WO1999046720A1 - Procede d'intermediation a appel automatique pour achats par reseau - Google Patents

Procede d'intermediation a appel automatique pour achats par reseau Download PDF

Info

Publication number
WO1999046720A1
WO1999046720A1 PCT/US1999/005368 US9905368W WO9946720A1 WO 1999046720 A1 WO1999046720 A1 WO 1999046720A1 US 9905368 W US9905368 W US 9905368W WO 9946720 A1 WO9946720 A1 WO 9946720A1
Authority
WO
WIPO (PCT)
Prior art keywords
purchaser
subscribing
site
access
resource
Prior art date
Application number
PCT/US1999/005368
Other languages
English (en)
Inventor
Yoav A. Leitersdorf
Timothy Sixtus
Original Assignee
Cha Technologies Services, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cha Technologies Services, Inc. filed Critical Cha Technologies Services, Inc.
Priority to EP99913856A priority Critical patent/EP1062560A1/fr
Priority to CA002323500A priority patent/CA2323500A1/fr
Priority to AU31838/99A priority patent/AU3183899A/en
Publication of WO1999046720A1 publication Critical patent/WO1999046720A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/29Payment schemes or models characterised by micropayments

Definitions

  • This invention relates to online electronic communications and transactions, and, in particular, to transactions between resource providers and users of such resources that communicate in an internetworked computer system.
  • Internetworked computer systems such as the Internet
  • allow transactions such as electronic commerce purchases including electronic resource acquisition.
  • the Internet has quickly become the preferred choice of many users for obtaining information, data, images, sound clips, software programs, etc. (referred to generally as a resource) since a user has virtually unlimited access to any host computer connected to the Internet.
  • Problems have arisen, however, that are somewhat unique to this electronic commerce paradigm.
  • one problem has arisen in the area of authentication or confirmation of a user's identity. That is, when a user wishes to access a resource provided by a resource provider, the resource provider must be able to ensure that the user is actually who she says she is. In the real world, the provider (e.g., a shopkeeper) can simply ask for a driver's license or other piece of identification to confirm the shopper's identity prior to accepting payment in the form of a check or credit card. In the online environment, other forms of identification are obviously required.
  • Another problem that exists in the online world is the instance wherein a user would like to obtain a resource from a resource provider, such by downloading an image or other piece of information.
  • resource providers require users to be registered with their services, for example by paying a monthly fee of $20.00 for unlimited downloading of data.
  • the user may not want have to pay for such subscriptions just to get a single resource, especially since the cost of such registrations can become quite expensive given the number of resource providers that exist on the Internet.
  • the Internet digital communications network is widely used for commercial transactions in which a buyer accesses a web site of a merchant using a browser and purchases data, textual material, graphics, or other digital content for immediate delivery from the merchant's site to the purchaser's site over the network.
  • the content purchased is relatively inexpensive, say under a dollar in price.
  • heretofore large programs at both the buyer's site and the merchant's site have been required to handle the financial aspects of the transaction.
  • a buyer's account - termed a "cardholder" account - would include (1) a cardnumber which would identify the account, (2) the cardholder's name, (3) the cardholder's Internet e-mail address, (4) the state of the account; i.e., "active,” “suspended,” or “invalid;” and (5) a pay-in selection indicating how the cardholder would make payment; e.g.,, authorization to charge a credit card.
  • a seller's account with the payment system of the patent would include the following data: (1) a seller's account cardnumber, (2) the seller's name, (3) the seller's Internet e-mail address, (4) a state of the account, and (5) a seller's agent number.
  • a seller's agent would be a bank card processor which would interact with credit card bureaus to perform the functions of credit card authorizations and chargebacks.
  • the seller's agent number would be stored in the below-the-line system of the payment system of the patent, and not in the above-the-line system. See column 7, lines 17 through 20 of the Rose et al.
  • the payment-request message from the seller would include the buyer's cardnumber, the seller's cardnumber, a textual description of the transaction, an amount, a merchant's transaction identifier, and any delivery information.
  • the above-the-line program after receiving the payment-request message, the above-the-line program would ascertain whether the message was from a qualified seller by checking a database file on the above-the-line system.
  • the above-the-line program of the payment system of the patent would generate a payment-query message to be sent to the buyer over the Internet to ask the buyer whether the buyer authorized payment for the transaction to the seller.
  • the payment-query message contained a transaction identifier, the buyer's name, the seller's name, the textual description of the transaction, and an amount. The payment-query message would then be sent to the buyer's e-mail address.
  • the payment-query message would request the buyer to respond with one of three replies: "yes,” “no,” or "fraud.”
  • lines 31 through 66 of the patent if the buyer responded with a message indicating "yes," the above-the-line program would transfer the transaction information to the below-the-line program.
  • the below-the-line system would associate the buyer's cardnumber with the buyer's payment information and the seller's account number with the seller's agent number.
  • the below-the-line system would then communicate to the seller's agent the identity of the seller, the transaction amount, the buyer's credit card number or other payment information, and any delivery information.
  • the communication to the seller's agent would be carried out on secure communication channels off the Internet. If the seller's agent approved the charge, it would send an authorization code to the below-the-line system. According to column 10, lines 64 through 66 and column 11, lines 8 through 25 of the Rose et al. '917 patent, upon receipt of the authorization code, the below-the-line program would generate a cryptographic signature for the authorization code which would then be transferred to the above-the-line program. The above-the-line program would then transmit to the seller a payment-notification message which would include the seller's transaction identifier and the cryptographically signed authorization code.
  • United States patent No. 5,822, 737 to Ogram concerned an automated payment system for purchases over a distributed computer network such as the Internet.
  • a consumer using a customer computer would connect with a merchant computer over the network.
  • the merchant computer would communicate promotional material to the customer computer via the network. If the customer decided to buy the service or product from the merchant, the link with the merchant computer would be broken - by a mechanism apparently not specified in the '737 patent - and the customer computer would be linked with a payment processing computer. In the change from the merchant computer to the payment processing computer, an indicia of the URL or the product being promoted by the merchant computer would be communicated to the payment processing computer.
  • the payment processing computer could accept the credit card account number which was to be debited the amount of the product.
  • an encrypting software package could be first downloaded to the customer's computer for secure transmission of the credit card number.
  • the payment processing computer would then establish a link via telephone lines with a credit card server computer while maintaining linkage with the customer computer.
  • the credit card account number and amount would be communicated to the credit card server computer, which would respond with an authorization indicia.
  • the payment processing computer would in certain cases transmit a password to the customer's computer.
  • the password would have been defined by the merchant's computer to pass along to the customer's computer.
  • the password could be used by the customer's computer to gain access to restricted material within the merchant's computer.
  • the password could be displayed on a window in a screen on the customer's computer for the customer to use with the merchant.
  • the password could be printed or committed to memory, and then entered by the consumer to lift restricted access to material in the merchant's computer.
  • the subject invention broadly concerns an automatically invoked intermediation process for purchasing content over a digital communications network by subscribing purchasers from subscribing merchants.
  • the intermediation process comprises the step of establishing a database of subscriber- purchaser accounts and a database of subscriber-merchant accounts at a central transaction processing site on the digital communications network.
  • the subscriber-merchant accounts database includes information encoding resource locator data identifying at least one restricted-access port at each subscribing merchant site on the network and, for each such restricted-access port, information encoding an access fee schedule for accessing content by way of the restricted-access port and access-restriction-override information such as a password for enabling access to content by way of the restricted-access port.
  • the subscriber- purchaser accounts database includes information encoding purchaser site authentication credentials and a purchaser account balance for each subscribing purchaser.
  • the intermediation process of the invention further comprises establishing a resource rules database at the network site of each subscribing purchaser.
  • the resource rules database includes information encoding resource-locator-data identification criteria corresponding to each of at least a subset of the restricted-access ports at subscribing merchant sites identified in the subscriber-merchant accounts database and the access fee schedule for accessing content by way of the corresponding restricted-access port.
  • the intermediation process of the invention also includes the steps of locally monitoring network communication activity information at the network site of each subscribing purchaser with respect to access to a target network resource generated by a browser program at the subscribing purchaser site and comparing such network communication activity information to the resource-locator-data identification criteria corresponding to restricted-access ports at the network sites of subscribing merchants in the resource rules database locally maintained at the site of the subscribing purchaser.
  • the intermediation process of the invention also includes the steps of retrieving the access fee schedule corresponding to the matched resource-locator-data identification criteria from the resource rules database, displaying an access fee from the access fee schedule for accessing content by way of the restricted access port corresponding to the resource-locator-data identification criteria, and prompting for approval or disapproval of completing the access for the displayed access fee.
  • the intermediation process of the invention further comprises, upon receipt at the subscribing purchaser site of a user communication responsive to the prompting indicating approval of completing the access to content by way of the restricted-access port for the access fee, the step of transmitting a purchase-request message from the subscribing purchaser site to the transaction processing site over the network.
  • the purchase-request message includes information encoding purchaser-site authentication credentials and identifying the restricted-access port at the merchant site corresponding to the matched resource-locator-data identification criteria.
  • the intermediation process of the invention also comprises, upon receipt of the purchase-request message at the transaction processing site, the step of determining whether the purchaser-site authentication credentials encoded in the purchase-request message matches with any purchaser-site authentication credentials included in the subscriber-purchaser accounts database. If such a match is found, the process of the invention includes the step of transmitting over the network to the restricted-access port of the merchant site a restricted- access-enabling access-request message to download purchased content by way of the restricted-access port to the transaction processing site.
  • the restricted-access-enabling access-request message includes access-restriction-override information corresponding to the restricted-access port retrieved from the subscriber-merchant accounts database.
  • the intermediation process of the invention further comprises, upon receipt of the downloaded purchased content at the transaction processing site from the subscribing- merchant site by way of the restricted-access port responsive to the restricted-access-enabling access-request message, the steps of encrypting the downloaded purchased content and forwarding the thus encrypted purchased content to the subscribing purchaser site over the network.
  • the intermediation process of the invention also includes, upon receipt of the encrypted purchased content at the subscribing purchaser site, the step of transmitting a content-received confirmation message to the transaction-processing site by the subscribing purchaser site over the network.
  • the intermediation process of the invention further includes, upon receipt of the content-received confirmation message from the subscribing purchaser site at the transaction processing site, the step of debiting the purchaser account balance corresponding to the subscribing purchaser in the subscriber-purchaser accounts database by the access fee for accessing purchased content by way of the restricted-access port and forwarding a cryptographic key for decrypting the encrypted purchased content to the subscribing purchaser site over the network.
