S 555 5** S
124. A system according to claim 123, wherein a vendor with a registered text-services number, e.g. a vendor, being a local store, may publicly advertise the registered text-services number so that clients wishing to pay a sum to a vendor may text appropriate data-strings to the text- services number whereupon both vendor and client may receive transaction confirmation information from the offeror's control facility, which may be used by a client to confirm payment to a vendor.
125. A system according to claim 124, wherein a vendor's registered contact information or method may comprise a network communications address or may incorporate communications methods or protocols such as Bluetooth, WI-Fl or infrared data transfer.
126. A system according to claim 125, wherein a vendor's registered textservices number or other contact information may be included in marketing flyers and product catalogues which may include prices and product codes of items for sale.
127. A system according to claim 126, wherein a vendor's marketing flyers or product catalogues, which may contain prices and product codes of catalogue items, may be sent to a client's registered address; a client may text a product code to a vendor's text services number, together with data-strings of appropriate value and client's registered unique ID, thereby simplifying purchase of a client's requirements and facilitating automatic delivery of goods to a client's registered address.
128. A system and device according to claim 127, wherein a client conveying data-strings of a greater value than a vendor requires for a transaction, may be offered data-strings in any suitable form by a vendor, as change' from said transaction.
129. A system according to claim 128, wherein said change may be in the form of a receipt containing bar-codes, numeric or alpha- numeric characters.
130. A system and device according to claim 129, wherein said change may be in any data-strings format.
131. A system according to claim 130, wherein said change may be transmftted to a client's mobile communications device.
132. A system according to claim 131, wherein the offeror may permit registered vendors to request the offeror's control-facility to send datastrings of requested value to any communications number or address, and to debit a vendor's account accordingly.
* S * S S * S S S S S * S S S * S * S *SS S S S SS * S S S S S S * S S S S S S *SS S 555 SSS S
133. A system according to claim 132, wherein a client may make a voice call to a vendor's registered phone number and be thereby facilitated to select purchases and may communicate data-strings and client ID to cause payment and delivery of said selected purchases.
134. A system according to claim 133, wherein inactive or invalid datastrings may be acquired by a client without charge or payment and subsequently may be activated or validated by a client transmitting a master data-string or other associated or appropriate data and by payment of a fee, thus allowing clients to carry a reserve of data-strings or data-strings cards or devices for future activation and use.
135. A system and device according to claim 134, wherein a payment transaction to activate data-strings may be accomplished by a variety of means or methods.
136. A system according to claim 135, whereby a payment transaction to activate data-strings may be accomplished by means of: a bank; credit or debit card; 24 hr (ATM) machines; cash deposit machines; mobile-phone premium-text fee; authorised merchant; or, data-strings may be activated by using valid data-strings to pay for them.
137. A system according to claim 136, wherein if for example: a standalone' data-string is one that is not linked to another data-string; a dependent' data-string is dependent on a master data-string for verification; a paired' data-string is one of only two linked datastrings of equal characteristics and combined value; a triple' datastring is one of three linked data-strings of equal characteristics with collective value, and so on; and where, for example, if the prefix or suffix: *S* = a stand-alone data-string; *M* = a master data-string; *p* = a paired data-string; *D* = a dependent data- string; *T* = a triple data-string; 0.5* = a data-string of fifty pence value; 1* = a data-string of 1 value; 2* = a data-string of 2 value; 10* = a data-string of 10 value; it would follow that: a prefix may signify a stand-alone data-string of 10 value; a prefix *D*05* may indicate a dependent data-string of fifty pence value; data- strings *M*50* huyY8 gYT65 24Vhg LvU and *D*5* vo7k7 mtgVF 6fdm7 LvU may indicate a master data-string having a maximum authorisation value limit of 100 and a possibly related, dependent data-string of 5 value.
138. A system according to claim 137, which facilitates secure and anonymous electronic commerce, the system comprising: * * S S * * S S S * S S S S S * S * S 515 5 5 I
I S I S I I S
* 5 0 5 5 S S S.. S S.. 55. I secure, valuable data, in the form of complex unique recognisable data-sequences or data-strings of various fixed monetary values as established or guaranteed by an originator or offeror' of said data strings; a data offeror, offering secure datastrings for sale to clients, with the agreement to buy the data-strings back from a client if a client decides to sell the data-strings, and to then deposit a client's proceeds from the sale of said data-strings, into a client's bank account or, alternatively, to deposit a client's proceeds into a bank account, or other type of account of a client's nomination, if requested to do so by a client; a client, purchasing secure data from a data offeror with the proviso that if the data should be re-sold, a client may allow the data offeror first refusal of the purchase of that data; a vendor, offering goods, services, facilities or other purchases to a client and accepting payment from a data offeror, or data-strings from a client, as payment for said client's desired purchases.
