WO1998047091A1 - Virtual property system - Google Patents
Virtual property system Download PDFInfo
- Publication number
- WO1998047091A1 WO1998047091A1 PCT/US1998/007176 US9807176W WO9847091A1 WO 1998047091 A1 WO1998047091 A1 WO 1998047091A1 US 9807176 W US9807176 W US 9807176W WO 9847091 A1 WO9847091 A1 WO 9847091A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ownership
- transactor
- game
- server
- digital
- Prior art date
Links
- 238000012546 transfer Methods 0.000 claims abstract description 102
- 238000004891 communication Methods 0.000 claims description 16
- 230000002452 interceptive effect Effects 0.000 claims description 9
- 230000002085 persistent effect Effects 0.000 claims description 8
- 230000003993 interaction Effects 0.000 claims description 5
- 241000282326 Felis catus Species 0.000 claims 1
- 230000002093 peripheral effect Effects 0.000 claims 1
- 238000000034 method Methods 0.000 description 24
- 238000010200 validation analysis Methods 0.000 description 15
- 230000008859 change Effects 0.000 description 14
- 230000004044 response Effects 0.000 description 14
- 238000006243 chemical reaction Methods 0.000 description 12
- 230000007246 mechanism Effects 0.000 description 12
- 230000008569 process Effects 0.000 description 12
- 238000013474 audit trail Methods 0.000 description 11
- 238000013461 design Methods 0.000 description 11
- 230000000694 effects Effects 0.000 description 9
- 230000009471 action Effects 0.000 description 7
- 230000008901 benefit Effects 0.000 description 7
- 239000003795 chemical substances by application Substances 0.000 description 7
- 230000008520 organization Effects 0.000 description 6
- 230000006399 behavior Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 5
- 230000001052 transient effect Effects 0.000 description 5
- 208000001613 Gambling Diseases 0.000 description 3
- 230000000717 retained effect Effects 0.000 description 3
- HEFNNWSXXWATRW-UHFFFAOYSA-N Ibuprofen Chemical compound CC(C)CC1=CC=C(C(C)C(O)=O)C=C1 HEFNNWSXXWATRW-UHFFFAOYSA-N 0.000 description 2
- 230000004075 alteration Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000003796 beauty Effects 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 230000003111 delayed effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 238000012384 transportation and delivery Methods 0.000 description 2
- 230000002747 voluntary effect Effects 0.000 description 2
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 206010000210 abortion Diseases 0.000 description 1
- 230000004931 aggregating effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000006735 deficit Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- A63F13/12—
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/30—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/047—Payment circuits using payment protocols involving electronic receipts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/30—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
- A63F13/33—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers using wide area network [WAN] connections
- A63F13/335—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers using wide area network [WAN] connections using Internet
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/40—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterised by details of platform network
- A63F2300/407—Data transfer via internet
Definitions
- the present invention relates to computer networks and, more particularly, to a system of property ownership and transfer implemented in connection with a computer network.
- Computer network users generally attempt to exploit the unique features inherent in communications over computer networks. Owners of valuable data or "content,” such as software developers or entertainment companies, take advantage of the relative ease and speed of data replication and transmission over computer networks to inexpensively distribute their data to vast audiences. Retailers and advertisers utilize the relative cost-effectiveness and ready searchability (as compared to conventional publishing media) of data published on the World Wide Web to make information available to vast bodies of potential customers. Multinational businesses use the medium to allow immediate and inexpensive communication among employees in various parts of the world.
- the present invention involves a system of property ownership and transfer that can be implemented in connection with a computer network
- FIG 1 is an overview of an embodiment of a virtual property system according to the present invention
- FIG 2 illustrates the basic relationships among elements of an embodiment of a virtual property system according to the present invention
- FIG 3 illustrates a consumer login scenario used in connection with an embodiment of a virtual property system according to the present invention
- FIG 4 illustrates a web purchase scenario used in connection with an embodiment of a virtual property system according to the present invention
- FIG 5 illustrates an account checking procedure used in connection with an embodiment of a virtual property system according to the present invention
- FIG 6 illustrates a procedure for posting a newly created object for sale in connection with an embodiment of a virtual property system according to the present invention
- FIG 7 illustrates a procedure for posting a previously acquired object for resale in connection with an embodiment of a virtual property system according to the present invention
- FIG 8 illustrates the structure of a limited edition digital object used in connection with an embodiment of a virtual property system according to the present invention
- FIG 9 illustrates aspects of a procedure according to FIG 6
- FIG 1 and FIG 2 A preferred embodiment of a property ownership and transfer system according to the present invention is illustrated in FIG 1 and FIG 2 and referred to herein as a "Transactor" system
- the illustrated Transactor system involves a database 10, a Transactor server 20, end-users 30, a Transactor broker 40, and an application service provider (e.g., a game server) 50.
- End users 30 comprise end-user computers (or “terminals") 31, 32, and 33, and end-user individuals 35, 36, 37, and 38
- the illustrated Transactor system may include any number of end-users and/or end- user terminals, an additional terminal and an additional user labeled " " are included in FIG 1 to illustrate this fact
- Database 10 and Transactor server 20 may each comprise a plurality of databases and servers, respectively.
- Embodiments of the system optionally may include any number of Transactor brokers and application service providers with any number of associated end users
- the application service provider may be a general Internet service provider (e.g., AOL, CompuServe, Pacific Bell), a game specific service provider (e.g., Mpath, Heat, TEN), an open network market-specific service, a closed or private network service, or any other service provided over a computer network
- the below discus- sion emphasizes the example of a Transactor system in which the application service provider comprises a game server, and the end-users comprise game clients End users 30 interact with one another and with game server 50 over a computer network (e.g , the Internet) 60 in a virtual world (e.g., an interactive environment governed by a prescribed set of rules) provided by game server 50 and supported by Transactor server 20
- a virtual world e.g., an interactive environment governed by a prescribed set of rules
- Transactor server 20 communicates with Transactor broker 40 over the Internet 60 or, optionally,
- Transactor-enabled vendors e.g., web sites
- a consumer's credit account holder 80 e.g., a consumer's bank account 90
- Transactor-enabled vendors preferably are accessible via the Internet 60, as are consumer's credit account holder 80 and consumer's bank account 90
- the illustrated Transactor entities can be categorized broadly as clients and/or servers Some entities may act as both a client and a server at the same time, but always as one or the other with regard to other specific entities
- a game server acts as a client to a
- Transactor server but as a server to its game clients
- the main categories of computing entities in the overall Transactor hierarchy are:
- Transactor servers provide transaction and ownership authentication to their clients, who may be other Transactor servers, game servers, game users (which are game clients acting through a game server) and Transactor users (which are not acting through any game server) Transactor servers operate on Transactor user accounts and encapsulated Transactor objects, they need not know the details of any particular game world that may exist
- the Transactor servers essentially define a marketplace in which safe transactions may occur, and existence and ownership may be asserted and verified under rules (i.e., "Transactor Laws of Nature") defined for the Transactor system as a whole
- the primary purpose of the Transactor system is to provide a safe marketplace for objects and owners outside the scope of any game in which those objects and owners might participate If a potential game does not require its game objects to exist outside the scope of its game universe, then using Transactor to determine authenticity and ownership is not necessary It may, however, be more convenient or easier to use Transactor services than to create a special-purpose property ownership and transfer system for that game
- a given Transactor server is responsible for the objects and users defined in its own database
- a Transactor server trusts other Transactor servers for validation of all other objects and users It can, however, detect certain kinds of cheating that might occur in its conversations with those other Transactor servers
- a group of Transactor servers have secure access to a shared distributed database
- the group of servers appears, for most purposes, as a single large Transactor server acting on a single database
- Transactor users are users that are in direct communication with a Transactor server, rather than in communication through an intermediary game server Thus, they are limited to the core Transactor activities of creating objects, making transactions, and authenticating ownership and existence All other activities are performed through a game server
- a game server is a Transactor user that performs transactions and limited types of authentications (e.g., verify game membership)
- game servers define, in a conventional manner, a game "universe” or “virtual world” for their clients, and operate on a set of game objects using game rules that the game designer defines for that game
- a game universe includes all servers that run the game, the game software's behavior, and the rules that define possible behavior for that game
- Game users are the participants in a game universe that exists on one or more game servers
- most Transactor operations on the game's owned objects are brokered by the game server, acting on behalf of the game user
- the only time a game user appears as a Transactor user is when object ownership must be authenticated or changed Even then, however, this activity may be brokered by the game server acting within the scope of the game universe's possible actions
- FIGs 3, 4, 5, 6, and 7 A scenario is an exemplary use of Transactor technology to accomplish some purpose for a user
- a user may be a consumer, a vendor, or any other user of the Transactor technology, including an intermediate server program that subscribes to Internet-based Transactor services, for convenience, the user is referred to consistently in these scenarios as a consumer
- FIG 3 describes a process in which a user logs on, and optionally registers as a Transactor user, in an exemplary embodiment of a Transactor system As illustrated in FIG 3, the following steps take place
- step 1 the consumer (e.g., user 35) logs onto the Internet 60
- step 2 the consumer logs onto a Transactor enabled service provider (or onto a Transactor server)
- the consumer may decide to register as a Transactor user (step 3, at 106) Alternatively, the consumer may decide not to register as a Transactor user (step 3, at 106) Alternatively, the consumer may decide not to register as a Transactor user (step 3, at 106) Alternatively, the consumer may decide not to register as a Transactor user (step 3, at 106) Alternatively, the consumer may decide not to register as a Transactor user (step 3, at 106) Alternatively, the consumer may decide not to register as a Transactor user (step 3, at 106)
- Transactor user and, consequently, leave the site (step 14, at 128)
- the consumer may already be a registered Transactor user (step 8, at 118) and have no need to register as a Transactor user
- the consumer fills out a registration form (step 4, at 108), identifying his or her charge account and bank account information
- a Transactor server creates a new account and issues private data (e.g., user key, password) to the consumer (step 6, at 112).
- the consumer receives and stores the keys and other data, and obtains the Transactor client software (e.g., by download or mail) (step 7, at 114)
- the consumer After the consumer has become a registered Transactor user (after completing step 7 or step 8), the consumer logs into the client-side Transactor object manager (which is described further herein and abbreviated "TOM") as a valid user (step 9, at 116)
- TOM client-side Transactor object manager
- the consumer may decide (Step 10) to make a purchase (illustrated at 120 and in FIG 4)
- the consumer may decide (step 1 1) to check his Transactor account (illustrated at 122 and in FIG 5)
- the consumer may decide (step 12) to post an object that he has created for sale (illustrated at 124 and in FIG 6)
- the consumer may decide (step 13) to post a previously acquired object for resale (illustrated at 126 and in FIG 7)
- FIG 4 describes the process in which a user makes a simple purchase from a web sales site and uses the new object on the network in an exemplary embodiment of a Transactor system As illustrated in FIG 4, the following steps take place
- step 1 a consumer (e.g., user 35) decides to make a purchase
- the consumer's TOM sends (step 2, at 204) signals indicating an intent to purchase, along with the appropriate user ID and product information, to the vendor's web site
- the vendor's Transactor broker module creates (step 3, at 206) a transaction record that incorporates necessary vendor IDs, product information and vendor signatures with consumer's information
- the vendor then sends (step 4, at 208) a transaction record, as described further herein, to the Consumer's TOM for signature
- the consumer's TOM confirms (step 5, at 210) the vendor's signature and transaction record contents, and signs and forwards (step 6, at 212) the transaction record to the Transactor server
- the consumer's TOM also notifies (step 7, at 214) the vendor's server that the transaction has been signed and a record has been forwarded to the Transactor server
- the Transactor server then validates (step 8, at 216) the Transaction record and contents, issuing an OK (i.e., transaction is valid) or a rejection (transaction is invalid) If the validation is not OK, the operation is not performed and the user is so notified (step 9a, at 218) If the validation is OK, the Transactor changes (step 9b, at 220) the object's ownership in the relevant database and determines all splits and fees for all accounts involved (e.g., buyer, reseller, maker, service provider), transactions for each account are then logged and new account balances are computed
- the Transactor server then sends (step 10, at 222) a purchase OK to the vendor's server, and the vendor's server receives (step 11 , at 224) the OK and repackages the existing unit with the consumer's ID
- the vendor's server then sends (step 12, at 226) the object to the consumer or sends notification of where to download the object via FTP The sale is logged as complete
- the consumer's TOM server receives (step 13, at 228) notice of the sale and downloads the object according to the instructions received in step 12
- a Transactor server will verify the ownership of the object
- FIG 5 describes the process in which a consumer checks his Transactor account As illustrated in FIG 5, the following steps take place
- step 1 a consumer (e.g., user 35) decides to check his Transactor account
- the consumer's TOM sends (step 2, at 304) intent-to-purchase account information
- the Transactor Server sends (step 3, at 306) a validation challenge to the consumer's TOM, and the consumer's TOM responds (step 4, at 308) to the validation challenge
- the Transactor server receives the response (step 5, at 310)
- step 6a If the validation is not OK, the operation is not performed and the user is notified of the failure (step 6a, at 312)
- the Transactor server allows (step 6b, at 314) the client software (e.g. Java applets) to download the consumer's account information (not persistent)
- the consumer's TOM downloads (step 7, at 316), decrypts and displays account information using applets (or other client software) embedded in the web page (part of broker module, described herein)
- the consumer then reviews (step 8, at 318) account information (along with other communications from the Transactor server, if any have been received) and logs off or proceeds to other Transactor activity
- FIG 6 describes the process in which a registered Transactor user posts an object that he created for sale As illustrated in FIG 6, the following steps take place
- step 1 a registered Transactor user (e.g., user 35) decides to post an object that he has created for sale
- the user logs into the TOM to "package" his object, the TOM enters (step 3, at 406) the user ID (e.g., Al A1A1) into the object package fields, and the user inputs data regarding, for example, price, revenue model, and number available
- the user logs on (step 4, at 408) to a Transactor Server directly or a Transactor- enabled service provider, and is validated by a Transactor Server
- the user then uploads (step 5, at 410) the packaged object and fields with instructions for the Transactor Server to create a new product
- the Transactor Server then verifies (step 6, at 412) that it received the data correctly, and proceeds to create a product, giving it a unique product ID (BIB IB 1)
- the Transactor Server then sends (step 7, at 414) the unique product ID, and other product-related informa- tion, back to the user
- the Transactor Server will verify (step 8, at 416) buyer's (37) Transactor User status and the existence of available unsold units for the buyer- designated product ID
- the Transactor Server creates a new unique unit ID and assigns ownership of that unit to the buyer in its internal ownership databases
- the Transactor Server then packages (step 10, at 422) the unit ID with ownership information and the digital product itself, encrypts portions of the resulting data, and sends the result to the user or informs the user where the packaged object may be downloaded
- the Transactor Server also updates (step 11, at 424) all relevant accounts, computes and distributes splits
- FIG. 7 describes the process in which a registered Transactor user posts a previously acquired object for sale As illustrated in FIG 7, the following steps take place
- step 1 the Consumer decides to post a previously acquired object for resale Using the TOM, the Consumer then indicates (step 2, at 504) the asking price for the object and sends posting (and appropriate IDs including TOM signature) to the Transactor
- the Transactor Server then sends (step 3, at 506) a validation challenge to the Consumer's TOM
- the Consumer's TOM responds (step 4, at 508) to the validation challenge
- the Transactor Server receives (step 5, at 510) the response
- step 6a at 512
- the Transactor Server includes (step 6b, at 514) the object posting in a log of objects currently for sale "classifieds " The object, or a pointer to the object, is stored at a Broker Server for resale
- Another valid Transactor user for example Consumer 36, logs on (step 7, at 516) to a
- Transactor enabled web site and activates her TOM to search for an object to purchase Consumer 36 searches (step 8, at 518) the Transactor "classifieds" by object name, universe, price, or any other conventional search criteria to find the desired object
- Consumer 36 locates (step 9, at 520) the object posted by Consumer 35 and decides to make a purchase
- the TOM for Consumer 36 then sends (step 10, at 522) its intent to purchase (and appropriate IDs) to the Broker Server via the Transactor-enabled web site
- the purchase process continues (step 11, at 524) as in FIG 4, with the Broker Server acting as vendor
- LEDO 600 comprises a payload 606, a unit ID 602, and an owner ID 604 Each of these elements are illustrated in corresponding dashed boxes
- Examples of LEDOs for use in game environment in connection with an embodiment of a Transactor system comprise tools, characters, keys, spells, levels, abilities, behaviours
- a variety of additional types of LEDOs for use with embodiments of a Transactor system will be apparent to those skilled in the art from the present disclosure
- each LEDO has a unique, immutable unit ID, an owner ID indicating the current owner of the object and a payload comprising binary data which defines the object characteristics
- Unit ID 602 is assigned to the unit during object creation and incorporated in the LEDO during the initial object purchase
- the owner ID 604 is assigned to the user during
- User Registration and incorporated in the LEDO during object purchase Payload 606 comprises data which defines the object (e.g., textures, data pointers, Al, object attributes)
- the objects are persistent such that they are accessible both when the user is in communication with a server (e.g., a game server) and when the user is not in communication with the server
- the number of LEDOs of a particular type can be closed or limited (e.g., the product run is capped at a predetermined number) or open-ended
- the unit ID for each LEDO is assigned at its creation and is unique
- the unit ID is immutable in the sense that a change in the unit ID for a particular LEDO can be detected and, in preferred embodiments, the LEDO loses functionality (e.g., it cannot be used in the relevant game world) if it has been altered
- FIG 9 describes the process in which a registered Transactor user posts an object that he has created for sale in accordance with the previous description in FIG 6
- the following description of the steps in this process uses the FIG 6 reference numerals and step numbers, along with the FIG 9 reference numerals
- step 1 a registered Transactor user (e.g., user 35) decides to post an object that he has created for sale
- the user logs into the TOM to "package" his object, the TOM enters (step 3, at 406) the user ID (e.g., A1A1A1) into the object package fields, and the user inputs data regarding, for example, price, revenue model, and number available
- the user logs on (step 4, at 408) to a Transactor Server directly or a Transactor- enabled service provider, and is validated by a Transactor Server Steps 1 through 4 above are further illustrated in FIG 9 by User 35 (identified by code
- Data fields 720 include a product ID field 722 for the identification code associated with the object (in this case, BIBIBI), a seller ID field 724 for entering an identification code associated with the seller of the object (in this case, A1A1A1), an owner ID field 726 for entering an identification code associated with the owner of the object (in this case, Al Al Al), a price field 728 for entering the requested price for the object (in this case, $5 00), a maker ID field 730 for indicating the identity of the maker of the object (in this case, A1A1A1, the owner), a revenue model field 732 to indicate financial terms associated with the sale of the object (in this case, a straight sale), a total available field 734 indicating the total number of objects of this type that are available for sale, and an FTP field 736 indicating the delivery details for the object
- a product ID field 722 for the identification code associated with the object (in this case, BIBIBI)
- a seller ID field 724 for entering an identification code associated with the seller
- the Transactor Server (740) then verifies (step 6, at 412) that it received the data correctly, and proceeds to create a product (illustrated at 750), giving it a unique product ID (BIBIBI) shown in data field 762
- the Transactor Server then sends (step 7, at 414) the unique product ID, and other product-related information, back to the user
- the Transactor Server will verify (step 8, at 416) buyer's (in this case, user 37) Transactor User status and the existence of available unsold units for the buyer-designated product ID
- the Transactor Server creates a new unique unit ID (illustrated at data field 768 and, in this case, DIDIDI) and assigns ownership of that unit from the seller (AIAIAI, illustrated in data field 764) to the buyer (C1C1C1 illustrated in data field 766) in its internal ownership databases and in the new object (relevant data is illustrated in data fields 760)
- the Transactor Server creates a new unique unit ID (illustrated at data field 768 and, in this case, DIDIDI) and assigns ownership of that unit from the seller (AIAIAI, illustrated in data field 764) to the buyer (C1C1C1 illustrated in data field 766) in its internal ownership databases and in the new object (relevant data is illustrated in data fields 760)
- AIAIAI illustrated in data field 764
- C1C1C1 illustrated in data field 766 in its internal ownership databases and in the new object (relevant data is illustrated in data fields 760)
- the Transactor Server then packages (step 10, at 422, also illustrated at 770) the unit ID with ownership information and the digital product itself, encrypts portions of the resulting data, and sends the result to the user or informs the user where the packaged object (illustrated at 770) may be downloaded
- the Transactor Server also updates (step 1 1, at 424) all relevant accounts, computes and distributes splits
- the illustrated Transactor system is predicated upon various trust relationships among the Transactor entities illustrated in FIGs 1 and 2 These trust relationships are as follows
- a Transactor Server trusts other Transactor Servers to correctly authenticate objects and accounts which are outside its own knowledge This trust is mutual
- a Transactor Server does not trust a Transactor User Accordingly, a Transactor Server does not trust a game Server All transactions and authentication must be valid according to the Transactor protocol rules, or a transaction request will be rejected Both participants in any transaction are independently authenticated by the Transactor Server
- a Transactor User trusts all Transactor Servers to give correct information about transactions, objects, and accounts
- a Transactor User does not trust another Transactor User, except to the extent authenticated by a Transactor Server
- Game Servers like other Transactor Users, trust their Transactor Servers to perform valid ownership transfers, and to correctly authenticate user-accounts and object ownership Game Servers also trust the Transactor Server to authenticate game objects themselves (i.e., detect data tampering), but only insofar as the originally registered game object was itself correct in the game universe That is, if the originally registered game object was flawed or illegal for the game universe, it will be "correct” as far as the Transactor Server is concerned, but will be “incorrect” when the game server tries to use it
- Game servers need not trust their game users In some embodiments, however, game servers may trust game users without a Transactor server authentication
- Game servers trust other game servers that help create the game universe
- Game users trust game servers to "play a fair game” (i.e., follow the rules of the game universe) Game servers that do not play a fair game are unlikely to be successful in the game market, but there is no final Transactor arbiter of what constitutes a "fair game "
- a game user need not trust another game user, except insofar as confirmed by the game server for the given game universe
- This section includes a description of how, in an embodiment of a Transactor system according to the present invention, objects may be bought, sold, and traded using a mutually trusted third party (a broker) in order to effect transactions in other than real-time
- a mutually trusted third party a broker
- this is described in terms of a "game,” the rules of which define a model of conventional real-world brokering and agency
- a typical problem involving a game, game- players, and ownership transfer is first presented
- This example is followed by a brief analysis of a "simple solution,” which can be used in simple embodiments of a Transactor system
- brokers, their actions, rules, and how this solves the basic ownership-transfer problem when implemented in more complex embodiments of a Transactor system 1 An Llxemplary Game Scenario and Implementation Problem
- This example involves a simple multi-player game, running on a server machine
- the players own some Transactor objects, which reside on their own machines
- a few players decide to play a game using some (but not all) of their owned objects, using the game server to run the "game world"
- the rules of this game allow game objects (encapsulated as Transactor objects and initially existing on the player's machines) to be involuntarily “plundered” by the brute force or trickery of any player, as well as voluntarily traded away, or simply lost or dropped In this game, possession equals ownership Lost or dropped objects not picked up by another player are "owned” by the game (or game service provider)
- a Transactor server is contacted and a transaction (a Transactor ownership transfer) made each time a game-object changes ownership, (e.g., it is plundered, traded away, lost, dropped)
- the basic problem is how a game server or anyone else in the above scenario can truly enforce transferring ownership involuntarily, that is, without the active assent of the object's original owner Under ordinary circumstances, the owner cannot be compelled to use or disclose his private key and, without it, ownership cannot be taken away Even if the game- client software running on the player's machine automatically responded to a game server request to transfer ownership, the user could have hacked the software to not permit owner- ship transfers Thus, in conventional circumstances, the game server would have no way to enforce ownership transfer to the object's new owner
- Transactor servers trust all game servers, thus opening up potential holes in the overall system security model and greatly expanding the required trust relationships in the overall system It would also require that Transactor servers distinguish a game-server account from other kinds of accounts, and treat them differently
- Transactor servers to process huge numbers of transactions (one for every trade, steal, plunder, or take), and require that the game servers certify that each involuntary trade was legal (to guard against fraud or hacking) All this network traffic must occur in real-time, or at least with an asynchronous capability But that asynchronicity can propagate to any depth, since objects may rapidly change owners again before a prior ownership transfer has completed This quickly leads to a large "roll-back" problem that a game server must handle on its own
- a game player gives a "power of attorney" privilege to a game server during game play, and rescinds it when the game ends or the player withdraws from play Under these "powers of attorney," the game server takes ownership of every object brought into play, keeping track of the "true" owner The game server then runs the game according to its rules for who owns what and how they got it, and finally resolves end-game ownership by transferring the objects to their most recent game-level owners
- the game server must tag each object with it's current "designated owner," starting with the ID of the original owner
- the game server still owns the object, as far as the Transactor system is concerned, so the designated owner is just a part of how the game is played
- the tag is simply the Transactor user-ID of whoever has game-level owner- ship of the object
- Plundered objects are tagged with the user-ID of the plunderer Objects traded voluntarily are tagged with the new owner's ID Lost or dropped objects are tagged with the Transactor user-ID of the game itself (i.e.
- the game server (which owns all in-play objects) transfers actual Transactor-level ownership to the player If a player's connection goes out, the game server maintains the "designated owner" tags, subject to plundering by other players within the game context
- servers spawn sub-processes or call on concurrent server-side programs to perform cash-outs synchronously, rather than burdening the game-program with such non-game details
- a game server provides "free parking” to game players who want to keep their objects on the server and avoid most uploading and downloading The server retains ownership of the objects, but they are not active in any game These "parked objects" are not available to the player for out-of-game trading, but can be reacquired by the player at any time 3 Brokers and Brokering
- brokers in this description refers to any mutually trusted third party who acts on behalf of two other parties to effect some pre-determined action
- a broker is trusted to act on behalf of the original authority, but only within the boundaries defined at the time of the brokering agreement, and only for specific designated objects
- both participants in the brokered transaction must trust the brokering agent to act on their behalf
- a broker is a mutually trusted intermediary in a transaction that occurs between two other individuals, neither one of whom need trust the other
- a Transactor Server provides a means by which an individual may grant trust to another individual in the Transactor system This will become clear from the following description of a "brokering game "
- a broker In a "Brokering Game,” a broker is an agent Its actions result in a safe trustworthy transaction between two other parties, who are the "players" in the Brokering Game
- a broker operates on an object, acting as intermediary in transferring ownership between the original owner and the buyer Users (players) in the Brokering Game participate voluntarily, and willingly transfer ownership of their objects to the broker with the understanding that they will get them back if the broker does not sell the object
- the Game Universe of the Brokering Game consists of all the objects that a given broker has for sale or trade, and the identity of each object's original owner (the "designated owner")
- the Brokering Universe may also contain requests by players for the broker to seek out and obtain a certain kind or class of object These requests would require a more sophisticated Brokering Game program
- any particular instance of the Brokering Game may charge a fee to "play" That is, it may charge a fee in order to broker a transaction This fee is different from the Maker's Fee computed by the Transactor Server Fees are defined by whoever creates a particular Brokering Game
- Brokers are typically connected through the Internet to a number of other brokers (although they need not be) These brokers may communicate requests to one another in order to complete transactions
- These inter-broker communication protocols are yet to be defined, but must be standardized for all brokers
- Brokers that do not communicate directly with other brokers behave as simple public or private store-fronts for the sale of their users' objects (sort of a "consignment store") This may entail a web connection (HTTP server) in addition to the brokering services, or it may be a "closed game” in which only registered users can log on and participate That is a decision to be made by the game designer It is not a Transactor rule or law
- the broker can own objects that are not actively being brokered because one or more criteria of the brokering agreement have lapsed
- Brokers must notify the original owner with all due haste when an object has been sold This is more than just a courtesy to players, since the original owner may be a game server that requires some real-time notification of a sales transaction in order to run its game in something approaching real time Brokers should also notify the original owner when one of the limiting criteria of the brokering agreements lapses, when the brokering agreement itself expires, or some other criterion takes the object out of active brokering "play "
- the basic rules of brokering given above define a fundamental set of ground rules by which brokers act for users. But they are not limited just to game servers that only play the Brokering Game If any game implements these rules using a game-as-broker design, it can act as a broker on behalf of all its users, for whatever purpose the game designers choose
- Transactor objects are useless to those who would simply take them (i.e. copy the file), because the object itself is encrypted under the owner's key, and because a Transactor server would disallow the object's use except by the owner.
- a game universe acts as a broker, then it owns all objects that are in play, and no Transactor server is needed to "change owners" Instead, the game servers maintain a "designated owner," which starts out as the object's original Transactor owner, but may be altered according to the game rules for plundering when another user encounters the object Since the game server is acting as a broker, the player who brings the object into play must voluntarily transfer ownership to the game server, fully agreeing that the game-play rules determine who will eventually get actual Transactor-certified ownership of the object If the game design allows objects to be taken out of play, then the most recent "designated owner" receives actual Transactor-certified ownership of the object, and receives the object from the game-as-broker, not from the object's original owner
- Borrowing is a game rule or rules that define how an object may be used by someone other than its owner, and perhaps how ownership of the borrowed object may be transferred without the owner's direct permission should the borrower "lose” the object
- the game server acts as a broker and actually owns the object as far as a Transactor server is concerned
- any rules that the game designer makes will be carried out on objects already owned Also as with plundering, there is a "designated owner” who can take the object out of play and become the "actual owner” (i.e.
- a borrower would typically be prevented from taking the object out of play by the game rules If this is not done, then there is no difference in fact between a borrower and a plunderer (since possession would equal ownership), and a borrower would simply be a plunderer to whom you gave the object voluntarily rather than involuntarily
- Sales More than just a neutral broker a Sales agent would earn its fee by actively seeking out buyers for the goods it has been charged with selling Like any broker, it owns the goods it is trying to sell, at least according to an authenticating Transactor server
- the "designated owner" is the individual who wants the goods sold, and to whom ownership will revert according to the agreed-upon rules and constraints, should the item not be sold
- a collector agent would seek out sellers of goods described or designated to it by its users It would then buy or trade to acquire those goods, according to the instructions it was given by a particular user
- a Collector agent may have several users who all want the same object
- the arbitration rules for deciding who actually gets an object are for the designer to define They are not a Transactor law or rule First- come first-served is one example of such a rule Highest finder' s-fee is another Bribery might be another These are all valid Collector rules in the Transactor universe (3)
- Gambling/Gaming A casino or gambling house acts as a broker for its patrons It may charge a fee, or it may take a cut of winnings, or any other arrangement
- the objects wagered can be private currency or barterable objects, depending on the house rules
- Some brokering agreements may ignore the "return on demand” rule, and only return objects to their owners when the brokering agreement expires Certain commercial operations such as auction houses might need this rule variation, to guarantee to bidders that an object remained "in play” until all bids were in or the brokering agreement expired This would apply for real-time as well as delayed auctions These agreements will also probably have a minimum price that the object must be sold for, just as real-world auctions do
- Transactor server and client software may be implemented in many computer languages such as, for example, C/C++ or Java, and that embodiments may be implemented in a manner that is portable across Window/Windows NT and selected UNIX environments
- a Transactor system according to the present invention can be broken down into several elements and services The primary division is into client-side elements (termed tools) and server-side elements (termed services) Some elements, such as embedded applets, can be viewed as lying somewhere between these two elements, because they originate from and communicate with a server yet run and operate on a client machine.
- a tool is a distinct identifiable program or capability residing on a client's computer. It is invoked directly by a user to accomplish a specific purpose It is more like a tool in a Word toolbar, rather than like a command-line tool in Unix.
- Publicly accessible server-side elements appear simply as services on a network, with no specific requirement that they be implemented as separate server processes on a particular server machine or cluster of machines
- a particular service may be provided by a class or thread within a single server program, or by a distinct server process on a machine, or by a group of server machines, or even or by a distributed self-updating service like the Internet's Domain Name System (DNS)
- DNS Domain Name System
- a typical Transactor merchant will also need to supply other conventional vendor services as appropriate (e.g., a sales mechanism or metaphor, a stocking mechanism, billing)
- Transactor client-side tools reside on and run from the client's machine. Preferably, they are not embedded in web pages. A wide variety of techniques for constructing the below tools will be apparent to those skilled in the art, based on the present disclosure.
- Object Manager The object manager collects objects into lists and groups, examines or browses objects, including unowned ones, etc. This is the "root” Transactor tool from which all other actions (owner acceptance, wrapping, unwrapping, etc.) can be performed.
- Owner Acceptor The owner acceptor accepts a password or pass-phrase typed in, applies it to a Transactor "keychain", and allows use of resulting Transactor keys, if successful In some embodiments, this tool is implemented as an inherent part of the Object Manager
- wrapper wraps a raw digital object (which may be an existing digital object in the user's possession or a digital object newly created by the user) with an owner's Transactor info, resulting in a Transactor object
- Unwrapper Unwrapper The unwrapper unwraps an owned object, resulting in a raw digital object and a separate file holding the data from the Transactor fields
- TID It does not validate objects or ownership, only the identity of users
- Bookkeeper receives, confirms, and logs all transactions and transfers of objects, maintains accounts (distributes splits to other users, etc ), and performs collect-and-forward transactions to other mercantile servers (bank-cards and bank- deposits)
- Object Registrar The object registrar register new objects, issuing Object ID's (OID's), validates objects and ownership thereof, for Bookkeeper, and performs ownership transfers in support of Bookkeeper
- a Transactor vendor will have utilize a Storekeeper service, which keeps an inventory list, keeps a sales log of transactions, and communicates with the User Registrar, Bookkeeper, and Object Registrar
- a module should be treated as a related set of facilities or capabilities, not necessarily as a software-design element corresponding to a library, package, or class
- the core support modules are
- Networking software may be provided either as a standard library (e.g., as for C or C++), or as a standard part of the language system (e.g., as for Java)
- This module is responsible for encrypting and decrypting all Transactor objects and communications It is also responsible for generating unique cryptography keys, Transactor
- This module allows other modules to read or write the Transactor fields of a given object's Transactor wrapper independent of any actual game or other use This module also performs wrap and unwrap of raw digital objects
- this module uses the values from an object's Transactor fields, as received from the Transactor- Field Module, this module computes splits, fees, etc for all the participants in a sales transaction according to an object's predetermined Revenue Model This module also distributes those amounts to each user account in the database, and writes entries in the log This module also interfaces to third-party "bankware" to perform payments and billing of all user accounts
- a policy is defined so as to determine when, how often, at what amount, what activity level, etc. to actually initiate a banking transaction involving the bankware.
- a Revenue Model is a server-side software element that determines how revenues accrue to Owners, Makers, etc. In some embodiments, it is preferable to define several standard Revenue Models In some embodiments, a "plug-in" type architecture for additional Revenue Model components is also used
- Logging Module A log provides a complete serialized list of every change to any Transactor database This acts not only as a backup in case of database corruption, but also as an independent accounting audit trail for all transactions
- the Logging module maintains several such logs, serving different purposes as outlined in more detail later Most logging occurs on the server- side, but a client-side Logging Module is responsible for logging a user's transaction history in the local transaction log This is purely for user information purposes
- Cryptography provides several features within Transactor data invisibility, data integrity, authentication, etc
- Data invisibility means that the data is not visible to any but an authorized user/owner This is accomplished with encryption
- Data integrity means that data can be determined as being in an untampered form This is accomplished with secure hashing and digital signatures
- Authentication means that two parties who do not trust each other can each determine that the other entity is who it claims to be This is accomplished with authenticating protocols that may employ encryption, hashing, digital signatures, etc
- Transactor ID and an Object ID are part of the authentication system and, preferably, are uniquely identifiable and cryptographically secure User ID's may simply be sequentially assigned numbers, from a pre-determined range allotted to a particular Transactor server Uniqueness is the only requirement Object ID's may include a sequentially assigned number, as well as hashed information about the object's contents, maker, registration time, etc These values are essentially impossible to forge or fake, nor do they allow an altered or forged object or user to be improperly recognized as valid Since the user and object databases contain every known ID, all objects and users can always be verified
- a Transactor user's data may change over time, such as from a change of address This does not alter the originally issued Transactor ID
- the registered user simply enters the new data, while using the same ID originally calculated and assigned A Transactor object does not change over time, so its Object ID (or a related message digest or hash) can always be recalculated to verify that it has not been tampered with This is how objects can be verified as unaltered even without transferring their entire contents to the Transactor Bookkeeper service
- a game weapon may have a variable power level, but that variable must be kept outside the "wrapper" provided for Transactor object validation
- the weapon itself may define internal constants that limit valid power levels, and these would be inside the wrapper to prevent tampering
- the worst effect from tampering is to gain a full power level
- Every Transactor digital object preferably contains several data fields in the object itself that identify the object and its owner, its original creator, the revenue model, and how sales splits are computed
- the Transactor registered-object database holds the correct values of all unalterable fields, so any tampered field can be easily identified and set right
- Transactor modules use the Transactor-field values to determine how to handle the object, or how to handle transactions involving the object
- This module provides uniform access to all readable fields, and constrained but uniform access to writable fields For example, anyone can read the Current Owner field and retrieve the ID kept there, but only the accepted and verified owner can write to that field But even the owner can't do everything An owner can set a new price, but can't change the Maker or Split fields. The latter can only be changed by the original Maker.
- the Financial Module acts as the intermediary between Transactor transactions and actual banking or payment-system (bankware) transactions.
- This module's main purpose is to calculate and distribute the fee splits designated by the object being sold. In the simplest case, this is basically a "calculate and forward" module, and every Transactor transaction immediately results in one or more bankware transactions. Such a simple implementation might not even need to keep any account-balance information of its own, instead relying entirely on the bank-maintained accounts to determine a user's balances.
- a more sophisticated Financial Module might instead maintain its own "summary" accounts for every user, and only perform bankware transactions at the end of the day, and only for those accounts whose resulting daily balance was larger than some predefined amount (e.g. more than $2.00 credit or deficit), or had gone longer than 30 days without a transaction.
- some predefined amount e.g. more than $2.00 credit or deficit
- users and vendors are spared the overhead of large numbers of tiny banking transactions.
- the detailed transaction logs and the corresponding reporting tools provide a complete audit trail to determine every detail that went into any aggregated banking transaction.
- the user's current account balance is either a positive or negative amount.
- the current balance is zeroed out, and translated into an appropriate credit deposit or debit charge against the user's designated outside financial accounts. That is, a single bankware transaction occurs. If the amount is small enough, it is simply carried forward to the next billing period and no bankware transactions are performed for that user's account.
- the precise details of "small enough”, as well as other particulars such as a small balance carried for a long enough period of time, will be determined by further research or an arbitrary decision in the design. In any case, these parameters must be tunable.
- a Revenue Model is a software element that calculates how ownership transfers generate revenue for sellers or makers
- a Revenue Model is designated by an ID in the Transactor object itself, designated when the object was created by its maker
- the Revenue Model software component is passed information about the object, the sale price, etc and is responsible for calculating how much of the sale price goes to seller, maker, broker, etc
- the Revenue Model software component has no knowledge or interaction with accounts, bankware, etc It only calculates shares in a revenue stream
- the primary storage facilities are the various databases Redundant information is kept by time- stamping and logging every transaction that alters any database This log acts as both an accounting audit trail and as a backup mechanism
- the log can be searched (off-line using yet-to-be-defined tools) to discover reasons for problems like, for example, account balance disparities or contested purchases It also clearly shows the time at which each transaction was made
- the log can be used to restore the databases should they become corrupted This is accomplished by starting with a valid backup database and sequentially applying every logged alteration The result is an up-to-date database In the safest setup, all log files are kept on a different physical hard disk than the database files
- One log entry may correspond to several changes in the databases
- Log-file formats should be compact (i.e. binary, not ASCII text).
- the Logging Module can switch to another log-file at any time, under administrative direction (manually, at a scheduled time (e.g. midnight), etc )
- a log-file switch is performed using the algorithm outlined below Log entries received during the switch are queued up and eventually written to the new log-file
- the logger must never overwrite, truncate, or delete a file itself If it fails to create a new empty unique log-file, it will refuse to switch log files
- Log-files need not be kept forever They can be moved off-line after some period of time and retained only until their backup media is reused
- the scheduling of this should be one of the policies determined by the Transactor administrators or owners, and implemented as a configuration option of the Transactor software Since log-files contain valuable sensitive data, they must be kept secure at all times, even when off-line Log files may be encrypted to protect against possible snooping This option must only alter the data written to the log, not any other aspect of its nature
- a log may be 'reset' so that log-files do not grow too large This does not actually delete any data from the log Instead, the logger switches to a new log-file, leaving the prior log-file intact Failure at any point aborts the log-switch, and logging continues in the original file, with a log-entry made that a log-switch failed This switch is accomplished as follows
- a memory-based queue is created to hold log-entries received during the switch Entries are time-stamped with their entry-time into the queue
- the prior log-file is renamed by appending the transfer time-stamp to the existing name, in an acceptable ASCII format (i.e. no illegal characters for the machine)
- the new log-file is renamed to the old log-file's name Depending on the platform, this may require closing the new log-file, renaming it, then reopening it and seeking to the end
- a Transactor transaction occurs whenever ownership of an object is transferred from its current owner to a new owner
- a transaction record is the collection of data that describes all the entities involved in that transaction and the type of transaction requested Transaction records can be valid or invalid, solely depending on their contents
- a critical Transactor service is to recognize and prohibit all invalid transfers by rejecting invalid transaction records
- a transaction record basically looks like this
- Type Seller sold Buyer this Object on Date for Price, by time X; signed by Seller, then Buyer.
- T S sold B this O on D for P, by X; signed: SS, BB.
- T is the type of transaction record, identifying the rest of the data for the Transactor server S is the Seller's TID, which must also be the original owner of the object B is the Buyer's TID, which will be the new owner of the object O is the transferred object's unique
- OID Object ID
- D is the date and time (expressed in GMT for uniformity) at which the transaction occurred
- P is the agreed-upon price, if it was a sale for money as opposed to barter
- X is an expiration-time a short time after the transaction record is completed Its purpose is explained below
- the entire transaction record is then digitally signed by the Seller SS, then by the Buyer BB
- This collection of data is then sent to the Bookkeeper service for validation and approval If approved, the given object's ownership is transferred to the buyer, and the new ownership is recorded in the database If rejected, there is no ownership transfer, but the Bookkeeper retains the record so it can detect patterns of fraud or other difficulties
- the Seller constructs the transaction record and fills in all fields, then signs it
- the transaction record is then sent to the Buyer, who decrypts it, verifies the Seller's signature, then signs it, encrypts it again, and sends it to the Bookkeeper service
- These last steps requires the Buyer's cooperation, so the Seller must trust the buyer to actually sign and forward the transaction record Without the expiration-time X, this would be a security flaw, since Seller's are not required to trust Buyer's Adding an expiration-time declares a deadline after which the transaction record is automatically invalid, so the Seller is no longer entirely dependent on the Buyer's good behavior
- the Buyer must submit the transaction record to the Transactor server before this deadline, otherwise it will be rejected, even if all other data is correct
- This deadline prevents the Buyer from holding the Seller's object "hostage" for an indeterminate time, effectively preventing its sale or use elsewhere After the deadline, the Seller can sell the object to someone else without fear that a bogus delayed transaction record will be sent in by an uns
- the Bookkeeper tells the Financial Module to calculate and distribute sales splits, fees, etc It also updates the object and ownership databases to reflect the resulting object transfer All intelligible transaction records, whether accepted or rejected, are logged to a transaction log-file Certain patterns of rejections may send a security notification to an administrator, or take some other predefined action Garbled transaction-record attempts are not logged to the transaction log, but may append an entry to a "problem with host H" file for later perusal and action by an administrator
- the value of O in a transaction record must be something more than just the OID of the object This is to prevent various fraud schemes whereby having an object's ID would be equivalent to having the object
- One way to avoid such problems is to have the O value be a collection or composite of several values that not only identify the object, but also act as an assurance that the object is really in S's possession, and really owned by S One part of this composite is the OID
- the "assurance value" needs to be something that can only be calculated by the object's true owner, such as a message-digest of the object's decrypted contents (only possible for the owner and the Bookkeeper) combined with the values for B and D to introduce unpredictability Without the unpredictable values of B & D (and perhaps some other random strings), a cheater could have precalculated the object's message-digest, and it would never change even after the object was sold or destroyed Thus, the main reason for using a message-digest would be lost
- T S sold B this O on D for P, by X; signed: SS, BB.