  • the intermediation process of the invention includes, upon receipt of the cryptographic key at the subscribing purchaser site, the step of decrypting the encrypted purchased content at the purchaser site.
  • the access fee schedule corresponding to a restricted-access port in the subscriber-merchant accounts database consists of a single access fee for accessing content by way of the restricted-access port.
  • the access-restriction-override information corresponding to a restricted-access port in the subscriber-merchant accounts database preferably includes a password for enabling access to content by way of the restricted-access port.
  • the subscriber-purchaser accounts database preferably includes, for each subscribing purchaser, information encoding an account-replenishment amount and a financial account number identifying an account at a financial institution upon which the subscribing purchaser may draw.
  • the step of debiting the purchaser account balance corresponding to the subscribing purchaser in the subscriber-purchaser accounts database by the access fee for accessing purchased content by way of the restricted-access port preferably includes the step of comparing the purchaser account balance with an account minimum value.
  • the process of the invention preferably includes the step of sending a funds-transfer request to the financial institution for transferring funds in the amount of the account-replenishment amount from the account identified by the financial account number to an intermediation entity account.
  • the purchaser account balance is preferably credited by the account replenishment amount to bring the purchaser account balance above the account minimum value.
  • the funds transfer request is preferably sent from the transaction processing site to the financial institution over a communication channel separate from the digital communications network interconnecting the transaction processing site, the subscribing purchaser sites, and the subscribing merchant sites.
  • the digital communications network interconnecting the transaction processing site, the subscribing purchaser sites, and the subscribing merchant sites is preferably the Internet.
  • Content purchased by means of a preferred intermediation process of the invention can include practically any resource which can be transmitted over the Internet.
  • Such content could include text, software, data, visual images, and audio, for example.
  • HTML hypertext mark-up language
  • GTF graphic image format
  • JPEG joint photographic experts group
  • a software object embedded in digital content is conventionally identified by resource locator data such as a URL which encodes the location of the object on the network.
  • resource locator data such as a URL which encodes the location of the object on the network.
  • the content is parsed at the transaction processing site and any resource locator data corresponding to a software object embedded in the content extracted. Resource locator data so extracted is then used to retrieve any corresponding software objects over the network.
  • the software objects thus retrieved are combined with the original downloaded content at the transaction processing site to form a composite purchased-content object.
  • the composite purchased-content object is then encrypted and forwarded to the subscribing purchaser site which purchased the content over the network. Decryption of the encrypted composite purchased-content object at the subscribing purchaser site according to such preferred process makes available the original content and any embedded software objects at the purchaser site without the necessity of the
  • a copy of a digital content downloaded to the transaction processing site from a restricted-access port at the network site of the subscribing merchant pursuant to a purchase-request message received from a subscribing purchaser site in accordance with an embodiment of the intermediation process of the invention may be cached at the transaction processing site.
  • the cached copy of the digital content may be used to provide the purchased content for encryption and downloading to the second subscribing purchaser site without having to access the content a second time by way of the restricted-access port of the subscribing merchant port.
  • hard goods may be purchased by subscribing purchasers from subscribing merchants over the Internet for delivery offline by means of a preferred intermediation process of the invention described in the following paragraphs.
  • the preferred automatically invoked intermediation process for purchasing hard goods over a digital communications network includes the steps of establishing a database of subscriber-purchaser accounts and a database of subscriber-merchant accounts at a central transaction processing site on the network.
  • the subscriber-merchant accounts database includes information encoding resource locator data identifying at least one order- entry port at each subscribing merchant site on the network and, for each such order-entry port, information encoding a schedule of prices and goods purchasable by orders entered by way of the order-entry port.
  • the subscriber-purchaser accounts database includes information for each subscribing purchaser encoding purchaser site authentication credentials and a purchaser account balance.
  • the intermediation process for purchasing hard goods also includes the step of establishing a resource rules database locally at the network site of each subscribing purchaser.
  • the resource rules database includes information encoding resource-locator-data identification criteria corresponding to each of at least a subset of the order-entry ports at subscribing merchant sites identified in the subscriber-merchant accounts database and the schedule of prices and goods purchasable by orders entered by way of the corresponding order-entry port.
  • the intermediation process for purchasing hard goods further includes the steps of locally monitoring network communication activity information at the network site of each subscribing purchaser with respect to access to a target network resource generated by a browser program at the subscribing purchaser site and comparing such network communication activity information to the resource-locator-data identification criteria corresponding to order-entry ports at the network sites of subscribing merchants in the resource rules database locally maintained at the site of the subscribing purchaser.
  • the intermediation process for purchasing hard goods also includes the steps of retrieving the schedule of prices and goods corresponding to the matched resource-locator-data identification criteria from the resource rules database, displaying at least a portion of prices and goods from the schedule, and prompting for identification of goods to be ordered.
  • the intermediation process of the invention for purchasing hard goods further comprises, upon receipt at the subscribing purchaser site of a user communication responsive to the prompting identifying hard goods to be ordered, the step of transmitting an order- request message from the subscribing purchaser site to the transaction processing site over the network.
  • the order-request message includes information encoding purchaser-site authentication credentials, identifying the order-entry port at the merchant site corresponding to the matched resource-locator-data identification criteria, and specifying the hard goods to be ordered.
  • the intermediation process of the invention for purchasing hard goods also comprises, upon receipt of the order-request message at the transaction processing site, the step of determining whether the purchaser-site authentication credentials encoded in the order-request message matches with any purchaser-site authentication credentials included in the subscriber- purchaser accounts database. If such a match is found, the process includes the step of transmitting over the network to the order-entry port of the merchant site an order-entry message to enter an order for the hard goods specified in the order-request message by way of the order-entry port and request transmission of an order-confirmation message from the merchant site to the transaction processing site.
  • the intermediation process of the invention for purchasing hard goods further includes, upon receipt of an order-confirmation message at the transaction processing site from the subscribing merchant site responsive to the order-entry message, the steps of encrypting the order-confirmation message and forwarding the encrypted order confirmation message to the subscribing purchaser site over the digital communications network.
  • the intermediation process of the invention for purchasing hard goods also includes, upon receipt of the encrypted order-confirmation message at the subscribing purchaser site, the steps of transmitting an order-confirmation received message to the transaction- processing site by the subscribing purchaser site over the network.
  • the intermediation process of the invention for purchasing hard goods further includes, upon receipt of the order-confirmation message from the subscribing purchaser site at the transaction processing site, the step of debiting the purchaser account balance corresponding to the subscribing purchaser in the subscriber-purchaser accounts database by the total price of the hard goods ordered and forwarding a cryptographic key for decrypting the encrypted order-confirmation message to the subscribing purchaser site over the network.
  • the intermediation process of the invention for purchasing hard goods also includes, upon receipt of the cryptographic key at the subscribing purchaser site, the step of decrypting the encrypted order-confirmation message at the purchaser site. Delivery of the hard goods to the subscribing purchaser is made offline by the subscribing merchant. The decrypted order- confirmation message may be used as proof to the subscribing merchant that the goods were ordered and paid for.
  • a subscribing merchant to an intermediation service carrying out a preferred intermediation process of the invention can use conventional Web publishing software at its Internet site to establish publicly accessible ports and restricted-access ports for use in connection with the intermediation process.
  • Commercially available conventional Web publishing software ordinarily has facilities for establishing a password-protected restricted- access port at an Internet site which requires the presentation of a user identification code and a password to obtain access to content by way of the restricted access port.
  • No software in addition to such conventional Web publishing software is required of a subscribing merchant to make use of preferred intermediation processes of the invention, which represents a significant advantage over the prior art.
  • the problem of the user needing subscriptions in order to obtain online resources is addressed through the use of a resource proxy.
  • the resource proxy acts as a broker, and generally will have its own subscriptions to many resource providers.
  • a client process on the user's machine intercedes and requests the resource proxy to obtain the resource.
  • the client process intercedes when the provider asks for the user's identification and password in response to a request for a resource by the user.
  • the client process intercedes when the user generates a request to access a resource from a provider to which access is restricted.
  • the resource proxy who has an account with the resource provider (or who will get the account if required), then obtains the resource on behalf of the user and provides the resource to the user.
  • the user can obtain many individual resources from the proxy
  • the resource proxy can serve multiple users, of course, in order that the provision of such individual resources can make economic sense.
  • a secure micropayment system is implemented by the resource proxy and the users to effect payment for the use of the resources.
  • the resource proxy may use a trust server to ensure that the requesting user is actually who she says she is, and to collect payment (the micropayment system) for the provision of the individual resource.
  • Figure 1 is an illustration of a triangulation authentication methodology utilized in a first preferred embodiment of the present invention.
  • Figure 2 is an illustration of a prior-art resource request made by a user to a resource provider.
  • Figure 3 is an illustration of the use of a resource proxy in the triangulation authentication schema of Figure 1.
  • FIGS 4-7 and 9 illustrate the interaction between existing financial networks, resource providers, and the triangulation authentication flow.
  • Figure 8 illustrates resource acquisition in accordance with a preferred embodiment of the present invention.
  • Figure 10 is an illustration of one aspect of the use of a resource proxy in accordance with a preferred embodiment of the present invention.
  • Figure 11 illustrates data flow in a back office transaction.
  • Figures 12A-12C is a sample merchant application.
  • Figure 13 shows aggregation of micropayment sums.
  • Figure 14 is a schematic diagram of subscribing purchaser sites, subscribing merchant sites, and an intermediation service transaction processing site interconnected via the Internet for carrying out a preferred embodiment of the intermediation process of the invention.
  • Figure 15 is an illustration of an intermediation-service subscription application screen generated by a preferred intermediation service.
  • Figure 16 is an illustration of a subscription-confirmation screen generated by the preferred intermediation service.
  • Figure 17 illustrates a newspaper contents screen for a hypothetical online financial newspaper.
  • Figure 18 illustrates a newspaper subscription screen presented by the online financial newspaper when a Web browser attempts to navigate to restricted-access content of the newspaper without making use of a preferred intermediation service of the invention.
  • Figure 19 illustrates an intermediation-service pop-up window which appears on the screen of a subscribing purchaser's personal computer when a browser running on the computer attempts to access restricted-access content of the online financial newspaper in the case in which the newspaper is a subscribing merchant to the preferred intermediation service.