139. A system and device according to claim 137 or claim 138, which functions as follows: a client desires to purchase a card containing datastrings from a retailer approved by a data-strings card offeror; the retailer scans the data contained in a selected card's bar-code or magnetic strip and communicates that data along with the retailer's unique registered ID to the card offeror; the value of the data strings contained in said card is confirmed with the retailer; the retailer exchanges the card for a client's payment whereupon the card's data- strings are validated and activated in the offeror's database by the offeror's control facility and a receipt is provided by the POS for a client's records; said approved retailer makes relevant bank transfer to the offeror by prior mutual agreement; a client may browse the internet, select desired purchases from a vendor's website and effect purchase of said selections: by choosing the offeror's payment method if presented via a vendor's website; by transfer of appropriate data-strings to a vendor; by a client informing a vendor of the offeror's agreement to make payment to a vendor on their behalf and subseqyetly by conveying necessary details such as offeror's I or web address and client's unique registered nickname' and eriJ or delivery address to said vendor; * S 5 S S * S S S S S S S * S * * *** S S e *S S S S S S S S * S S * * S S 555 5 5*S 555 S a vendor, unregistered and in mutual concord may send a communication to the offeror including their IP address, bank details for receipt of payment and a client's IP address and nickname, stating the asking price of said client's desired purchase; the system can incorporate a vendor's unique registered ID which may be communicated to confirm a vendor's authenticity; the offeror can send a secure web page to a client's IP address or email to a client's email address with the name, IP address and payment request details of a vendor requesting payment; a client, upon approving the source and amount of a requested payment may then enter a master data-string(s) into the offeror's web page along with valid data-strings totalling an equal or greater value than the sum of the vendor's requested payment; the payment request page can then be returned by the client to the central computer system of the offeror for verification; authentication of submitted data-strings takes place by the offeror querying against a database of data-strings stored on a database server communicating via a secure intranet or Internet; a client's valid data-strings may now be annulled by the offeror and an authorised payment sum as specified by a vendor and approved by a client can be transferred via the offeror's transaction server into the account of a vendor as agreed; a message confirming a transaction can be sent to both parties; a vendor can now release a client's desired purchases; if data-strings submitted by a client are of greater value than the sum of a vendor's requested payment, a data-string as change', equal in value to the difference between a vendor's requested sum and the value of a client's submitted data-strings may be transmitted to a client.
140. A system according to claim 137, claim 138 or claim 139, wherein desired purchases, goods or services can be dispensed by vending machines, and wherein a client may convey data-strings and other information either: direct to a vending machine; to the offeror's control facility; to an operator or controller of a vending machine who can remotely control said vending machine; to thereby cause said purchases to be elicited or dispensed.
141. A system according to claim 140, wherein a vending machine can convey a system or menu to a client's mobile communications * S * S S * * S S S S S * * 5 * * S S S.. S S *
SS S S S S S S S
S S S S 5 S S S 555 SIS S device to facilitate purchase of specific goods, services or purchases.
142. A system according to claim 141, wherein, if an unregistered client's data-strings, transmitted to the offeror during a transaction, are of a value greater than a vendor's requested payment, a client may choose to donate any remaining value or change' to a charitable organisation as facilitated by the offeror and in doing so, the offeror may help to maintain a client's anonymity or prevent client traceability and make it unnecessary for clients or vendors to hold user accounts; i.e. client anonymity may be maintained for a small price and with a little goodwill.
143. A system according to claim 142, wherein in the event of a registered client wishing to make payment to a registered charity, the offeror may wish to acknowledge payment by allowing a client to accrue points in a system whereby the client with the most points at a prescribed moment in time is awarded a gift.
144. A system and according to claim 143, which can further including the practice of charging a fee in connection with performing a transaction if said transaction is authenticated.
145. A system according to claim 144, which may function as a means for deriving a source of revenue, e.g. incentives or pecuniary return in the form of agreed commission deductions or rebates from a vendor.
146. A system according to claim 145, wherein the offeror may allow a client to present their data-strings for sale to a broker who may choose to purchase a client's data, redeem and store the value of said data and in return offer a client payment or financial schemes other than those already presented by the offeror.
147. A system and according to claim 146, wherein data may be utilised or stored on a smart-card' containing integrated circuitry and may be rechargeable with data and used in perpetuity.
148. A system according to claim 147, wherein data-strings purchased by a client, may embody actual or prescribed monetary value as established by the originator or offeror' of said data-strings.
149. A system according to claim 148, wherein a card or device may utilise data-strings of low actual or prescribed monetary value, which may be used to reference certain larger sums of money belonging to the offeror by using a method whereby a client buys data-strings from the offeror and pays the offeror's asking price which is greater than the actual value of the data-strings; the * * * * S * * I * * * * S I * * S I I III S I I S* * S a * * *
I I S S I S
* S IS. SI. I offeror in return agrees to buy a client goods or services of a certain value not exceeding the price paid by a client for said datastrings and to give said client said goods or services free of charge if the client can verify information contained in said data-strings with the offeror in a prescribed manner.
150. A system and device according to claim 149, wherein data-strings of no actual or prescribed monetary value may be used to reference certain sums of money belonging to a client and contained in the offeror's bank account.
151. A system according to claim 150, wherein a card or device may embody an appointed monetary value either by way of data contained therein, or by containing reference to data stored elsewhere which itself may actually be data of appointed monetary value or may subsequently refer to data of appointed monetary value.
152. A system according to claim 151, wherein data-strings can be sold to a client and thus the money paid for them is no longer a client's; as a result, financial customer accounts need not be held by the offeror.
153. A system according to claim 152, wherein the value of a data- string or data-strings may be varied by the offeror and consequently may represent more or less value than the original value pertaining to said data-string(s).
154. A system according to claim 153, incorporating a disbursement device controlling or possessing redeemable monetary value that cannot be overdebited, enabling a client to control specific data in order to effect specific monetary transactions.
155. A system according to claim 154, facilitating exchange or transfer of resources and incorporating an anonymous, secure, client- controlled method without need for a disburser to know a payee's bank details or true identity.
156. A system according to claim 152 or claim 154, where a device may contain, refer or pertain to specific controlled data or data-strings of predetermined redeemable monetary value which can be communicated by way of communications networks to enable client authorisation of payment to any persons, vendor or organisation approved by said client and with said payment being transacted by a guarantor or agent.
157. A system according to claim 156, wherein a client upon communicating valid data as acquired from an originator or a S a * S a. * * * - I S a. a..a * * * I a - * a * a * * * * *. I a offeror' of said data, in the form of specific data sequences or data-strings', to the data-strings' offeror's control facility, in a prescribed manner, causes the control facility to approve the transfer of a specific sum of money as controlled by a client's specific communicated data-strings, with payment consequently being transferred by the offeror's system to an account of a client's choosing.
158. A system according to claim 157, wherein a client may acquire valid data or code from an originator or offeror' of said data or code, in the form of data-strings' comprising unique, specific or random verifiable code or data sequences; and wherein a client, upon communicating said valid data-strings to a data-strings offeror's control-facility in a prescribed manner, causes the control-facility to approve transfer of a specific sum of money, as controlled by the quantity and attributes of a client's communicated data-strings.
159. A system according to any of the preceding claims, wherein certain data, in the form of unique, discrete or multiple data sequences or datastrings', is employed to embody or pertain to various individual predetermined monetary values as determined by an originator or offeror of said data-strings; and wherein, by using suitable communications methods or interface, valid data-strings may be communicated by a client' or possessor of said data- strings, singularly or in plurality, to a control-facility' which may comprise: an online transaction server which has stored thereon functions for logic and procedures and a database server whereon a database of issued data-strings is stored along with associated verification data including value and status information for each data-string currently issued and vendors' registration information; and consequently, where said database may be queried by said control-facility; accordingly, the value pertaining to clients' communicated data-strings may be verified by a control-facility and one or more valid data-strings' values may be annulled by a control-facility at a client's request to thereby cause the control- facility to empower said client to authorise or request that a precise payment sum as controlled by the sum of the values pertaining to said annulled data-string(s) be transferred to an account of the client's choosing, by way of the control facility endorsing the client's requested payment transaction accordingly; said payment sum consequently being transferred via transaction accounting and payment processing features of the control-facility of the system.
160. A system and device substantially as herein described above, six card-like embodiments of which are illustrated in the accompanying drawings.
a * I S IS S. * * - *.
d S * S 555 5 5 : : .* * . . a.. * - :.. .
GB0502211A 2005-02-03 2005-02-03 Payment means and system Expired - Fee Related GB2422935B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0502211A GB2422935B (en) 2005-02-03 2005-02-03 Payment means and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0502211A GB2422935B (en) 2005-02-03 2005-02-03 Payment means and system

Publications (3)

Publication Number Publication Date
GB0502211D0 GB0502211D0 (en) 2005-03-09
GB2422935A true GB2422935A (en) 2006-08-09
GB2422935B GB2422935B (en) 2009-08-19

Family

ID=34307900

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0502211A Expired - Fee Related GB2422935B (en) 2005-02-03 2005-02-03 Payment means and system

Country Status (1)

Country Link
GB (1) GB2422935B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998043825A1 (en) * 1997-04-02 1998-10-08 Aaron Ittah Payment instrument on all types of networks and particularly on internet
WO2000074006A1 (en) * 1999-06-01 2000-12-07 Ic Company System
EP1111560A1 (en) * 1999-11-26 2001-06-27 Netcard Cash Limited Payment system
US20010042784A1 (en) * 1999-03-02 2001-11-22 Debra Lynn Fite Pre-paid card system for purchasing products or services
US20040011864A1 (en) * 2000-03-16 2004-01-22 Daniel Thompson Pre-paid purchasing card and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0030154D0 (en) * 2000-12-11 2001-01-24 En Squared Ltd Improvements relating to public-key encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998043825A1 (en) * 1997-04-02 1998-10-08 Aaron Ittah Payment instrument on all types of networks and particularly on internet
US20010042784A1 (en) * 1999-03-02 2001-11-22 Debra Lynn Fite Pre-paid card system for purchasing products or services
WO2000074006A1 (en) * 1999-06-01 2000-12-07 Ic Company System
EP1111560A1 (en) * 1999-11-26 2001-06-27 Netcard Cash Limited Payment system
US20040011864A1 (en) * 2000-03-16 2004-01-22 Daniel Thompson Pre-paid purchasing card and method

Also Published As

Publication number Publication date
GB0502211D0 (en) 2005-03-09
GB2422935B (en) 2009-08-19

Similar Documents

Publication Publication Date Title
US20220180415A1 (en) Exchange item group sharing in a computing network
AU2007319692B2 (en) Secure universal transaction system
TWI511518B (en) Improvements relating to multifunction authentication systems
US7483862B1 (en) System and method for prepaid biometric redemption accounts
US20010034717A1 (en) Fraud resistant credit card using encryption, encrypted cards on computing devices
US11580464B2 (en) Consumers management system
US20040019571A1 (en) Mobile communication device with electronic token repository and method
US20020040346A1 (en) Computer system and method for on-line generating a password protected and barcode prepaid instrument of entitlement and activating said instrument on presentation over a computer network
US20020143703A1 (en) Internet cash card
US20030229790A1 (en) System and method for electronic ticket purchasing and redemption
JP2006012175A (en) System and method for coordinating payment identification system
CN102625725A (en) Internet and mobile technologies based secured lottery system and method
US8504395B2 (en) System for accepting value from closed groups
AU2002307644A1 (en) Payment card and method
JP4942240B2 (en) Payment processing method using a credit card
JP2002083237A (en) Settlement management method for electronic commerce by prepaid system
JP2002207970A (en) Information card issuing system
US20040117303A1 (en) Apparatus and anonymous payment system (ASAP) for the internet and other networks
JP3555088B2 (en) Authentication data issuing system and authentication data authentication system based on specific time
GB2422935A (en) Pre-payment system for facilitating electronic commerce and anonymous transactions
JP2003507824A (en) Guarantee system for performing electronic commerce and method used therefor
WO2012125527A2 (en) System and method for multi-use identification device
KR20190041478A (en) System and method for exchanging digital bearer securities
KR100450096B1 (en) Method of electronic commerce by imaginary account for cash receipt And the server
JP2002032572A (en) Authentication system, authentication method and settlement system

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20091119