- the D field always contains the date/time of the request, and the contents are always signed by at least one participant
- Some fields have no meaning outside of sales transactions, such as the price P, which is zero on all the following
- Verify a User (TID) S is the user making the request B is the TID being checked O is all zeros The record is only signed by SS An "OK" response means that B is a valid TID
- Rejection may mean any error
- Validate an Owned Object S equals B, and is the user making the request O is the object identifier/digest
- O is the object identifier/digest
- the record is only signed by SS
- An "OK" response means that the object is valid and is owned by S Rejection may mean any error
- Validate an Unowned Object S is all zeros
- B is the user making the request
- O is the object identifier/digest
- the record is only signed by BB
- An "OK" response means that the object itself is valid, but its ownership is undetermined This prevents non-owners from inferring another user's owned objects by probing with valid Object ID's Rejection may mean any error
- the Transactor software system is a flexible general-purpose system for establishing ownership and for conveying products and payments It is not limited to real-world monetary transactions, nor to purely digital objects Following are some specialized features that are available, in some embodiments, as options to Transactor service providers
- Transient property Transient objects provide a mechanism to allow exchange of data between users or client and server that exploits the security and consistency of the
- Transactor protocols while not transferring ownership or utility to the receiver Transient objects cannot be stored in a user's inventory, and they automatically disappear when the connection with their originator is broken
- the original complete object may contain or refer to a small embedded transient "preview" of itself which can be separately extracted and sent to the prospective buyer
- This transient object has no value, is unusable in play, and cannot be traded or retained in the user's inventory It is purely for examination before purchase Its Object ID does not exist in any Transactor-server database, since it is created on-the-fly, so it cannot be traded
- a membership card is a persistent "entry visa” to other services or privileges It is persistent in that it cannot be spent or expended like currency, and has no inherent value as currency (but may have collectible value) It allows entry or access to services, because the service provider can see the user present a valid card Membership cards usually have an expiration date, nor are they transferable to another user except by the issuer
- a passport is one example of a "membership card", as is a driver's license
- a membership card also identifies the holder as a member of the issuing organization, but this is primarily for use by other organizations, since in an electronic world an organization may be presumed to have an available database of members, making membership cards superfluous As a real-world example, membership cards may be used across organizations, such as showing a specific airline's frequent-flyer card to receive a discount at a particular car- rental agency The car- rental agency can't redeem miles, but can give a discount after seeing a valid card Thus possession of the card has value, even if not as currency
- Membership cards are one application of a special property of Transactor objects the assigned property
- An assigned object is owned like any other Transactor object, but its ownership cannot be changed by the owner, only by the maker/issuer Specifically, the assigned object cannot be sold or traded away until after it expires (thus not interfering with any potential collectibles market) If the issuer creates the object with an expiration date, then the object is only valid until that date
- All assigned objects contain the normal Transactor fields identifying the owner, maker, etc But since these fields are inherently alterable, the assigned object must have an override mechanism That override is contained in the digitally-signed and inherently unalterable body of the object It consists of an additional packet of data labeled as "assignment data" and appearing in a standardized form, which contains the TID of the issuing organization, the TID of the assigned owner, and an assignment expiration date These unalterable fields automatically override the normal Transactor fields, and thus prevent the object from being traded away or transferred Since the issuer and assignee TID's are visible, the user's membership in that particular issuing organization is confirmed to any third party who requests a membership card
- the assignment data packet may also hold an expiration date When used beyond that date, the object is no longer valid, and should be treated as if the object did not exist For the case of membership cards, this represents the membership expiration date For other kinds of assigned objects, it may represent a deadline or some other fixed date or timestamp, as defined by that kind of object's unique requirements
- Membership cards may be defined by the issuer/maker to hold preferences or other demographic data about the assigned owner This data may be encrypted, visible only to the issuer, or it may be cleartext, visible to any organization that the card is presented to In the real world, for example, driver's licenses are effectively membership cards
- a "motorcycle” endorsement or “corrective lenses” restriction are owner-specific information encoded on the card itself
- a private currency is any fungible valuable medium of exchange that does not represent actual money
- fungible means that the nature of the object makes it replaceable and non-unique, such as grain or cash is in the real world
- valuable simply means that people might have a reason to collect pieces of the exchange medium, other than as collector's items
- private currencies do have real value, even if not directly convertible to cash
- Some real-world examples are frequent-flyer miles that accrue and earn airline tickets or hotel stays, or the "bonus points" awarded by some long-distance phone carriers that can be redeemed for phone-time or merchandise But perhaps the best-known example is S&H green stamps — they are fungible and valuable, but have no actual cash value
- a Transactor system When a Transactor system is installed, its medium of exchange is defined as either money or a private currency If the private currency option is chosen, then a CurrencyConversion supporting module is configured and installed in the system This module converts private currency amounts into money amounts, as needed by other modules in the system (e.g. the billing department) The actual conversion data is defined in a vendor- specific database, which is kept secure on the vendor's servers, and can be edited by the vendor at any time
- a private-currency Transactor system requires conversion into and out of the private currency Conversion into private currency is made as a money-purchase of some number of units of the private currency For example, a user spends $10 and has 1000 quatloos credited to his account This can be a straight linear conversion, or it can be tiered (e.g. spend $20 and get 2500 quatloos), all as defined in the conversion database
- Normal spending of the private currency is simply a "redemption" of the private currency in exchange for an object
- the buyer's account is debited and the object is transferred to the new owner If the seller were another user, then the seller's account would be credited Nowhere is a conversion out of the private currency required Note that this is true even when physical objects are being purchased (e.g. the example of S&H green stamps did not require cash, either)
- Physical objects can be bought and sold on a Transactor system, in addition to or as an alternative to purely digital objects
- a user can buy a T-shirt or a game accessory as easily as a new digital game object
- the user immediately receives an assigned digital object representing the purchase of the physical object, and later receives the actual physical object via a shipping channel. Any conventional shipping channel may be used for this purpose
- This digital object represents the merchandise order, and contains all the information one would find on a regular order receipt date of order, price, tracking number, buyer, seller, shipper, shipping address, etc
- the digital object serves as a digital receipt
- the digital object can also contain other elements, such as beauty shots of the purchased physical object (e.g. JPEG images), preferably rendered to match any optional features, like color or size
- This digital object is an assigned object having no intrinsic value (described above, under "Membership Cards") Since it is assigned only to the buyer, it cannot be traded away, although it can be deleted from the owner's inventory at any time, if desired
- the "credit transaction" is an order for the merchandise, incorporating all the shipping information and other account information needed to process the order At that point, it is the supplier's responsibility to ship the order to the user, and the Transactor system is not involved any further
- This protocol for purchasing physical objects works for any Transactor-supported sales mechanism, including direct object sales as well as flyers
- the flyer for a physical object is no different than that for a digital object, since both actually refer to a service provided by a supplier, as outlined above
- Transactor system and other Transactor systems according to the present invention will be apparent to those skilled in the art based on the present disclosure
- This section presents a preferred set of mechanisms and protocols used to provide security in connection with the Transactor system discussed above
- These security features are discussed in the context of, and are particularly useful in embodiments, involving interactive games which may allow ownership and transfer of various kinds of objects, both online and offline
- objects are typically owned by players (in some cases, they may be simply lying discarded somewhere, owned by no player, in which case ownership may be assigned to the game server)
- An object is not necessarily represented by an "object” in some programming language (though this would be a natural way to represent it)
- Game objects are usually owned by someone, and have specific attributes, which may change over time
- objects are owned by independent agents acting in the game world This can be considered to be a form of ownership by the game server In the worldview of the players, however, the objects will be owned by another entity
- Impermissible multiple transfers A player may try to transfer the same object sequentially to many other players, which is inappropriate for most objects as a previously transferred object is no longer in the first player's possession
- a player may try to determine what objects are in the possession of other players, or those objects' attributes
- E ⁇ Key ⁇ (Data) E ⁇ Key ⁇ (Data)
- Key is the key
- Data is the data being encrypted
- Hashing using a one-way hash function is shown as hash(Data)
- Public-key encryption using an algorithm such as RSA or ElGamal, is shown as PKE_ ⁇ PublicKey ⁇ (Data), where PublicKey is the public key of the message's intended recipient, and Data is the data being encrypted Typically, this is used only to send random encryption keys for symmetric algorithms
- Each protocol message has a unique 160-bit identifier at its beginning, followed by a 32-bit version identifier, and a 32-bit value giving the length of the whole final message This is intended to allow an implementation to parse each incoming message immediately
- MO X0,Sign_ ⁇ SK_ ⁇ Sender ⁇ ⁇ (X0)
- Transactor system will be apparent to those skilled in the art based on the present disclosure
- there is one central server which holds the "world,” and with which all players' machines interact to learn about and influence their world
- This is an inherently simple way of implementing a game It suffers from the problems that it may be hard to find a trusted server machine which has the computational ability and bandwidth to and from each player's machine to do this effectively Essentially, this is related to centrally maintaining one big database with various kinds of access restrictions
- the security model described below is most effective in connection with this type of game setting
- This security system relates to the following four basic modes of play
- Proxy-Mode Some other entity is acting as proxy for the server This would typically be the case when a small group of users wanted to play a Aocal" game
- the proxy will prevent unwarranted creation, destruction, and alteration of objects in the local game, and will try to guarantee that no cheating done in the local game (even involving all participants) can allow cheating in the global game Note that in many circumstances, one player in a group might be trusted enough to be the proxy
- Player-Mode In Player Mode, there is a single player playing the game alone
- objects may be transferred around between players, and may also (in some cases) be discarded or picked up It may make sense to have a user ID for a player called "nobody,” and have this user ID possess things that have been discarded There may be one such user ID used for each different game or "world” that's going on, i.e. each Proxy Server may have its own
- An ownership document is a signed document from the server, affirming that at some time, T, a given player was in possession of a given object, with a given set of attributes and conditions Thus, it is structured as
- Variable-length fields always start with a 32-bit length identifier All lengths are given in bits, but all fields are continued out to the next full byte If the length field is zero, then that's all the data in that field.
- L0 length of final message, including signature
- RO a random number of 64 bits
- MO X0,Sign_ ⁇ SK_P ⁇ (X0)
- Rl a random number of 64 bits
- L2 length of whole final message, including signature
- L3 length of whole message, including signature
- L3a length of whole Exit Visa, including signature
- R3 a random number of 64 bits
- K3 a random encryption key
- Exit Visa X3,Sign_ ⁇ SK_S ⁇ (X3) and sends to the Player
- M3 U3,V3,L3,PKEJPK_P ⁇ (K3),EJK3 ⁇ (ExitVisa)
- L0 length of whole final message, including signature
- RO a random number of 64 bits
- MO X0,Sign_ ⁇ SK_P ⁇ (X0)
- LI length of whole final message, including signature.
- Rl a random number of 64 bits
- ProxyExitVisa the exit visa from the proxy server or the central server
- K2 a random encryption key
- Entrance Visa X2,Sign(X2)
- M2 U2,V2,L2,PKE ⁇ PK_S ⁇ (K2),E_ ⁇ K2 ⁇ (Entrance Visa)
- the Server checks to see if any of the changes are in contradiction with other things (restrictions on objects, existing ownership records, etc ) If not, then the Server forms
- MESSAGE any message that needs to be sent to the Player (This could be encrypted if necessary )
- Proxy-Mode is also relatively easy to secure
- the Proxy takes on the tasks of the Server— so long as these are done honestly, the whole system should work almost exactly like Server-Mode
- the Proxy is dishonest, then its dishonesty (at least in changing around object ownerships) should be easily detected
- Proxy-Mode the Proxy Server issues transfer documents These are of the following general format
- K0 is a random encryption key
- Entrance into the game being run by the proxy server occurs as follows
- L0 length of whole final message, including signature
- RO a random number of 64 bits
- C_P certificate of player's public key, from Exit Visa.
- MO X0,Sign_ ⁇ SK_P ⁇ (X0)
- the Proxy Server verifies the certificate and signature, and then forms
- LI length of whole final message, including signature.
- Rl a random number of 64 bits
- C_Q certificate of the proxy server's public key, given by the central server.
- Ml Xl,Sign_ ⁇ SK_Q ⁇ (Xl).
- K2 a random encryption key
- R2 a random number of 64 bits
- Exit Visa the Exit Visa given by the central server earlier.
- M2 U2,V2,L2,PKE_ ⁇ PK_Q ⁇ (K2),E_ ⁇ K2 ⁇ (Y2).
- the Proxy Server forms
- L3a final length of Y3
- PlayerData Data needed by the player to join the game.
- K3 a random encryption key
- the Proxy makes some kind of note to tell the central Server that the Player joined the game at this time When this is delivered, the central Server is able to detect various kinds of cheating To form this note (whose method of delivery is still unspecified), the Proxy forms
- ID_P ID of player
- RO a random number of 64 bits
- MO X0,Sign_ ⁇ SK_P ⁇ (X0)
- Rl a random number of 64 bits
- U3 hash("Transactor System— Exit Visa Response Envelope (Proxy)"
- U3a hash("Transactor System-Exit Visa Response (Proxy)")
- L3a final length of Y3
- Exit Visa the Exit Visa issued to this Player by the central Server
- ProxyExitVisa X3,Sign_ ⁇ SK_Q ⁇ (X3)
- K3 a random encryption key
- K4 a random encryption key
- M3 U3,V3,L3,PKE_ ⁇ PK_P ⁇ (K3),E_ ⁇ K3 ⁇ (ProxyExitVisa),
- M3a U3,V3,L3,PKE PK_S ⁇ (K4),E K4 ⁇ (ProxyExitVisa)
- ID B Bob's ID
- RO a random number of 64 bits
- K0 a random encryption key
- Proxy decrypts and verifies the message. If all is well, it forms
- Description A description of the requested transfer, including descriptions of the object and any
- Kl a random encryption key
- M1 U1,V1,L1,PKE_ ⁇ PK_B ⁇ (K1),E_ ⁇ K1 ⁇ (Y1)
- c Bob decrypts and verifies the message If he doesn't want to allow the transfer, he can send any message that isn't the expected response, and the transfer will fail If he does want to allow the transfer, then he forms
- R2 a random number of 64 bits
- M2 X2,S ⁇ gn_ ⁇ SK_B ⁇ (X2)
- R3 a random number of 64 bits
- M3 X3,Sign_ ⁇ SK_Q ⁇ (X3).
- M4 X4,Sign_ ⁇ SK_A ⁇ (X4).
- TransferDocument a transfer document, as described above.
- X5 U5a,V5,L5a,hash(M2),TransferDocument
- K5 a random encryption key
- M5 U5,V5,L5,PKE_ ⁇ PK_B ⁇ (K5),E_ ⁇ K5 ⁇ (Y5)
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP98915452A EP0974118A1 (en) | 1997-04-11 | 1998-04-09 | Virtual property system |
IL13230298A IL132302A0 (en) | 1997-04-11 | 1998-04-09 | Virtual property system |
NZ500145A NZ500145A (en) | 1997-04-11 | 1998-04-09 | System for transferring digital property objects over a computer network |
BR9808865-3A BR9808865A (en) | 1997-04-11 | 1998-04-09 | Virtual property system |
JP54407798A JP2001524233A (en) | 1997-04-11 | 1998-04-09 | Virtual property system |
AU69632/98A AU721052C (en) | 1997-04-11 | 1998-04-09 | Virtual property system |
CA002286056A CA2286056A1 (en) | 1997-04-11 | 1998-04-09 | Virtual property system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/834,027 | 1997-04-11 | ||
US08/834,027 US6119229A (en) | 1997-04-11 | 1997-04-11 | Virtual property system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998047091A1 true WO1998047091A1 (en) | 1998-10-22 |
Family
ID=25265916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/007176 WO1998047091A1 (en) | 1997-04-11 | 1998-04-09 | Virtual property system |
Country Status (8)
Country | Link |
---|---|
US (1) | US6119229A (en) |
EP (1) | EP0974118A1 (en) |
JP (1) | JP2001524233A (en) |
BR (1) | BR9808865A (en) |
CA (1) | CA2286056A1 (en) |
IL (1) | IL132302A0 (en) |
NZ (1) | NZ500145A (en) |
WO (1) | WO1998047091A1 (en) |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000079367A1 (en) * | 1999-06-23 | 2000-12-28 | The Brodia Group | Method and system for secure guaranteed transactions over a computer network |
EP1078667A1 (en) * | 1999-01-28 | 2001-02-28 | Sega Enterprises, Ltd. | Network game system, game device terminal used in it and storage medium |
WO2001022650A2 (en) * | 1999-09-20 | 2001-03-29 | Ethentica, Inc. | Server-side implementation of a cryptographic system |
WO2001033319A1 (en) * | 1999-11-04 | 2001-05-10 | Sonera Smarttrust Oy | A method and system for managing property |
JP2001312674A (en) * | 2000-04-28 | 2001-11-09 | Konica Corp | Economy data processing system for virtual space and recording medium |
EP1196872A1 (en) * | 1999-05-15 | 2002-04-17 | John W.L. Ogilvie | Automatic broker tools and techniques |
US20070112660A1 (en) * | 2005-02-04 | 2007-05-17 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Disposition of proprietary virtual rights |
US7260724B1 (en) | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
EP1916022A2 (en) | 2006-10-23 | 2008-04-30 | Kabushiki Kaisha Square Enix (also trading as Square Enix Co., Ltd.) | A game contents delivery system and a method of delivering game contents |
US7391865B2 (en) | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
US7577621B2 (en) | 1999-09-20 | 2009-08-18 | Security First Corporation | Cryptographic server with provisions for interoperability between cryptographic systems |
US7593864B2 (en) * | 2000-04-18 | 2009-09-22 | Brian Mark Shuster | Method and apparatus for managing ownership of virtual property |
US7953083B1 (en) | 2006-12-12 | 2011-05-31 | Qurio Holdings, Inc. | Multicast query propagation scheme for a peer-to-peer (P2P) network |
US8000328B1 (en) | 2007-05-22 | 2011-08-16 | Qurio Holdings, Inc. | Filtering messages in a distributed virtual world based on virtual space properties |
US8116323B1 (en) | 2007-04-12 | 2012-02-14 | Qurio Holdings, Inc. | Methods for providing peer negotiation in a distributed virtual environment and related systems and computer program products |
US8135018B1 (en) | 2007-03-29 | 2012-03-13 | Qurio Holdings, Inc. | Message propagation in a distributed virtual world |
US8155322B2 (en) | 2006-11-07 | 2012-04-10 | Security First Corp. | Systems and methods for distributing and securing data |
US8260728B1 (en) | 2008-12-12 | 2012-09-04 | Qurio Holdings, Inc. | System and method for influencing behavior in a distributed virtual environment |
US8433656B1 (en) | 2007-06-13 | 2013-04-30 | Qurio Holdings, Inc. | Group licenses for virtual objects in a distributed virtual world |
US8898464B2 (en) | 2008-02-22 | 2014-11-25 | Security First Corp. | Systems and methods for secure workgroup management and communication |
US8904194B2 (en) | 2004-10-25 | 2014-12-02 | Security First Corp. | Secure data parser method and system |
US8904080B2 (en) | 2006-12-05 | 2014-12-02 | Security First Corp. | Tape backup method |
US9064127B2 (en) | 2009-05-19 | 2015-06-23 | Security First Corp. | Systems and methods for securing data in the cloud |
US9213857B2 (en) | 2010-03-31 | 2015-12-15 | Security First Corp. | Systems and methods for securing data in motion |
US9397827B2 (en) | 2007-09-14 | 2016-07-19 | Security First Corp. | Systems and methods for managing cryptographic keys |
US9516002B2 (en) | 2009-11-25 | 2016-12-06 | Security First Corp. | Systems and methods for securing data in motion |
WO2017195084A3 (en) * | 2016-05-09 | 2018-01-11 | Kelkar Abhijeet | Method and network-based utility for virtual unique identification, monitoring and lifecycle management of an asset |
Families Citing this family (339)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE48056E1 (en) | 1991-12-23 | 2020-06-16 | Blanding Hovenweep, Llc | Ergonomic man-machine interface incorporating adaptive pattern recognition based control system |
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US5903454A (en) | 1991-12-23 | 1999-05-11 | Hoffberg; Linda Irene | Human-factored interface corporating adaptive pattern recognition based controller apparatus |
USRE47908E1 (en) | 1991-12-23 | 2020-03-17 | Blanding Hovenweep, Llc | Ergonomic man-machine interface incorporating adaptive pattern recognition based control system |
USRE46310E1 (en) | 1991-12-23 | 2017-02-14 | Blanding Hovenweep, Llc | Ergonomic man-machine interface incorporating adaptive pattern recognition based control system |
US6850252B1 (en) | 1999-10-05 | 2005-02-01 | Steven M. Hoffberg | Intelligent electronic appliance system and method |
US7212632B2 (en) | 1998-02-13 | 2007-05-01 | Tecsec, Inc. | Cryptographic key split combiner |
US6694433B1 (en) * | 1997-05-08 | 2004-02-17 | Tecsec, Inc. | XML encryption scheme |
JP3954689B2 (en) * | 1997-06-12 | 2007-08-08 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Message processing method, message processing apparatus, and storage medium for storing program for controlling message processing |
BR9806000A (en) * | 1997-06-17 | 2000-01-25 | Purdue Pharma Lp | Self-destructive document and system for sending messages by e-mail. |
US20020007411A1 (en) * | 1998-08-10 | 2002-01-17 | Shvat Shaked | Automatic network user identification |
US6913193B1 (en) * | 1998-01-30 | 2005-07-05 | Citicorp Development Center, Inc. | Method and system of tracking and providing an audit trail of smart card transactions |
US8077870B2 (en) * | 1998-02-13 | 2011-12-13 | Tecsec, Inc. | Cryptographic key split binder for use with tagged data elements |
US6591250B1 (en) * | 1998-02-23 | 2003-07-08 | Genetic Anomalies, Inc. | System and method for managing virtual property |
US6799165B1 (en) | 1998-07-28 | 2004-09-28 | Eimar M. Boesjes | Apparatus and methods for inventory, sale, and delivery of digitally transferable goods |
US7152043B2 (en) * | 1999-02-19 | 2006-12-19 | Ariba, Inc. | Method and system for dynamically controlling overtime in electronic auctions |
US7283980B2 (en) * | 1999-05-14 | 2007-10-16 | Ariba, Inc. | Method and system for controlling the initiation and duration of overtime intervals in electronic auctions |
US7792713B1 (en) * | 2000-01-24 | 2010-09-07 | Ariba, Inc. | Method and system for disguised price bidding in online auctions |
US7599878B2 (en) * | 1999-02-19 | 2009-10-06 | Ariba, Inc. | Method, apparatus, and system for bidding in rounds |
US7383206B2 (en) * | 1999-02-19 | 2008-06-03 | Ariba, Inc. | Method and apparatus for multiple variable bidding in an online auction |
US6230146B1 (en) | 1998-09-18 | 2001-05-08 | Freemarkets, Inc. | Method and system for controlling closing times of electronic auctions involving multiple lots |
US7249085B1 (en) | 1999-03-31 | 2007-07-24 | Ariba, Inc. | Method and system for conducting electronic auctions with multi-parameter price equalization bidding |
US7765279B1 (en) | 1998-10-28 | 2010-07-27 | Verticalone Corporation | System and method for scheduling harvesting of personal information |
US8069407B1 (en) | 1998-12-08 | 2011-11-29 | Yodlee.Com, Inc. | Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes |
US7672879B1 (en) | 1998-12-08 | 2010-03-02 | Yodlee.Com, Inc. | Interactive activity interface for managing personal data and performing transactions over a data packet network |
US7085997B1 (en) | 1998-12-08 | 2006-08-01 | Yodlee.Com | Network-based bookmark management and web-summary system |
US6338068B1 (en) * | 1998-12-14 | 2002-01-08 | International Business Machines Corporation | Method to demonstrate software that performs database queries |
US6424979B1 (en) * | 1998-12-30 | 2002-07-23 | American Management Systems, Inc. | System for presenting and managing enterprise architectures |
US7225152B2 (en) * | 1999-02-19 | 2007-05-29 | Ariba, Inc. | Method, apparatus, and system for varying an award volume in an auction |
US20020077959A1 (en) * | 1999-02-19 | 2002-06-20 | Marc Alaia | Method and system for using line item bid limits in electonic auctions |
US7499876B2 (en) * | 1999-02-19 | 2009-03-03 | Ariba, Inc. | Method and apparatus for configurably adjusting a bid in an online auction |
US7840476B1 (en) | 1999-03-31 | 2010-11-23 | Ariba, Inc. | Transformation bidding with tooling requirements |
US7752535B2 (en) | 1999-06-01 | 2010-07-06 | Yodlec.com, Inc. | Categorization of summarized information |
US6754665B1 (en) * | 1999-06-24 | 2004-06-22 | Sony Corporation | Information processing apparatus, information processing method, and storage medium |
US7343320B1 (en) * | 1999-08-02 | 2008-03-11 | Treyz G Victor | Online digital image-based product ordering system |
CN1376285A (en) * | 1999-09-28 | 2002-10-23 | Cfph有限责任公司 | Systems and methods for transferring item with restricted transferability |
US7131001B1 (en) * | 1999-10-29 | 2006-10-31 | Broadcom Corporation | Apparatus and method for secure filed upgradability with hard wired public key |
US6748538B1 (en) * | 1999-11-03 | 2004-06-08 | Intel Corporation | Integrity scanner |
US6351776B1 (en) * | 1999-11-04 | 2002-02-26 | Xdrive, Inc. | Shared internet storage resource, user interface system, and method |
US7496578B2 (en) * | 1999-11-04 | 2009-02-24 | Aol Llc | Shared internet storage resource, user interface system, and method |
US20100185614A1 (en) | 1999-11-04 | 2010-07-22 | O'brien Brett | Shared Internet storage resource, user interface system, and method |
WO2001041031A2 (en) | 1999-11-16 | 2001-06-07 | Cfph, L.L.C. | Systems and methods for reselling electronic merchandise |
WO2001048633A1 (en) | 1999-12-24 | 2001-07-05 | Telstra New Wave Pty Ltd | A virtual token |
US7275046B1 (en) * | 1999-12-30 | 2007-09-25 | Dst Systems Inc. | Simultaneous real-time access to financial information |
US7797194B1 (en) * | 2000-01-20 | 2010-09-14 | The Topps Company, Inc. | Method and apparatus for offering for sale collectibles on primary and secondary markets |
US7835957B1 (en) | 2000-01-24 | 2010-11-16 | Ariba, Inc. | Method and system for correcting market failures with participant isolation in dutch style online auctions |
US20010034635A1 (en) * | 2000-01-26 | 2001-10-25 | Gil Winters | System and method for utilizing a fully-integrated, on-line digital collectible award redemption and instant win program |
US6604107B1 (en) * | 2000-04-24 | 2003-08-05 | Ebay Inc. | Generic attribute database system for storing items of different categories having shared attributes |
US20030220885A1 (en) * | 2000-05-04 | 2003-11-27 | Bruno Lucarelli | Collectible item authentication and ownership system and method of selling collectible items |
US7877437B1 (en) | 2000-05-08 | 2011-01-25 | H.E.B., Llc | Method and apparatus for a distributable globe graphical object |
US20020040314A1 (en) * | 2000-05-08 | 2002-04-04 | Michael Tolson | Method and system for business application of a portable information agent |
US6728773B1 (en) * | 2000-05-10 | 2004-04-27 | Cisco Technology Inc. | System for controlling and regulating distribution of intellectual properties using internet protocol framework |
US20050132233A1 (en) * | 2000-05-10 | 2005-06-16 | Cisco Technology, Inc. | Digital rights framework |
US6721793B1 (en) * | 2000-05-10 | 2004-04-13 | Cisco Technology, Inc. | Intellectual property over non-internet protocol systems and networks |
US7076445B1 (en) * | 2000-06-20 | 2006-07-11 | Cartwright Shawn D | System and methods for obtaining advantages and transacting the same in a computer gaming environment |
US20020004786A1 (en) * | 2000-06-21 | 2002-01-10 | Olympus Optical Co Ltd | Information offering system |
US6473758B1 (en) * | 2000-06-27 | 2002-10-29 | Intel Corporation | Method and apparatus for private and restricted-use electronic addresses |
US6342837B1 (en) * | 2000-07-20 | 2002-01-29 | Chun Pen Lai | Object identification structure applicable for identification, production control, and data retrieval |
FI109741B (en) * | 2000-07-21 | 2002-09-30 | Suomen Posti Oy | Method and apparatus for controlling data transmission in a data network |
WO2002021404A1 (en) * | 2000-09-06 | 2002-03-14 | Envoii | Method and apparatus for a portable information account access agent |
JP2002082840A (en) * | 2000-09-06 | 2002-03-22 | Sony Corp | Method for protecting personal information |
US7052396B2 (en) * | 2000-09-11 | 2006-05-30 | Nintendo Co., Ltd. | Communication system and method using pictorial characters |
US6944648B2 (en) * | 2000-09-22 | 2005-09-13 | Docusign, Inc. | System and method for managing transferable records |
TW552539B (en) * | 2000-09-29 | 2003-09-11 | Sony Corp | Agent system, agent transaction method, data providing device, and data recording medium |
JP2002207685A (en) * | 2000-10-12 | 2002-07-26 | Sony Computer Entertainment Inc | Virtual world system, server computer and information processor |
US7660740B2 (en) | 2000-10-16 | 2010-02-09 | Ebay Inc. | Method and system for listing items globally and regionally, and customized listing according to currency or shipping area |
KR100897950B1 (en) * | 2000-10-27 | 2009-05-18 | 소니 컴퓨터 엔터테인먼트 인코포레이티드 | Information processing system comprising a plurality of operation terminal devices and an information processing device |
AU2002243209A1 (en) * | 2000-11-01 | 2002-07-24 | Station Casinos, Inc. | Method and system for remote gaming |
US6880085B1 (en) * | 2000-11-01 | 2005-04-12 | Cardiac Pacemakers, Inc. | Security system for implantable medical devices |
US20020072995A1 (en) * | 2000-11-02 | 2002-06-13 | Smith Frank A. | Patent licensing process |
US7870054B2 (en) * | 2000-11-10 | 2011-01-11 | Ariba, Inc. | Method, apparatus and system for advancing a bidder to a selected rank |
US6631010B1 (en) | 2000-11-13 | 2003-10-07 | Hewlett-Packard Development Company, L.P. | Web-based imaging system utilizing “cookies” to provide a single-action printing option |
US7634439B1 (en) | 2000-11-14 | 2009-12-15 | Ariba, Inc. | Method and apparatus to perform buy versus leasing transformational bidding |
JP2002157204A (en) * | 2000-11-17 | 2002-05-31 | Square Co Ltd | Game device, server system, information service method, recording medium and program |
US8086518B1 (en) | 2000-12-29 | 2011-12-27 | Ariba, Inc. | Allotting an award volume in an auction |
US7084998B2 (en) * | 2001-02-13 | 2006-08-01 | Ariba, Inc. | Method and system for processing files using a printer driver |
US7277878B2 (en) | 2001-02-13 | 2007-10-02 | Ariba, Inc. | Variable length file header apparatus and system |
US7072061B2 (en) * | 2001-02-13 | 2006-07-04 | Ariba, Inc. | Method and system for extracting information from RFQ documents and compressing RFQ files into a common RFQ file type |
US8380608B2 (en) * | 2001-02-15 | 2013-02-19 | Ariba, Inc. | System and method for creating a spot market |
US20020111895A1 (en) * | 2001-02-15 | 2002-08-15 | Blair William R. | System and method for creating catalog neutral products |
US6941559B2 (en) * | 2001-02-28 | 2005-09-06 | Sharp Laboratories Of America | Software bus and interface for digital television application software environments |
US20020133463A1 (en) * | 2001-03-16 | 2002-09-19 | International Business Machines Corporation | Method for reporting characteristics of a service provider such as an application service provider |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US7856414B2 (en) * | 2001-03-29 | 2010-12-21 | Christopher Zee | Assured archival and retrieval system for digital intellectual property |
AU2002258901B2 (en) | 2001-04-20 | 2007-03-29 | American Express Travel Related Services Company, Inc. | System and method for travel carrier contract management and optimization |
US20060059544A1 (en) * | 2004-09-14 | 2006-03-16 | Guthrie Paul D | Distributed secure repository |
US20040098349A1 (en) * | 2001-09-06 | 2004-05-20 | Michael Tolson | Method and apparatus for a portable information account access agent |
US20060064739A1 (en) * | 2004-09-17 | 2006-03-23 | Guthrie Paul D | Relationship-managed communication channels |
US7505936B2 (en) * | 2001-05-11 | 2009-03-17 | Accenture Global Services Gmbh | Digital content subscription conditioning system |
US8131993B2 (en) | 2001-05-23 | 2012-03-06 | Sharestream, Llc | System and method for a commercial multimedia rental and distribution system |
EP1402680B1 (en) * | 2001-05-23 | 2015-04-01 | Sharestream, LLC | System and method for a commercial multimedia rental and distribution system |
JP3429287B2 (en) * | 2001-05-29 | 2003-07-22 | 株式会社コナミコンピュータエンタテインメント大阪 | NET GAME SYSTEM AND NET GAME MANAGEMENT METHOD |
JP3417935B2 (en) * | 2001-05-30 | 2003-06-16 | 株式会社コナミコンピュータエンタテインメント大阪 | NET GAME SERVER DEVICE, NET GAME MANAGEMENT METHOD, AND NET GAME MANAGEMENT PROGRAM |
JP3429286B2 (en) * | 2001-05-29 | 2003-07-22 | 株式会社コナミコンピュータエンタテインメント大阪 | NET GAME SYSTEM AND NET GAME MANAGEMENT METHOD |
JP3422784B2 (en) * | 2001-05-30 | 2003-06-30 | 株式会社コナミコンピュータエンタテインメント大阪 | NET GAME SYSTEM AND NET GAME MANAGEMENT METHOD |
EP1262215A3 (en) * | 2001-05-29 | 2003-01-08 | Konami Computer Entertainment Osaka, Inc. | Server device for net game, net game management method, net game mamagement program, and recording medium which stores net game |
EP1262216A3 (en) * | 2001-05-29 | 2003-01-08 | Konami Computer Entertainment Osaka, Inc. | Server device for net game, net game management method, net game management program, and recording medium which stores net game |
EP1262217A3 (en) * | 2001-05-29 | 2003-01-08 | Konami Computer Entertainment Osaka, Inc. | Server device for net game, net game management method, net game management program, and recording medium which stores net game |
US7895123B1 (en) | 2001-06-12 | 2011-02-22 | Accenture Global Services Limited | Digital content publication |
WO2003005161A2 (en) | 2001-07-02 | 2003-01-16 | American Express Travel Related Services Company, Inc. | System and method for airline purchasing program management |
US6966832B2 (en) * | 2001-07-13 | 2005-11-22 | Gameaccount Limited | System and method for providing game advice to a user of a gaming application |
US7249139B2 (en) * | 2001-07-13 | 2007-07-24 | Accenture Global Services Gmbh | Secure virtual marketplace for virtual objects and services |
WO2003006128A2 (en) * | 2001-07-13 | 2003-01-23 | Gameaccount Limited | System and method for adding a skill aspect to games of chance |
US6721956B2 (en) * | 2001-07-17 | 2004-04-13 | Scientific-Atlanta, Inc. | Interactive information services system and associated method for capturing transaction data |
US20050288974A1 (en) * | 2001-08-23 | 2005-12-29 | American Express Travel Related Services Company, Inc. | Travel service broker system and method |
US20040260581A1 (en) * | 2001-08-23 | 2004-12-23 | American Express Travel Related Services Company, Inc. | Travel market broker system |
US7499864B2 (en) | 2002-01-25 | 2009-03-03 | American Express Travel Related Services Company, Inc. | Integrated travel industry system |
US7539620B2 (en) * | 2002-07-02 | 2009-05-26 | American Express Travel Related Services Company, Inc. | System and method for facilitating transactions among consumers and providers of travel services |
US6947958B2 (en) * | 2001-09-19 | 2005-09-20 | Sony Corporation | System and method for documenting composite data products |
US7752266B2 (en) | 2001-10-11 | 2010-07-06 | Ebay Inc. | System and method to facilitate translation of communications between entities over a network |
US20030074321A1 (en) * | 2001-10-15 | 2003-04-17 | Vidius Inc. | Method and system for distribution of digital media and conduction of electronic commerce in an un-trusted environment |
US20030088497A1 (en) * | 2001-11-02 | 2003-05-08 | Belgrano Eduardo J. | Combination currency/barter system |
US7536362B2 (en) * | 2001-11-07 | 2009-05-19 | Ariba, Inc. | Method for selecting an optimal balance between direct cost and a number of suppliers |
US7031473B2 (en) * | 2001-11-13 | 2006-04-18 | Microsoft Corporation | Network architecture for secure communications between two console-based gaming systems |
GB0129437D0 (en) * | 2001-12-08 | 2002-01-30 | Koninkl Philips Electronics Nv | Server and units |
US8126799B2 (en) * | 2002-01-09 | 2012-02-28 | Ariba, Inc. | Method of bidding to drive competition in an auction |
US20030135444A1 (en) * | 2002-01-15 | 2003-07-17 | Nachiappan Annamalai | Multiple award optimization |
US7146331B1 (en) | 2002-01-17 | 2006-12-05 | Ariba, Inc. | Method and system for supplier prioritization |
US7805323B2 (en) | 2002-01-25 | 2010-09-28 | American Express Travel Related Services Company, Inc. | System and method for processing trip requests |
US20030144958A1 (en) * | 2002-01-28 | 2003-07-31 | Liang Eli Entze | Computer network based secure peer-to-peer file distribution system |
GB2384719B (en) * | 2002-01-30 | 2005-07-06 | Hewlett Packard Co | Virtual game tournament arrangement |
US8016675B2 (en) * | 2002-02-07 | 2011-09-13 | Hewlett-Packard Development Company, L.P. | Network-based game system and method |
FR2836072B1 (en) * | 2002-02-21 | 2004-11-12 | Commissariat Energie Atomique | COMPONENT USING COMPOSITE MATERIAL FOR MICROSYSTEM FOR BIOLOGICAL OR BIOCHEMICAL ANALYSIS |
US7487365B2 (en) * | 2002-04-17 | 2009-02-03 | Microsoft Corporation | Saving and retrieving data based on symmetric key encryption |
US7483852B2 (en) * | 2002-04-24 | 2009-01-27 | Ariba, Inc. | Total value bidding |
US20030208417A1 (en) * | 2002-04-30 | 2003-11-06 | Matthias Heinrichs | Inventory management |
US20060036447A1 (en) * | 2002-05-15 | 2006-02-16 | Stefan Roever | Methods of facilitating contact management using a computerized system including a set of titles |
US7707121B1 (en) | 2002-05-15 | 2010-04-27 | Navio Systems, Inc. | Methods and apparatus for title structure and management |
US20030217006A1 (en) * | 2002-05-15 | 2003-11-20 | Stefan Roever | Methods and apparatus for a title transaction network |
US7707066B2 (en) | 2002-05-15 | 2010-04-27 | Navio Systems, Inc. | Methods of facilitating merchant transactions using a computerized system including a set of titles |
US7814025B2 (en) * | 2002-05-15 | 2010-10-12 | Navio Systems, Inc. | Methods and apparatus for title protocol, authentication, and sharing |
US7552205B2 (en) * | 2002-05-21 | 2009-06-23 | Accenture Global Services Gmbh | Distributed transaction event matching |
US8078505B2 (en) | 2002-06-10 | 2011-12-13 | Ebay Inc. | Method and system for automatically updating a seller application utilized in a network-based transaction facility |
US8719041B2 (en) | 2002-06-10 | 2014-05-06 | Ebay Inc. | Method and system for customizing a network-based transaction facility seller application |
US7941348B2 (en) | 2002-06-10 | 2011-05-10 | Ebay Inc. | Method and system for scheduling transaction listings at a network-based transaction facility |
KR100952089B1 (en) * | 2002-06-10 | 2010-04-13 | 이베이 인크. | Method and system for scheduling transaction listings at a network-based transaction facility |
US20040006530A1 (en) * | 2002-07-03 | 2004-01-08 | Freemarkets, Inc. | Automated lotting |
JP3586269B2 (en) * | 2002-07-16 | 2004-11-10 | 株式会社コナミオンライン | Network service system and point transfer system |
US7974908B1 (en) | 2002-07-29 | 2011-07-05 | Ariba, Inc. | System and method for promoting competition in an auction |
US8554650B1 (en) | 2002-07-31 | 2013-10-08 | Ariba, Inc. | Importable template |
US7680673B2 (en) * | 2002-08-23 | 2010-03-16 | Wheeler Cynthia R | System for real estate sale management |
US20050246193A1 (en) * | 2002-08-30 | 2005-11-03 | Navio Systems, Inc. | Methods and apparatus for enabling transaction relating to digital assets |
US20050038707A1 (en) * | 2002-08-30 | 2005-02-17 | Navio Systems, Inc. | Methods and apparatus for enabling transactions in networks |
US20050234860A1 (en) * | 2002-08-30 | 2005-10-20 | Navio Systems, Inc. | User agent for facilitating transactions in networks |
US20050038724A1 (en) * | 2002-08-30 | 2005-02-17 | Navio Systems, Inc. | Methods and apparatus for enabling transaction relating to digital assets |
US7693747B2 (en) * | 2002-10-31 | 2010-04-06 | Ariba, Inc. | Methods, system, and medium for initiating an online auction utilizing a line item detail report |
JP2004157864A (en) * | 2002-11-07 | 2004-06-03 | Canon Inc | Content distribution system |
US20070202951A1 (en) * | 2002-11-14 | 2007-08-30 | Arena Unlimited, Inc. | Asset manipulation of computer games using a network |
US20040133583A1 (en) * | 2002-11-20 | 2004-07-08 | Tingey Kenneth B. | system architecture and method for entering and accessing entity data in events accounting |
US8126701B2 (en) * | 2003-01-31 | 2012-02-28 | Ariba, Inc. | Translation technology in electronic sourcing |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US7370212B2 (en) | 2003-02-25 | 2008-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US20040199421A1 (en) * | 2003-04-04 | 2004-10-07 | Oda Lisa Maureen | Method and system to discharge a liability associated with a proprietary currency |
US9881308B2 (en) | 2003-04-11 | 2018-01-30 | Ebay Inc. | Method and system to facilitate an online promotion relating to a network-based marketplace |
JP2005004728A (en) * | 2003-05-20 | 2005-01-06 | Canon Inc | Information processing system, information processing device, information processing method, storage medium storing program for executing same so that program can be read out to information processing device, and program |
US7742985B1 (en) | 2003-06-26 | 2010-06-22 | Paypal Inc. | Multicurrency exchanges between participants of a network-based transaction facility |
US7713116B2 (en) * | 2003-06-30 | 2010-05-11 | Microsoft Corporation | Inventory management of virtual items in computer games |
US7702530B2 (en) * | 2003-07-29 | 2010-04-20 | Lifespring Health Network Llc | Systems and methods for consumers to purchase health care and related products |
US7517282B1 (en) * | 2003-08-04 | 2009-04-14 | Microsoft Corporation | Methods and systems for monitoring a game to determine a player-exploitable game condition |
US7698229B2 (en) * | 2003-08-29 | 2010-04-13 | International Business Machines Corporation | Method and apparatus for trading digital items in a network data processing system |
US7958055B2 (en) * | 2003-08-29 | 2011-06-07 | International Business Machines Corporation | Method and apparatus for temporary ownership of digital items in a network data processing system |
US20050050170A1 (en) * | 2003-08-29 | 2005-03-03 | International Business Machines Corporation | Method and apparatus for securely conducting digital property trade |
US7392422B2 (en) * | 2003-10-20 | 2008-06-24 | Sony Computer Entertainment America Inc., | Violations in a peer-to-peer relay network |
US20050108303A1 (en) * | 2003-10-31 | 2005-05-19 | Carter Richard D. | Remote backup and restore technique |
WO2005045712A1 (en) * | 2003-11-10 | 2005-05-19 | Majitek International Pte Ltd | A system, method and software for managing software |
US20050137940A1 (en) * | 2003-12-22 | 2005-06-23 | Lindsay Jeffrey D. | Method to provide a product to a consumer to protect consumer privacy |
KR100982515B1 (en) * | 2004-01-08 | 2010-09-16 | 삼성전자주식회사 | Apparatus and method for constraining the count of access to digital contents using a hash chain |
US9189568B2 (en) | 2004-04-23 | 2015-11-17 | Ebay Inc. | Method and system to display and search in a language independent manner |
US20060242406A1 (en) | 2005-04-22 | 2006-10-26 | Microsoft Corporation | Protected computing environment |
CN1319008C (en) * | 2004-06-18 | 2007-05-30 | 华为技术有限公司 | Game virtual-article data processing method, game platform system and game system |
US20060025208A1 (en) * | 2004-07-27 | 2006-02-02 | Kirt Ramsey | Sports wagering method and system |
US7675519B2 (en) * | 2004-08-05 | 2010-03-09 | Elite Avatars, Inc. | Persistent, immersible and extractable avatars |
US8547380B2 (en) * | 2004-08-05 | 2013-10-01 | Elite Avatars, Llc | Persistent, immersible and extractable avatars |
US8347078B2 (en) | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
US8176564B2 (en) | 2004-11-15 | 2012-05-08 | Microsoft Corporation | Special PC mode entered upon detection of undesired state |
US20060106920A1 (en) * | 2004-11-15 | 2006-05-18 | Microsoft Corporation | Method and apparatus for dynamically activating/deactivating an operating system |
US7695369B2 (en) * | 2004-11-22 | 2010-04-13 | Planetwide Games, Inc. | Systems and methods for accessing online content during online gaming |
US20090198604A1 (en) * | 2004-12-17 | 2009-08-06 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Tracking a participant loss in a virtual world |
US7774275B2 (en) * | 2005-02-28 | 2010-08-10 | Searete Llc | Payment options for virtual credit |
US20060190283A1 (en) * | 2005-02-04 | 2006-08-24 | Searete Llc | Participating in risk mitigation in a virtual world |
US20060174350A1 (en) * | 2005-02-03 | 2006-08-03 | Navio Systems, Inc. | Methods and apparatus for optimizing identity management |
US8271365B2 (en) | 2005-02-04 | 2012-09-18 | The Invention Science Fund I, Llc | Real-world profile data for making virtual world contacts |
US7958047B2 (en) | 2005-02-04 | 2011-06-07 | The Invention Science Fund I | Virtual credit in simulated environments |
US20060195376A1 (en) * | 2005-02-28 | 2006-08-31 | Jung Edward K | Compensation techniques for virtual credit transactions |
US7890419B2 (en) | 2005-02-04 | 2011-02-15 | The Invention Science Fund I, Llc | Virtual credit in simulated environments |
US20070136185A1 (en) * | 2005-02-04 | 2007-06-14 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Disposition of proprietary virtual rights |
US7937314B2 (en) * | 2005-10-21 | 2011-05-03 | The Invention Science Fund I | Disposition of component virtual property rights |
US8457991B2 (en) | 2005-02-04 | 2013-06-04 | The Invention Science Fund I, Llc | Virtual credit in simulated environments |
US8556723B2 (en) | 2005-02-04 | 2013-10-15 | The Invention Science Fund I. LLC | Third party control over virtual world characters |
US8473382B2 (en) | 2006-02-28 | 2013-06-25 | The Invention Science Fund I, Llc | Virtual collateral for real-world obligations |
US20080270165A1 (en) * | 2005-02-04 | 2008-10-30 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Virtual world property disposition after real-world occurrence |
US7720687B2 (en) | 2005-10-03 | 2010-05-18 | The Invention Science Fund I, Llc | Virtual world property disposition after real-world occurrence |
US8060829B2 (en) | 2005-04-15 | 2011-11-15 | The Invention Science Fund I, Llc | Participation profiles of virtual world players |
US8512143B2 (en) | 2005-07-18 | 2013-08-20 | The Invention Science Fund I, Llc | Third party control over virtual world characters |
US8566111B2 (en) | 2005-02-04 | 2013-10-22 | The Invention Science Fund I, Llc | Disposition of component virtual property rights |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US8799168B2 (en) * | 2005-04-19 | 2014-08-05 | Sony Online Entertainment Llc | Secure transfer of online privileges including non-financial options |
US9430897B2 (en) * | 2005-04-19 | 2016-08-30 | Sony Interactive Entertainment America Llc | Secure transfer of digital objects |
US8192286B2 (en) * | 2005-04-19 | 2012-06-05 | Sony Online Entertainment Llc | System for secure transfer of online privileges |
US8126990B2 (en) | 2005-04-21 | 2012-02-28 | Fiducci Thomas E | Data backup and transfer system, method and computer program product |
US7849165B2 (en) | 2005-04-21 | 2010-12-07 | Fiducci Thomas E | Data backup, storage, transfer, and retrieval system, method and computer program product |
US9363481B2 (en) | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
US9436804B2 (en) | 2005-04-22 | 2016-09-06 | Microsoft Technology Licensing, Llc | Establishing a unique session key using a hardware functionality scan |
US20060265758A1 (en) | 2005-05-20 | 2006-11-23 | Microsoft Corporation | Extensible media rights |
US8353046B2 (en) | 2005-06-08 | 2013-01-08 | Microsoft Corporation | System and method for delivery of a modular operating system |
WO2007011738A2 (en) * | 2005-07-18 | 2007-01-25 | Searete Llc | Security arrangements for virtual world obligations |
US20070061250A1 (en) * | 2005-09-15 | 2007-03-15 | Itake Technology Co., Ltd. | System and method for virtual capital operation on the internet |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US8762403B2 (en) * | 2005-10-10 | 2014-06-24 | Yahoo! Inc. | Method of searching for media item portions |
US20070083558A1 (en) * | 2005-10-10 | 2007-04-12 | Yahoo! Inc. | Media item registry and associated methods of registering a rights holder and a media item |
US20070094139A1 (en) * | 2005-10-10 | 2007-04-26 | Yahoo! Inc. | Media item payment system and associated method of use |
US20070083537A1 (en) * | 2005-10-10 | 2007-04-12 | Yahool, Inc. | Method of creating a media item portion database |
US20070083380A1 (en) * | 2005-10-10 | 2007-04-12 | Yahoo! Inc. | Data container and set of metadata for association with a media item and composite media items |
US7844820B2 (en) * | 2005-10-10 | 2010-11-30 | Yahoo! Inc. | Set of metadata for association with a composite media item and tool for creating such set of metadata |
US20090125412A1 (en) * | 2005-10-13 | 2009-05-14 | Flying Bark Interactive Pty Limited | Token trading |
US20080090628A1 (en) * | 2005-10-14 | 2008-04-17 | Leviathan Entertainment, Llc | Method and System to Allow for Inheritance between Characters in a Virtual Environment |
US7780532B2 (en) * | 2005-10-14 | 2010-08-24 | Leviathan Entertainment, Llc | Ownership of game environments in a virtual world |
US7813963B2 (en) | 2005-12-27 | 2010-10-12 | The Pen | Interactive electronic desktop action method and system for executing a transaction |
US9177338B2 (en) | 2005-12-29 | 2015-11-03 | Oncircle, Inc. | Software, systems, and methods for processing digital bearer instruments |
WO2007078987A2 (en) | 2005-12-29 | 2007-07-12 | Navio Systems, Inc. | Software, systems, and methods for processing digital bearer instruments |
US8087031B2 (en) * | 2006-01-09 | 2011-12-27 | Oracle America, Inc. | Method and apparatus for data transfer between isolated execution contexts |
US20070219908A1 (en) * | 2006-03-02 | 2007-09-20 | Yahoo! Inc. | Providing syndicated media to authorized users |
US7789758B2 (en) * | 2006-03-10 | 2010-09-07 | Electronic Arts, Inc. | Video game with simulated evolution |
US20160247211A2 (en) * | 2006-03-30 | 2016-08-25 | Vidangel, Inc. | Apparatus, system, and method for remote media ownership management |
US9621372B2 (en) | 2006-04-29 | 2017-04-11 | Oncircle, Inc. | Title-enabled networking |
US8162209B2 (en) | 2006-05-25 | 2012-04-24 | Buchheit Brian K | Storefront purchases utilizing non-negotiable credits earned from a game of chance |
US8342399B1 (en) | 2006-05-25 | 2013-01-01 | Mcghie Sean I | Conversion of credits to funds |
US8267315B1 (en) | 2006-05-25 | 2012-09-18 | Mcghie Sean I | Exchange of non-negotiable credits for entity independent funds |
US7703673B2 (en) | 2006-05-25 | 2010-04-27 | Buchheit Brian K | Web based conversion of non-negotiable credits associated with an entity to entity independent negotiable funds |
US10062062B1 (en) | 2006-05-25 | 2018-08-28 | Jbshbm, Llc | Automated teller machine (ATM) providing money for loyalty points |
US8684265B1 (en) | 2006-05-25 | 2014-04-01 | Sean I. Mcghie | Rewards program website permitting conversion/transfer of non-negotiable credits to entity independent funds |
US8668146B1 (en) | 2006-05-25 | 2014-03-11 | Sean I. Mcghie | Rewards program with payment artifact permitting conversion/transfer of non-negotiable credits to entity independent funds |
US9704174B1 (en) | 2006-05-25 | 2017-07-11 | Sean I. Mcghie | Conversion of loyalty program points to commerce partner points per terms of a mutual agreement |
US8376224B2 (en) | 2006-05-25 | 2013-02-19 | Sean I. Mcghie | Self-service stations for utilizing non-negotiable credits earned from a game of chance |
US8577805B1 (en) * | 2007-07-23 | 2013-11-05 | United Services Automobile Association (Usaa) | Systems and methods for virtual banking |
US20080004094A1 (en) * | 2006-06-30 | 2008-01-03 | Leviathan Entertainment, Llc | Method and System to Provide Inventory Management in a Virtual Environment |
US20080004119A1 (en) * | 2006-06-30 | 2008-01-03 | Leviathan Entertainment, Llc | System for the Creation and Registration of Ideas and Concepts in a Virtual Environment |
US20080004120A1 (en) * | 2006-06-30 | 2008-01-03 | Leviathan Entertainment, Llc | Management and Protection of Creative Works in a Virtual Environment |
US20080004118A1 (en) * | 2006-06-30 | 2008-01-03 | Leviathan Entertainment, Llc | Creation and Registration of Ideas and Concepts in a Virtual Environment |
US20080040253A1 (en) * | 2006-08-11 | 2008-02-14 | Jacobson Eric C | System and method for creation and trade of exchange-backed equity investments |
US8639782B2 (en) | 2006-08-23 | 2014-01-28 | Ebay, Inc. | Method and system for sharing metadata between interfaces |
US7606752B2 (en) | 2006-09-07 | 2009-10-20 | Yodlee Inc. | Host exchange in bill paying services |
US8888598B2 (en) * | 2006-10-17 | 2014-11-18 | Playspan, Inc. | Transaction systems and methods for virtual items of massively multiplayer online games and virtual worlds |
GB2443264A (en) * | 2006-10-27 | 2008-04-30 | Ntnu Technology Transfer As | Integrity checking method for a device in a computer network, which controls access to data; e.g. to prevent cheating in online game |
US20080115228A1 (en) * | 2006-11-15 | 2008-05-15 | Yahoo! Inc. | Rights engine |
US10192234B2 (en) * | 2006-11-15 | 2019-01-29 | Api Market, Inc. | Title materials embedded within media formats and related applications |
US8799218B2 (en) | 2006-12-01 | 2014-08-05 | Ebay Inc. | Business channel synchronization |
US20080200253A1 (en) * | 2007-02-20 | 2008-08-21 | Leviathan Entertainment, Llc | System and Method to Levy and Collect Taxes in a Virtual Environment |
US20080208683A1 (en) * | 2007-02-27 | 2008-08-28 | Dawson Christopher J | Providing preferred treatment based on preferred conduct |
US20080204449A1 (en) * | 2007-02-27 | 2008-08-28 | Dawson Christopher J | Enablement of virtual environment functions and features through advertisement exposure |
US10007930B2 (en) * | 2007-02-27 | 2018-06-26 | International Business Machines Corporation | Invocation of advertisements in a virtual universe (VU) |
US20080208674A1 (en) * | 2007-02-27 | 2008-08-28 | Hamilton Rick A | Targeting advertising content in a virtual universe (vu) |
US9514117B2 (en) | 2007-02-28 | 2016-12-06 | Docusign, Inc. | System and method for document tagging templates |
KR20140139117A (en) * | 2007-03-12 | 2014-12-04 | 소니 온라인 엔터테인먼트 엘엘씨 | Secure transfer of digital objects |
US20080274811A1 (en) * | 2007-05-02 | 2008-11-06 | S.H. Ganz Holdings Inc. And 816877 Ontario Limited | Character training and development |
US8949706B2 (en) * | 2007-07-18 | 2015-02-03 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
US8655961B2 (en) | 2007-07-18 | 2014-02-18 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
CN101425897B (en) * | 2007-10-29 | 2011-05-18 | 上海交通大学 | Customer authentication method, system, server and customer node |
US8626819B2 (en) | 2007-11-19 | 2014-01-07 | Ganz | Transfer of items between social networking websites |
US20090132357A1 (en) * | 2007-11-19 | 2009-05-21 | Ganz, An Ontario Partnership Consisting Of S.H. Ganz Holdings Inc. And 816877 Ontario Limited | Transfer of rewards from a central website to other websites |
US8088002B2 (en) * | 2007-11-19 | 2012-01-03 | Ganz | Transfer of rewards between websites |
US8612302B2 (en) | 2007-11-19 | 2013-12-17 | Ganz | Credit swap in a virtual world |
US20090132309A1 (en) * | 2007-11-21 | 2009-05-21 | International Business Machines Corporation | Generation of a three-dimensional virtual reality environment from a business process model |
US20090158161A1 (en) * | 2007-12-18 | 2009-06-18 | Samsung Electronics Co., Ltd. | Collaborative search in virtual worlds |
US8206222B2 (en) | 2008-01-29 | 2012-06-26 | Gary Stephen Shuster | Entertainment system for performing human intelligence tasks |
US9754234B2 (en) * | 2008-02-15 | 2017-09-05 | International Business Machines Corporation | Tracking of shared inventory in a virtual universe |
JP5159375B2 (en) * | 2008-03-07 | 2013-03-06 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Object authenticity determination system and method in metaverse, and computer program thereof |
US8688975B2 (en) * | 2008-03-25 | 2014-04-01 | International Business Machines Corporation | Certifying a virtual entity in a virtual universe |
US8261334B2 (en) | 2008-04-25 | 2012-09-04 | Yodlee Inc. | System for performing web authentication of a user by proxy |
US9724611B2 (en) * | 2008-05-21 | 2017-08-08 | Disney Enterprises, Inc. | Method and system for synchronizing an online application and a portable device |
US8099338B2 (en) * | 2008-06-09 | 2012-01-17 | International Business Machines Corporation | Management of virtual universe item returns |
JP4979645B2 (en) * | 2008-07-15 | 2012-07-18 | ヤフー株式会社 | Transaction management server device, transaction management method and program |
US20100035692A1 (en) * | 2008-08-08 | 2010-02-11 | Microsoft Corporation | Avatar closet/ game awarded avatar |
US8239259B2 (en) * | 2008-08-15 | 2012-08-07 | Ganz | Donations in a virtual environment |
US8347235B2 (en) | 2008-09-26 | 2013-01-01 | International Business Machines Corporation | Method and system of providing information during content breakpoints in a virtual universe |
US8346669B2 (en) * | 2008-10-08 | 2013-01-01 | International Business Machines Corporation | Method of requesting a customized instance of an object using information contained within an existing instance |
US20100100452A1 (en) * | 2008-10-22 | 2010-04-22 | International Business Machines Corporation | Virtual business object to manage virtual world transactions |
US9005016B2 (en) | 2008-10-24 | 2015-04-14 | Lee Amaitis | Wagering on event outcomes during the event |
US8342966B2 (en) | 2008-10-24 | 2013-01-01 | Cfph, Llc | Wager market creation and management |
US8342946B2 (en) | 2008-10-24 | 2013-01-01 | Bgc Partners, Inc. | Computer graphics processing and display of selectable items |
WO2010062680A2 (en) * | 2008-10-30 | 2010-06-03 | Sri Raghavan | Methods and systems for supporting asset exchange |
US9586149B2 (en) | 2008-11-05 | 2017-03-07 | International Business Machines Corporation | Collaborative virtual business objects social sharing in a virtual world |
US8255807B2 (en) * | 2008-12-23 | 2012-08-28 | Ganz | Item customization and website customization |
US8555359B2 (en) | 2009-02-26 | 2013-10-08 | Yodlee, Inc. | System and methods for automatically accessing a web site on behalf of a client |
US9280875B2 (en) * | 2009-03-06 | 2016-03-08 | Zynga Inc. | Virtual playing chips in a multiuser online game network |
US8239496B2 (en) * | 2009-03-13 | 2012-08-07 | Docusign, Inc. | Systems and methods for document management transformation and security |
US8566171B2 (en) * | 2009-03-20 | 2013-10-22 | Michal Anne Rogondino | Digital media archive collectible defined by variable collectability attributes |
US9373137B2 (en) | 2009-04-07 | 2016-06-21 | International Business Machines Corporation | Mapping transactions between the real world and a virtual world |
KR101048439B1 (en) * | 2009-04-24 | 2011-07-11 | (주)엠더블유스토리 | The server that stores the game execution authority authentication method, the recording medium on which the game execution authority authentication program is recorded, and the game execution authority authentication program. |
US20100306084A1 (en) * | 2009-05-28 | 2010-12-02 | Yunus Ciptawilangga | Need-based online virtual reality ecommerce system |
US20100306121A1 (en) * | 2009-05-28 | 2010-12-02 | Yunus Ciptawilangga | Selling and delivering real goods and services within a virtual reality world |
US20110078052A1 (en) * | 2009-05-28 | 2011-03-31 | Yunus Ciptawilangga | Virtual reality ecommerce with linked user and avatar benefits |
US20100306120A1 (en) * | 2009-05-28 | 2010-12-02 | Yunus Ciptawilangga | Online merchandising and ecommerce with virtual reality simulation of an actual retail location |
US8788952B2 (en) * | 2009-09-03 | 2014-07-22 | International Business Machines Corporation | System and method for locating missing items in a virtual universe |
US9251318B2 (en) | 2009-09-03 | 2016-02-02 | International Business Machines Corporation | System and method for the designation of items in a virtual universe |
US8795072B2 (en) * | 2009-10-13 | 2014-08-05 | Ganz | Method and system for providing a virtual presentation including a virtual companion and virtual photography |
US8424065B2 (en) * | 2009-11-25 | 2013-04-16 | International Business Machines Corporation | Apparatus and method of identity and virtual object management and sharing among virtual worlds |
US8635163B2 (en) * | 2010-01-13 | 2014-01-21 | Green Man Gaming Limited | System and method for facilitating a video game exchange |
US20110184881A1 (en) * | 2010-01-22 | 2011-07-28 | Preston Riggs | System and method for managing and using a competitive media site |
US9251131B2 (en) | 2010-05-04 | 2016-02-02 | Docusign, Inc. | Systems and methods for distributed electronic signature documents including version control |
US8244595B2 (en) * | 2010-06-08 | 2012-08-14 | Microsoft Corporation | Method and system for protecting game related content in a centralized marketplace |
SG10201504580YA (en) | 2010-06-11 | 2015-07-30 | Docusign Inc | Web-based electronically signed documents |
US8272956B2 (en) | 2010-11-16 | 2012-09-25 | Zynga Inc. | Social supply harvest mechanic for interactive social games |
US8137194B1 (en) * | 2010-11-16 | 2012-03-20 | Zynga Inc. | Supply delivery for interactive social games |
US20120142429A1 (en) | 2010-12-03 | 2012-06-07 | Muller Marcus S | Collaborative electronic game play employing player classification and aggregation |
US9782674B2 (en) | 2011-01-07 | 2017-10-10 | Ganz | Synchronizing system for gameplaying |
US8577737B1 (en) * | 2011-06-20 | 2013-11-05 | A9.Com, Inc. | Method, medium, and system for application lending |
US9824198B2 (en) | 2011-07-14 | 2017-11-21 | Docusign, Inc. | System and method for identity and reputation score based on transaction history |
US9268758B2 (en) | 2011-07-14 | 2016-02-23 | Docusign, Inc. | Method for associating third party content with online document signing |
CN103917999B (en) | 2011-07-14 | 2017-10-24 | 多塞股份公司 | On-line signature identity and verification method and its system in community |
WO2013019519A1 (en) | 2011-08-02 | 2013-02-07 | Rights Over Ip, Llc | Rights-based system |
US10511732B2 (en) | 2011-08-25 | 2019-12-17 | Docusign, Inc. | Mobile solution for importing and signing third-party electronic signature documents |
EP2748721B1 (en) | 2011-08-25 | 2022-10-05 | DocuSign, Inc. | Mobile solution for signing and retaining third-party documents |
US8137193B1 (en) * | 2011-09-26 | 2012-03-20 | Zynga Inc. | Supply delivery for interactive social games |
US8133116B1 (en) * | 2011-09-26 | 2012-03-13 | Zynga Inc. | Social supply harvest mechanic for interactive social games |
US8758119B1 (en) | 2011-10-20 | 2014-06-24 | Zynga Inc. | Asset transfers between interactive social games |
JP2015501984A (en) * | 2011-11-21 | 2015-01-19 | ナント ホールディングス アイピー,エルエルシー | Subscription bill service, system and method |
US8721456B2 (en) | 2012-02-17 | 2014-05-13 | Ganz | Incentivizing playing between websites |
US9230130B2 (en) | 2012-03-22 | 2016-01-05 | Docusign, Inc. | System and method for rules-based control of custody of electronic signature transactions |
JP5770673B2 (en) * | 2012-04-02 | 2015-08-26 | 株式会社コナミデジタルエンタテインメント | GAME SYSTEM, SERVER DEVICE, AND PROGRAM |
US8401923B1 (en) * | 2012-05-04 | 2013-03-19 | Transengine Technologies, LLC | Method for a ticket exchange across different systems of record |
US8959595B2 (en) | 2013-03-15 | 2015-02-17 | Bullaproof, Inc. | Methods and systems for providing secure transactions |
US20150221049A1 (en) * | 2014-02-03 | 2015-08-06 | Spayce, Inc. | Virtual property system |
US9511281B1 (en) * | 2014-05-27 | 2016-12-06 | Kabam, Inc. | Beginner's offer via inventory item pack |
CN104090835B (en) * | 2014-06-27 | 2017-01-25 | 中国人民解放军国防科学技术大学 | eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method |
US9684915B1 (en) * | 2014-07-11 | 2017-06-20 | ProSports Technologies, LLC | Method, medium, and system including a display device with authenticated digital collectables |
US10009351B2 (en) | 2015-05-22 | 2018-06-26 | Yu Yung Choi | System and method for access and management of physical objects over a communication network related thereto |
US9813317B2 (en) * | 2015-07-02 | 2017-11-07 | Tektronix Texas, Llc | Self-localizing data distribution network |
US10864443B2 (en) | 2017-12-22 | 2020-12-15 | Activision Publishing, Inc. | Video game content aggregation, normalization, and publication systems and methods |
US11484796B1 (en) | 2019-03-04 | 2022-11-01 | Mythical, Inc. | Systems and methods for facilitating distribution of in-game instructions pertaining to an online gaming platform |
US10512843B1 (en) | 2019-04-15 | 2019-12-24 | Mythical, Inc. | Systems and methods for using re-playable in-game operations to reach particular user game states in an online gaming platform |
US11712627B2 (en) | 2019-11-08 | 2023-08-01 | Activision Publishing, Inc. | System and method for providing conditional access to virtual gaming items |
US11899755B2 (en) | 2020-05-20 | 2024-02-13 | Sony Group Corporation | Virtual music rights management |
US20220300950A1 (en) * | 2021-03-20 | 2022-09-22 | Solydaria, Inc. | Systems and methods for generating and transmitting digital proofs of ownership for purchased products |
US20220351280A1 (en) * | 2021-04-29 | 2022-11-03 | Ana Maria Cardenas Gasca | Generating virtual digital objects using blockchain technology |
US11640603B1 (en) * | 2021-11-18 | 2023-05-02 | Joseph Freire | System and method for crypto token linked assets |
US11801448B1 (en) * | 2022-07-01 | 2023-10-31 | Datadna, Inc. | Transposing virtual content between computing environments |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5455407A (en) * | 1991-11-15 | 1995-10-03 | Citibank, N.A. | Electronic-monetary system |
WO1996007151A1 (en) * | 1994-08-30 | 1996-03-07 | Local Villages Incorporated | A technique for determining resource usage values in a system that presents on-line computer services as navigable virtual space |
EP0753836A2 (en) * | 1995-07-12 | 1997-01-15 | Sony Corporation | A three-dimensional virtual reality space sharing method and system |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4899299A (en) * | 1987-12-23 | 1990-02-06 | International Business Machines Corporation | Method for managing the retention of electronic documents in an interactive information handling system |
US5734823A (en) * | 1991-11-04 | 1998-03-31 | Microtome, Inc. | Systems and apparatus for electronic communication and storage of information |
WO1996007251A2 (en) * | 1994-09-01 | 1996-03-07 | Philips Electronics N.V. | Coherent optical communication system |
DE69637733D1 (en) * | 1995-02-13 | 2008-12-11 | Intertrust Tech Corp | SYSTEMS AND METHOD FOR SAFE TRANSMISSION |
US5734909A (en) * | 1995-09-01 | 1998-03-31 | International Business Machines Corporation | Method for controlling the locking and unlocking of system resources in a shared resource distributed computing environment |
US5815657A (en) * | 1996-04-26 | 1998-09-29 | Verifone, Inc. | System, method and article of manufacture for network electronic authorization utilizing an authorization instrument |
US5778368A (en) * | 1996-05-03 | 1998-07-07 | Telogy Networks, Inc. | Real-time embedded software respository with attribute searching apparatus and method |
US5862339A (en) * | 1996-07-09 | 1999-01-19 | Webtv Networks, Inc. | Client connects to an internet access provider using algorithm downloaded from a central server based upon client's desired criteria after disconnected from the server |
US5958005A (en) * | 1997-07-17 | 1999-09-28 | Bell Atlantic Network Services, Inc. | Electronic mail security |
US5960411A (en) * | 1997-09-12 | 1999-09-28 | Amazon.Com, Inc. | Method and system for placing a purchase order via a communications network |
EP0917119A3 (en) * | 1997-11-12 | 2001-01-10 | Citicorp Development Center, Inc. | Distributed network based electronic wallet |
-
1997
- 1997-04-11 US US08/834,027 patent/US6119229A/en not_active Expired - Lifetime
-
1998
- 1998-04-09 EP EP98915452A patent/EP0974118A1/en not_active Withdrawn
- 1998-04-09 NZ NZ500145A patent/NZ500145A/en unknown
- 1998-04-09 BR BR9808865-3A patent/BR9808865A/en not_active IP Right Cessation
- 1998-04-09 CA CA002286056A patent/CA2286056A1/en not_active Abandoned
- 1998-04-09 WO PCT/US1998/007176 patent/WO1998047091A1/en not_active Application Discontinuation
- 1998-04-09 JP JP54407798A patent/JP2001524233A/en active Pending
- 1998-04-09 IL IL13230298A patent/IL132302A0/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5455407A (en) * | 1991-11-15 | 1995-10-03 | Citibank, N.A. | Electronic-monetary system |
WO1996007151A1 (en) * | 1994-08-30 | 1996-03-07 | Local Villages Incorporated | A technique for determining resource usage values in a system that presents on-line computer services as navigable virtual space |
EP0753836A2 (en) * | 1995-07-12 | 1997-01-15 | Sony Corporation | A three-dimensional virtual reality space sharing method and system |
Non-Patent Citations (1)
Title |
---|
HOFER R C ET AL: "DIS TODAY", PROCEEDINGS OF THE IEEE, vol. 83, no. 8, August 1995 (1995-08-01), pages 1124 - 1136, XP000524899 * |
Cited By (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1078667A1 (en) * | 1999-01-28 | 2001-02-28 | Sega Enterprises, Ltd. | Network game system, game device terminal used in it and storage medium |
US7618320B2 (en) | 1999-01-28 | 2009-11-17 | Kabushiki Kaisha Sega | Network game system, and game terminal device and storage medium used therefor |
US6848997B1 (en) | 1999-01-28 | 2005-02-01 | Kabushiki Kaisha Sega Enterprises | Network game system, game device terminal used in it and storage medium |
EP1078667A4 (en) * | 1999-01-28 | 2003-10-15 | Sega Enterprises Kk | Network game system, game device terminal used in it and storage medium |
EP1196872A1 (en) * | 1999-05-15 | 2002-04-17 | John W.L. Ogilvie | Automatic broker tools and techniques |
EP1196872A4 (en) * | 1999-05-15 | 2004-04-07 | John W L Ogilvie | Automatic broker tools and techniques |
WO2000079367A1 (en) * | 1999-06-23 | 2000-12-28 | The Brodia Group | Method and system for secure guaranteed transactions over a computer network |
US6957334B1 (en) | 1999-06-23 | 2005-10-18 | Mastercard International Incorporated | Method and system for secure guaranteed transactions over a computer network |
US7577621B2 (en) | 1999-09-20 | 2009-08-18 | Security First Corporation | Cryptographic server with provisions for interoperability between cryptographic systems |
US7391865B2 (en) | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
WO2001022651A3 (en) * | 1999-09-20 | 2001-12-27 | Ethentica Inc | Cryptographic server with provisions for interoperability between cryptographic systems |
US8494969B2 (en) | 1999-09-20 | 2013-07-23 | Security First Corp. | Cryptographic server with provisions for interoperability between cryptographic systems |
WO2001022322A3 (en) * | 1999-09-20 | 2001-10-11 | Ethentica Inc | Electronic commerce with cryptographic authentication |
US8726033B2 (en) | 1999-09-20 | 2014-05-13 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
WO2001022651A2 (en) * | 1999-09-20 | 2001-03-29 | Ethentica, Inc. | Cryptographic server with provisions for interoperability between cryptographic systems |
US7187771B1 (en) | 1999-09-20 | 2007-03-06 | Security First Corporation | Server-side implementation of a cryptographic system |
US9613220B2 (en) | 1999-09-20 | 2017-04-04 | Security First Corp. | Secure data parser method and system |
US7260724B1 (en) | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US9449180B2 (en) | 1999-09-20 | 2016-09-20 | Security First Corp. | Secure data parser method and system |
WO2001022650A3 (en) * | 1999-09-20 | 2002-01-10 | Ethentica Inc | Server-side implementation of a cryptographic system |
WO2001022322A2 (en) * | 1999-09-20 | 2001-03-29 | Ethentica, Inc. | Electronic commerce with cryptographic authentication |
US8214650B2 (en) | 1999-09-20 | 2012-07-03 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US9189777B1 (en) | 1999-09-20 | 2015-11-17 | Security First Corporation | Electronic commerce with cryptographic authentication |
WO2001022650A2 (en) * | 1999-09-20 | 2001-03-29 | Ethentica, Inc. | Server-side implementation of a cryptographic system |
US9298937B2 (en) | 1999-09-20 | 2016-03-29 | Security First Corp. | Secure data parser method and system |
US7802104B2 (en) | 1999-09-20 | 2010-09-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
WO2001033319A1 (en) * | 1999-11-04 | 2001-05-10 | Sonera Smarttrust Oy | A method and system for managing property |
US7593864B2 (en) * | 2000-04-18 | 2009-09-22 | Brian Mark Shuster | Method and apparatus for managing ownership of virtual property |
JP2001312674A (en) * | 2000-04-28 | 2001-11-09 | Konica Corp | Economy data processing system for virtual space and recording medium |
US9338140B2 (en) | 2004-10-25 | 2016-05-10 | Security First Corp. | Secure data parser method and system |
US9294444B2 (en) | 2004-10-25 | 2016-03-22 | Security First Corp. | Systems and methods for cryptographically splitting and storing data |
US11178116B2 (en) | 2004-10-25 | 2021-11-16 | Security First Corp. | Secure data parser method and system |
US9992170B2 (en) | 2004-10-25 | 2018-06-05 | Security First Corp. | Secure data parser method and system |
US9985932B2 (en) | 2004-10-25 | 2018-05-29 | Security First Corp. | Secure data parser method and system |
US9935923B2 (en) | 2004-10-25 | 2018-04-03 | Security First Corp. | Secure data parser method and system |
US9906500B2 (en) | 2004-10-25 | 2018-02-27 | Security First Corp. | Secure data parser method and system |
US9871770B2 (en) | 2004-10-25 | 2018-01-16 | Security First Corp. | Secure data parser method and system |
US9294445B2 (en) | 2004-10-25 | 2016-03-22 | Security First Corp. | Secure data parser method and system |
US9135456B2 (en) | 2004-10-25 | 2015-09-15 | Security First Corp. | Secure data parser method and system |
US8904194B2 (en) | 2004-10-25 | 2014-12-02 | Security First Corp. | Secure data parser method and system |
US9047475B2 (en) | 2004-10-25 | 2015-06-02 | Security First Corp. | Secure data parser method and system |
US9009848B2 (en) | 2004-10-25 | 2015-04-14 | Security First Corp. | Secure data parser method and system |
US20070112660A1 (en) * | 2005-02-04 | 2007-05-17 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Disposition of proprietary virtual rights |
US7789759B2 (en) | 2006-10-23 | 2010-09-07 | Kabushiki Kaisha Square Enix | Game contents delivery system and a method of delivering game contents |
EP1916022A2 (en) | 2006-10-23 | 2008-04-30 | Kabushiki Kaisha Square Enix (also trading as Square Enix Co., Ltd.) | A game contents delivery system and a method of delivering game contents |
EP1916022A3 (en) * | 2006-10-23 | 2008-10-08 | Kabushiki Kaisha Square Enix (also trading as Square Enix Co., Ltd.) | A game contents delivery system and a method of delivering game contents |
US9774449B2 (en) | 2006-11-07 | 2017-09-26 | Security First Corp. | Systems and methods for distributing and securing data |
US9407431B2 (en) | 2006-11-07 | 2016-08-02 | Security First Corp. | Systems and methods for distributing and securing data |
US8155322B2 (en) | 2006-11-07 | 2012-04-10 | Security First Corp. | Systems and methods for distributing and securing data |
US8787583B2 (en) | 2006-11-07 | 2014-07-22 | Security First Corp. | Systems and methods for distributing and securing data |
US9195839B2 (en) | 2006-12-05 | 2015-11-24 | Security First Corp. | Tape backup method |
US8904080B2 (en) | 2006-12-05 | 2014-12-02 | Security First Corp. | Tape backup method |
US7953083B1 (en) | 2006-12-12 | 2011-05-31 | Qurio Holdings, Inc. | Multicast query propagation scheme for a peer-to-peer (P2P) network |
US8135018B1 (en) | 2007-03-29 | 2012-03-13 | Qurio Holdings, Inc. | Message propagation in a distributed virtual world |
US8750313B1 (en) | 2007-03-29 | 2014-06-10 | Qurio Holdings, Inc. | Message propagation in a distributed virtual world |
US8116323B1 (en) | 2007-04-12 | 2012-02-14 | Qurio Holdings, Inc. | Methods for providing peer negotiation in a distributed virtual environment and related systems and computer program products |
US8000328B1 (en) | 2007-05-22 | 2011-08-16 | Qurio Holdings, Inc. | Filtering messages in a distributed virtual world based on virtual space properties |
US8433656B1 (en) | 2007-06-13 | 2013-04-30 | Qurio Holdings, Inc. | Group licenses for virtual objects in a distributed virtual world |
US9397827B2 (en) | 2007-09-14 | 2016-07-19 | Security First Corp. | Systems and methods for managing cryptographic keys |
US8898464B2 (en) | 2008-02-22 | 2014-11-25 | Security First Corp. | Systems and methods for secure workgroup management and communication |
US8260728B1 (en) | 2008-12-12 | 2012-09-04 | Qurio Holdings, Inc. | System and method for influencing behavior in a distributed virtual environment |
US9064127B2 (en) | 2009-05-19 | 2015-06-23 | Security First Corp. | Systems and methods for securing data in the cloud |
US9516002B2 (en) | 2009-11-25 | 2016-12-06 | Security First Corp. | Systems and methods for securing data in motion |
US9443097B2 (en) | 2010-03-31 | 2016-09-13 | Security First Corp. | Systems and methods for securing data in motion |
US9589148B2 (en) | 2010-03-31 | 2017-03-07 | Security First Corp. | Systems and methods for securing data in motion |
US10068103B2 (en) | 2010-03-31 | 2018-09-04 | Security First Corp. | Systems and methods for securing data in motion |
US9213857B2 (en) | 2010-03-31 | 2015-12-15 | Security First Corp. | Systems and methods for securing data in motion |
WO2017195084A3 (en) * | 2016-05-09 | 2018-01-11 | Kelkar Abhijeet | Method and network-based utility for virtual unique identification, monitoring and lifecycle management of an asset |
Also Published As
Publication number | Publication date |
---|---|
JP2001524233A (en) | 2001-11-27 |
CA2286056A1 (en) | 1998-10-22 |
IL132302A0 (en) | 2001-03-19 |
AU721052B2 (en) | 2000-06-22 |
NZ500145A (en) | 2001-03-30 |
BR9808865A (en) | 2000-08-01 |
US6119229A (en) | 2000-09-12 |
EP0974118A1 (en) | 2000-01-26 |
AU6963298A (en) | 1998-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6119229A (en) | Virtual property system | |
US6341353B1 (en) | Smart electronic receipt system | |
US6938019B1 (en) | Method and apparatus for making secure electronic payments | |
US6157920A (en) | Executable digital cash for electronic commerce | |
EP0941524B1 (en) | Transaction system | |
US8051011B2 (en) | Electronic currency, electronic wallet therefor and electronic payment systems employing them | |
US6339765B1 (en) | Method and apparatus for defining private currencies | |
Lipton et al. | Micro-payments via efficient coin-flipping | |
US20220327529A1 (en) | Advanced Transactional Protocols And Ecosystem For Smart Contract Authoring And Deployment | |
JP2002508552A (en) | System and method for providing confidential presentation and payment through an open network | |
US7567909B1 (en) | Electronic transactions | |
KR19990063886A (en) | Methods, devices, systems and firmware for security work | |
CN110084576A (en) | The method for verifying e-payment | |
Chen et al. | Toward achieving anonymous nft trading | |
WO2001044968A2 (en) | Transaction system and method | |
AU721052C (en) | Virtual property system | |
WO2004049273A1 (en) | Peer to peer electronic-payment system | |
KR20030060467A (en) | method for managing digital cyber-lottery games, and system for the same | |
Poutanen | NetCents protocol for inexpensive Internet payments | |
Lipton et al. | Micro-Payments via E cient Coin-Flipping | |
Lucas | Improvements in Probabilistic Micropayment Schemes | |
KR20040062224A (en) | A method and its system of publishing and selling digital instant lottery | |
Mu | Towards Universally Acceptable m-Com Protocol | |
Clark | Bitcoin: A Technical Introduction | |
Harkavy | Anonymous Atomic liransactions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 132302 Country of ref document: IL |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 69632/98 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref document number: 2286056 Country of ref document: CA Kind code of ref document: A Ref document number: 2286056 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 500145 Country of ref document: NZ Ref document number: 1998915452 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 1998 544077 Country of ref document: JP Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 1998915452 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWG | Wipo information: grant in national office |
Ref document number: 69632/98 Country of ref document: AU |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998915452 Country of ref document: EP |