  • Figure 20 is an illustration of a screen representing content of the online financial newspaper to which access is restricted.
  • Figure 21 is an illustration of an account-maintenance screen presented to subscribing purchasers to the preferred intermediation service.
  • R A Random number generated by Alice.
  • R ⁇ Random number generated by Bob.
  • NGE Nonce Generation Event in which a session key (or nonce) is created to encrypt/decrypt requested resources.
  • K A ,K B Function of one seed A to seed B, and it's inverse.
  • a triangulation authentication data flow over a computer network such as the Internet that will accomplish a successful authentication via a process referred to as a session manager is as follows:
  • User network site Alice initializes and sends an authentication request to user network site Bob.
  • User Bob accepts the authentication request, forms a first compound message comprising the authentication request and information about himself, and forwards the compound message to network site Ted.
  • Ted receives the first compound message (from Alice to Ted through Bob), confirms Alice's intent and sends her a second compound message to Bob (from Ted to Bob through Alice).
  • Encryption may optionally be utilized at sensitive message transfers to ensure that no data is viewed or tampered with by any party other than the intended recipient.
  • the message Alice sends to Bob from Ted is preferably Ted's confirmation of Alice's status encrypted such that only Bob can decipher the message.
  • Bob can be a server with resources that Alice seeks or requires. Once the authentication is complete, Bob can serve Alice's requests with inexpensiveity.
  • Locator into her browser.
  • the HTTP server (“Hal”) fetches the resource for her request and returns it to her browser. However, if the resource is protected, Hal sends back a request for a UTD/PW. 3. In the latter case, the browser responds to Hal' s request by displaying a dialog box with input boxes for a UID PW pair.
  • Alice's browser makes a second request for the resource, this time providing the user-entered UID/PW data with the request.
  • the entered data is stored during the rest her session to satisfy any of Hal's future requests for them.
  • a method for conducting micro-currency transactions is detailed, referred to herein as the micropayment system.
  • the micropayment system simply stated, in a triangulated system where Bob is a subscriber to an online service or has a previous relationship with a resource vendor, any Alice can obtain password- protected data through Bob's subscription or account without a subscription of her own.
  • the resource is password protected, so Hal asks Alice for a password (PW).
  • the password request triggers the micropayment system control (the micropayment system control "captures” the password request and initializes the authentication process. Simultaneously, the URL is requested of Bob instead of Hal). 4 . Alice asks Bob for "any resource”, and sends triangulation authentication data.
  • Hal delivers the resource to Bob. 10.
  • Bob sends the resource on to Alice.
  • Ted can keep track of Alice's requests and debit her account per delivery.
  • the platform of the present invention provides low cost, easy to use e-Commerce controls.
  • the components are based on the foundation of Session Manager authentication, a process by which any registered user can authenticate himself or herself to any other in the system.
  • the micropayment system facilitates online purchases of primarily digital resources that may range in value from less than a tenth of a cent to approximately US$15.00.
  • the upper bound may be determined by the abilities of Secure Electronic Transactions ("SET") initiatives.
  • the client software sends a Registration server (Reg) the appropriate information along with an approved fiscal instrument to charge (e.g., a credit card account number). 4. Reg passes the registration data across a secure gateway to back-office services and generates a unique registration number for Alice. 5. Alice's fiscal instrument is charged a previously negotiated amount.
  • a Registration server e.g., a credit card account number
  • the negotiated amount is digitally translated into NGE (Nonce Generation Events, that allow for decryption of resources to be provided in the future, and once used, represent a purchase) which are stored on a Trust Server (Ted) and associated with Alice's registration number.
  • NGE Near Generation Events, that allow for decryption of resources to be provided in the future, and once used, represent a purchase
  • Hal's request for credentials signals the micropayment system client to intercede on Alice's behalf. Alice is asked if she
  • Figure 5 shows the session manager authentication triangle (Alice to Bob to Ted to Alice, back to Bob).
  • Ted receives the first compound message (from Alice to Ted through Bob), confirms Alice's intent and sends a second compound message (from Ted to Bob through Alice).
  • Encryption may be utilized at sensitive message transfers to ensure that no data is viewed or tampered with by any party other than the intended recipient.
  • the compound message Ted sends in step three is preferably encrypted.
  • a compound message involves all three participants, and during each compound message transfer, the party in the middle adds or reads information unique to itself.
  • the message Alice sends to Bob from Ted is Ted's encrypted confirmation of Alice's status that only Bob can decipher.
  • Bob opens his message from Ted he can be certain that Alice is who she claims to be.
  • Bob can be a server with resources that Alice seeks or requires. Once the authentication is complete, Bob can serve Alice's requests with anonymity. This particular Bob is a registered resource proxy. The micropayment system client software on Alice's machine has sent a resource request to Bob, and initiated an authentication session.
  • Bob and Ted are preferably locally connected over a fast connection to reduce throughput between them. Additional potential overhead that might be found in negotiating a large number of session manager authentications is reduced for the same reason. Local connection between session manager components increase scalability options as well as reducing the ultimate "cost-per-click.”
  • Resource proxy Bob maintains accounts with multiple resource vendors acting as a universal client.
  • FIG. 6 shows existing resource providers.
  • Bob is a client to the many resource- vendor Hal variants that exist in the online world, including e-Commerce schemes ranging from a simple subscription model to Open Market's CSP (Commerce Service Provider).
  • CSP Commerce Service Provider
  • Bob is equipped to communicate via diverse front-ends supported or enforced by any particular Hal.
  • Bob is a registered user with respect to each of them.
  • Bob and Hal may have an existing relationship. If Bob should encounter a Hal that has an unknown or new e ⁇ Commerce scheme, Bob may opt to subscribe. Thus, Alice's requested resource may be fetched by Bob from a previously unknown Hal.
  • Bob has obtained the resource that Alice wants.
  • Bob has effectively encapsulated any vendor requirements for billing and charges, and is now in possession of Alice's requested resource.
  • Bob functions as a "universal client" to every Hal
  • Ted During the session manager authentication phase, Alice was recorded by Ted as making the request. Ted now creates a nonce generation event which is used in the debit process.
  • Stepping back to step three of the session manager authentication Ted sent Alice a compound message where she read the part destined for her and forwarded the rest, which was encrypted for Bob.
  • the second compound message contained a nonce, or one time key (preferably, a pair of keys) generated by Ted, and such keys are what is sent to Bob and Alice.
  • Ted When Ted is satisfied that Alice is who she claims to be pursuant to the session manager function, Ted sends Alice a decryption key (1) and its mate to Bob (2). Bob encrypts the resource with his encryption key, sends the encrypted resource to Alice (3) where she can decrypt it with her decryption key. Since a nonce was generated, no one but the intended recipient can obtain the resource in this session, and Alice's acceptance and usage of key provides proof of delivery. The nonce generation event has served its purpose and Ted will decrement the available nonce generation events reserved in Alice's account.
  • the backoffice and accounting services reside apart from the core net-side nonce generation event based transactional activity and across a protected gateway.
  • the backoffice and accounting services layer helps to form the accounting foundation integral to, and found within, any corporate entity.
  • the backoffice and accounting services layer is where client and vendor accounts are processed and where the purchase orders and invoices get entered and fulfilled.
  • the back office and accounting services layer is where statements and checks are printed and posted.
  • the business model resembling the back office in activity and intent from this vantage point, and the view of the National Automated Clearing House Association (“NACHA"), is often described as mail-order/telephone order ("MOTO").
  • MOTO mail-order/telephone order
  • customer orders are placed via telephone (for the most part) and accepted without the customer's signature, and then charged with central terminal servers.
  • the back end of the preferred embodiment bears a distinct kinship to a service provider's revenue model as well.
  • the user base is asked to pay up front for services which the micropayment system promises to provide at a later time.
  • the nonce generation events may be sold in quantities corresponding to twenty United States dollars-(US$20).
  • the subscription agreement between the user and the company providing the micropayment system provides that when the user's supply of nonce generation events gets low enough, the Company is authorized to replenish the user's supply of nonce generation events without the user's needing to intervene.
  • the replenishing debit accounts function is carried out on one or more terminal servers, running clearing software and linked to an external clearing body by a modem and telephone line (or a dedicated) communications link.
  • the external clearing body may be a NACHA representative, credit card company, bank or a national financial non-bank, such as
  • the back-end transaction processing may be, in general, carried out in different ways with different parties.
  • the processing system can select parties and processing methods which are advantageous for a given transaction.
  • Alice's fiscal instrument is charged, and upon a successful transaction, she is provided a usable online micropayment system account. Under the subscription agreement, the amount charged will not exceed US$20.00 and will not be less than a lower limit based on costs enforced by the external clearing body.
  • a debit account stores a previously negotiated amount charged against a users credit card or other fiscal instrument. This is sometimes called "pay-to-play" and is functionally similar to the familiar automated teller machine (ATM) paradigm.
  • ATM automated teller machine
  • the back-end transaction processing can be carried out in a number of ways.
  • the various different options for carrying out back-end transaction processing are assembled in a modular layer.
  • One clearing system may prove useful at any single time, but whenever another proves to be more advantageous for any reason (e.g., better rates, partnership arrangements, etc.), the more advantageous system can be adopted without disrupting the rest of the structure.
  • Ted will determine when Alice has reached a previously agreed upon lower threshold. At that time, Ted will send a message through the secure gateway to a local terminal server. The terminal software will negotiate via modem or leased line connection an authorized charge against Alice's fiscal instrument. Upon a successful clearing transaction, an "ok" status is sent back through the secure gateway to Ted.
  • the process for replenishing debit accounts is similar to the process for initially charging the debit accounts.
  • a user/buyer wants to obtain a resource (article, image, sound, etc.) from an Internet merchant/vendor.
  • the merchant/vendor requires proof of subscription (either to the merchant's services, or to the merchant's choice of e-Commerce vendor) before the resources will be delivered.
  • the user/buyer is not a subscriber and chooses not to subscribe at this time, but would still like to obtain the resource.
  • the micropayment client software residing on the user/buyer's personal computer senses the subscription request and offers to obtain the resource for the user/buyer.
  • micropayment client handle the transaction a message is sent to the micropayment servers indicating this.
  • the micropayment server uses it's own subscription to the merchant/vendor to obtain the resource
  • the merchant/vendor recognizes the micropayment server as a subscriber and delivers the resource to the micropayment server. 8. The micropayment server then delivers the resource to the user/buyer.
  • the pieces required to process transactions include a merchant account, a terminal server (such as a card reader), a modem link, and access to a clearing company.
  • Issuing bank (of the credit card);
  • a number of web vendors offer credit-card payment processing services for conducting a transaction on the Internet. Such companies include WebMall, USWeb, Octagon, and CyberCash, etc. Services such companies provide range from the set-up of a merchant account on an organization's behalf to performing the entire online transaction from the company.
  • a preferred micropayment process of the invention does not require online Internet transactions.
  • the micropayment back-office activities are akin to a service organization such AOL, MSN, UUNet, etc. in that the buyer is asked periodically to pre-pay for services that will be rendered. No Internet connection is required for the transaction to transpire, the user need not be online at the time, and the transaction does not occur on the Web.
  • This type of transaction process is regarded by NACHA as a mail order/telephone order or MOTO transaction because the credit card itself is never physically present when a transaction is processed.
  • An Internet service such as the preferred micropayment system does not require an Internet transaction. In fact, it is part of the inherent security and ease of use of the present invention that the transactional activity occurs offline. The CPU and bandwidth requirements of securing an online transaction are completely removed.
  • Figure 11 illustrates micropayment system backoffice activity.
  • a micropayment terminal server or other point of sale (POS) device receives a charge request for User X.
  • the terminal server looks up User X in an accounts database and gets the information, "Alice User, CC# 1234 4567 8910, expiration 0999.”
  • the terminal server then dials into it's credit card processor and requests a US$20.00 charge against Alice User's credit card, passing the information ("Alice User, CC# 1234 4567 8910, expiration 0999") it just received from the accounts database.
  • the credit card processor returns a status (either "OK” or "Unable”).
  • the terminal server passes only the status of User X back to the secured gateway and the micropayment online servers beyond.
  • the credit card processor debit the cardholders account by US$20.00 and credits the micropayment merchant account the same US$20.00. This can be performed in a batch process where many requests for credit card clearing are queued until an appropriate time, or performed at the time of request.
  • Figures 12A-C comprise an exemplary form for creating a merchant account. Though the costs and charges vary, they are roughly as follows:
  • Micropayment transactions are conducted at the request of multiple buyers. Nonce generating events are issued to users for purchasing resources from multiple merchant/vendors .
  • a "transaction dump" or raw data from the Internet is processed, where a measure of used nonce generating events is sent through the secured gateway destined for the
  • Accounting services will receive this raw data and calculate an aggregate yield based on the accumulated usage of a merchant/vendor's resources. No individual buyer's information is kept in the online space or found in the raw data — such information is not required to remunerate merchant/vendors.
  • the preferred micropayment process of the invention aggregates small individual purchases into one larger accumulated value. This value is further processed through accounting services to yield a commission for performing these services. The remaining cash value is processed and a check is issued to each respective merchant/vendor at pre-defined intervals (monthly, bi-weekly, etc.) in one lump sum (as opposed to 250 separate checks of less than a dollar apiece). This is true for every vendor.
  • Benefits for user/buyers in this model come from the fact that none of their purchasing dollars are tied to a single merchant/vendor. Their ability to spend nonce generating events freely allows for more "impulse spending” as well, which also benefits merchant/vendors.
  • both the merchant and the purchaser are subscribers to an automatically-invoked intermediation service which provides facilities for carrying out the process of the invention.
  • the intermediation service provides a trust server and a
  • the trust server and the proxy content server can separately access the Internet and can be separately accessed via the Internet.
  • the trust server and the proxy content server of the intermediation service are interconnected by a private digital communications network separate from the Internet.
  • FIG. 14 A preferred arrangement for inter-connecting subscribing purchasers, subscribing merchants, and components of a transaction processing site for the preferred intermediation service is illustrated schematically in Figure 14.
  • the preferred intermediation service employs a modular and distributed arrangement involving a transaction queue for transaction processing by servers at the transaction processing site, which provides for scalability and work-load balancing by adding additional servers.
  • a plurality of personal computers 300 of buyers who subscribe to the intermediation service, a plurality of web servers 302 of merchants who subscribe to the intermediation service, and a transaction processing site 304 are interconnected by the Internet digital communications network 306.
  • the transaction processing site 304 includes a plurality of servers 310-330 among which various tasks of transaction processing for the intermediation service are distributed.
  • a core group of the servers 310-322 at the transaction processing site 304 are interconnected by a private transaction-queue interconnection network 332 which facilitates distribution of the transaction processing tasks among the servers of the core group 310-322 and permits additional servers 324 be added to the core group for scaling and work-load balancing.
  • a banker/membership server 310 may manipulate a subscribing purchaser accounts database; a resource rules database server 312 may manipulate a master copy of a resource-rules database for the service, a trust server 314 may perform purchaser account verification; a supervisor server 316 may serve decryption keys for decrypting purchased content and order- confirmation messages; a proxy content server 318 may retrieve purchased content from subscribing merchant sites and, if appropriate, parses the content to identify and retrieve software objects embedded in the purchased context; an account server 320 handles the initial formation of new accounts and account maintenance; and an account replenishment server 322
  • the account replenishment server 322 can communicate with a credit-card processor 332 of a financial institution via a channel 334 separate from the Internet.
  • a master database server 326 logs transactions processed by the core group and stores the subscribing purchaser accounts database and the master copy of the resource-rules database and, in conjunction with an account database server 324, maintains financial account data such as credit card numbers of subscribing purchasers.
  • An accounting system server 330 may handle disbursements to subscribing merchants and a data mining system 328 may collect statistical data concerning use of the transaction processing site. Communication between the transaction processing site 304 and the Internet is mediated by a firewall system 340 which controls access to the servers of the site.
  • the preferred intermediation service of the invention maintains a subscriber-purchaser accounts database and a subscriber-merchant accounts database, both of which can be accessed by the trust server and the proxy content server not via the Internet.
  • the subscriber- purchaser accounts database includes for each subscribing purchaser, a purchaser account identification number, cryptographic information for communicating with the subscribing purchaser, a purchaser account balance, and information for replenishing the purchaser's account. Table I below sets forth the information maintained for each subscribing purchaser in the subscriber-purchaser accounts database.
  • the subscriber-merchant accounts database includes information encoding universal resource locator ("URL") data identifying one or more restricted-access ports at each subscribing merchant site on the network, and, for each such restricted-access port, information encoding an access fee for accessing content by way of the restricted-access port and a password for obtaining access to content by way of the restricted-access port.
  • URL universal resource locator
  • a subscribing purchaser will generally communicate over the Internet using a personal computer running an Internet browser program and making use of the services of a commercial Internet service provider ("ISP").
  • Subscription to the preferred intermediation service of the invention is generally initiated "online” over the Internet, with the new subscriber accessing a Web site of the intermediation service.
  • the preferred intermediation service downloads a subscription application screen 400 in hypertext markup language (“HTML") format for display on the display screen of the personal computer of the new subscriber.
  • the subscription application screen 400 includes HTML data-entry fields labeled to prompt for entry of the new subscribing purchaser's name 402 and billing address 404, including e-mail address.
  • the preferred intermediation service maintains a purchaser account for each subscribing purchaser against which charges for purchases made by the purchaser using the intermediation service are applied.
  • the purchaser account of a new purchaser is opened with an initial deposit which is withdrawn from another financial account of the new subscribing purchaser, such as a credit-card account maintained with a bank or other financial institution.
  • the subscription application screen 400 includes HTML data-entry fields labeled to prompt for entry of billing information 406 to be registered with the intermediation service, including card type, card number, and expiration date.
  • the subscription application screen 400 also includes HTML data-entry fields labeled to prompt for entry of purchaser account replenishment information 408, including the amount of an initial deposit in the purchaser account of the new subscribing purchaser.
  • the replenishment information 408 prompted for in the subscription application screen 400 includes a replenishment threshold value, a replenishment amount, and a selection of whether the replenishment is to be carried out automatically or manually by the subscribing purchaser.
  • a subscription confirmation screen 410 illustrated in
  • Figure 16 is downloaded in HTML format over the Internet from the transaction processing site to the personal computer of the new subscribing purchaser for display on the personal computer under the control of the browser program.
  • the subscription confirmation screen 410 indicates that a subscribing purchaser account has been successfully established and identifies the purchaser account number.
  • the HTML instructions which specify the subscription confirmation screen 410 painted by the browser on the display screen of the personal computer of the new subscribing purchaser define a labeled control area 412 which carries the label: "click here to download redirection and authentication control program.”
  • the browser can detect when a user executes a "mouse click" when the cursor of the display screen is positioned within the labeled control area.
  • the browser program In response to detecting such a mouse click , the browser program transmits a control action message over the Internet to the transaction processing site of the intermediation service which indicates that a mouse click occurred in the labeled control area 412.
  • a redirection and authentication control program is downloaded over the Internet from the transaction processing site and installed in the personal computer of the new subscribing purchaser.
  • the redirection and authentication control program runs on the personal computer of each subscribing purchaser of the preferred automatically invoked intermediation service and locally monitors Internet communication activity information generated by the Internet browser program running on the personal computer.
  • the redirection and authentication control program can monitor Internet communication activity generated by the browser program using the application programming interface "API" of the browser program.
  • API application programming interface
  • the redirection and authentication control program can monitor communication activity information generated by a "Netscape Navigator” browser program by way of the "DDE API" interface of the Navigator program and can monitor communication activity information generated by a "Microsoft Internet Explorer” browser program by way of the "COM" interface of the Internet Explorer program.
  • DdeConnect Establishes/closes a DDE connection to the browser.
  • One DDE connection is all that is necessary to monitor all Navigator browser windows.
  • OpenURL which is not a DDE operation may be used to process a URL request.
  • This call is used for two purposes: (1) to return control to the browser for URL requests for which there are no resource rules database entries; and (2) to instruct the browser to display a cached resource retrieved by the control program via the intermediation service.
  • the redirection and authentication control program installed in the personal computer of each subscribing purchaser to the preferred intermediation service includes a resource rules database for identifying Internet communication activity information generated by the browser program running on the personal computer with respect to accessing resources available by way of restricted-access ports of network sites of subscribing merchants to the intermediation service.
  • the resource rules database of the redirection and authentication control program installed in a given subscribing purchaser's personal computer includes a data structure referred to as a "rule" which functions as a scripting language to permit search criteria specified in the rule to be applied to URL's or other communication activity information generated by the Internet browser program running on the computer.
  • a rule could be used to test a URL for the presence of a particular keyword or a hostname to identify a restricted-access port at a subscribing merchant's site.
  • rules include information for determining how much is to be charged for access to the resource in the restricted access port and for how long access to the resource is to be permitted once permission to access has been purchased.
  • a master resource rules database is maintained at the transaction processing site of the preferred intermediation service for updating the local resource rules databases in the personal computers of the subscribing purchasers from time to time.
  • Subscribing purchasers may maintain copies of the full master resource rules database or may maintain a copy of the resource rules database for only a subset of the restricted-access ports identified in the master resource rules database. Such a subset might, for example, be limited to sites suitable for access by children, or, for purposes of limiting the size of the research rules database in the personal computer of subscribing purchasers, to sites with content in a particular language.
  • the master copy of the resource rules database is structured as a structured query language ("SQL") database.
  • An entry in the master copy of the resource rules database takes the form of an SQL table row.
  • Product, fee schedule, and term information used to form the entry in the database is obtained from the subscribing merchant who is to provide the product.
  • resource rules database is prepared at the transaction processing site, which is then compressed using a conventional data compression algorithm.
  • the compressed flat-file version of the resource rules database is distributed to new subscribing purchaser sites along with the redirection and authentication control program.
  • the redirection and authentication control program queries the transaction processing site upon initialization of each Internet connection and every twenty four hours for the date of the current version of the master copy of the resource rules database.
  • the redirection and authentication control program downloads a copy of the most recent resource rules database in the compressed file format, decompresses the downloaded database file, and updates the copy of the database maintained at the purchaser site. Updated purchase terms are generally distributed throughout the intermediation service within forty-eight hours.
  • the redirection and authentication control program running on the personal computer of a subscribing purchaser functions to intercept automatically requests to access a target resource at a restricted-access port of an Internet site of one of the subscribing merchants, to notify the subscribing purchaser that access to such resource may be had under certain conditions including payment of an access fee, and, if the subscribing purchaser chooses to accept the conditions, to redirect the request for access to the transaction processing site of the intermediation service for charging the subscribing purchaser's account the amount of the access fee and fulfilling the request for access to the target resource.
  • the functioning of the redirection and authentication control program of the preferred intermediation service from the perspective of a subscribing purchaser is described below in terms of a hypothetical example involving accessing content at the Internet site of an online financial newspaper.
  • a subscribing purchaser desires to browse the Internet, he or she launches a browser program on his or her personal computer and establishes communication with an Internet service provider.
  • the redirection and authentication control program of the preferred intermediation service is launched automatically upon the launching of the browser program.
  • the browser program Each time the subscribing purchaser navigates to a new Internet site, the browser program generates a URL which identifies the site on the Internet.
  • the redirection and authentication control program monitors each URL generated by the browser program before the URL is transmitted by the browser program from the personal computer and determines if the URL corresponds to a restricted-access port of a subscribing merchant identified in the resource rules database of the control program.
  • a subscribing purchaser to the preferred intermediation service upon attempting to navigate to the same article identified in the publicly accessible newspaper contents screen 414 of Figure 17, would be shown an intermediation-service pop-up window 422 offering the subscribing purchaser the option of accessing the nonpublicly accessible contents of the online newspaper for an access fee and an access time specified in the pop-up window, as illustrated in Figure 19.
  • the intermediation-service pop-up window would generally appear practically instantaneously after the subscribing purchaser attempted to access the non-publicly accessible article, since the redirection and authentication control program of the intermediation service running locally on the subscribing purchase's personal computer would have intercepted the URL generated by the browser program to access the article and would have determined by searching the resource rules database maintained locally on the personal computer that the
  • URL corresponded to a restricted-access port of subscribing merchant to the intermediation service - the online financial newspaper.
  • the redirection and authentication control program would block transmission of the URL and, using access fee and access time data retrieved locally from the resource rules database, generate the intermediation service pop-up window 422.
  • the intermediation-service pop-up window 422 generated by the redirection and authentication control program includes two "push-button” control areas 426 and 428 respectively labeled “OK” and "cancel” to prompt for proceeding with the access under the access fee and access time conditions 424 specified in the pop-up window or termination the access process under the intermediation service. If the "cancel" push-button control area 428 is selected, the browser is permitted to transmit the blocked URL and the newspaper subscription screen 418 appears as shown in Figure 18. If the "OK" push-button control area 426 is selected, the request for access to the restricted-access port of the online newspaper is redirected by the redirection and authentication control program over the Internet to the transaction processing site of the preferred intermediation service, as discussed below.
  • the subscribing purchaser elects to proceed with the requested access under the conditions specified in the intermediation-service pop-up window 422 by executing a mouse click with the cursor positioned on the push-button control area 426 labeled "OK" on the pop- up window 422, a six-step authentication and fulfillment procedure in accordance with the preferred intermediation process is initiated to authenticate and fulfill the requested access.
  • the redirection and authentication program running on the subscribing purchaser's personal computer forms a URL request data object which is composed of three fields for encoding respectively: (1) the rule identification number - designated "Rule ID" in
  • the local redirection and authentication control program maintains a ten digit number denoted "S A " referred to as the "account secret" which
  • the value of the account secret is updated after each transaction to access a target resource by way of a restricted-access port at an Internet site of a subscribing merchant.
  • values for a previous account secret, the current account secret, and a next account secret are maintained for the account of each subscribing purchaser in the subscriber- purchaser accounts database maintained at the transaction processing site of the preferred intermediation service.
  • a transaction random number is generated by the redirection and authentication control program for each transaction to access a target resource by way of a restricted-access port at an Internet site of a subscribing merchant.
  • the redirection and authentication control program After generation of the transaction random number, the redirection and authentication control program forms a first-step-identifier, random-number augmented data object composed of a first-step identifier code number designated a x and the transaction random number.
  • the first- step-identifier, random-number augmented data object is then encrypted by the redirection and authentication control program using a conventional data encryption procedure with the current account secret number as the encryption key.
  • the encryption procedure used permits the encrypted data object to be decrypted with the same key value.
  • a redirected purchase-request message is then transmitted over the Internet from the personal computer of the subscribing purchaser by the redirection and authentication control program to the proxy content server of the preferred intermediation service.
  • the redirected purchase-request message is composed of the purchaser account number, a version identification number for the intermediation procedure, the first step identifier code number ⁇ ,, the URL request data object, and the encrypted first-step-identifier, random-number- augmented data object.
  • the proxy content server receives the redirected purchase-request message from the personal computer of the subscribing purchaser and checks the first-step- identifier code number ⁇ x and the version identification number included in the purchase- request message and generates an appropriate error message and terminates the authentication and fulfillment procedure if either is not recognized. If both the first-step-identifier code number a and the version identification code in the redirected purchase request message are recognized by the proxy content server, the proxy content server retransmits the redirected purchase request message without change to the trust server of the preferred intermediation service over the private network interconnecting the proxy content server and the trust server, thereby concluding the second step of the authentication and fulfillment procedure.
  • the trust server receives the redirected purchase-request message and extracts the rule identification number and the URL for the target resource from the URL request data object included in the purchase-request message.
  • the trust server checks the validity of the redirected purchase request by determining whether the rule identification number and the URL of the target resource correspond to one another in the master resource rules database maintained at the transaction processing site of the preferred intermediation service. If the rule identification number and the URL of the target resource correspond in the master resource rules database, the authentication and fulfillment procedure is permitted to proceed, otherwise the procedure is terminated and an appropriate error message is generated.
  • the first-step-identifier code ⁇ x is again extracted from the redirected purchase-request message and checked. If the code is not recognized, the authentication and fulfillment procedure is terminated and an appropriate error message issued.
  • a resource encryption key is generated at the trust server by the following procedure. First, two random numbers are generated and then combined to form a double-random-number data object. The double random-number data object is then processed according to a known cryptographic message digest algorithm known as the "SHA1" secure hash algorithm.
  • the SHA1 secure hash algorithm The SHA1 secure
  • the purchaser account number and the encrypted first-step-identifier, random- number- augmented data object are extracted from the redirected purchase-request message at the trust server.
  • the current account secret S A and the previous account secret S Ap are retrieved from the subscriber-purchaser accounts database maintained at the transaction processing site of the preferred intermediation service. If the purchaser account number is unrecognized, the authentication and fulfillment procedure is terminated and an appropriate error message generated.
  • a decryption algorithm using the account secret as decryption key is then applied to the encrypted first-step-identifier, random- number-augmented data object from the redirected purchase-order message and the result checked to determine if the decryption was successful by determining if the first step identifier code number ⁇ , was extracted. If the first decryption attempt was not successful, a second decryption attempt is made by the applying the decryption algorithm to the encrypted first-step-identifier, random-number augmented data object using the previous account secret S Ap as decryption key, in case the redirected purchase-request message transmitted by the subscribing purchaser's computer had been delayed.
  • the result of the second decryption attempt is checked as before to determine if the decryption was successful by determining if the first step identifier code number ⁇ , was extracted. If the second decryption attempt was not successful, the authentication and fulfillment procedure is terminated by the trust server and an appropriate error message issued, in that the identity of the subscribing purchaser whose purchaser account number was included in the redirected purchase-request message was not confirmed.
  • a working value of the current account secret for the account in the trust server is set equal to the value of the previous account secret S Ap .
  • a working value of the transaction random number in the trust server is set equal to the value of the random number extracted from the decrypted encrypted first-step-identifier, random-number augmented data object, which, in that case, represented the transaction random number of the previous transaction.
  • a verified-account-identity purchase-request message is transmitted from the trust server to the proxy content server over the private network interconnecting the trust server and the proxy account server.
  • the verified-account-identity purchase-request message includes data encoding the version identification number for the intermediation procedure taken from the redirected purchase-request message previously forwarded to the trust server from the proxy content server, a third step identifier code number 3 , the resource encryption key generated at the trust server, and the URL for the target resource taken from the redirected purchase- request message.
  • a composite session key is composed as a sum of the resource encryption key included in the verified-account-identity purchase request message and a locally-computable key augmentation value.
  • the locally-computable key augmentation value is computed by applying the SHAl secure hash algorithm three times in succession. First, the SHAl secure hash algorithm is applied to a first composite data object composed of the working values of the transaction random number originally generated by the redirection and authentication control program running on the subscribing purchaser's personal computer and the current account secret S A in the trust server to obtain a first hash value.
  • the first hash value is combined with the working values of the transaction random number and the current account secret to form a second composite data object.
  • the SHAl secure hash function is then applied to the second composite data object to obtain a second hash value.
  • the second hash value is then combined with the working values of the transaction random number and the current account secret to form a third composite data object.
  • the locally-computable key augmentation value can also be computed locally by the redirection and authentication control program in the personal computer of the subscribing purchaser, since the values of the transaction random number and the current account secret are available locally to the redirection and authentication control program.
  • the URL of the target resource is extracted from the verified-account-identity purchase-request message at the proxy content server.
  • the URL of the target resource is used as a pointer to the resource rules data base to extract a vendor identification number.
  • the vendor identification number in turn is used to extract from the subscriber-merchant accounts database a password for accessing the target resource by way of the restricted-access port of the subscribing merchant.
  • the target resource is accessed and transmitted over the Internet to the proxy content server at the transaction processing site of the preferred intermediation service.
  • the target resource is combined with a fourth-step-identifier code number ⁇ 4 to form a step-labeled target-resource composite data object.
  • the step-labelled target-resource composite data object so formed is then encrypted with an encryption algorithm which employs the resource encryption key extracted from the verified-account-identity purchase-request-message as the encryption key for the algorithm.
  • an encrypted-target-resource delivery message is transmitted over the Internet from the proxy content server to the personal computer of the subscribing purchaser who originally attempted to access the target resource.
  • the encrypted-target-resource delivery message includes data encoding the version identification number for the intermediation procedure, the fourth step identifier code number ⁇ 4 and the encrypted step-labelled target-resource data object.
  • the locally- computable key augmentation value previously computed at the trust server in the third step of the procedure is recomputed independently by the redirection and authentication control program running on the personal computer of the subscribing purchaser.
  • the final key augmentation value and the intermediate hash values obtained in computing the final key augmentation value should be identical whether computed at the trust server or at the subscribing purchaser's personal computer, since the same procedure involving applying the SHAl secure hash algorithm three times in succession to successive composite data objects formed from the transaction random number, the current account secret, and prior hash values can be followed in both cases and the values for the transaction random number and the current account secret are the same.
  • a receipt data object is generated in the sixth step of the authentication and fulfillment procedure for each transaction in which access to a target resource is obtained by means of the preferred intermediation service and transmitted to the personal computer of the subscribing purchaser.
  • the elements of the receipt data object are specified in Table HI below:
  • URL STR(102 ) Include this with receipt if the URL is required by the rule type
  • KeylD NUM(IO) A pointer to an array of keys maintained in the trust server, Indicates which key was used in the hash
  • ReceiptHash STR(10 2 ) Indicates the resultant of the hash
  • the receipt data object may be presented to the transaction processing site of the intermediation service to enable the subscribing purchaser to obtain multiple accesses to the target resource - say, over a fixed period of time established by the rule - without incurring multiple charges.
  • the redirection and authentication control program running on the subscribing purchaser's personal computer may or may not have a receipt data object at the time of a given instance of the fifth step of the authentication and fulfillment procedure, depending on whether the transaction had previously progressed to a stage at which a receipt data object was generated and transmitted to the subscribing purchaser's personal computer.
  • the redirection and authentication control program forms a step-labeled receipt indicator composite data object.
  • the step-labeled receipt-indicator composite data object is formed by combining the fifth-step identifier code number ⁇ 5 with the following data elements from the receipt data object: RulelD, ServerExpirationDate, UserlD, KeylD, ReceiptHash, and, if appropriate to the rule type, the URL of the target resource.
  • the step-labeled receipt-indicator data object is formed by combining the fifth-step indicator code number with code indicating that no receipt data object is present.
  • the step-labeled receipt indicator composite data object is then encrypted with an encryption algorithm using as the encryption key the second hash value obtained as the result of the second of the three successive applications of the SHAl secure hash algorithm made in connection with the calculation of the locally-computable key augmentation value.
  • a resource-decryption-key request message is assembled by the redirection and authentication control program running on the personal computer of the subscribing purchaser after receiving the encrypted target-resource delivery message from the proxy content server of the preferred intermediation service.
  • the resource-decryption-key request message is
  • the resource-decryption-key request message is transmitted from the personal computer of the subscribing purchaser to the trust server of the preferred intermediation service over the Internet to conclude the fifth step of the authentication and fulfillment procedure of the preferred intermediation process.
  • the determination of whether to charge the subscribing purchaser's account for the access fee involves three test criteria applied with respect to the step-labeled receipt-indicator date object included in the resource-decryption-key request message: (1) does the data object include a receipt data object?; (2) if a receipt data object was included, is it genuine?; and (3) if a receipt data object was included, has the expiration date passed?
  • the encrypted step-labeled receipt-indicator composite data object is decrypted at the trust server using as decryption, key the second hash value obtained as the result of the second of the three successive applications of the SHAl secure hash algorithm made in connection with the calculation of the locally-computable key augmentation value.
  • Extraction of the fifth-step identifier code number ⁇ 5 from the decrypted step-identified receipt indicator composite data object verifies the identify of the subscribing purchaser specified by the purchaser account number included in the resource-decryption-key request message.
  • 49 receipt-indicator composite data object is checked to determine if a receipt data object was included in the data object.
  • the subscribing purchaser's account with the intermediation service is charged the amount of the access fee for accessing the target resource.
  • the genuineness of the receipt data object is checked before proceeding. Specifically, the SHAl secure hash algorithm is applied to a composite data object formed of the following data elements included in the receipt data object: KeylD, RulelD, ServerExpirationDate, UserlD, and, if called for by the rule type, the URL of the target resource. If the result of the SHAl hash function matches the ReceiptHash included in the receipt data object, indicating that the receipt data object is genuine, the authentication and fulfillment procedure proceeds to the date verification step without charging the subscribing purchaser's account.
  • the receipt data object is not genuine and the subscribing purchaser's account is charged the amount of the access fee. If a receipt data object was found to have been included in the step-labeled receipt-indicator composite data object and the receipt data object was found to be genuine, the server expiration date encoded in the receipt data object is compared to the current date provided by the trust server. If the server expiration date has not been exceeded, no charge is made to the subscribing purchaser's account. If the server expiration date has been exceeded, the subscribing purchaser's account is charged the access fee.
  • a resource-decryption-key delivery message is assembled at the trust server.
  • the resource-decryption-key delivery message is composed of data- encoding the following data elements: the purchaser account number, the version
  • step-labeled key/receipt-carrier composite data object is formed of the sixth-step identifier code number ⁇ 6 the composite session key computed in the third step of the authentication and fulfillment procedure discussed above, and, a receipt data object incorporating the data elements identified in Table III above.
  • the step-labeled key/receipt-carrier composite data object is then encrypted using an encryption algorithm employing as encryption key the second hash value obtained as the result of the second of the three successive applications of the SHAl secure hash algorithm made in connection with the calculation of the locally-computable key augmentation value.
  • the resource decryption-key delivery message is transmitted from the trust server to the personal computer of the subscribing purchaser over the Internet. After the transmission of the resource-decryption-key delivery message, the record of information specific to the transmission may be cleared from the trust server.
  • the redirection and authentication program running on the computer After receipt of the resource-decryption-key delivery message at the personal computer of the subscribing purchaser, the redirection and authentication program running on the computer applies a decryption algorithm to the encrypted step-labeled key/receipt carrier composite data object using as decryption key the result of the second of the three successive applications of the SHAl secure hash algorithm made in connection with the calculations of the locally-computable key augmentation value.
  • the calculation for the locally-computable key augmentation value can be carried out identically on the trust server and locally on the subscribing purchaser's personal computer.
  • Decryption of the encrypted step-labeled key-receipt carrier composite data object enables the redirection and authentication control programs to obtain the value of the composite session key included in the data object.
  • the resource decryption key may then be obtained locally from the composite session key by subtracting the locally-computable key augmentation value from the composite session key.
  • the resource decryption key may then be used by the redirection and authentication control program to decrypt the encrypted target resource previously transmitted to the personal computer of the subscribing purchaser from the proxy content
  • the subscribing purchaser can peruse an article from the online financial newspaper 429 on the display screen of his or her personal computer, as illustrated in Figure 20.
  • decryption of the encrypted step-labeled key/receipt carrier composite data object enables the redirection and authentication control program to obtain a receipt data object included in the composite data object.
  • Obtaining the receipt data object permits the subscribing purchaser to access additional content in the online newspaper without further charge until the server expiration date included in the receipt data object is exceeded.
  • the sixth step of the authentication and fulfillment procedure concludes by updating the account secret at the personal computer of the subscribing purchaser by setting the new account secret equal to the result of the first of the three successive applications of the SHAl secure hash algorithm made in connection with the calculation of the locally- computable key augmentation value.
  • the account secret values in the subscriber- purchaser accounts database at the transaction processing site are updated by setting the new previous account secret value equal to the old current account secret value and setting the new current account secret value equal to the previously determined first hash value, which was the result of applying the SHAl secure hash algorithm to the first composite data object composed of the working values of the transaction random number and the current account secret S A .
  • the subscribing purchaser may monitor the status of his or her account with the preferred intermediation service by downloading an account maintenance screen 430 for the account from the transaction processing site, as illustrated in Figure 21.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un procédé d'intermédiation à appel automatique conçu pour permettre à des acheteurs abonnés (300) d'effectuer des achats sur un réseau auprès de commerçants abonnés (302). Ce procédé consiste à établir, au niveau du site du réseau de chaque acheteur abonné, une base (312) de données de règles régissant les ressources. Pour un aspect du procédé, la base contient, d'une part des informations codant des critères d'identification de données de localisation de ressources correspondant à des ports d'accès restreints desservant des sites (302) des commerçants abonnés, et d'autre part des informations relatives à la redevance des accès pour l'achat d'un contenu via le port correspondant. A la réception d'une communication utilisateur correspondant à l'approbation, le système transmet à un site (304) de traitement des transactions un message de demande d'achat. Après vérification des droits attachés au site de l'acheteur, le système extrait du site du commerçant abonné la ressource cible. On utilise pour cela des informations permettant de revenir sur les restrictions d'accès, lesquelles informations sont codées, puis envoyées au site de l'acheteur abonné.
PCT/US1999/005368 1998-03-11 1999-03-11 Procede d'intermediation a appel automatique pour achats par reseau WO1999046720A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP99913856A EP1062560A1 (fr) 1998-03-11 1999-03-11 Procede d'intermediation a appel automatique pour achats par reseau
CA002323500A CA2323500A1 (fr) 1998-03-11 1999-03-11 Procede d'intermediation a appel automatique pour achats par reseau
AU31838/99A AU3183899A (en) 1998-03-11 1999-03-11 Automatically invoked intermediation process for network purchases

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US7763598P 1998-03-11 1998-03-11
US60/077,635 1998-03-11
US26087499A 1999-03-02 1999-03-02
US09/260,874 1999-03-02

Publications (1)

Publication Number Publication Date
WO1999046720A1 true WO1999046720A1 (fr) 1999-09-16

Family

ID=26759504

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/005368 WO1999046720A1 (fr) 1998-03-11 1999-03-11 Procede d'intermediation a appel automatique pour achats par reseau

Country Status (4)

Country Link
EP (1) EP1062560A1 (fr)
AU (1) AU3183899A (fr)
CA (1) CA2323500A1 (fr)
WO (1) WO1999046720A1 (fr)

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001022322A2 (fr) * 1999-09-20 2001-03-29 Ethentica, Inc. Commerce electronique avec authentification cryptographique
WO2001022692A2 (fr) * 1999-09-20 2001-03-29 Hwangjin Jang Systeme de services en ligne sur internet
WO2001055882A2 (fr) * 2000-01-27 2001-08-02 Crossoff Inc. Procede de verification d'authenticite et appareil associe
EP1158404A2 (fr) * 2000-05-26 2001-11-28 Sharp Kabushiki Kaisha Dispositif de serveur et système de transmission d'application pour la transmission appropriée de l'application divisée en parties
FR2811451A1 (fr) * 2000-07-07 2002-01-11 Thomson Multimedia Sa Systeme et procede de gestion de transactions de micropaiement, terminal de client et equipement de marchand correspondants
JP2003515822A (ja) * 1999-11-23 2003-05-07 テレフオンアクチーボラゲツト エル エム エリクソン(パブル) 電子商業システムで用いるための支払システムおよび方法
EP1396805A1 (fr) * 2001-06-11 2004-03-10 Sony Corporation Systeme d'argent electronique
US7260724B1 (en) 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7391865B2 (en) 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
US7577621B2 (en) 1999-09-20 2009-08-18 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
US8155322B2 (en) 2006-11-07 2012-04-10 Security First Corp. Systems and methods for distributing and securing data
US8276196B1 (en) * 2008-08-18 2012-09-25 United Services Automobile Association (Usaa) Systems and methods for implementing device-specific passwords
US8898464B2 (en) 2008-02-22 2014-11-25 Security First Corp. Systems and methods for secure workgroup management and communication
US8904194B2 (en) 2004-10-25 2014-12-02 Security First Corp. Secure data parser method and system
US8904080B2 (en) 2006-12-05 2014-12-02 Security First Corp. Tape backup method
US9064127B2 (en) 2009-05-19 2015-06-23 Security First Corp. Systems and methods for securing data in the cloud
US9213857B2 (en) 2010-03-31 2015-12-15 Security First Corp. Systems and methods for securing data in motion
US9397827B2 (en) 2007-09-14 2016-07-19 Security First Corp. Systems and methods for managing cryptographic keys
US9516002B2 (en) 2009-11-25 2016-12-06 Security First Corp. Systems and methods for securing data in motion
US9626664B2 (en) 2012-03-07 2017-04-18 Clearxchange, Llc System and method for transferring funds
US10318936B2 (en) 2012-03-07 2019-06-11 Early Warning Services, Llc System and method for transferring funds
US10395223B2 (en) 2012-03-07 2019-08-27 Early Warning Services, Llc System and method for transferring funds
US10395247B2 (en) 2012-03-07 2019-08-27 Early Warning Services, Llc Systems and methods for facilitating a secure transaction at a non-financial institution system
US10438175B2 (en) 2015-07-21 2019-10-08 Early Warning Services, Llc Secure real-time payment transactions
US10748127B2 (en) 2015-03-23 2020-08-18 Early Warning Services, Llc Payment real-time funds availability
US10769606B2 (en) 2015-03-23 2020-09-08 Early Warning Services, Llc Payment real-time funds availability
US10832246B2 (en) 2015-03-23 2020-11-10 Early Warning Services, Llc Payment real-time funds availability
US10839359B2 (en) 2015-03-23 2020-11-17 Early Warning Services, Llc Payment real-time funds availability
US10846662B2 (en) 2015-03-23 2020-11-24 Early Warning Services, Llc Real-time determination of funds availability for checks and ACH items
US10956888B2 (en) 2015-07-21 2021-03-23 Early Warning Services, Llc Secure real-time transactions
US10963856B2 (en) 2015-07-21 2021-03-30 Early Warning Services, Llc Secure real-time transactions
US10970688B2 (en) 2012-03-07 2021-04-06 Early Warning Services, Llc System and method for transferring funds
US10970695B2 (en) 2015-07-21 2021-04-06 Early Warning Services, Llc Secure real-time transactions
US11037121B2 (en) 2015-07-21 2021-06-15 Early Warning Services, Llc Secure real-time transactions
US11037122B2 (en) 2015-07-21 2021-06-15 Early Warning Services, Llc Secure real-time transactions
US11062290B2 (en) 2015-07-21 2021-07-13 Early Warning Services, Llc Secure real-time transactions
US11144928B2 (en) 2016-09-19 2021-10-12 Early Warning Services, Llc Authentication and fraud prevention in provisioning a mobile wallet
US11151523B2 (en) 2015-07-21 2021-10-19 Early Warning Services, Llc Secure transactions with offline device
US11151522B2 (en) 2015-07-21 2021-10-19 Early Warning Services, Llc Secure transactions with offline device
US11157884B2 (en) 2015-07-21 2021-10-26 Early Warning Services, Llc Secure transactions with offline device
US11386410B2 (en) 2015-07-21 2022-07-12 Early Warning Services, Llc Secure transactions with offline device
US11593800B2 (en) 2012-03-07 2023-02-28 Early Warning Services, Llc System and method for transferring funds

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9700854D0 (en) 1997-01-16 1997-03-05 Scient Generics Ltd Sub-audible acoustic data transmission mechanism

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5815657A (en) * 1996-04-26 1998-09-29 Verifone, Inc. System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
US5848400A (en) * 1996-07-01 1998-12-08 Sun Microsystems, Inc. Electronic check exchange, clearing and settlement system
US5864667A (en) * 1995-04-05 1999-01-26 Diversinet Corp. Method for safe communications
US5870473A (en) * 1995-12-14 1999-02-09 Cybercash, Inc. Electronic transfer system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5864667A (en) * 1995-04-05 1999-01-26 Diversinet Corp. Method for safe communications
US5870473A (en) * 1995-12-14 1999-02-09 Cybercash, Inc. Electronic transfer system and method
US5815657A (en) * 1996-04-26 1998-09-29 Verifone, Inc. System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
US5848400A (en) * 1996-07-01 1998-12-08 Sun Microsystems, Inc. Electronic check exchange, clearing and settlement system

Cited By (94)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9449180B2 (en) 1999-09-20 2016-09-20 Security First Corp. Secure data parser method and system
US9613220B2 (en) 1999-09-20 2017-04-04 Security First Corp. Secure data parser method and system
US7577621B2 (en) 1999-09-20 2009-08-18 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
US9189777B1 (en) 1999-09-20 2015-11-17 Security First Corporation Electronic commerce with cryptographic authentication
US9298937B2 (en) 1999-09-20 2016-03-29 Security First Corp. Secure data parser method and system
WO2001022322A3 (fr) * 1999-09-20 2001-10-11 Ethentica Inc Commerce electronique avec authentification cryptographique
WO2001022322A2 (fr) * 1999-09-20 2001-03-29 Ethentica, Inc. Commerce electronique avec authentification cryptographique
WO2001022692A3 (fr) * 1999-09-20 2001-12-06 Hwangjin Jang Systeme de services en ligne sur internet
WO2001022651A3 (fr) * 1999-09-20 2001-12-27 Ethentica Inc Serveur cryptographique a fonctions d'interoperabilite entre systemes cryptographiques
WO2001022650A3 (fr) * 1999-09-20 2002-01-10 Ethentica Inc Installation cote serveur d'un systeme cryptographique
WO2001022651A2 (fr) * 1999-09-20 2001-03-29 Ethentica, Inc. Serveur cryptographique a fonctions d'interoperabilite entre systemes cryptographiques
WO2001022650A2 (fr) * 1999-09-20 2001-03-29 Ethentica, Inc. Installation cote serveur d'un systeme cryptographique
WO2001022692A2 (fr) * 1999-09-20 2001-03-29 Hwangjin Jang Systeme de services en ligne sur internet
US7391865B2 (en) 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
US8726033B2 (en) 1999-09-20 2014-05-13 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US8494969B2 (en) 1999-09-20 2013-07-23 Security First Corp. Cryptographic server with provisions for interoperability between cryptographic systems
US8214650B2 (en) 1999-09-20 2012-07-03 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7802104B2 (en) 1999-09-20 2010-09-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7187771B1 (en) 1999-09-20 2007-03-06 Security First Corporation Server-side implementation of a cryptographic system
US7260724B1 (en) 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
JP2003515822A (ja) * 1999-11-23 2003-05-07 テレフオンアクチーボラゲツト エル エム エリクソン(パブル) 電子商業システムで用いるための支払システムおよび方法
WO2001055882A3 (fr) * 2000-01-27 2002-12-12 Crossoff Inc Procede de verification d'authenticite et appareil associe
WO2001055882A2 (fr) * 2000-01-27 2001-08-02 Crossoff Inc. Procede de verification d'authenticite et appareil associe
EP1158404A2 (fr) * 2000-05-26 2001-11-28 Sharp Kabushiki Kaisha Dispositif de serveur et système de transmission d'application pour la transmission appropriée de l'application divisée en parties
EP1158404A3 (fr) * 2000-05-26 2004-04-14 Sharp Kabushiki Kaisha Dispositif de serveur et système de transmission d'application pour la transmission appropriée de l'application divisée en parties
FR2811451A1 (fr) * 2000-07-07 2002-01-11 Thomson Multimedia Sa Systeme et procede de gestion de transactions de micropaiement, terminal de client et equipement de marchand correspondants
JP2004503018A (ja) * 2000-07-07 2004-01-29 トムソン ライセンシング ソシエテ アノニム 少額決済処理を管理するためのシステム及び方法、並びに対応するクライアント端末及び小売商装置
WO2002005152A1 (fr) * 2000-07-07 2002-01-17 Thomson Licensing Sa Systeme et procede de gestion de transactions de micropaiement, terminal de client et equipement de marchand correspondants
EP1396805A1 (fr) * 2001-06-11 2004-03-10 Sony Corporation Systeme d'argent electronique
EP1396805A4 (fr) * 2001-06-11 2006-11-08 Sony Corp Systeme d'argent electronique
US9906500B2 (en) 2004-10-25 2018-02-27 Security First Corp. Secure data parser method and system
US9294444B2 (en) 2004-10-25 2016-03-22 Security First Corp. Systems and methods for cryptographically splitting and storing data
US9009848B2 (en) 2004-10-25 2015-04-14 Security First Corp. Secure data parser method and system
US9047475B2 (en) 2004-10-25 2015-06-02 Security First Corp. Secure data parser method and system
US8904194B2 (en) 2004-10-25 2014-12-02 Security First Corp. Secure data parser method and system
US9135456B2 (en) 2004-10-25 2015-09-15 Security First Corp. Secure data parser method and system
US9871770B2 (en) 2004-10-25 2018-01-16 Security First Corp. Secure data parser method and system
US9992170B2 (en) 2004-10-25 2018-06-05 Security First Corp. Secure data parser method and system
US11178116B2 (en) 2004-10-25 2021-11-16 Security First Corp. Secure data parser method and system
US9985932B2 (en) 2004-10-25 2018-05-29 Security First Corp. Secure data parser method and system
US9294445B2 (en) 2004-10-25 2016-03-22 Security First Corp. Secure data parser method and system
US9935923B2 (en) 2004-10-25 2018-04-03 Security First Corp. Secure data parser method and system
US9338140B2 (en) 2004-10-25 2016-05-10 Security First Corp. Secure data parser method and system
US9407431B2 (en) 2006-11-07 2016-08-02 Security First Corp. Systems and methods for distributing and securing data
US9774449B2 (en) 2006-11-07 2017-09-26 Security First Corp. Systems and methods for distributing and securing data
US8155322B2 (en) 2006-11-07 2012-04-10 Security First Corp. Systems and methods for distributing and securing data
US8904080B2 (en) 2006-12-05 2014-12-02 Security First Corp. Tape backup method
US9195839B2 (en) 2006-12-05 2015-11-24 Security First Corp. Tape backup method
US9397827B2 (en) 2007-09-14 2016-07-19 Security First Corp. Systems and methods for managing cryptographic keys
US8898464B2 (en) 2008-02-22 2014-11-25 Security First Corp. Systems and methods for secure workgroup management and communication
US8839385B1 (en) 2008-08-18 2014-09-16 United Services Automobile Association (Usaa) Systems and methods for implementing device-specific passwords
US8276196B1 (en) * 2008-08-18 2012-09-25 United Services Automobile Association (Usaa) Systems and methods for implementing device-specific passwords
US9064127B2 (en) 2009-05-19 2015-06-23 Security First Corp. Systems and methods for securing data in the cloud
US9516002B2 (en) 2009-11-25 2016-12-06 Security First Corp. Systems and methods for securing data in motion
US10068103B2 (en) 2010-03-31 2018-09-04 Security First Corp. Systems and methods for securing data in motion
US9213857B2 (en) 2010-03-31 2015-12-15 Security First Corp. Systems and methods for securing data in motion
US9589148B2 (en) 2010-03-31 2017-03-07 Security First Corp. Systems and methods for securing data in motion
US9443097B2 (en) 2010-03-31 2016-09-13 Security First Corp. Systems and methods for securing data in motion
US10395247B2 (en) 2012-03-07 2019-08-27 Early Warning Services, Llc Systems and methods for facilitating a secure transaction at a non-financial institution system
US11715075B2 (en) 2012-03-07 2023-08-01 Early Warning Services, Llc System and method for transferring funds
US10318936B2 (en) 2012-03-07 2019-06-11 Early Warning Services, Llc System and method for transferring funds
US10395223B2 (en) 2012-03-07 2019-08-27 Early Warning Services, Llc System and method for transferring funds
US10970688B2 (en) 2012-03-07 2021-04-06 Early Warning Services, Llc System and method for transferring funds
US11948148B2 (en) 2012-03-07 2024-04-02 Early Warning Services, Llc System and method for facilitating transferring funds
US9691056B2 (en) 2012-03-07 2017-06-27 Clearxchange, Llc System and method for transferring funds
US10078821B2 (en) 2012-03-07 2018-09-18 Early Warning Services, Llc System and method for securely registering a recipient to a computer-implemented funds transfer payment network
US11605077B2 (en) 2012-03-07 2023-03-14 Early Warning Services, Llc System and method for transferring funds
US11593800B2 (en) 2012-03-07 2023-02-28 Early Warning Services, Llc System and method for transferring funds
US11373182B2 (en) 2012-03-07 2022-06-28 Early Warning Services, Llc System and method for transferring funds
US11361290B2 (en) 2012-03-07 2022-06-14 Early Warning Services, Llc System and method for securely registering a recipient to a computer-implemented funds transfer payment network
US11321682B2 (en) 2012-03-07 2022-05-03 Early Warning Services, Llc System and method for transferring funds
US9626664B2 (en) 2012-03-07 2017-04-18 Clearxchange, Llc System and method for transferring funds
US10748127B2 (en) 2015-03-23 2020-08-18 Early Warning Services, Llc Payment real-time funds availability
US10878387B2 (en) 2015-03-23 2020-12-29 Early Warning Services, Llc Real-time determination of funds availability for checks and ACH items
US10769606B2 (en) 2015-03-23 2020-09-08 Early Warning Services, Llc Payment real-time funds availability
US10832246B2 (en) 2015-03-23 2020-11-10 Early Warning Services, Llc Payment real-time funds availability
US10839359B2 (en) 2015-03-23 2020-11-17 Early Warning Services, Llc Payment real-time funds availability
US10846662B2 (en) 2015-03-23 2020-11-24 Early Warning Services, Llc Real-time determination of funds availability for checks and ACH items
US11386410B2 (en) 2015-07-21 2022-07-12 Early Warning Services, Llc Secure transactions with offline device
US10762477B2 (en) 2015-07-21 2020-09-01 Early Warning Services, Llc Secure real-time processing of payment transactions
US11151523B2 (en) 2015-07-21 2021-10-19 Early Warning Services, Llc Secure transactions with offline device
US11151522B2 (en) 2015-07-21 2021-10-19 Early Warning Services, Llc Secure transactions with offline device
US10438175B2 (en) 2015-07-21 2019-10-08 Early Warning Services, Llc Secure real-time payment transactions
US11157884B2 (en) 2015-07-21 2021-10-26 Early Warning Services, Llc Secure transactions with offline device
US10956888B2 (en) 2015-07-21 2021-03-23 Early Warning Services, Llc Secure real-time transactions
US11922387B2 (en) 2015-07-21 2024-03-05 Early Warning Services, Llc Secure real-time transactions
US11062290B2 (en) 2015-07-21 2021-07-13 Early Warning Services, Llc Secure real-time transactions
US11037122B2 (en) 2015-07-21 2021-06-15 Early Warning Services, Llc Secure real-time transactions
US10963856B2 (en) 2015-07-21 2021-03-30 Early Warning Services, Llc Secure real-time transactions
US11037121B2 (en) 2015-07-21 2021-06-15 Early Warning Services, Llc Secure real-time transactions
US10970695B2 (en) 2015-07-21 2021-04-06 Early Warning Services, Llc Secure real-time transactions
US11151566B2 (en) 2016-09-19 2021-10-19 Early Warning Services, Llc Authentication and fraud prevention in provisioning a mobile wallet
US11144928B2 (en) 2016-09-19 2021-10-12 Early Warning Services, Llc Authentication and fraud prevention in provisioning a mobile wallet
US11151567B2 (en) 2016-09-19 2021-10-19 Early Warning Services, Llc Authentication and fraud prevention in provisioning a mobile wallet

Also Published As

Publication number Publication date
CA2323500A1 (fr) 1999-09-16
EP1062560A1 (fr) 2000-12-27
AU3183899A (en) 1999-09-27

Similar Documents

Publication Publication Date Title
WO1999046720A1 (fr) Procede d'intermediation a appel automatique pour achats par reseau
CA2595920C (fr) Paiement non frauduleux d'achats sur internet
US7734527B2 (en) Method and apparatus for making secure electronic payments
US6748367B1 (en) Method and system for effecting financial transactions over a public network without submission of sensitive information
CA2371734C (fr) Procede et systeme permettant le traitement de paiements par l'internet utilisant un reseau de transfert electronique de fonds
AU754886B2 (en) A virtual private lock box
US7318047B1 (en) Method and apparatus for providing electronic refunds in an online payment system
US8825545B2 (en) System and method for facilitating on-line payment
US20040128257A1 (en) Method and apparatus for administering one or more value bearing instruments
JP2003531447A (ja) バーチャル安全のための方法およびシステム
US7430540B1 (en) System and method for safe financial transactions in E.Commerce
US20040029566A1 (en) Method and apparatus for controlling or monitoring access to the content of a telecommunicable data file
US20040078331A1 (en) Payment system using electronic stamps
US7844551B1 (en) Secure, anonymous authentication for electronic purchasing with dynamic determination of payment pricing and terms and cross vendor transaction resolution
WO1997019414A1 (fr) Systeme de paiement monetaire par reseau informatique
US20120233021A1 (en) Online Transaction System
US20020073022A1 (en) System and method for on-line payment transactions
US20040073509A1 (en) Network communication electronic commerce system
WO2000055779A1 (fr) Ensemble de facturation pour l'utilisation de pages web
EP1360663A2 (fr) Procede et appareil de creation d'un ou plusieurs instruments porteur de valeurs
Ekasdornkorn et al. Micropayments for E-Commerce Transactions: A Solution to Credit Card Use in Thailand
AU2012202358A1 (en) Fraud-free payment for internet purchases
WO2001013297A2 (fr) Procede pour mener des transactions financiers dans un reseau etendu
WO2001073708A2 (fr) Procede et appareil d'administration d'un instrument porteur de valeurs

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2323500

Country of ref document: CA

Ref country code: CA

Ref document number: 2323500

Kind code of ref document: A

Format of ref document f/p: F

NENP Non-entry into the national phase

Ref country code: KR

WWE Wipo information: entry into national phase

Ref document number: 1999913856

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1999913856

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWW Wipo information: withdrawn in national office

Ref document number: 1999913856

Country of ref document: EP