WO2002059818A1 - Procede destine a une fonction de contrat de depot au cours d'une transaction utilisant un cadre de base de donnees d'adresses electroniques/physiques - Google Patents

Procede destine a une fonction de contrat de depot au cours d'une transaction utilisant un cadre de base de donnees d'adresses electroniques/physiques Download PDF

Info

Publication number
WO2002059818A1
WO2002059818A1 PCT/US2001/002902 US0102902W WO02059818A1 WO 2002059818 A1 WO2002059818 A1 WO 2002059818A1 US 0102902 W US0102902 W US 0102902W WO 02059818 A1 WO02059818 A1 WO 02059818A1
Authority
WO
WIPO (PCT)
Prior art keywords
mail address
buyer
utilizing
electronic mail
network
Prior art date
Application number
PCT/US2001/002902
Other languages
English (en)
Inventor
John Eric Peters
William A. Morris
Original Assignee
Accenture Llp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Accenture Llp filed Critical Accenture Llp
Priority to PCT/US2001/002902 priority Critical patent/WO2002059818A1/fr
Priority to CA002436608A priority patent/CA2436608A1/fr
Publication of WO2002059818A1 publication Critical patent/WO2002059818A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • the present invention relates to shipping parcels, and more particularly to shipping parcels purchased from a network-based retailer in an e-Commerce environment.
  • a method for an escrow function in conjunction with providing an intermediary role between a buyer and a seller utilizing a network First, an agreement is facilitated between a buyer and a seller to transact utilizing a network. Next, an electronic mail address is received from the buyer utilizing the network. Payment is then accepted from the buyer for goods being sold by the seller utilizing the network. Thereafter, the payment is held. The seller is then provided with the electronic mail address for shipping the parcel. In operation, the shipping entity is capable of utilizing the electronic mail address to determine a physical mail address of the buyer, and tracking a location of the goods during the shipment thereof. Only after verification by the shipping entity of the receipt of the goods by the buyer is the payment released to the seller.
  • the verification of the receipt of the goods is received utilizing the electronic mail address.
  • the shipping entity may also be provided with an electronic mail address of the intermediary such that the intermediary receives the verification.
  • the agreement maybe facilitated by providing an auction environment utilizing the network.
  • the payment may take the form of a digital wallet, and/or a credit card number.
  • Figure 1 is a schematic diagram of a network implementation of one embodiment of the present invention
  • Figure 2 is a schematic diagram of a hardware implementation of one embodiment of the present invention.
  • Figure 3 is a flow diagram illustrating a method of registering users in a database in accordance with one embodiment of the present invention
  • FIG. 4 is a flow diagram a shipper-based electronic/physical mail address database architecture in accordance with one embodiment of the present invention
  • Figure 5 is a flow diagram illustrating a method of handling a change of address in a database in accordance with one embodiment of the present invention
  • Figure 6 is a cut away view of the scanner pen showing the working parts at a first point during a scan of a text set
  • Figure 7 is the same cut away view of the scanner pen showing the scan at a later part of the scan of text characters
  • Figure 8 is a cut away view of the scanner pen form a view taken at approximately 90 degrees from that shown in Figure 6 and Figure 7;
  • Figure 9 shows an alternate manner of coupling a leading (trailing) text element to the first element of the scan array or to a separate single detector element;
  • Figure 10 shows yet another method of bringing the scanned text and the leading text element to a single discrete detector or to the first element of the scanning array
  • Figure 11 is a flow diagram illustrating a retail-based transaction using a database in accordance with one embodiment of the present invention.
  • Figure 12 is a flow diagram illustrating a buyer-based transaction using a database in accordance with one embodiment of the present invention
  • Figure 13 is a schematic diagram of a system of enabling secure electronic payments over an unsecured network according to a preferred embodiment of the invention
  • Figure 14 is a flow diagram illustrating method of verifying an age of a buyer during an e-
  • Figure 15 is a flow diagram illustrating an electronic mail address validation scheme during an e- Commerce transaction using a database in accordance with one embodiment of the present invention
  • Figure 16 is a flow diagram for an electronic delivery confirmation using a database in accordance with one embodiment of the present invention.
  • Figure 17 is a flow diagram for an escrow function using a database in accordance with one embodiment of the present invention.
  • Figure 18 is a block diagram schematically showing the structure of an electronic mail system according to an embodiment of the invention.
  • Figure 19 is a diagram showing the arrangement of data in a mail
  • Figure 20 is a flowchart schematically showing processing performed by an electronic mail terminal utility
  • Figure 21 is a flowchart schematically showing processing performed by an electronic mail terminal utility
  • Figure 22 is a flowchart showing the details of the attachment file register processing of Figure 20;
  • Figure 23 is a flowchart showing the details of the attachment file analysis processing of Figure 21;
  • Figure 24 is a diagram showing one example of the contents of a folder table
  • Figure 25 is a flowchart showing the details of the condition defining processing of Figure 21.
  • Figure 26 is a flowchart illustrating a method for selective advertising using the mailing system of the present invention.
  • FIG. 1 is a schematic diagram of a network implementation of one embodiment of the present invention.
  • a database 100 is established which has a plurality of a physical mail addresses each of which has an associated electronic mail address.
  • the physical mail addresses may include a name, street address, city and zip code.
  • the electronic mail address includes a user name, first level domain name, and second level domain, i.e. iohndoe( ),usps.gov, etc.
  • a plurality of postal service centers, or shippers, 102 each of which is capable of accessing the database 100.
  • Such connection may be established using a network, i.e. LAN, WAN, wireless, the Internet, etc.
  • the shippers may include any business or government entity which is capable of shipping parcels, goods, etc. to physical mail addresses.
  • the electronic mail addresses may be written, stamped, typed, encoded, or otherwise applied to parcels, and the shippers 102 are capable of accessing the database 100 to enter the electronic mail addresses for the purpose of retrieving the associated physical mail addresses.
  • the shippers 102 are adapted to ship parcels without requiring the physical mail address to be situated on the parcel. This provides privacy, security, and enables numerous services which will be set forth hereinafter in greater detail.
  • access to the database 100 may also be gained via the Internet 104 which is connected thereto.
  • a server 103 may act as an interface to the database, as shown in Figure 1. This allows retailers 106 and buyers 108 to access services rendered by the server 103.
  • the server may provide electronic mailing, or various other services during business transactions over the Internet including, but not limited to e-mail shopping, e-mail shipping, and age verification.
  • Email shopping may be facilitated by providing the ability to purchase goods over the internet with only an email address as one's identification.
  • the email address may provide consumer protection in that physical mail addresses does not have to be provided over the internet.
  • a digital wallet may be used for payment,, thus eliminating the need to provide credit card information or personal address information over the internet. A much higher level of consumer protection is thus afforded.
  • the consumerVpurchaser may provide their registered email address with a valid digital certificate to an on-line retailer or party with which they wish to do business.
  • the retailer could request validation of the consumer's digital certificate in order to authenticate the certificate.
  • the consumer would then select their items for purchase and the consumer would initiate the purchase transaction.
  • Payment can be made by providing the retailer either with or without specific personal payment information, hi the case of providing personal payment information, the consumer may provide a credit card, checking account or other personal or business account information. In the other methods the consumer may provide the retailer with an alias account number, digital wallet account, smart card, reference number or any other initiation method that is independent of the consumer's personal financial account mformation.
  • the transaction may be completed.
  • the retailer or retailer's agent may apply an email shipping address to the outbound parcel.
  • the shipper delivers the parcel to the buyer's physical mail address location.
  • the retailer can be any party that sells or bills for goods or services over the internet.
  • the consumer may be anyone that purchases goods over the internet.
  • Email shipping involves the ability to ship a parcel or letter with an email address and translate the email address to a physical mail address for residential or commercial delivery.
  • parcelsMetters are taken to a consolidator point(s) where a shipper may look up the email address and associate it with physical mail address location.
  • the capability to send an email as part of the delivery confirmation process could be accomplished since there is an email address attached to a physical mail address.
  • the email address could be assigned to the delivery confirmation number. From that point forward, every time the confirmation of a parcel is scanned an email address could be sent to the shipper notifying the shipper of the movement of the parcel.
  • Age verification on the internet is accomplished by associating a name and age to a digital certificate.
  • an individual may show one or two forms of valid identification and be assigned a Certificate Authority based on whether they are 18, 19, 20 or 21 and older. They can then purchase items over the internet that are age restricted.
  • a site requires an age check of the individual, it may check the digital certificate authority.
  • the person requesting the email address may show a proof of age and would be assigned an email address with the age or birth date associated with the certificate authority.
  • a birth date or age may then be associated with a digital certificate authority or in a database with a digital certificate authority.
  • the vendor of that site may access that person's Digital Certificate Authority for proof of age. After the age has been verified the individual may be able to then access age sensitive information on the site. Perhaps more important that permitting the purchase of items is the fact that it would not allow minors to view this type of information.
  • the present technique may be used during access to adult sites, R rated movie trailers, Tobacco, Alcohol, Firearms, Financial transactions where age is important
  • FIG. 2 illustrates a typical hardware configuration of a workstation in accordance with a preferred embodiment having a central processing unit 210, such as a microprocessor, and a number of other units interconnected via a system bus 212.
  • a central processing unit 210 such as a microprocessor
  • the workstation shown in Figure 2 includes a Random Access Memory (RAM) 214, Read Only Memory (ROM) 216, an I/O adapter 218 for connecting peripheral devices such as disk storage units 220 to the bus 212, a user interface adapter 222 for connecting a keyboard 224, a mouse 226, a speaker 228, a microphone 232, and/or other user interface devices such as a touch screen (not shown) to the bus 112, communication adapter 234 for connecting the workstation to a communication network (e.g., a data processing network) and a display adapter 236 for connecting the bus 212 to a display device 238.
  • RAM Random Access Memory
  • ROM Read Only Memory
  • I/O adapter 218 for connecting peripheral devices such as disk storage units 220 to the bus 212
  • user interface adapter 222 for connecting a keyboard 224, a mouse 226, a speaker 228, a microphone 232, and/or other user interface devices such as a touch screen (not shown) to the bus 112
  • the workstation typically has resident thereon an operating system such as the Microsoft Windows NT or Windows/95 Operating System (OS), the IBM OS/2 operating system, the MAC OS, or UNIX operating system.
  • OS Microsoft Windows NT or Windows/95 Operating System
  • IBM OS/2 operating system the IBM OS/2 operating system
  • MAC OS the MAC OS
  • UNIX operating system the operating system
  • OOP Object oriented programming
  • OOP is a process of developing computer software using objects, including the steps of analyzing the problem, designing the system, and constructing the program.
  • An object is a software package that contains both data and a collection of related structures and procedures. Since it contains both data and a collection of structures and procedures, it can be visualized as a self- sufficient component that does not require other additional structures, procedures or data to perform its specific task.
  • OOP therefore, views a computer program as a collection of largely autonomous components, called objects, each of which is responsible for a specific task. This concept of packaging data, structures, and procedures together in one component or module is called encapsulation.
  • OOP components are reusable software modules which present an interface that conforms to an object model and which are accessed at run-time through a component integration architecture.
  • a component integration architecture is a set of architecture mechanisms which allow software modules in different process spaces to utilize each others capabilities or functions. This is generally done by assuming a common component object model on which to build the architecture. It is worthwhile to differentiate between an object and a class of objects at this point.
  • An object is a single instance of the class of objects, which is often just called a class.
  • a class of objects can be viewed as a blueprint, from which many objects can be formed.
  • OOP allows the programmer to create an object that is a part of another object.
  • the object representing a piston engine is said to have a composition-relationship with the object representing a piston, hi reality, a piston engine comprises a piston, valves and many other components; the fact that a piston is an element of a piston engine can be logically and semantically represented in OOP by two objects.
  • OOP also allows creation of an object that "depends from” another object. If there are two objects, one representing a piston engine and the other representing a piston engine wherein the piston is made of ceramic, then the relationship between the two objects is not that of composition.
  • a ceramic piston engine does not make up a piston engine. Rather it is merely one kind of piston engine that has one more limitation than the piston engine; its piston is made of ceramic.
  • the object representing the ceramic piston engine is called a derived object, and it inherits all of the aspects of the object representing the piston engine and adds further limitation or detail to it.
  • the object representing the ceramic piston engine "depends from" the object representing the piston engine. The relationship between these objects is called inheritance.
  • the object or class representing the ceramic piston engine inherits all of the aspects of the objects representing the piston engine, it inherits the thermal characteristics of a standard piston defined in the piston engine class.
  • the ceramic piston engine object overrides these ceramic specific thermal characteristics, which are typically different from those associated with a metal piston. It skips over the original and uses new functions related to ceramic pistons.
  • Different kinds of piston engines have different characteristics, but may have the same underlying fimctions associated with it (e.g., how many pistons in the engine, ignition sequences, lubrication, etc.).
  • a programmer would call the same functions with the same names, but each type of piston engine may have different/overriding implementations of functions behind the same name. This ability to hide different implementations of a function behind the same name is called polymorphism and it greatly simplifies communication among objects.
  • composition-relationship With the concepts of composition-relationship, encapsulation, inheritance and polymorphism, an object can represent just about anything in the real world, hi fact, one's logical perception of the reality is the only limit on determining the kinds of things that can become objects in object- oriented software.
  • Some typical categories are as follows:
  • Objects can represent physical objects, such as automobiles in a traffic-flow simulation, electrical components in a circuit-design program, countries in an economics model, or aircraft in an air-traffic-control system.
  • ® Objects can represent elements of the computer-user environment such as windows, menus or graphics objects.
  • An object can represent an inventory, such as a personnel file or a table of the latitudes and longitudes of cities.
  • An object can represent user-defined data types such as time, angles, and complex numbers, or points on the plane.
  • OOP allows the software developer to design and implement a computer program that is a model of some aspects of reality, whether that reality is a physical entity, a process, a system, or a composition of matter. Since the object can represent anything, the software developer can create an object which can be used as a component in a larger software project in the future.
  • OOP enables software developers to build objects out of other, previously built objects.
  • C++ appears to be the most popular choice among many OOP programmers, but there is a host of other OOP languages, such as Smalltalk, Common Lisp Object System (CLOS), and Eiffel. Additionally, OOP capabilities are being added to more traditional popular computer programming languages such as Pascal.
  • Class libraries are very flexible. As programs grow more complex, more programmers are forced to adopt basic solutions to basic problems over and over again.
  • a relatively new extension of the class library concept is to have a framework of class libraries. This framework is more complex and consists of significant collections of collaborating classes that capture both the small scale patterns and major mechanisms that implement the common requirements and design in a specific application domain. They were first developed to free application programmers from the chores involved in displaying menus, windows, dialog boxes, and other standard user interface elements for personal computers.
  • Frameworks also represent a change in the way programmers think about the interaction between the code they write and code written by others.
  • the programmer called libraries provided by the operating system to perform certain tasks, but basically the program executed down the page from start to finish, and the programmer was solely responsible for the flow of control. This was appropriate for printing out paychecks, calculating a mathematical table, or solving other problems with a program that executed in just one way.
  • event loop programs require programmers to write a lot of code that should not need to be written separately for every application.
  • the concept of an application framework carries the event loop concept further. Instead of dealing with all the nuts and bolts of constructing basic menus, windows, and dialog boxes and then making these things all work together, programmers using application frameworks start with working application code and basic user interface elements in place. Subsequently, they build from there by replacing some of the generic capabilities of the framework with the specific capabilities of the intended application.
  • Application frameworks reduce the total amount of code that a programmer has to write from scratch.
  • the framework is really a generic application that displays windows, supports copy and paste, and so on, the programmer can also relinquish control to a greater degree than event loop programs permit.
  • the framework code takes care of almost all event handling and flow of control, and the programmer's code is called only when the framework needs it (e.g., to create or manipulate a proprietary data structure).
  • a programmer writing a framework program not only relinquishes control to the user (as is also true for event loop programs), but also relinquishes the detailed flow of control within the program to the framework. This approach allows the creation of more complex systems that work together in interesting ways, as opposed to isolated programs, having custom code, being created over and over again for similar problems.
  • a framework basically is a collection of cooperating classes that make up a reusable design solution for a given problem domain. It typically includes objects that provide default behavior (e.g., for menus and windows), and programmers use it by inheriting some of that default behavior and overriding other behavior so that the framework calls application code at the appropriate times.
  • default behavior e.g., for menus and windows
  • Class libraries are essentially collections of behaviors that you can call when you want those individual behaviors in your program.
  • a framework provides not only behavior but also the protocol or set of rules that govern the ways in which behaviors can be combined, including rules for what a programmer is supposed to provide versus what the framework provides.
  • a framework embodies the way a family of related programs or pieces of software work. It represents a generic design solution that can be adapted to a variety of specific problems in a given domain. For example, a single framework can embody the way a user interface works, even though two different user interfaces created with the same framework might solve quite different interface problems.
  • a preferred embodiment of the invention utilizes HyperText Markup Language (HTML) to implement documents on the Internet together with a general-purpose secure communication protocol for a transport medium between the client and the Newco. HTTP or other protocols could be readily substituted for HTML without undue experimentation. Information on these products is available in T. Berners-Lee, D. Connoly, "RFC 1866: Hypertext
  • HTML Markup Language - 2.0
  • R. Fielding H, Frystyk, T. Berners-Lee, J. Gettys and J.C. Mogul, "Hypertext Transfer Protocol - HTTP/1.1: HTTP Working Group Internet Draft” (May 2, 1996).
  • HTML is a simple data format used to create hypertext documents that are portable from one platform to another.
  • HTML documents are SGML documents with generic semantics that are appropriate for representing information from a wide range of domains.
  • HTML has been in use by the World-Wide Web global information initiative since 1990. HTML is an application of ISO Standard 8879; 1986 Information Processing Text and Office Systems; Standard Generalized Markup Language (SGML). To date, Web development tools have been limited in their ability to create dynamic Web applications which span from client to server and interoperate with existing computing resources. Until recently, HTML has been the dominant technology used in development of Web-based solutions. However, HTML has proven to be inadequate in the following areas:
  • UI User Interface
  • Custom “widgets” e.g., real-time stock tickers, animated icons, etc.
  • client-side performance is improved.
  • Java supports the notion of client-side validation, offloading appropriate processing onto the client for improved performance.
  • Dynamic, real-time Web pages can be created. Using the above-mentioned custom UI components, dynamic Web pages can also be created.
  • Sun's Java language has emerged as an industry-recognized language for "programming the Internet.”
  • Sun defines Java as: "a simple, object-oriented, distributed, interpreted, robust, secure, architecture-neutral, portable, high-performance, multithreaded, dynamic, buzzword- compliant, general-purpose programming language.
  • Java supports programming for the Internet in the form of platform-independent Java applets.”
  • Java applets are small, specialized applications that comply with Sun's Java Application Programming Interface (API) allowing developers to add "interactive content” to Web documents (e.g., simple animations, page adornments, basic games, etc.). Applets execute within a Java-compatible browser (e.g.,
  • ActiveX includes tools for developing animation, 3-D virtual reality, video and other multimedia content. The tools use Internet standards, work on multiple platforms, and are being supported by over 100 companies.
  • the group's building blocks are called ActiveX Controls, small, fast components that enable developers to embed parts of software in hypertext markup language (HTML) pages.
  • ActiveX Controls work with a variety of programming languages including Microsoft Visual C++, Borland Delphi, Microsoft Visual Basic programming system and, in the future, Microsoft's development tool for Java, code named "Jakarta.” ActiveX Technologies also includes ActiveX
  • Server Framework allowing developers to create server applications.
  • ActiveX could be substituted for JAVA without undue experimentation to practice the invention.
  • FIG 3 is a flow diagram illustrating a method 300 of registering users in the database 100 of Figure 1. Such registration procedure is required to establish the information database with the highest integrity.
  • an identity of a user is authenticated in operation 302, and a physical mail address of the user is received 304. Thereafter, in operation 306, an electronic mail address is assigned to the user, and the user is provided with a digital certificate for effecting payment during transactions utilizing a network. Note operation 308.
  • the physical mail address, the digital certificate, and the electronic mail address are entered in a database, as indicated in operation 310.
  • the database allows for retrieving a physical mail address in response to the receipt of the electronic mail address as set forth hereinabove.
  • Such physical mail address may thus be used to ship goods purchased during the transactions utilizing the network.
  • the identity of the user is authenticated by checking valid evidence of the identity of the user, i.e. a driver's license, birth certificate, military identification card, etc.
  • the authentication is carried out in a government agency by a trusted official, hi the alternative, any other trusted third parties such as notaries, banks, lawyers, etc. may be employed.
  • identity of the user may include an age of the user for reasons that will be set forth hereinafter. Further, payment may be received from the user for the registration. As an option, the assigned electronic mail address is selected by the user.
  • FIG 4 is a flow diagram a shipper-based electronic/physical mail address database process 400.
  • an electronic mail address is retrieved from a parcel by the postal service centers 102 of Figure 1. Note operation 402.
  • the electronic mail address may be written or coded on the parcel, and may be scanned from the parcel.
  • Such electronic mail address is the type capable of being used to transmit information over a network.
  • the database is queried using the retrieved electronic mail address.
  • the database includes a plurality of electronic mail addresses and associated physical mail addresses, as set forth earlier. As an option, the database may be queried from afar using one of the networks mentioned earlier.
  • the physical mail address associated with the received electronic mail address is received from the database in response to the query, as indicated in operation 406. At that point, the physical mail address may be physically applied to the parcel.
  • the parcel is then shipped to the physical mail address in operation 408 by conventional methods, land, air, sea-based cargo vehicles.
  • FIG. 5 is a flow diagram illustrating a method 500 of handling a change of address in a database in accordance with one embodiment of the present invention.
  • the database includes a plurality of physical mail addresses and associated electronic mail addresses. Initially, in operation 502, electronic mail addresses are retrieved from associated parcels. Next, physical mail addresses are identified based on the retrieved electronic mail addresses using a database. Note operation 504.
  • an updated physical mail address may be received from a user as part of a request to update the database in operation 506.
  • This request may be received by way of a network such as the Internet, or in person.
  • an identity of the user is authenticated in operation 508.
  • the physical mail address associated with the electronic mail address is replaced without modifying the associated electronic mail address.
  • the identity of the user is authenticated by checking a piece of evidence verifying the identity.
  • other means of authentication may be employed such as the use of a digital certificate that is issued during the registration process of Figure 3.
  • the electronic mail address may be written or encoded on the parcel, and may be scanned from the parcel.
  • a handheld scanner may be employed.
  • a compact hand-held and hand-guided device will now be described which employs a one dimensional linear scanning array as the main scanning element.
  • This array provides a series of vertical "slices" or samples of the text being scanned.
  • a secondary single detector element which may or may not be an element of the main scanning array, simultaneously samples the text at a predetermined vertical and horizontal position relative to the main scanner detector array.
  • This action provides a means of establishing the appropriate spatial accurate representation of the scanned character, via specialized computer algorithms which have been developed, so that the application of optical character recognition (OCR) software can provide a precise interpretation of the scanner output.
  • OCR optical character recognition
  • the present device provides a simple, light, compact, and inexpensive hand-held scanner for note taking, excerpting text, reference citing, etc.
  • the scanner can take the shape of a pen or of a palm controlled device similar to a computer mouse.
  • the information to be scanned can be acquired from printed sources such as books, magazines, newspapers, etc. All or a portion of lines of text of arbitrary (within reason) lengths can be scanned.
  • a computer algorithm (to be described) corrects the baseline variations of the scanned text and then corrects for distortions due to uneven scanning speed.
  • the processed text is then subjected to a standard optical character recognition (OCR) analytical program and the scanned text is thus converted from a bitmapped image to ASCII character codes, thereby providing a vast savings in computer memory for a given amount of text.
  • OCR optical character recognition
  • the scanner 610 is stroked along a line of text so that each character is in turn is partially in the field of view of the linear scanning array 620.
  • the fully scanned image provides a succession of vertical slices of each character of the text.
  • Each slice of the text character is stored as a lxN record (in our case a 1x128 record).
  • a computer algorithm corrects for uneven or skewed baseline and for uneven and/or incorrect scan speed across the page.
  • an OCR program converts the corrected scanned image into ASCII text codes for final storage and utilization.
  • a scan pen 610 of the present invention is represented in a cut away view.
  • the scan pen is stroked is a direction 612 along a set of text characters 614.
  • the text characters on the printed page are illuminated by a set of light emitting diodes (LEDs) 616 or some other bright light source such as incandescent or fluorescent lamps or laser diodes, etc. If necessary and/or appropriate, the illumination produced by these light sources can be enhanced and made uniform by the presence of a metallic reflecting insert surface (polished aluminum) 618 placed inside the scan pen nose piece.
  • LEDs light emitting diodes
  • An image of the text 622 is formed in the plane of the linear scanning detector element 620 by lens 624.
  • Dotted lines 633, 634, 635 and 636 indicate the extent of the optical path that forms the image on the detector face.
  • a beam splitter 626 is placed at an intermediate position between lens 624 and the linear detector 620. This causes a secondary image 628 of the text to be formed (in the illustrated case) at a right angle to the primary image 622 which is itself focused onto linear detector array 620.
  • a single discrete detector element 630 is positioned in this image plane so that it detects a position in the scanned text which is advanced (or retarded if appropriate) relative to the primary image position on detector array 620. Dotted lines 664 and 666 indicate the extent of the optical path that forms the image onto detector 630. This advanced position is predetermined by fabrication of the scan pen, and in the example cited in the summary it is set at 0.125 inches although obviously any appropriate value may be selected.
  • the detector array 620 is shown as scanning a slice of the character "a” while the discrete detector 630 is shown as detecting a position in the character "b" which is yet to be imaged onto the detector array 620.
  • Electronic package 632 performs the function of clocking the array scanning and conditioning the output for presentation to a computer.
  • FIG. 7 shows the same view as Figure 6, but now with the scan of text having been advanced. In this case the primary image is positioned with the letter "b" focused onto array 620 while the letter "c" has advanced into position on discrete detector element 630.
  • the detection of the position of letter "b” is produced onto detector 630 earlier in the scan than is the detection of "b” by the primary linear array 620.
  • this detection at the discrete detector 630 occurs precisely 0.125 inches in front of the corresponding image position on detector array 620. Since the detector array 620 is scanned at a constant rate, in the case of our working device at 15,635 complete scans per second, it is possible to determine the exact number of scans of array 620 that occurred between the detection of the leading edge of character "b” by the discrete detector 630 and the corresponding leading edge of the character "b” by the particular array element of detector array 620 that is in horizontal resolution with the discrete detector 630. In the scan pen that we assembled we found that the appropriate corresponding array element of array 620 was element number 658 out of the set of 128.
  • Figure 8 shows another cut away view of the scan pen, taken in the direction orthogonal to those of Figure 6 and Figure 7. It further clarifies the relationship between the "advanced detector" element 630 and the corresponding element of the main scanning array 620.
  • Figure 9 shows another methodology for providing the VE function.
  • a flat bundle of optical fibers 640 provides an object plane 642 at its upper surface which is in turn imaged onto the linear detector array 620.
  • This upper surface if formed into a linear array of fibers, each of which has a diameter of about 50 micrometers (0.002" or about 500 elements per linear inch).
  • 0.002" or about 500 elements per linear inch a linear array of fibers, each of which has a diameter of about 50 micrometers (0.002" or about 500 elements per linear inch).
  • 0.002" or about 500 elements per linear inch 0.002" or about 500 elements per linear inch
  • arrays could be fabricated that either permit direct contact by such fiber linear bundles or said arrays could be fabricated with sufficiently thin protective windows that direct contact would provide for the necessary spatial resolution on the array. It is possible, however, that a very sophisticated computer analysis of the resultant scanned image might derive useful information.
  • One major key point of this embodiment lies in the fact that the lower face 644 of the fiber bundle has been modified so that a few (one to four) of the fibers 646 from one edge of the bundle 640 have been rerouted so that it (they) are positioned in the object plane next to the text 614 being scanned in a position precisely located a known distance in front of the main body of the bundle 640. This then provides a VE element which is registered with a particular element of the main array 620 and positioned a known and predetermined distance before (after) the main array fiber system 640.
  • the VE output is registered onto the edge element(s) of the main array and thus automatically shares the gain parameters of the array as well as eliminating some circuitry and programming necessitated by the existence of an independent single element detector to provide the VE function.
  • the leading aspect of this set of few fibers effectively produces an advanced image 638 of the text being scanned upon the corresponding few detector elements at one end of the main scanning array.
  • FIG 10. An additional embodiment of the scanning device is presented in Figure 10. This embodiment derives in part from that of Figure 9 which is discussed above.
  • a linearly registered fiber array 640 is now positioned so that its input face 644 is positioned remotely from the surface being scanned.
  • text 614 is imaged onto the input (lower) face of the fiber bundle 640 which is again configured such that the lower or input face 644 possesses the advanced VE configuration described above relative to Figure 9.
  • An additional lens 650 positioned at an intermediate position between text element 614 and fiber bundle input face 644 images said text onto the plane of the fiber bundle input face.
  • This embodiment thus places the bundle input face at a remote position from the substrate surface being scanned and thus precludes any possible pick up of surface debris which might contaminate scanned images for the case of elements which might contact the scanned surface.
  • Dotted lines 654, 655, 656, and 657 indicate the extent of the optical path that forms the image onto the fiber bundle input face.
  • the data set derived from the scan pen consists of a set of scan slices of the text, each slice being 128 individual "pixel" elements, plus a single detector output from the advanced element 630.
  • the complete data set is comprised of an indeterminate number of such scans, but for purposes of estimation, if the scans occur on an average of 1000 scans per linear inch of text and the line of text is 6 inches overall, then the record will be some 6000 sets of the (128+1) detector outputs .
  • the first part of the data processing is to replace a 128 byte single scan file by a 16 byte file in which each pixel of the scanning array is represented by a single pixel in a byte; i.e. a byte now represents the output of 8 elements of the array.
  • a byte now represents the output of 8 elements of the array.
  • the baseline correction must be made for skewness of the scanned image which is evidenced by a continual slanting of the baseline as a function of distance into the scan. Correction for the non-linearity of scan must also be made. A curved or wavy baseline must be accounted for and all text characters displayed relative to a single horizontal baseline.
  • the remaining 13 lower case characters a, c, e, m, n, o, r, s, u, v, w, x, and z establish the fundamental text "height" in that the lower edge of these characters form a "baseline” for the text (which is common with the ascender class of characters) and the upper edge of the character set form the "heightline” for the font in that all of the characters share a common upper value.
  • the length below the baseline of the descending portion of descender characters is between 35% and 39% of the fundamental text height (we will use 37%).
  • the height of ascenders, capital letters and numerals is 137% of the fundamental text height. For the case that the text is all capitals, this font height analysis is not necessary.
  • the scanner When the scanner is first to be employed on a series of text lines, it is placed into a "calibrate" mode by a software switch. Then a representative line of the text is scanned. The scanned image is examined by the specialized software algorithm which determines the fundamental text height. This is done by determining the highest and lowest scanner element addresses which are "l"s; i.e. the extent of black elements is determined within each text character. The extent of text characters is established by locating a series of scans which contain no black elements. That is scans which have black elements are grouped between series scans which have only white spaces. In the case of text characters which are occasionally connected, then the identified "character" may well consist of two or more true text characters. The computer will thus establish two fundamental heights of the scanned text.
  • the larger value will be associated with ascenders, descenders, capital letters and numerals.
  • the smaller value will be associated with the 13 lower case "fundamental text height” characters. This value is stored in memory for future reference.
  • This program thus produces a bitmapped image of the text which now resides on a completely flat horizontal baseline. Again, note that other algorithms can produce this same result if the algorithms are presented with the scanned text slices and the synchronized output of the virtual encoder.
  • the text image must now be corrected for non uniformity of scan stroke as well as the basic error in scan velocity which produces a distorted image of the text.
  • the program detects the onset of a leading edge of a character in the advanced discrete detector element 630.
  • the number of scans that exist between this event and the event of detecting the onset of the same leading edge by the corresponding registered linear array element (#658 for the case of the scan pen device already tested) is established.
  • the comparison of that experimental number of scans as compared to the required "precise image" number of scans (664 for the present case) then permits the orderly elimination of scans on a regular proportional basis so that the remaining scans produce a faithful image of the text.
  • the next paragraph gives the narrative version of the computer algorithm flow chart specifically for the case where scans must be deleted in an orderly manner.
  • VE virtual encoder
  • This processed image is then formatted for presentation to an OCR program for reduction of the text image to ASCII code representation.
  • formatted it is meant that the finalized bitmap image is given the appropriate file header so that the selected OCR program can process the information directly.
  • FIG 11 is a flow diagram illustrating a retail-based transaction method 1100 using a database in accordance with one embodiment of the present invention.
  • an order for goods is received from a buyer utilizing the network. This may be accomplished using a site on the network, i.e. website, which provides information on goods, and allows the buyer to select desired goods.
  • an electronic mail address is received from the buyer utilizing the network. As an option, the step of receiving the electronic mail address may be preceded by the step of prompting the buyer to enter the electronic mail address.
  • Payment is also accepted for the order of goods from the buyer utilizing the network. See operation 1106. Such payment may be accepted using a digital wallet and/or a credit card number.
  • the electronic mail address is applied to the goods, and the goods are shipped, in operation 1010.
  • a shipping entity is capable of utilizing the electronic mail address to determine a physical mail address of the buyer, as set forth earlier. 0
  • FIG 12 is a flow diagram illustrating a buyer-based transaction method 1200 using a database in accordance with one embodiment of the present invention.
  • an order for goods is sent from a buyer to a seller utilizing the network in operation 1202.
  • the buyer may select the goods from a plurality of goods displayed on a site on a network such as the 5 Internet.
  • a prompt is received to enter an electronic mail address of the buyer utilizing the network.
  • the electronic mail address is entered for transmission to the seller utilizing the network.
  • payment is Q effected for the order of goods utilizing the network by sending the seller an account identifier, as indicated in operation 1208.
  • the account identifier corresponds to a digital wallet and/or a credit card number.
  • FIG. 13 shows the overall architecture of the preferred system for utilizing an open communication network such as the Internet as a medium for the transfer of credit card account information.
  • the system on which the cyber wallet is utilized includes a plurality of users, each provided with an individual cyber wallet, Q the users being connected to a plurality of merchant processors over the Internet (for example, by means of the World-Wide Web).
  • Each of these merchant processors is connected by means of a secured network or by means of a secret tunneling or other channel protecting procedure to a credit processor held by at least one account servicer.
  • payment information is transferred from a user to a merchant processor in the form of a public key encrypted authorization ticket, which is then forwarded by the merchant to the credit processor.
  • All unprotected communications over the Internet are presumed to be accessible by unauthorized parties, and all merchants are subject to suspicion.
  • the credit processors are presumed to be secure and trustworthy.
  • the cyber wallet on which the preferred system and method is based is in the form of any account and/or personal information required to be transmitted to the account servicer in order to verify the account status, and which may be "carried" on a tamper resistant portable electronic storage medium such as a smartcard, or stored on the customer's computer (or personal digital assistant, PCMCIA card, or the like) together with the browser/mosaic software which will enable the customer to utilize the wallet for transactions carried out on the Internet, and a public key file which will be described below.
  • information in the wallet could also be accessible solely through use of a PIN mechanism, such as might be included in a smart card in order to ensure compatibility with such systems.
  • the cyber wallet may be contained in a smartcard or other physical device, it may also exist purely as software (which is why the "wallet” is referred to herein as a "cyber wallet”).
  • the cyber wallet does exist in static physical form, in the form of instruction stored in a memory device, or programmed into the wiring of an integrated circuit, and will be used by the customer in the same manner as a credit card.
  • the cyber wallet is contained on a smartcard which can be inserted into a card reader in a manner similar to the manner in which existing credit or debit cards are used, without the need for entry of additional information.
  • the cyber wallet is in the form of software provided to the consumer by his credit card company or bank, and may be stored on the consumer's personal computer rather than being physically carried around like a smartcard.
  • the cyber wallet includes what ever information is needed by the account servicer to authorize a transaction and, uniquely, a file containing a plurality of public keys.
  • These public keys are an important feature of cyber wallet because it is these keys that are used to protect the information on the card as it is being transmitted to the merchant.
  • the concept of the key file is to use one of the public keys of a public-private key cryptosystem to encrypt the necessary information and send the encrypted information in the form of an "authorization ticket,” which can then be forwarded by the merchant together with order information, as necessary, to the account servicer/authenticator in order to obtain authorization from the account servicer which allows the transaction to be completed.
  • public keys to encrypt the information, so that the information can only be decrypted by the party in possession of the associated private key, the information can be fully protected as it is passed electronically to the merchant, and from the merchant to the account servicer.
  • the inclusion of a public key file in the cyber wallet is to be distinguished from the inclusion of card authentication information.
  • the present invention involves public key encryption of any information contained in the wallet which is necessary to authenticate the transaction, and private key decryption, the private key being held under secured conditions by the account servicer who carries the ultimate risk of any fraud.
  • the public key file contained in the wallet contains means for varying the public key used to encrypt the authorization ticket, thus reducing the likelihood that one of the keys could be compromised.
  • the wallet is created by the account servicer or provider under secured conditions, by gathering together all information necessary to carry out credit transactions remotely over the Internet, including browser/mosaic software if necessary, account information, a user PIN number, a user ID, MAC, and any other information which might be needed during the payment and authentication process.
  • This information is associated with a public key file preferably containing a plurality of public keys associated with a single root key, and key identifiers.
  • the entire wallet is then provided to the customer, in any form which enables the customer to utilize the wallet, for example as a software package for use on the customer's portable computer, or on a smart card which can be carried around by the customer and used at kiosks provided with smart card readers.
  • the customer selects the appropriate wallet, depending for example on which "credit card” he or she wishes to use, by retrieving the software from a disk, or inserting a smart card into a card reader, and establishes communications with the merchant.
  • the customer then makes an order and the merchant requests an authorization ticket in the form of payment or account information encrypted by one of the public keys in the public key file. Selection of the public key may be in response to transmission from the merchant of a public key identifier associated with the public key.
  • the card has been inserted into a card reader, or if the software has been provided with provision for accepting a PIN number, entry of the PIN number can be required to proceed with the transaction at this time to unlock the information stored in the wallet or to verify the user identity as part of the credit card verification, and in addition the authenticity of information in the wallet can be verified using various techniques.
  • the merchant receives the authorization ticket, the merchant then embeds or associates it with whatever information the merchant needs to provide the account servicer.
  • the authorization ticket is then forwarded to the account servicer, at which point the account servicer uses the private key associated with the selected public key in order to decrypt the file and verify the status of the account. If the transaction is approved, the account servicer then sends an approval message back to the merchant, together with decrypted information necessary for the merchant's records.
  • a public key can be replaced by other means, for example by including provision in the cyber wallet for decrypting a new public key which has been encrypted by the old private key.
  • cyber wallets containing the necessary public key file and browser software to be downloaded by a merchant to a customer, rather than supplied by the "credit card" company directly to the customer, with the user adding the account and personal information necessary to effect a transaction, in which case the private key will still be held by the account servicer and the merchant will still have no access to any information in the authorization ticket which it forwards from the customer to the account servicer.
  • Figure 14 is a flow diagram illustrating method 1400 of verifying an age or other types of information on a buyer during an e-Commerce transaction using a database.
  • the present method may be particular beneficial during a transaction with a seller for age-sensitive goods or services over a network.
  • Such goods may include at least one of tobacco, adult video, and alcohol.
  • Services such as financial transactions may also utilize the present system.
  • a database must be established, as set forth earlier. Accordingly, in operation 1402, an identity of a buyer is received including an indication of an age of the buyer. In one embodiment, the information may include an address, zip code, phone number and/or professional affiliation. Thereafter, in operation 1404, a physical mail address of the buyer is received after which an electronic mail address is assigned to the buyer. Note operation 1406. The physical mail address, the identity, and the electronic mail address are all subsequently entered in a database for retrieving a physical mail address in response to the receipt of the electronic mail address. Note operation 1408.
  • a request may be received from a seller for verification of the age or other information on the buyer utilizing a network.
  • This request may be received via the Internet, or by any other means.
  • the database maybe queried for retrieving the identity of the buyer, as indicated in operation 1412.
  • a verification of the age of the buyer may then be transmitted to the seller utilizing the network.
  • a digital certificate including the identity of the buyer may be generated and stored in the database.
  • the buyer may be provided with the digital certificate for submission to the seller during the transaction.
  • the request received from the seller may include the digital certificate, hi one embodiment, the digital certificate may be used by the seller themselves to authenticate the age of the user.
  • FIG 15 is a flow diagram illustrating an electronic mail address validation scheme 1500 during an e-Commerce transaction using a database.
  • the present method may be used by a retailer to determine whether the buyer is registered with the database. Again, the database must be established prior to carrying out the present method.
  • an identity of a buyer is authenticated after which a physical mail address of the buyer is received so that an electronic mail address may be assigned to the buyer.
  • Note operations 1504-1506 The physical mail address, the identity, and the electronic mail address are each subsequently entered in a database for retrieving a physical mail address in response to the receipt of the electronic mail address. Note operation 1508.
  • a request may be received from a seller for verification of an electronic mail address of the buyer utilizing a network, as indicated in operation 1510.
  • the database may be queried for retrieving the electronic mail address of the buyer.
  • a verification of the electronic mail address of the buyer may transmitted to the seller utilizing the network. See operation 1514.
  • the verification may include a verification of an existence of the electronic mail address in the database.
  • the identity of the buyer may be received from the seller, wherein the verification of the electronic mail address includes a verification that the identity corresponds to the electronic mail address.
  • Figure 16 is a flow diagram for an electronic delivery confirmation method 1600 using a database.
  • a parcel is shipped using an electronic mail address situated thereon by looking up an associated physical mail address in a database.
  • a location thereof is tracked utilizing a network in operation 1604. This may be accomplished by logging the parcel in a database each time the parcel changes locations. This can be accomplished by any means using hand held scanners, etc.
  • Such message is indicative of the location of the parcel during the shipment thereof.
  • the message maybe transmitted upon the location of the parcel being the physical mail address.
  • the electronic mail address may include a user name, a first level domain name, and a second level domain name for use on a network such as the Internet. Further, the network by which the location is tracked is different from that on which the electronic message is transmitted.
  • a confirmation number maybe assigned to the parcel upon looking up the associated physical mail address in the database. Such confirmation number may in turn be used to track the parcel. As an option, the confirmation number is scanned. Further, the message may be automatically sent each instance that the confirmation is scanned.
  • the electronic mail address is used to transmit the message to at least one of a pager and a wireless phone.
  • Figure 17 is a flow diagram for an escrow process 1700 using a database in accordance with one embodiment of the present invention. Such method is particularly beneficial in auction environments when the reputation or integrity of the seller can not be readily verified.
  • an agreement is facilitated between a buyer and a seller to transact utilizing a network.
  • the agreement may be facilitated by providing an auction environment utilizing the network via a website or the like.
  • an electronic mail address is received from the buyer utilizing the network. Payment is then accepted from the buyer for goods being sold by the seller utilizing the network. Note operation 1706. This may take the form of a digital wallet or credit card number, as set forth earlier.
  • the shipping entity is capable of utilizing the electronic mail address to determine a physical mail address of the buyer, and tracking a location of the goods during the shipment thereof. Such tracking may take any desired form that is well known to those of ordinary skill.
  • FIG. 18 schematically shows, in block form, the structure of an electronic mail system 181 according to one embodiment of the invention.
  • the electronic mail system 181 is composed of a host 182 undertaking the management of mailboxes MB; and a plurality of data processing systems 183, 184 for transmitting data to each other through the host 182.
  • the host 182 is, for example, a general-purpose large-sized computer system and has the function of providing various network services including electronic mail service (i.e., mailbox service).
  • electronic mail service i.e., mailbox service
  • the host 182 When a mail M addressed to the data processing system 184 is input (put in the post) from the data processing system 183 for example, the host 182 once stores the mail M in the mailbox MB for the data processing system 184. Upon receipt of a request for transferring from the data processing system 184 or at a predetermined time, the host 182 transfers (delivers) the mail M to the data processing system 184.
  • Each of the data processing systems 183, 184 is a stand-alone computer system composed of, for example, a personal computer, display unit, hard disk etc. and various kinds of application programs can be used with it.
  • an electronic mail terminal utility 185 which is a kind of application program, performs processing on signals concerned with mail services provided by the host 182.
  • the electronic mail terminal utility 185 maintains a user mail server 186 which is a data base having a plurality of folders for storing data associated with electronic mails, and a folder table
  • the contents of the user mail server 186 and the folder table 187 are created individually for each of the data processing systems 183, 184 and therefore their contents in the data processing system 183 are usually different from those of the data processing system 184.
  • the users of the data processing systems 183, 184 may make arrangements for using the same number of folders and/or the same folder names.
  • the user mail server 186 has, as shown in Figure 18, a message folder Fm, a shared folder F0 and three dedicated folders FI to F3 as receiving folders.
  • FIG 19 shows the arrangement of data in the mail M.
  • the mail M is composed of a content part MC containing optional information to be conveyed from one end user to another and an envelop part ME containing control information used to correctly transmit the content part MC and to properly manage the content part MC at the receiving side.
  • the content part MC is composed of one or a plurality of heading files HF that are a group of text data corresponding to message information and one or a plurality of attachment files AF that are attached to the heading files HF in order to send data information.
  • the file arrangement i.e., the number and type of data files which are a collection of data representing optional information
  • the mail M to be transmitted includes the content part MC which consists of only data files corresponding to message information or only data files corresponding to data information.
  • the format of the envelop part ME is fixed in the electronic mail system 1 and the envelop part ME is composed of 13 items of directory data Dl to D13 by which processing operations performed by the host 182 and the data processing systems 183, 184 are specified.
  • the directory data Dl ⁇ to Dl 3 are 13 items of data indicating a serial No. allocated to every mail M; the postal indication of the mail M (ordinary, registered, confidential, express, multiple address etc.); the name of the mail M; an addresser's identification code; an addressee's identification code; a sending date; the length of the mail M (excluding the attachment files AF); the number of attachment files AF; the name of the attachment file AF; the attribute of the attachment file AF; the length of the attachment file AF; the name of the specified folder; and the presence or absence of a request for creating a new folder, respectively.
  • One set of the directory data D9 to D13 corresponds to one attachment file AF, and therefore, when N-number of attachment files AF exist in the content part MC, N-sets of directory data D9 to D 13 are written in the envelop part ME.
  • the attribute of the attachment file AF mentioned herein is the type of file classified in accordance with a desired feature such as applications software used for creating the file, or the presence or absence of a protect.
  • Figures 20 and 21 schematically show the flow of the processing performed by the electronic mail terminal utility 185.
  • the electronic mail terminal utility (hereinafter referred to as "utility") 185 has four functions, i.e., creating the mail M, transmitting the mail M, receiving the mail M and environment setting such as registering the management conditions of the mail M.
  • the utility 185 When the operator of the data processing system 184 for example starts up the utility 185, the utility 185 displays a function-selection screen (initial menu) on a display unit, showing the four functions as well as termination as commands to be selected, and checks which command has been selected from the initial menu.
  • a function-selection screen initial menu
  • the utility 185 When the operator selects the mail creating function, the utility 185 writes a mail name, an addresser's identification code and an addressee's identification code in the envelop part ME as the directory data D3, D4, D5, these pieces of information having been input by the operator through a key board. Thereafter, the utility 185 displays an interactive screen to require an operator's instruction and then executes editing processing for creating the content part MC (#1811 to 1813).
  • the utility 185 Upon receipt of an instruction to terminate the editing, the utility 185 executes attachment file register processing for writing the name of the attachment file AF (directory data D9) in the envelop part ME. Then, the utility 185 calculates the length of the attachment file AF and the length of the mail M to store in the envelop part ME as the directory data Dl 1, D7 (#1814 to 1817). The substantially finished mail M is stored in the transmitting folder (#1818).
  • Figure 22 shows the flow of the attachment file register processing of Figure 23.
  • the utility 185 writes the attachment file name input by the operator in the envelop part ME as the directory data D9 (#18161). With this step, one attachment file AF has been registered as transmitted data.
  • the name of the specified folder is written as the directory data D12. If a request for creating a new folder is made when the specified folder does not exist at the receiving side, a flag for indicating the presence of the request is set and stored as the directory data D13 (#18162 to 18165).
  • the utility 185 selects one or a plurality of mails M specified by the operator as data to be transmitted.
  • a sending date (directory data D6) is written in the envelop part ME of the mail M selected as data to be transmitted and then the mail M is sent to the host 182 (#1822 to 1826).
  • the utility 185 makes enquiries to the host 182 about the presence or absence of the mail M addressed to the data processing system 184, and performs receiving processing for receiving the mail M if there exists (#1831, 1832).
  • the heading file HF is stored in the message folder FM whilst the attachment file AF is once stored in the shared folder F0.
  • the utility 185 performs attachment file analysis processing in which a folder suited for the attachment file AF is set and the attachment file AF is transferred from the shared folder F0 to the set, suitable folder (one of the dedicated folders FI to F3 or a new folder) (#1833, 1834, 1835).
  • the attachment file AF is classified (attribute identification) and stored. This facilitates the editing operation (processing) of the attachment file AF which will be performed later by the use of applications software.
  • Figure 23 shows the flow of the attachment file analysis processing of Figure 21.
  • the utility 185 sets, in this sub-routine, the dedicated folders FI to F3 specified by the directory data D12 (the name of a specified folder) as folders suitable for storing the attachment files AF (i.e., transferring destination for the attachment files AF) and terminates the processing of the sub-routine (#18341 to 18344).
  • a request for creating a new folder is made when the folder specified by the transmitting side does not exist within the user mail server 186, a new folder having the specified name is created and set as the transferring destination for the attachment file AF. On the other hand, if there is no request for creating a new folder, the specified folder name is deleted and the folder specification is canceled (#18345 to 18347).
  • the utility 185 reads data of a specified length (header) recorded in the leading end of the attachment file
  • the utility 185 searches the folder table 187 in order to check the presence or absence of the read file attribute information Att.
  • Figure 187 shows one example of the contents of the folder table 187.
  • each code which appears in the column of header code strings corresponds to a file name.
  • the folder name corresponding to the attachment file AF can be retrieved (#18349, 18350).
  • the folder name corresponding to the file attribute information Att is read and one of the dedicated folders FI to F3 having the folder name which has been read is set as the transferring destination for the attachment file AF (#18351, 18352).
  • the attachment file AF is, for example, a text document
  • the file attribute information Att is the ASCII code which corresponds to the first character of the document or a specific code (extension) given by the applications software which the operator at the transmitting side has used when creating the attachment file AF. In the latter case, the value of the specific code varies depending on the applications software which has been used.
  • the transferring destination for the attachment file AF which is a sort of data file is set in accordance with specific data stored in the mail M, such as the directory data D12 in the envelop part ME or the file attribute information Att which is part of the attachment file AF.
  • the attachment file AF will not be transferred but kept in the shared folder F0.
  • Figure 25 shows the flow of the condition defining processing of Figure 21.
  • the utility 185 firstly enters the file attribute information Att in the folder table 7 (#18411,
  • the dedicated folders FI to F3 do not have the input folder name, a new dedicated folder is created and the input folder name is put to the new folder. Then, the folder name is entered in the table folder 7 in combination with the file attribute information Att (#18413, 18414, 18416).
  • the directory data D12 (a specified folder name) for instructing the management condition of the attachment file AF at the receiving side is written in the envelop part ME of which format is fixed in the electronic mail system 181.
  • the attachment file AF is classified in accordance with the file attribute information Att originally included in the attachment file AF, there is no need to write data for instructing the management condition of the attachment file AF in every mail at the transmitting side. This saves labor in creating a mail.
  • the attachment files AF are classified by applications software and stored, when the attachment file AF is edited (processed) at the receiving side by the use of the same applications software as used for creating, the operation can be easily performed.
  • attachment files AF are classified at the receiving side in the foregoing embodiment, the heading files HF containing message information may be classified instead.
  • Figure 26 is a flowchart illustrating a method 2600 for selective advertising using the mailing system of the present invention
  • a request is received from a user including criteria relating to advertisements utilizing a network.
  • a plurality of advertisements are received from advertisers utilizing a network. Such advertisements are subsequently filtered to render only pertinent advertisements that meet the criteria, as indicated in operation 2606. Thereafter, the user is allowed access to the pertinent advertisements utilizing the network and the electronic mailing system. Note operation 2608.
  • an identity of the user is authenticated, and the user is provided with a digital certificate that may be used for verifying, the identify of the user before receiving the request from the user.
  • the criteria includes a time frame when the advertisements are to be received, and/or a type of products. As an option, payment may be received from the advertisers in exchange for the aforementioned service.
  • a user of the present e-mail service may go to an advertising directory and select the type of advertising ⁇ information, etc that they are willing to receive and the time frame during which they are willing to receive that information. For example, one may go to the category Trucks, to the sub category Chevrolet, to the subcategory Suburban and select that he or she wishes to receive advertisement information on Chevrolet Suburbans from March 1 st through March 31 st.
  • the digital certificate may authenticate the intentions of the user, and information could then be sold to anyone interested in sending specific information related to Chevy Suburbans.
  • the senders of the information may pay for these qualified leads, and the digital certificate provides the ability to order advertisement mail without the sender of the mail having to validate that identity of the requestor and whether he or she really wants the information.

Landscapes

  • Business, Economics & Management (AREA)
  • Economics (AREA)
  • Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Human Resources & Organizations (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne un procédé destiné à une fonction de contrat de dépôt conjointement à la possibilité de fournir un rôle intermédiaire entre un acheteur et un acheteur utilisant un réseau. Un accord de transaction au moyen d'un réseau est d'abord trouvé entre un acheteur et un vendeur. Une adresse de courrier électronique est ensuite reçue de l'acheteur utilisant le réseau. L'acheteur accepte alors le paiement de biens vendus par le vendeur utilisant le réseau. Le paiement est ensuite bloqué. Le vendeur reçoit l'adresse de courrier électronique pour expédier le colis. L'entité d'expédition est capable d'utiliser l'adresse de courrier électronique pour déterminer une adresse de courrier physique de l'acheteur, et de rechercher un emplacement des biens au cours de leur expédition. Le paiement peut être transmis au vendeur une fois seulement que l'entité d'expédition a vérifié la réception des biens par l'acheteur.
PCT/US2001/002902 2001-01-26 2001-01-26 Procede destine a une fonction de contrat de depot au cours d'une transaction utilisant un cadre de base de donnees d'adresses electroniques/physiques WO2002059818A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/US2001/002902 WO2002059818A1 (fr) 2001-01-26 2001-01-26 Procede destine a une fonction de contrat de depot au cours d'une transaction utilisant un cadre de base de donnees d'adresses electroniques/physiques
CA002436608A CA2436608A1 (fr) 2001-01-26 2001-01-26 Procede destine a une fonction de contrat de depot au cours d'une transaction utilisant un cadre de base de donnees d'adresses electroniques/physiques

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2001/002902 WO2002059818A1 (fr) 2001-01-26 2001-01-26 Procede destine a une fonction de contrat de depot au cours d'une transaction utilisant un cadre de base de donnees d'adresses electroniques/physiques

Publications (1)

Publication Number Publication Date
WO2002059818A1 true WO2002059818A1 (fr) 2002-08-01

Family

ID=21742284

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/002902 WO2002059818A1 (fr) 2001-01-26 2001-01-26 Procede destine a une fonction de contrat de depot au cours d'une transaction utilisant un cadre de base de donnees d'adresses electroniques/physiques

Country Status (2)

Country Link
CA (1) CA2436608A1 (fr)
WO (1) WO2002059818A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019050414A1 (fr) * 2017-09-07 2019-03-14 Nafisee Nawaf Procédé de transaction flottante retardée et mise en forme de comportement humain par l'intermédiaire d'un système de type dépôt

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5717989A (en) * 1994-10-13 1998-02-10 Full Service Trade System Ltd. Full service trade system
US5757917A (en) * 1995-11-01 1998-05-26 First Virtual Holdings Incorporated Computerized payment system for purchasing goods and services on the internet
US5794219A (en) * 1996-02-20 1998-08-11 Health Hero Network, Inc. Method of conducting an on-line auction with bid pooling
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US6047264A (en) * 1996-08-08 2000-04-04 Onsale, Inc. Method for supplying automatic status updates using electronic mail
US6170058B1 (en) * 1997-12-23 2001-01-02 Arcot Systems, Inc. Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5717989A (en) * 1994-10-13 1998-02-10 Full Service Trade System Ltd. Full service trade system
US5757917A (en) * 1995-11-01 1998-05-26 First Virtual Holdings Incorporated Computerized payment system for purchasing goods and services on the internet
US5794219A (en) * 1996-02-20 1998-08-11 Health Hero Network, Inc. Method of conducting an on-line auction with bid pooling
US6047264A (en) * 1996-08-08 2000-04-04 Onsale, Inc. Method for supplying automatic status updates using electronic mail
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US6170058B1 (en) * 1997-12-23 2001-01-02 Arcot Systems, Inc. Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019050414A1 (fr) * 2017-09-07 2019-03-14 Nafisee Nawaf Procédé de transaction flottante retardée et mise en forme de comportement humain par l'intermédiaire d'un système de type dépôt

Also Published As

Publication number Publication date
CA2436608A1 (fr) 2002-08-01

Similar Documents

Publication Publication Date Title
US11508024B2 (en) System and method of identity verification
US11151805B2 (en) System and method for processing distribution items in a distribution network
US7492946B2 (en) System, method and computer program for an integrated digital workflow for processing a paper form
CA2502811C (fr) Systeme et procede de capture, de stockage et de traitement de recepisses et de donnees associees
US6167568A (en) Method and apparatus for implementing electronic software distribution
US20060178994A1 (en) Method and system for private shipping to anonymous users of a computer network
US20010044785A1 (en) Method and system for private shipping to anonymous users of a computer network
US20020042722A1 (en) Settlement system, settlement program, settlement method, order placing device and information providing device
US20210141994A1 (en) Systems and methods for capturing real time client side data and for generating a permanent record
US20040243501A1 (en) System and method for automated data processing
AU2004235134B2 (en) Secure messaging center
US11775920B1 (en) Resource efficient interactions with data corresponding to physical parcel
US7014116B2 (en) Price verification method, device and program product
EP1364322A1 (fr) Procede destine a une architecture de base de donnes d'adresses de courrier physique /electronique chez un expediteur
US20100312694A1 (en) Mobile Electronic Transaction System, Device and Method Therefor
WO2002059818A1 (fr) Procede destine a une fonction de contrat de depot au cours d'une transaction utilisant un cadre de base de donnees d'adresses electroniques/physiques
WO2002059710A2 (fr) Procede de publicite selective dans un systeme de courrier electronique
US20050243105A1 (en) Systems and methods for the processing of digital files
US11861545B1 (en) Tokenization of shielded shipping data
GB2359707A (en) Secure network transactions
JP2004094757A (ja) 年賀状代行作成システム、年賀状代行作成方法および年賀状代行作成プログラム
MXPA05011295A (en) Secure messaging center

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2436608

Country of ref document: CA

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP