WO2001071596A1 - Methode de fourniture d'informations avec agent d'authentification sur l'internet et systeme a cet effet - Google Patents

Methode de fourniture d'informations avec agent d'authentification sur l'internet et systeme a cet effet Download PDF

Info

Publication number
WO2001071596A1
WO2001071596A1 PCT/KR2001/000393 KR0100393W WO0171596A1 WO 2001071596 A1 WO2001071596 A1 WO 2001071596A1 KR 0100393 W KR0100393 W KR 0100393W WO 0171596 A1 WO0171596 A1 WO 0171596A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
authentication
consumer
agent
key
Prior art date
Application number
PCT/KR2001/000393
Other languages
English (en)
Inventor
Hyung-No Youn
Original Assignee
Youn Hyung No
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020000012975A external-priority patent/KR20000030758A/ko
Application filed by Youn Hyung No filed Critical Youn Hyung No
Priority to AU44749/01A priority Critical patent/AU4474901A/en
Publication of WO2001071596A1 publication Critical patent/WO2001071596A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Definitions

  • the present invention relates to an information providing method having authentication agent on Internet and an embodying system therefor. More particularly, the method and system can increase a coefficient of utilization of information contents by allowing an unspecified number of information consumers to expose information contents.
  • the information contents are transmitted with an authentication agent to the consumers through a software authentication agent.
  • the authentication agent authenticates in place of the information consumers, using an authentication key hold therein, in a state that the consumers' anonymity is secured.
  • the method and the system can induce information providers such as companies to request to provide much information by exactly totalizing the number of exposed information.
  • the method and the system can raise the information consumers' interest in utilization of information by circulating the authentication agent on a network.
  • the current Internet business is divided into four types.
  • One is an Infra, which makes to use an Internet, applied to Internet connecting services, networks, computers or security equipments.
  • Another is an Application for l manufacturing and providing solutions such as ASP (Application Solution Provider) services and software such as search engines.
  • Another is an Intermediary, which constructs and intermediates to show various information and contents on the Internet, containing a portal service, contents provision, Internet advertisement, Internet settlement and authentication business.
  • the other is an Electronic commerce such as Internet shopping malls.
  • the Infra business is mostly selling and construction businesses based on hardware (H/W), and a huge communication base called Internet has been the main element in business expansion due to the public benefit of media.
  • a WWW World Wide Web
  • HTML Hyper Text Markup Language
  • HTTP Hyper Text Transfer Protocol
  • the communication basis of the Internet is not fixed. Therefore, there have been various trials to expand application areas of the Internet such as an Intranet for utilizing the Internet in a secured condition and a VPN(Virtual Private Network), which does not use public protocols.
  • the growth of the Internet infra still requires appearance of effective ideas to make more effective Internet infra.
  • a demand of the solution of the problems in Internet traffic which is not smooth, is gradually increased.
  • the Intermediary business acts as an agent for information consumers to all shopping needs occurred between information providers and the information consumers.
  • the Intermediary business is more effective and inexpensive than real human agents.
  • the Internet advertisement is provided by portal sites, virtual associations, dealing integrators.
  • Banner advertisement on the portal site (for example, Yahoo or Goldbank) is to lead the information consumers to visit the portal sites of the various Internet sites by providing contents effective for the information consumers.
  • the information consumer can access anonymously, but the degree of concentration to advertisement is lowered because the information consumers search only desired contents. Therefore, the banner advertisement on the portal site is provided with deteriorated consumer information and cannot form a reliable relationship.
  • the advertisement has a high reliability and can advertise selectively.
  • various ways must be mobilized to obtain member information and private information, which the information consumers may be unwilling to provide, is demanded, and thus the relationship with the consumers is formed in a restricted area.
  • the dealing integrator based on selling for example, AutoBYTEL, Amazon.com, etc.
  • the dealing integrator does not have the reliable relationship in that the information consumers are not provide their private information, but has excellent concentration degree to the advertisement and connecting function between providers and the information consumers for dealing purpose.
  • the refundable advertisement may be confirmed by a way that the information consumer 102 directly searches the web site, which provides the refundable advertisement operated by an ad company 101, using tools such as a web browser and confirms 104 the refundable advertisement.
  • the refundable advertisement may be confirmed by a way that the web site transmits the refundable advertisement to the information consumer 102 through e-mail.
  • compensation such as cash, cyber money or products
  • private information of the information consumer 102 is required because the ad company must know who the information consumer 102 is.
  • an electronic commerce field which is a business model for dealing goods and products between companies, between the company and a government office, between the company and the consumer or between the consumers, the companies and the consumers are informed through various promotions to each other.
  • the electronic commerce is based on the Internet web site, which is intensively managed at the center on the basis of scale-up connection environment.
  • the site displays information and costs of various products and goods for transactions
  • the consumer puts desired goods into a basket constructed with software, inputs the consumer's account number to calculate the costs and receives the goods through an appropriate material flow system.
  • Such sites for transactions have various methods for concluding the transaction.
  • a transaction method of intermediating to select desired goods by emphasizing specialty of the goods or by comparing the same goods on separate sites has been disclosed.
  • the consumer must shop at least one or more sites to find the desired goods, and therefore, there is a trouble that the consumer must perform web surfing on various web sites for a long time.
  • agent objects are operated while interchanging data with other device on the network in a fixed place of a service provider system.
  • the service provider system is called a server between the various devices on the network, or a service receiver device called a client. If the agent objects move other place on the network, the agent objects can be distributed from a planned service server like the time that related programs are initially installed for a certain service.
  • the agent is not moved for itself by a prepared functional method during process of the agent in a device having a CPU(Central Processing Unit).
  • Only unchangeable program objects are distributed by another server, client or user through a previously prepared service process in the server and can be executed in the distributed place.
  • a Java applet for executing active representation and function on the web browser is well known.
  • the Java applet is program object executed in the client operated in a device, in which an interpreting engine called Java machine for understanding and operating Java OS, which is a program language patented and spread by Sun Microsystems, Inc.
  • Java machine may damage the system
  • the program objects move to the place confirming the security through a secured method. Therefore, the Java machine previously blocks the execution, which will damage the system, and represents authentication of it.
  • program objects which can be executed under the basis of a DCOM(Distributed Component Object Model) provided by Microsoft Company, can be distributed through web. If manufacturers manufacturing the program objects issue a guarantee of the program objects, the user recognizes it and installs and executes the program.
  • the authentication method of such program object movement is possible between systems, in which technique infrastructure including the provided communication protocol and having security is installed.
  • the program object has been expanded into the agent object for representing function on the network and, especially, on the Internet.
  • the agent object determines its position movement and moves for itself.
  • the operation in the moved place cannot be performed by the communication protocol commonly used on the Internet.
  • IBM has researched new protocol for network Infra, in which the agent objects act, and obtained patent right of U.S. patent no. 5,603,031.
  • IBM has searched a system, which includes an Intranet having a VPN(Virtual Private Network) as the protocol and which utilizes agent object in a specific area smaller than the Internet, and filed a Korean patent application no. 1998-086624. Additionally, various systems and methods of application and construction of agent objects have been patented (U.S. patent no 6,016,393) by the General Magic Company. However, in the above methods of applying the agent objects, it is difficult that the agent moves as the main body under the opened Internet condition and guarantees the security or authenticates in place of the user.
  • an object of the present invention to provide an information providing method having authentication agent on Internet and an embodying system therefor, which can lead more information consumers to use various information provided from an information agent and more exactly compute the number of exposed information by allowing an unspecified number of information consumers to expose information contents.
  • the information contents are transmitted with an authentication agent through a software agent called authentication agent.
  • the authentication agent authenticates in place of the information consumers with an authentication key hold therein, in a state that the consumers' anonymity is secured and by exactly totalizing the number of information exposure.
  • an ultimate object of the present invention to provide a software agent authenticating in place of the information consumer and recognizing and demonstrating the existence and valuable act of the information consumer.
  • a software agent authenticating in place of the information consumer and recognizing and demonstrating the existence and valuable act of the information consumer.
  • provided are technical method and system for embodying an agent including software representing and authenticating the information consumer and a system moving the software agent as the main body and securing the software agent under an open environment such as the Internet when the software agent is installed and utilized.
  • the use of the authentication agent can considerably reduce network traffic generated during information transmission between a server and a client through a web browser.
  • the present invention provides a stable technical method of utilizing the software agent even in the open environment such as the Internet by making the software agent called the authentication agent have an authentication key.
  • a gene key which is the authentication key transmitted to the consumer through the authentication agent, can be recognized as a securable authentication system reliable between the information consumer and an information mediator.
  • the information mediator is a provider of the authentication agent and be utilized as reliable value compensation standard of information consumption or information transmission. According to the present invention, the information mediator can exactly grasp the flow and consumption route of information, thus obtaining exact profit producing standard of the information provision.
  • the consumer who is the main body in consumption and circulation of information, can consume and circulate information in a state that the consumer's private information is exposed to a minimum.
  • the present invention can allow the information consumer to be active as a consumer and a seller in vender, thus expanding a width of employment.
  • the present invention can rapidly circulate information with an inexpensive cost, thus establishing an effective selling method.
  • the consumer can manage personal knowledge and the vender promotes a selling efficiency.
  • the present invention can construct effective Infra for transmitting effective contents to the information consumer.
  • the present invention can be changed, converted, replaced and substituted within a range of the business model, technical method and system and is not restricted in the above.
  • FIG. 1 is a block diagram of a conventional compensation method of a member registration transfer type advertisement for compensating advertisement confirmation on condition of member registration;
  • FIG. 2 is a block diagram of a conventional later-recommendation compensation method for compensating recommendation of other information consumer on condition of member registration
  • FIG. 3 is a block diagram of a compensation method of an agent transfer type advertisement for compensating advertisement confirmation through an authentication agent according to the present invention
  • FIG. 4 is a block diagram of an advance-recommendation compensation method for compensating recommendation of other information consumer through the authentication agent according to the present invention
  • FIG. 5 is a block diagram explaining an information transmitting method using a network that information requested by a businessman is transmitted to an information consumer through an authentication agent and the authentication agent authenticates confirmation of information in place of the information consumer to compensate to the information consumer;
  • FIG. 6 is a block diagram of a structure of the authentication agent, which is a software agent provided as an information circulating agent, according to the present invention.
  • FIG. 7 is a block diagram of a flow of the authentication agent, which is the software agent provided as the information circulating agent, according to the present invention.
  • FIG. 8 is a block diagram of a structure and a flow of an authentication agency, which is a software utility provided as an information circulating agent, according to the present invention
  • FIG. 9 is a block diagram of a structure and a flow of an authentication center, which is a system provided as an information mediator according to the present invention
  • FIG. 10 is a block diagram showing a comparison of a direct manufacture and supply agent method that a template authentication agent is manufactured and provided by an information provider through a distributed manufacturing tools and an indirect manufacture and supply agent method that the template authentication agent is manufactured and provided by information mediator;
  • FIG. 11 is a view of the authentication agency according to a preferred embodiment
  • FIG. 12 is a flow chart showing a process for manufacturing and providing the authentication agent by combining the template authentication agent and an authentication key data of a control DB;
  • FIG. 13 is a block diagram comparing three methods for transmitting the authentication key and information to the information consumer;
  • FIG. 14 is a view showing an example that the authentication agency is executed in the information consumer's computer
  • FIG. 15 is a flow chart showing a process of operating the authentication agent transmitted to the information consumer and a process of manufacturing and providing a new authentication agent through recommendation from an authentication center;
  • FIG. 16 is a view of the authentication agent according to a preferred embodiment.
  • FIG. 17 is a flow chart showing a process of performing settlement after confirming the authentication by the authentication key provided from the information consumer.
  • the present invention provides an information providing method of representing an information consumer in authentication in a security maintaining condition through an authentication agent having information contents and an authentication key as a software agent without exposing the information consumer's private information, when an information mediator provides the information consumer with information contents requested from an information provider.
  • agent transfer type advertisement a transfer type advertisement
  • the software authentication agent 9 represents the information consumer 2 in testifying that the information consumer 2 confirms advertisement.
  • the authetication agent 9 is the software agent invented according to the present invention and the information consumer 2 confirms it,
  • the information consumer 2 can obtain cost 5 of consumption of refundable advertisement without burden of outflow of private information and the authentication agent 9 can perform confirmation of member.
  • the present invention can perform agent transfer type advertisement. At this time, as shown in FIG.
  • the present invention takes advance-recommendation compensation when a new member is registered. That is, when the information consumer 2 sends the software authentication agent 9 containing advertisement to a new information consumer 6 through e-mail and the new information consumer 6 confirms 4 it, the software authentication agent 9 promptly notifies the ad company 1 of who is advertisement recommender 2 and who is consumer 6 in place of the information consumers 2 and 6. Then the ad company 1 gives benefits 5 and 8 to the consumers. Therefore, this flow is a way that the cost of act of the recommender 2 is first guaranteed.
  • the refundable agent transfer type advertisement and advance- recommendation compensation are possible through the authentication agent according to the present invention.
  • the transfer type advertisement shown in FIG. 3 roles of the authentication agent in the information providing method of the present invention will be described in more detail as follows.
  • the company 1 which provides information for advertisement of products or goods or for selling or information source 10 for search, the information consumer 2, who consumes and circulates the information and information source finally, and a web site operator 11, who intermediates such information and information source on a network such as the Internet according to the information providing method of the present invention.
  • the company 1, who is a sponsor providing the information source 10 provides the information mediator 11 with original information source 10.
  • the information mediator 11 provides refundable and payable information 12 to the information consumer 2 through the agent 9 (for the convenience, in this point, the agent 9 is considered as a man) without the demand of information such as member registration.
  • the agent 9 is employed to the information mediator 11, a proper authentication key 1, which has a clear discrimination property like a fingerprint or a gene, and a unique discrimination symbol of the agent 9 are recorded and stored to the information mediator 11. Therefore, the agent 9 performs the discrimination of private information, which the information consumer 2 is unwilling to expose, in place of the information consumer 2. After that, the agent 9 finds the initial information consumer 2 informed by the information mediator 11 (in fact, recommended by the former information consumer). When the agent 9 meets the information consumer 2, the information consumer confirms 4 the refundable (e.g. advertisement) and payable (e.g. purchase) information provided from the agent.
  • refundable e.g. advertisement
  • payable e.g. purchase
  • the agent 9 leaves a certificate 14, which includes the authentication key 13 (fingerprint or gene) and the visit number of the agent in an account book or a depository managed by the information consumer 2. Moreover, the agent 9 records the fact, that the information consumer confirms the provided information, in a recordable medium, and the contents recorded in the medium are the agent's authentication key 13 and the visit number notified to the information consumer. At the same time, the agent can notify the discrimination symbol representing the agent's authentication key 13 or authentication and the visit number to the information mediator 11 through a purchasing notification 15 by using a communication device communicated with only the information mediator. Especially, at this time, if confirming payable information, the information consumer 2 notifies information of purchased product delivery 16 to the agent 9 and the agent notifies information of the purchased product delivery 16 to the information mediator 11.
  • the agent 9 moves 10 to the recommended information consumer.
  • the agent adds and stores a next visit number.
  • the agent 9 moves to an extent of the initially fixed visit number, or repeatedly moves before the movement is stopped through communication with the information mediator 11 or until the information consumer 2 recommends no more.
  • the information consumer 2 takes out the authentication keys 13 and the visit numbers, which many agents have left, from the account book or the depository and submits to the information mediator 11 in bulk or separately.
  • the information mediator compares and confirms 7 each agent's authentication key 13 and visit number with previously recorded contents to know the agent's authentication key 13 and visit number are correct.
  • the information consumer 2 can obtain refund 5 up to a value (like cash) of the provided refundable information.
  • the information mediator 11 can provide the company 1 with the number of agent authentication provided 18 by the information consumer 2 or with the number previously notified by the agent 9 as the exact number of exposed information, and perform the corresponding computation 19.
  • the authentication agent 9 when the information consumer 2 meets and circulates information, especially refundable information 12, through the agent 9, the business model can be carried out without demanding any private information not opened to the public.
  • the authentication agent 9 is set and described as the man agent.
  • the authentication agent When the business model is carried out in the Internet environment, the authentication agent must perform to be fit for the purpose by moving and communicating through the network.
  • the agent is operated in the information consumer's device such as a computer connected to the network.
  • the authentication agent which is the software agent according to the present invention, must be embodied through software and systems.
  • the software and the systems have to be accepted by those skilled programmers in the art, the programmers sufficiently understanding the following steps.
  • the authentication agent 9 includes a data division 20 having two data and a function part 21 having three functions.
  • the data division 20 includes a gene key 13(for convenience, represented as the gene key because having the same property as the gene of human) serving as the authentication key and information contents 12.
  • the gene key 13 is a series of data aggregate for demonstrating uniqueness given when the software authentication agent 9 is generated from a central authentication data center 30 shown in FIG. 7.
  • the gene key 13 is contained in the software authentication agent 9 and separated only when the information contents 12 is consumed.
  • the central authentication data center 30 records which software authentication agent 9 contains the gene key 3. If the agent's unique data and information value included in the data division 20 are refundable, the gene key 13 holds index for verifying how much value the data and information have.
  • Another data is information contents 12, such as advertisement or research, which is transmitted and recognized to the information consumer by the software authentication agent 9.
  • the information contents 12 are divided into refundable information and payable information.
  • the function part 21 includes a display part 22 for displaying advertisement or research, a separate processing part 23 reproducing and generating the gene key 13 and recording the gene key 13 into the information consumer's storing device, and a communication processing part 24 for communicating with the authentication center 30, which sends the authentication agent 9.
  • the display part 22 of the function part 21 displays formatted data, such as HTML, GIF, AVI, etc., hold in a data area to the information consumer.
  • the gene key reproduced, generated and recorded by the separate processing part 23 is used as means for allowing the information consumer to request refund to the information provider or for submitting for authentication of purchase. Referring to FIG. 7, a method for processing service of the software authentication agent will be described as follows.
  • the software authentication agent 9 is transmitted from the central authentication data center 30 to the information consumer through the Internet 3 in the form of e-mail 31.
  • the information consumer can download the authentication agent 9 from a web site operated by the authentication center.
  • the information consumer's e-mail address may be one of e-mail addresses recommended from the former information consumer.
  • the transmitted authentication agent 9 is operated in the information consumer's computer by the information consumer's reading order 34, shows the stored information contents 12 such as refundable and payable information to the information consumer and makes the information consumer to confirm 35 it.
  • the progress of the software authentication agent 9 is divided into two ways.
  • the gene key 13 of the software authentication agent 9 is generated 39 by the reproduction 37 and recorded 40 in the information consumer's memory.
  • the reproduced and generated gene key 39 is exchanged into cash 43 or products if the information consumer, who wants to receive refund, provides a settlement 42 with required information, such as bank accounts or address, to the web site 41 operated by the central authentication center 30.
  • the use of the gene key is recorded into the authentication center 30, and thus duplication of the settlement is prevented.
  • the authentication agency is provided as a preferred embodiment of the present invention, for moving the software authentication agent 9 in an exclusive communication method.
  • the authentication center 30 transmits a new software authentication agent having such gene key 13 and address to a new address. After that, the same flow is applied to the next information consumer.
  • the information consumer can recommend new information consumers for obtaining costs of the information circulation by inputting e-mail address of the new consumers to the authentication agent.
  • the authentication agent moves to the new consumer according to the movement method provided in this invention.
  • the movement of the authentication agent according to the present invention is different from a transfer of e-mail attached file through a function such as duplication by e-mail system processing tools and operating system usable by the information consumer. If the authentication agent is moved through the transfer of the e-mail system, it will bring about a result that the information consumer transfers the refundable certificate to other information consumer.
  • the communication function of the authentication agent according to the present invention can solve the above problem because the information mediator can confirm whether or not the movement is performed from the authentication center in a right method. The reason is that movement procedure is effectively performed through a support system of the authentication center, which will be described later, when the authentication agent moves to the new consumer's address using the communication function hold in the authentication agent.
  • the movement of the authentication agent is performed in such a manner that the authentication agent sends the agent's gene key with the new consumer's address to the authentication center and the authentication center generates a next authentication agent through the gene key and sends the new authentication agent holding the new gene key to the new consumer's address.
  • the authentication center can prevent the duplication of the authentication keys when the authentication agent generates the gene key, i.e., authentication key for demonstrating its refundable value or in a proper condition capable of communicating with the authentication center.
  • the authentication agent operated by the unsuitable movement of the authentication agent is stopped in providing the gene key.
  • the gene key of the authentication agent according to the present invention is data testifying its uniqueness like the human's authentication (fingerprint and gene). However, because data duplication in the computer may be easily performed, to testify the uniqueness like the human's authentication, an unduplicated method and an unrejectable authentication method are needed.
  • the authentication agent the authentication agent generates coded authentication key based on algorithm generating a series of coded data impossible to reproduce. According to coding methods well known in this field, the algorithm is generated on the basis of the authentication agent's discrimination data generated when the authentication agent is generated and discrimination data, which is input by the information consumer and will be provided later for authentication and which only the information consumer knows.
  • the gene key generated by the above can be decoded later based on algorithm, which only the information mediator knows.
  • the movement of the authentication agent can be performed also through the common e-mail system without the system of the authentication center.
  • the other method there is a method that the authentication key is provided from the authentication center system and only the provided authentication key is compared and authenticated by the authentication center system.
  • the construction of the system can allow the authentication, effective reduce network traffic by communicating only the authentication key of the authentication agent, and make a new authentication agent through a central control.
  • the authentication key is always generated through examination in the authentication center for guarantee not to have virus property.
  • a specific viewer may be used or arbitrary viewer such as a web browser supported from the consumer's device may be used. That is, data for display can be displayed through all methods reproducible by the consumer's device.
  • the authentication agent can have functions capable of commonly or separately communicating and all functions acceptable from the information consumer's device can perform directly or indirectly.
  • a method for transmitting the authentication agent to a client a method for transmitting to a server or the client in an attached file form through the e-mail system or a method for transmitting through the HTTP or an FTP, which are common protocol, may be adopted.
  • the authentication agent is transmitted using communication by a VPN(Virtual Private Network) on the network and Internet in aspects of security, simplification of process and usefulness.
  • the VPN forms a system to independently transmit information between the authentication agencies or between the authentication agents in other user's device connected to the network and Internet by installing a management S/W (hereinafter, called "authentication agency") previously provided from the information mediator according to the demand of the information consumer.
  • authentication agency a management S/W (hereinafter, called "authentication agency") previously provided from the information mediator according to the demand of the information consumer.
  • the role of the authentication agency may not be required. However, it is preferable to install the authentication agency in the information consumer's computer for constructing the effective system.
  • the authentication agency 50 includes an authentication agent DB 45 for collecting and managing the software authentication agents 9, a gene key DB 47 for storing the gene authentication keys 13 generated by the authentication agents 9, which the information consumer 2 confirms 46 and operates, and a communication part 49 for communicating with other authentication agency or authentication center 30.
  • the authentication agency 50 can be downloaded from the central authentication data center 30 of the information mediator or installed in the information consumer's computer through medium such as a CD containing the authentication agency.
  • the authentication agency 50 in the computer, in which the authentication agency 50 is installed, can effectively manage the authentication agents 9 according to the flow shown in FIG. 5.
  • the authentication agency 50 when the authentication agent 9 reaches the information consumer's computer under the communication system, such as the Internet, capable of detecting service of the e-mail transfer system or the authentication agency 50, the authentication agency 50 promptly stores the transmitted authentication agent 9 into the authentication agent DB 45. At this time, the authentication agent 9 transmitted through e-mail 51 is stored in the authentication agent DB 45 before being opened.
  • the authentication agents which do not reach the authentication agency 50, may be directly performed, as shown in FIG. 7.
  • the authentication agent 9 waiting in the authentication agent DB 45 represents each information contents 12 by the information consumer's reading 34 order, and at the same time, reproduces and separates the gene key 13 of the authentication agent 9.
  • the separated gene key 39 serves as an electronic coin 54 and stores in the gene key DB 47 included in the authentication agency 50.
  • the gene keys 39 are sent to the authentication center 30 through the communication part 49 and transferred into cash.
  • the gene key 13 having the confirmed information contents 12 records the confirmed state and is transmitted to the authentication center 30 through the communication part 49 of the authentication agency 50 in a state that required information is capsuled by the information consumer's recommendation transferring 56 order.
  • the central authentication data center 30 transmits the new authentication agent to a new authentication agency or a new e-mail address through information of the transmitted gene key 13. The above process is carried out repeatedly.
  • the gene keys 13 and 39 collected in the DBs 45 and 47 can be referred and transferred to a medium such as a diskette through a recording method such as file.
  • the authentication agency may be programmed to have additional functions as follows.
  • the authentication agency can provide a service such as chatting through an Internet communication infra exclusively constructed between the authentication agencies. That is, the authentication agency can perform all services programmable and applicable to communication technique based.
  • the authentication agency can provide database capable of managing and dividing the authentication agents. Preferably, if a service for reusing information contents provided to the information consumer into knowledge is provided, it will be better.
  • the authentication agency can be directly provided with only the authentication key and data having refundable and payable information from the authentication center without being provided with the authentication key of the authentication agent.
  • the authentication key from the authentication center can be directly managed by the authentication agency in storing, keeping and transmitting the authentication key and information contents, like the authentication key provided from the authentication agent. Additionally, the provided information may be managed for reference and confirmation.
  • the information consumer's computer, in which the authentication agency is installed, can successfully perform the objects of the present invention without the action of the authentication agent.
  • the authentication center 30 includes a database having a round DB 61 for storing template authentication agent, which is the software authentication agent, a main DB 62 for storing transfer requiring data and required information provided by the information provider for target marketing, an authentication agency DB 63 for storing the current position of the authentication agency, and a mileage DB 64 for recording and storing the information consumer's mileage, an authentication agent generating engine 65, an exclusive communication function 66 for communicating with the authentication agency and a communication function 67 for communicating with the general e-mail system.
  • template authentication agent which is the software authentication agent
  • main DB 62 for storing transfer requiring data and required information provided by the information provider for target marketing
  • an authentication agency DB 63 for storing the current position of the authentication agency
  • a mileage DB 64 for recording and storing the information consumer's mileage
  • an authentication agent generating engine 65 for communicating with the authentication agency
  • a communication function 67 for communicating with the general e-mail system.
  • the authentication agent generating engine 65 provides the authentication key to the template authentication agent or searches the template authentication agent from the authentication key provided from the former authentication agent and provides a new authentication key.
  • the main DB 62 stores the same authentication key as the initial or reproduced authentication agent or coded key comparable to the authentication key of the initial or reproduced authentication agent and stores peculiar properties related to the refundable or payable information of each authentication agent.
  • the mileage DB 64 stores data, such as bank accounts, capable of confirming the accounts, which the information consumer must settle, and profit to be refunded to the consumer. The authentication key can access to the mileage DB 64 and confirm data stored in the DB 64.
  • the authentication agency DB 63 manages data related with a transfer time required for the exclusive communication with the authentication agency and the transfer number and the current position of the authentication agency.
  • the software authentication agent is manufactured 69 into the contents suitable for transfer and stored in the database 61 of the authentication center as the template, which is the round software authentication agent. If the transfer requiring data with information provided by the information provider are stored in the database 62, as shown in FIG. 8, the database 62 prepares a new software authentication agent. The new software authentication agent will be transmitted to the client secured through the gene key 72 and transfer information returned into the authentication center by the information consumer's recommendation or to the client who the information provider operating the authentication center secures. After that, in case of the initial client who does not have the software authentication agency 50 shown in FIG.
  • the database 62 generates a new software authentication agent by combining the template, the gene key and transfer information, takes out a proper transfer requiring data and transmits it through the e-mail function 67.
  • the position found through the exclusive communication function 66 when the software authentication agency is installed is stored in the database 63.
  • transfer requiring data of the information provider is compared with the position of the software authentication agency and transmitted to the software authentication agency called the camp.
  • the exclusive communication does not respond in an offline state, the communication means is converted into the e-mail transfer method. If the exclusive communication is in an online state, data is directly transmitted. If the transmission is succeeded and the client operates the software authentication agent, response 71 of the transfer success and completion of information use is sent to the authentication center.
  • the authentication center records the responded information into the mileage DB 64 to return proper benefit to the corresponding client.
  • the authentication agent according to the present invention is generated in the authentication center, includes refundable and payable information and is provided with the authentication key when being generated. At this time, similar or the same authentication key is stored in the authentication center.
  • Such authentication agents are continuously distributed to the information consumer through the e-mail system or the exclusive communication function with the authentication agency.
  • the information consumer accumulates the refundable value.
  • the consumer requests the settlement authentication system of the authentication center to submit the authentication key of the authentication agent and compares and confirms with the previously hold authentication key.
  • the refundable value accumulated in the DB can be paid.
  • management of the authentication key file is responsible to the information consumer based on the provisions, like the case that the responsibility caused by loss of the information consumer's ID and password lies with the consumer.
  • the authentication center system can totalize the payment contents to show an exposure rate of information to the information provider.
  • the authentication center system can previously monitor supply rate and exposure rate of information through the communication function of the authentication agent and have a proper adjusting system acceptable to the information consumer.
  • the authentication, settlement and adjustment functions of the authentication center system may be processed in separate server systems.
  • the present invention is not restricted to the above embodiment that the information consumer first confirms the refundable value, accumulates it and submits the accumulated authentication keys to settle the accounts.
  • the authentication agent must be previously programmed to present the information provider's information.
  • Such program may be manufactured through a well-known method.
  • the authentication agent is transferred and operated to the information consumer's computer, thereby representing information contents as shown in FIG. 11.
  • the authentication agent can have additional programs and it is generally recognized from the information consumer as the electronic coin. However, it is not needed to manufacture the authentication agent to the extent of the same number required by the information provider. The reason is that since information supply demand by the same provider is the same information supply, only the authentication agent having different authentication keys is manufactured.
  • the template authentication agent is manufactured 75 before the authentication key is provided.
  • the template authentication agent is directly manufactured 75 through a template authentication agent manufacturing machine provided by the information mediator.
  • the information mediator is a businessman of the business model, transferred to the information mediator 76/77 to represent the information supply.
  • the information provider can transfer 76/77 information 78, such as advertisement, and information 79 related to information supply such as a supply amount, supply value, etc. to a supply agency.
  • the supply agency manufactures the authentication agent to represent the information provider.
  • the information provider and the information mediator make a contract 80 and computes costs of the supply representation, which will be caused later.
  • template authentication agent is stored in a template DB 81 and a control DB 82 is constructed for controlling supply related information and action of the authentication agent.
  • information of each information provider is applied according to fields, such as information type (A, B,.), value ($1.0, -$1.5, ...), and issue number (1000, 500, ...) in one table 83.
  • the table 84 has various fields, such as related key, consecutive number, authentication key provided without a rule, confirmation of the information consumer, and recommendation number.
  • the second table has the authentication key provided when the authentication agent is manufactured from the template authentication agent.
  • the manufactured 85 authentication agent 86 has its own value and authentication key.
  • the manufactured authentication agent is provided 87 to the information consumer through the e-mail system or the communication infra constructed by the information mediator.
  • the authentication agent can take different transmitting methods.
  • a first method (A) is to transmit the authentication agent to the information consumer.
  • a second method (B) is to send information data and authentication key data through communication between the authentication agency, which is program utility previously distributed for transmitting the authentication key to the information consumer, and the authentication center.
  • a third method (C) is to provided the authentication key by allowing the information consumer to confirm information using the web browser on the web site operated by the authentication center.
  • the authentication agency is installed in the information consumer's computer and operated as shown in FIG. 14.
  • the arrow represents a dynamic movement for entering into the software authentication agency after the software authentication agent is operated.
  • the authentication agency has additional programs and is recognized as an electronic purse.
  • the authentication key may be transmitted to the information consumer by the above method.
  • information may be provided to the information consumer through the authentication agent, and it is processed according to the flow of FIG. 15.
  • the information consumer confirms 88 information provided through the e-mail system or the exclusive communication infra previously constructed by the information mediator.
  • the authentication agent transforms, duplicates the hold authentication key into acceptable form and stores 89 into file.
  • a procedure of program prepared for inputting the recommender' s e-mail address is performed.
  • the authentication agent is returned with a list of names of the input recommenders to the authentication center according to the information consumer's transfer order.
  • the communication protocol for the transmission is the exclusive communication means for security.
  • the transmitted authentication key can be searched 93 in the control DB. If the authentication key is not searched, information is not manufactured and provided from the authentication center, and thus it can be invalidated 94.
  • the searched authentication key is provided with a new authentication key from the template authentication agent DB as being recommended newly.
  • the new authentication agent is manufactured 95 and transmitted to the recommended information consumer through the e-mail system 96. At this time, the authentication center maintains the record for paying additional cost of the information circulation to the former information consumer 97.
  • the information consumer transmits or submits the authentication key file 98 provided by the authentication agent.
  • FIG. 16 illustrates a state that when information consumer operates the software authentication agent and information is consumed, the authentication agent inputs required information for changing the gene key divided from the authentication agent (in the drawing, named as reserve authentication key) to cash on the web site and the reserved gene keys are transmitted.
  • the submitted authentication key is researched in the control DB. If not researched, the authentication key is invalidated. Because the authentication key is always peculiar by information type every authentication agent, authentication agent is not duplicated and cannot be misappropriated because being data, which only the authentication center can know. Continuously, since there is possibility that the former settlement is provided again to the information consumer, the authentication agent verifies 112 whether or not the data is settled beforehand. If the verification is passed well, the authentication agent determines as a normal condition for the settlement and confirms 113 in the settlement confirmation field not to request resettlement. Finally, the information consumer receives the cost according to a common account transfer procedure 114.
  • the settlement authentication system guaranteeing payment of cost, that the information consumer has consumed and circulated, without outflow of private information besides opened e-mail in the Internet environment can be constructed.
  • the information mediator can provide objective data to the company and the company can pay the agent cost to the information mediator. Additionally, the authentication agent can safely move to the recommended place.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Cette invention a trait à une méthode de fourniture d'informations ainsi qu'au système correspondant, permettant de procéder à une authentification à la place d'un consommateur d'information, dans des conditions garantissant la sécurité et sans exposer l'information privée du consommateur d'information, par le biais d'un agent d'authentification ayant des contenus informationnels et une clé d'authentification comme agent logiciel. Dans un réseau et des environnements Internet, lorsque une publicité de remboursement est fournie, la méthode selon l'invention permet de procéder à une authentification à la place du consommateur d'information sans rendre publique l'information privée concernant le consommateur. De ce fait, sans aucun coût indirect, le consommateur d'information reçoit et fait circuler une information de remboursement ou de payement ou acquiert des biens, obtenant ainsi des disponibilités ou des biens en tant que coûts d'une consommation accumulée de l'information de remboursement. Un fournisseur d'information et un médiateur sont en mesure de traiter ensemble une affaire grâce à la fourniture d'une information objective et à l'évaluation du taux de consommation.
PCT/KR2001/000393 2000-03-15 2001-03-14 Methode de fourniture d'informations avec agent d'authentification sur l'internet et systeme a cet effet WO2001071596A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU44749/01A AU4474901A (en) 2000-03-15 2001-03-14 Information providing method having authentification agent on internet and embodying system therefor

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR1020000012975A KR20000030758A (ko) 2000-03-15 2000-03-15 인터넷상에서 정보를 제공함에 있어 인증을 대리하는방법을 갖춘 정보 마케팅 사업 모델과 기술적 구현 방법및 시스템
KR2000/12975 2000-03-15
KR10-2001-0009365A KR100478999B1 (ko) 2000-03-15 2001-02-23 인증 대리 수단을 갖춘 인터넷 상에서의 정보 제공방법 및그 구현 시스템
KR2001/9365 2001-02-23

Publications (1)

Publication Number Publication Date
WO2001071596A1 true WO2001071596A1 (fr) 2001-09-27

Family

ID=26637496

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2001/000393 WO2001071596A1 (fr) 2000-03-15 2001-03-14 Methode de fourniture d'informations avec agent d'authentification sur l'internet et systeme a cet effet

Country Status (2)

Country Link
AU (1) AU4474901A (fr)
WO (1) WO2001071596A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002063501A2 (fr) * 2001-02-09 2002-08-15 Remote-I Corporation Procede et appareil d'echange de donnees medias numeriques

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5129084A (en) * 1989-06-29 1992-07-07 Digital Equipment Corporation Object container transfer system and method in an object based computer operating system
US5446901A (en) * 1993-06-30 1995-08-29 Digital Equipment Corporation Fault tolerant distributed garbage collection system and method for collecting network objects
US5603031A (en) * 1993-07-08 1997-02-11 General Magic, Inc. System and method for distributed computation based upon the movement, execution, and interaction of processes in a network
US5794210A (en) * 1995-12-11 1998-08-11 Cybergold, Inc. Attention brokerage

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5129084A (en) * 1989-06-29 1992-07-07 Digital Equipment Corporation Object container transfer system and method in an object based computer operating system
US5446901A (en) * 1993-06-30 1995-08-29 Digital Equipment Corporation Fault tolerant distributed garbage collection system and method for collecting network objects
US5603031A (en) * 1993-07-08 1997-02-11 General Magic, Inc. System and method for distributed computation based upon the movement, execution, and interaction of processes in a network
US6016393A (en) * 1993-07-08 2000-01-18 General Magic, Inc. System and method for distributed computation based upon the movement, execution, and interaction of processes in a network
US5794210A (en) * 1995-12-11 1998-08-11 Cybergold, Inc. Attention brokerage

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002063501A2 (fr) * 2001-02-09 2002-08-15 Remote-I Corporation Procede et appareil d'echange de donnees medias numeriques
WO2002063501A3 (fr) * 2001-02-09 2003-04-03 Remote I Corp Procede et appareil d'echange de donnees medias numeriques

Also Published As

Publication number Publication date
AU4474901A (en) 2001-10-03

Similar Documents

Publication Publication Date Title
US7542943B2 (en) Computer services and methods for collecting payments from and providing content to web users
US7356507B2 (en) Network based user-to-user payment service
US7536351B2 (en) User-to-user payment service with payee-specific pay pages
AU2001251286B2 (en) System, method and apparatus for international financial transactions
US8577744B2 (en) System and method for effecting auction item payments through a network portal
US7599856B2 (en) Detection of fraudulent attempts to initiate transactions using modified display objects
US7653576B2 (en) Method for pricing items
US9105059B2 (en) Electronic commerce system utilizing custom merchant calculations
US20080071640A1 (en) Portal for commercial transactions
US20030208406A1 (en) Method and apparatus for processing one or more value bearing instruments
JPH11296587A (ja) 電子モールサーバ,電子モールクライアント,電子モールシステム及び記憶媒体
AU2001251286A1 (en) System, method and apparatus for international financial transactions
US20080306877A1 (en) Secure Internet E-Commerce
JP2001216441A (ja) 電子トークンを用いて電子商取引を実行する方法
JP2004513422A5 (fr)
KR100313582B1 (ko) 전자상행위의 통합 및 분산 관리 시스템과 서비스 방법
KR100478999B1 (ko) 인증 대리 수단을 갖춘 인터넷 상에서의 정보 제공방법 및그 구현 시스템
US20020042718A1 (en) Point of purchase dynamic architecture
WO2001071596A1 (fr) Methode de fourniture d'informations avec agent d'authentification sur l'internet et systeme a cet effet
KR20020005995A (ko) 사이버머니를 이용한 결제 시스템 및 그 방법
EP1360663A2 (fr) Procede et appareil de creation d'un ou plusieurs instruments porteur de valeurs
JP2003132255A (ja) スタンプサービスポイント管理装置およびスタンプサービスポイント管理方法
KR100831542B1 (ko) 인터넷을 통한 원스톱 자금이체 서비스 방법
JP2002245316A (ja) ポイント還元方法、センタ装置、店舗装置、及びポイント還元プログラム
JP2002049859A (ja) オンライン・プリペイド課金管理システム

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP