CN102368325A - Network commercial transactions - Google Patents
Network commercial transactions Download PDFInfo
- Publication number
- CN102368325A CN102368325A CN2011103649867A CN201110364986A CN102368325A CN 102368325 A CN102368325 A CN 102368325A CN 2011103649867 A CN2011103649867 A CN 2011103649867A CN 201110364986 A CN201110364986 A CN 201110364986A CN 102368325 A CN102368325 A CN 102368325A
- Authority
- CN
- China
- Prior art keywords
- payment
- businessman
- consumer
- token
- commodity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013475 authorization Methods 0.000 claims abstract description 11
- 238000000034 method Methods 0.000 claims description 47
- 238000010200 validation analysis Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 abstract description 20
- 230000007246 mechanism Effects 0.000 abstract description 15
- 238000012795 verification Methods 0.000 abstract description 13
- 230000004044 response Effects 0.000 description 31
- 230000008569 process Effects 0.000 description 19
- 230000006870 function Effects 0.000 description 14
- 230000009471 action Effects 0.000 description 13
- 238000012546 transfer Methods 0.000 description 8
- 230000000712 assembly Effects 0.000 description 7
- 238000000429 assembly Methods 0.000 description 7
- 230000008676 import Effects 0.000 description 7
- 238000007639 printing Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000012550 audit Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000002349 favourable effect Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000000295 complement effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 230000015654 memory Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 230000000739 chaotic effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 230000002950 deficient Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 238000007429 general method Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/407—Cancellation of a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Economics (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Current embodiments provide for authorization and payment of an online commercial transaction between a purchaser and a merchant including verification of an identity of the purchaser and verification of an ability of the purchaser to pay for the transaction, where the identity provider and the payment provider are often different network entities. Other embodiments also provide for protocols, computing systems, and other mechanisms that allow for identity and payment authentication using a mobile module, which establishes single or multilevel security over an untrusted network (e.g., the Internet).; Still other embodiments also provide for a three-way secure communication between a merchant, consumer, and payment provider such that sensitive account information is opaque to the merchant, yet the merchant is sufficiently confident of the consumer's ability to pay for requested purchases. In yet another embodiment, electronic billing information is used for authorization, auditing, payment federation, and other purposes.
Description
The application is that the PCT international application no is that PCT/US2006/014801, international filing date are that April 19, China national application number in 2006 are 200680011140.2, are entitled as the dividing an application of application of " network commercial transactions ".
Technical field
The present invention relates to be used to carry out the networked transaction system and the method for online transaction.
Background technology
The how new possibility of management functions of relevant company and individual has been opened in the surge of networked computer system.For example; Be connected to the terminal user of network (for example internet); Via can carrying out financial transaction in the enterprising industry transaction of doing business of network so that buy service and/or commodity such as computing machine, PDA, portable phone or the like networked devices, or management functions or on network, carry out individual and conclude the business.The intrinsic problem relevant with online transaction is security, particularly when comprising money transfer, fund and/or finance, individual or other confidential information in the transaction.
The online transaction of many routines according to two kinds of differences but one of relevant model carry out.Two kinds of model transmits browser with the information that acts between the each side related in the processing transaction interfaces.In first model, businessman is via browser vending articles or service online.Term " businessman " provides the commodity of confession purchase and/or any entity of service in this general reference.Term businessman is not used for describing any specific commercial state or describes the special permission seller, only if specify.On the contrary, this term is usually described to provide and is supplied to buy or the commodity of sale and/or any seller or the entity of service.Term service supplier can exchange ground with term businessman in this article and use, and unless otherwise indicated, has identical implication.
In the online transaction of routine, businessman can have description, shows or otherwise provide the commodity of confession sale and/or the website of service.Usually through selecting product via browser interface, the hope of one or more commodity or service is bought in indication to the terminal user.Then, browser display allows the terminal user to select one or more type of payment and input to accomplish the transaction page or leaf of the information that this exchange needs.For example, can allow the terminal user to select type of payment, such as credit card (for example VISA, MasterCard, American Express or the like) and import Transaction Information, such as expiration of credit number, card or the like by the transaction page or leaf of browser display.The transaction page or leaf also can be to the end user query personal information, such as name, billing address, Shipping Address or the like.Then, the terminal user submits this information to and businessman handles the information submitted to.
In this first model, businessman is " having " website usually.That is, businessman's maintaining web is responsible for content, and receives and handle the Transaction Information that is provided by the terminal user.Businessman can open an account with the terminal user before the first time transaction carrying out, then when each terminal user carries out the transaction with businessman, and login and password access this account of setting up via the user.That is, the terminal user selects to be used for the login name and the password of subsequent session or transaction usually.After the terminal user had submitted to by transaction page or leaf institute information inquiring, businessman handles this information was enough to accomplish this transaction to guarantee this information.For example, businessman can guarantee the sufficient funds that credit number is effective and have the price that is enough to payment for merchandise and/or service.
Second model generally includes the third party transaction supplier of the part payment of handling transaction.Third party and terminal user and businessman form relation.Especially, the user can open with the third party can be through the above-mentioned login and the account of password access.For opening this account, the terminal user can provide individual and payment information (be terminal user the personal information of discerning the user can be provided and such as payment informations such as one or more credit numbers, expiration) to the third party.The terminal user also can open the electronic funds account through to the third party transaction supplier money being provided, and its remaining sum can be used for buying online commodity and/or service.Third party the file account information that provides by the terminal user and/or maintenance terminal user's remaining sum.
The third party also with businessman's opening relationships, wherein the third party handles the payment processes of transaction.Especially, when the terminal user with account asked transfer funds to be bought, the third party agreed to pay businessman.The availability of just on the website of vending articles and service, using third-party option can be informed through signal by businessman, and this option is provided.For example, when the website of user capture businessman also determines to buy, an option that uses the third party transaction supplier to pay this purchase is provided to the user.
When option that the terminal user selects to use the third party transaction supplier to pay purchase, terminal user's browser is redirected to the website that belongs to the third party transaction supplier.Then, the terminal user signs in to his/her account and selects to be used in the type of payment (for example credit card) in the transaction via login/password combination, or request transfers into fund the account of businessman from user's capital account.Suitably transfer accounts through the transaction supplier in case businessman confirms payment, businessman just can continue to transport the product bought or the service of being bought is provided to the terminal user.In second model, the third party is responsible for maintenance terminal user's individual and Financial Information and handles transaction.
Description of drawings
In the accompanying drawings, each the identical or parts much at one shown in each figure are by identical numeral.For clarity sake, each figure in and unmarked each parts.In the accompanying drawings:
Fig. 1 illustrates the block diagram that is used to carry out the networked computer system of online transaction according to an embodiment of the invention;
Fig. 2 illustrates the diagrammatic sketch that is used for starting and carrying out in online transaction the system and method for authentication according to an embodiment of the invention;
Fig. 3 illustrates the diagrammatic sketch of the system and method that is used to carry out payment negotiation, checking and/or proves according to an embodiment of the invention.
Fig. 4 illustrates the networked computer system that is used to carry out online transaction according to an embodiment of the invention, and wherein transaction is handled through the transaction software that is installed on the computing machine that is connected to network at least in part;
Fig. 5 illustrates the networked computer system that is used to carry out online transaction according to another embodiment of the present invention, and wherein transaction is handled through the transaction software that is installed on the computing machine that is connected to network at least in part;
Fig. 6 illustrates according to an embodiment of the invention being used to and carries out the networked computer system to the permission that is installed in the application program on terminal user's computing machine, and wherein licence obtains through online transaction;
Fig. 7 A illustrate according to exemplary embodiment be used for be used to set up and its system of secure communication to the network authentication mobile module;
Fig. 7 B illustrates and is used for when setting up secure communication channel using the system of mobile module to the network authentication user according to exemplary embodiment;
Fig. 7 C illustrate according to exemplary embodiment be configured to use mobile module to come systems of each different services of single-stage or multistage checking;
Fig. 8 illustrates according to the payment information of exemplary embodiment and the tripartite secure exchange of payment associating;
Fig. 9 illustrates all usages according to the business transaction subsystem of exemplary embodiment and bill demonstration;
The use that Figure 10 illustrates according to exemplary embodiment is used for confirming that which kind of payment provider should be used for the payment options and the rule of business transaction; And
Figure 11 illustrates Subscriber Identity Module (SIM) equipment that disposes the fire wall that when being used for business transaction, meets the radio network communication agreement of being set up according to exemplary embodiment.
Summary of the invention
Conventional online transaction is for example bought commodity on network and/or service is subject to the attack of security breaches, thereby causes losing individual, finance and/or other confidential information.In addition, in the network of trusted (for example internet) not, businessman and buyer all are in a side who gets into the risk of bad movable person's transaction so that do not support to negotiate a price.Traditional online transaction model also can require the file purchaser's of businessman confidential information, and can require them to handle the payment aspect of transaction.In addition, conventional online transaction model is difficult to use concerning the purchaser and produces generally not trading experiencing intuitively.For example, via the browser that uses chaotic and unmanageable login/password example, carry out conventional online transaction.
The applicant is familiar with and recognizes: can be convenient to simpler and safer online business transaction framework with entrusting to lower-level system (and away from browser and terminal user) by at least a portion of the transaction responsibility of businessman and browser handles in the conventional model.For example, can handle one or more transaction tasks by the operating system at one or two place of terminal user and businessman, wherein information can obtain safer protection.Through with in one or more task Embedded Operating Systems, can alleviate some burdens that the user transmits Transaction Information, thereby make experience more directly perceived and strengthen security.In addition, can alleviate businessman safeguards buyer's information, handles payment information and/or handles transaction.
The applicant further recognizes: can be more safer and technological easily than login/password model through exploitation, alleviate the problem that is associated with the identity of confirming the buyer.In one embodiment, the Subscriber Identity Module (SIM) of terminal user's that in a planned way issue through stored energy, relevant identity information provides relevant buyer's identity information, thereby produces still less chaotic and more direct buying experience.In addition, the embodiment among this paper otherwise not trusted or unsafe network (for example internet) go up and use SIM equipment, be provided as single-stage or multi-stage authentication and configured protocols, method, computing system and other mechanism.
The applicant further recognizes: use common uninterested third party to provide each transaction element of online business transaction to alleviate the risk that buyer and businessman are absorbed in.The business transaction system is provided in one aspect of the invention; Wherein first network entity provides the checking to buyer's identity; And the various network entity provides the checking of the user being paid the ability of purchase, so that be that stranger's businessman and buyer can conclude the business each other comparatively safely.
Other embodiment allows the tripartite security business transaction between businessman, consumer and the payment with responsive escrow account information businessman or the opaque mode of third party to be provided.In this embodiment, transmit payment token via the consumer between businessman and the payment provider.Do not control or obtain the mode of any sensitive account information of consumer, these payment token of encrypting or sign with businessman and other people.However, businessman still can verify the payment token of the ability of expression service that consumer payment provided and/or commodity assuredly.
In another embodiment, the electronics charging information is used for payment authorization, audit and other purposes.In this embodiment; Entities of various kinds (for example consumer, businessman, payment provider or the like) is provided with the machine readable electronic bill, and this machine readable bill is used for automatically asking and confirms to pay, creates transactions history, provides the more accurate description of the payment of service/goods and other purposes that are used for online business transaction.This charging information also can be used for the payment associating to each professional copartner's of this businessman single payment from the consumer.For example, this businessman can have and in business transaction, provide each professional copartner's of service and/or commodity contractual relation.The electronics charging information can comprise those part payments of between each copartner, distributing, do not need customer interaction or audit and payments mechanism separately so that the payment associating can automatically occur.
Among this paper the rule formulated by any amount network entity that comprises consumer, businessman, payment provider or the like of the use that provides or the constraint mechanism of coming to judge automatically business transaction.For example, the payment options of accepting by businessman can with the consumer can with payment options make comparisons.Based on these relatively, can only those options that are complementary be provided to the consumer.In addition, based on this comparison and/or based on other rule or constraint, can automatically select payment options.For example, the consumer can be based on the type of the trust restriction payment of setting up with businessman.The rule and/or the constraint of many other types of definite exercises that can in business transaction, occur also can be arranged certainly.
Embodiment
The conventional model that is used for networked business transaction concentrates on the browser as the interface that is used to ask and submit to individual and Financial Information between purchased person and businessman or the service supplier, regardless of being directly through businessman or via the third party transaction supplier.In first instance, businessman bears the pressure of creating and safeguarding the foundation structure that can inquire about, obtain, handle and handle individual and Financial Information that has certain minimum security level usually.In addition, businessman can be responsible for safeguarding account and the account information (generally including the individual and the Financial Information of secret) to each of its consumer.
The buyer must abandon personal information (for example name, address, telephone number or the like) and Financial Information (for example debit card and credit number and expiration, account No. or the like) is accomplished transaction.In certain rank, the buyer must believe businessman be honest middle man and only with information as being authorized, will be with good sincere the operation.Likewise, businessman must believe that the buyer is that he represents, and the payment information that is provided is associated with the terminal user who buys really.Possibly not exist businessman to confirm the reliable method of validity of buyer's identity and/or payment information.In the distributed networked environment, the buyer possibly trust the prestige of businessman, and this can limit the source that the buyer has a mind to conclude the business.Businessman maybe even be that good sincerity, sincere buyer low be sure of operation through the buyer.In the network of trusted not, this model possibly present excessive risk a side or both sides.
Even when between buyer and businessman, forming the trust of confirming and being worth, the database of storing the consumer information of being safeguarded by businessman also possibly be easy to receive assault, information stealing even otherwise can be the bad movable person in honest and the believable enterprise.The third party transaction supplier is easy to also receive that electronics is stolen, security breaches or the like influence.More complicated " spy " program makes the hacker can record keystroke and obtain the screenshot capture of the computing machine of evil in damaged condition, thereby makes the transaction based on browser be easy to especially stolen by electronics.Therefore, the buyer who carries out online business transaction according to traditional method and model possibly be easy to suffer propagation and unauthorized of its secret individual and Financial Information to use.
Each businessman that conventional business transaction model requires buyer and him to want to carry out business transaction with it usually sets up the account.Usually, the account is protected via login name and password and visits, thereby requires the buyer to manage a plurality of logins and password and safeguard which login/password combination is corresponding to which account.Some consumers possibly resort to its login/password combination is stored on their computing machine locally, or identical login/password combination is used for all accounts.Two kinds of trials managing a plurality of accounts all are easy to be stolen, assault and/or other security breaches.
For example, will obtain single login/password combination if steal through electronics, then the consumer is in the risk that his/her all account is damaged.Except the inherently safe risk relevant with the login/password example of routine, the buyer possibly find that account's login process is the trading experiencing of difficult usefulness.Especially, when the buyer needs, must sign in to the account and make transaction inconvenient, because the buyer must produce this information with one or another kind of mode before accomplishing transaction.In addition, through the third party transaction supplier, the buyer is redirected to third party transaction supplier's website from the website of businessman.This step is not directly perceived, and is trouble and confusion to the buyer at least.
The applicant is familiar with and recognizes: will in conventional model, entrust to lower-level system (and away from browser and terminal user) by at least some transaction responsibilities of buyer and browser handles and can be convenient to simpler and safer online business transaction framework.In one embodiment, handle one or more transaction tasks by the operating system at one or two place that is in terminal user and businessman, wherein information obtains safer protection.Through with one or more task Embedded Operating Systems, can alleviate some burdens that the user transmits Transaction Information, thereby make that experience is more directly perceived and strengthen security.In addition, can make businessman avoid safeguarding buyer's information, handle payment information and/or handle transaction.
The applicant further recognizes: it is safer and technological easily to compare login/password model through exploitation, can alleviate and verify user's the relevant problem of identity.Relevant buyer's identity information is provided by Subscriber Identity Module (SIM) card that stores the identity information plan issue, relevant terminal user in one embodiment.In another embodiment, through embedding or otherwise be coupled to the smart card that the buyer carries out the network equipment of online business transaction identification information is provided.Use various recognition devices based on chip or card to allow the buyer that his or her identity and particular device such as portable phone or networked computer are linked.
Term " in a planned way " and/or " automatically " are meant and need not action manual or that the operator participates in carrying out basically.Especially, planned or be meant the action that starts and/or carry out through one or more computer programs automatically.For example, it is planned to provide login and/or password information to provide identification information not to be regarded as through request user (for example buyer), because carry out movement content by the user.Yet program is sent identification information (for example SIM number, network address hardware ID or the like) and is not asked the action of user's input information will be regarded as planned.Notice that these automatic operations can realize through software or nextport hardware component NextPort.
The applicant further recognizes: each element of transaction of online business transaction is distributed in is convenient to business transaction safer on the untrusted network on the various network equipment.In one embodiment, identity supplier and payment provider, from terminal user, businessman separately and the various network entity checking support is provided during business transaction each other.Term " network entity " in this article refers to network and exists, and can be one or the combination of terminal user/buyer, identity supplier, payment provider, businessman or the like.Network entity can be present on the network via one or more network nodes.For example, a plurality of networked devices can be operated under the protection of single network entity, such as the identity supplier who utilizes a plurality of servers to carry out at line service, or are connected to the terminal user of network via cellular phone and personal computer.Network entity can be the enterprise such as bank or retailer, or such as terminal user's individual.
In one embodiment, each element distribution of online transaction separately with network entity independently on.For example, the identity supplier can businessman can be used for verifying that the form of the identity token of buyer's identity provides identity validation.Identity token can comprise one or more identity documents of terminal user.Can be based on the identity information that provides by terminal user/buyer, such as from the user number of SIM, the network address (for example NIC (NIC) sign, worldwide name (WWN) or the like), log-on message or the like, send identity token.Similarly, the form that payment provider can payment token provides the checking to the ability of terminal user's payment.In addition, on behalf of the buyer, payment provider can handle payment transaction, buys commodity and/or service to repay from businessman.Said frame especially allows in the untrusted network environment, to carry out online business transaction with relative trust as stranger's buyer and businessman, as further said in detail in each exemplary embodiment that provides hereinafter.
In addition, an embodiment provides in online or the retail environment in the tripartite secure communication between businessman, consumer and the payment provider during the business transaction of buying service and/or commodity.As will discuss ground more in detail hereinafter, payment token passes to businessman from payment provider via the consumer.These payment token provide the proof of the ability of consumer payment service and/or commodity through allowing businessman directly to the authenticity of payment provider checking token.Although these payment token are discerned the payment authorization of service and/or commodity uniquely, the sensitive information of the relevant consumer's of being used for escrow account both had been not included in token, also can be otherwise encrypted so that invisible to businessman.Therefore, consumer's sensitive information is opaque to businessman, thereby even when allowing the consumer between them, to have insincere the relation, also can buy article relievedly from businessman.In addition; Because businessman can be to the direct validation of payment token of payment provider; Therefore businessman can be that the capable consumer who pays these services and/or commodity sends article relievedly, and need not safeguard relevant consumer's Financial Information (for example credit number, account information or the like).In addition, because payment provider can be verified the authenticity from consumer's payment token, so payment provider can be to businessman's transfer funds relievedly, thereby accomplishes tripartite security business transaction.
As previously mentioned, other embodiment that are used for the framework that this paper provides are with the safer subsystem (for example operating system) of part trade give-ups to computing equipment.This advantageously allows many performances, comprising: be used to allow the valid application program that the abstract model that online business transaction is experienced in the band is provided; The swindle of type protection in addition; The bill that is used to examine, pay associating and other payments or verify purpose is captured and is appeared; The ISP's code that is used for other security and businessman's dedicated functionality is carried out; Multi-stage authentication; And other characteristics.For example, some abstract models allow legal and other application programs provide on-line purchase and paying ability to the user, directly in application program, take place as these transaction, although the part business transaction is carried out outside band.Example comprises: catalogue buy (for example Amazon, Sears or the like), directly buy from the content of multimedia in the multimedia application, with test model downloaded software/recreation and through payment model release automatically in the band they, allow to support service, such as Short Message Service of passing through Email or the like based on subscribing.
In addition, in another embodiment, framework is captured and is presented the electronic account in above-mentioned tripartite safety (and the other) business transaction, as the mechanism that will be used for other checking, audit, payment associating and other purposes hereinafter in greater detail.In addition; Through business transaction being transferred to the safer part of subsystem; Other embodiment allow businessman on machine, to move private code (for example other user rs authentication, payment rule/mechanism, user experience or the like), and trusting these codes simultaneously will can assault or damage.Certainly, like more detailed said ground hereinafter, the applicant has further recognized other favorable characteristics through using at this abstract model that provides.
In another embodiment, the applicant also provide a kind of use mobile module safety to transmit and authenticating identity with to the paying ability of various different services total system and agreement.For example, can use Subscriber Identity Module (SIM) (or other similar mobile modules) to come in multistage verification environment to service or server authentication user and/or equipment.In this embodiment, with the irrelevant network of the network mobile foundation structure that is used for mobile module on authentication mobile module (and even maybe terminal user).Therefore, this system confirms to have mobile module through to the effective escrow account of mobile foundation structure authentication.This uses existing security protocol (for example WS-authentication, WS-safety and other similar agreements) to set up the secure communication with the computing equipment that is connected to mobile module and service (for example Web service (WS)).This secure communication also can be used for through the exchanges data authenticated between other agreements and mobile module and the mobile foundation structure-more describe ground in detail like hereinafter.In addition, other embodiment provide from moving the agreement and the state machine of the abstract computing equipment of foundation structure (being used in the communication on the separate network).Therefore, mobile module itself becomes portable terminal and computing equipment becomes peripherals, thereby meets current wireless standard, such as 3GPP (third generation partner program).
Fig. 1 illustrates the block diagram of the business transaction system 100 that is made up of a plurality of network nodes, and these network nodes comprise: terminal user (buyer) computing machine 110, merchant computer 140, identity supplier's computing machine 120 and payment provider computing machine 130.Each of above-mentioned node can comprise the one or more computing equipments via network 105 interconnection.Should recognize: terminal user's computing machine, businessman 140, identity supplier 120 and payment provider 130 can be associated with the network entity such as individual, company or enterprise.For example, terminal user's computing machine 110 is associated with the individual that this computing machine of employing visits the resource on the network usually, and merchant computer 140 can with commodity are provided and/or the company of service is provided or enterprise related.The one or more computing equipments that form each the above-mentioned parts in the business transaction system 100 can be used as entrance, computing platform and/or the carrier operation of related network entity at this network communication.
Notice that although can in the on-line purchase environment, be described in the embodiment that this provides, these embodiment also can be used in and sell directly to households in the transaction.For example, the above and following description of business transaction can be applied to the consumer and buy product at retail shop, wherein uses payment, identification, authorizes and other embodiment.Therefore, the embodiment that online experience is used for describing this paper only is used for the example purpose, and is not intended to limit or the scope of the embodiment that otherwise narrows down, only if explicit state is arranged in addition.
Notice that network 105 can be any kind network in any kind configuration of interconnection and the allowing node communication that is connected to this network.Node or equipment can connect via copper (for example type 5) cable, optics, wireless or its combination in any is connected to network.Can use such as any low level protocol of Ethernet and/or such as any information protocol of TCP/IP and transmit information.Network 105 can have the equipment of any amount that is attached thereto, and can be to trust (for example Intranet) or untrusted network (for example LAN/WAN, internet or the like) or both combinations.The computing machine that is connected to this network can be the equipment of any type, includes but not limited to or the combination in any of mobile phone, desk-top computer, tablet personal computer, server, workstation or the like.
Fig. 2 illustrates the diagrammatic sketch that is used for starting and carrying out in online transaction the system and method for authentication according to an embodiment of the invention, and Fig. 3 illustrates the diagrammatic sketch that is used for carrying out in online transaction the system and method for payment negotiation, checking and/or proof according to an embodiment of the invention.Can use these methods to carry out the online transaction between terminal user/buyer and the businessman alone or in combination.In following description,, do not do differentiation between network entity and the associated network equipment thereof only if specifically note.For example; " identity supplier " is commonly used to the identity supplier is described as entity (for example bank, government organs, agency or the like); And be described as the computing equipment that this entity is used for carrying out various types of network functions, such as the authentication that the terminal user is provided or otherwise represent physical operation.
Terminal user's computing machine 110 can place an order 242 with businessman 140.Order 242 can be any expression that the terminal user wants to buy from businessman 140 one or more commodity and/or service.In addition, order 242 can be selected commodity or service and produced by the Web browser that the terminal user resides in the page on the merchant web site via demonstration, or can be by selecting option from the application program of local runtime and produce, like more detailed said ground hereinafter.As the example of first instance, commodity and/or service that businessman 140 can provide a website to show or sell that it provides maybe can provide the line directory of commodity.Order 242 can be the expression that the terminal user wants to buy from businessman 140 any kind of one or more commodity and/or service.
As the example of second instance and as the replacement scheme of selecting one or more commodity and service from the website of businessman, order 242 can be derived from application program or other programs of terminal user's computing machine 110 this locality.For example, the terminal user can create via word-processing application, generation or Edit Document, uses demonstration applications design lantern slide and/or uses the Flame Image Process application program processes to be used for the image or the figure of placard or brochure.Application program can comprise the option under the print menu, and these imaginations allow for example, to be utilized local disabled printing feature, or otherwise adopted professional print service by third party's document printing.When selecting this option, application program can send to businessman 140 with order 242 via network.It will be appreciated that order 242 can be any expression of buying any commodity and/or service, because each side of the present invention is not limited to this point.
In response to order 242, but the 140 requesting terminal users 110 of businessman provide terminal user's identity and/or terminal user's the expression (step 205) of his checking claimed really.For example, any information in the source of relevant order 242 possibly not known by businessman 140, and possibly need relevant terminal user identity information and/or guarantee that the terminal user does not deceive his/her identity.In addition, businessman 140 can send notice or the expression that requires payment services, and requires to provide payment token.For obtaining payment token, be necessary at first to set up identity, like more detailed said ground hereinafter via identity token.In either case, terminal user 110 can respond the request of businessman 140 through the service (step 215) of supporting identity supplier 120.
For obtaining identity token, terminal user 140 provides identity information to identity supplier 120.Identity information can comprise any information that the terminal user that identity supplier 120 can be distinguished utilize terminal user's computing machine 110 and identity supplier possibly provide the various other-end users of service to it.For example, identity information can comprise and the hardware associated unique identification of terminal user's computing machine 110 symbol.In one embodiment, identity information provides through the SIM that sends the unique identifier of this user.Identity information can comprise the unique hardware number of the NIC (NIC) that terminal user's computing machine 110 is provided, worldwide name (WWN) or other network addresss of terminal user's computing machine 110; Or any other means that can identification terminal subscriber computer 110, comprise login name/password combination that (in certain embodiments) set up.
In response to the identity information that is provided by the terminal user, identity supplier 120 provides identity token (step 225) to the terminal computer 110 of authentication that relevant terminal user is provided and/or voucher.Identity information can be that another network equipment can be used for the electronic information of any kind of authentication, checking and/or definite terminal user ID.For example, identity token can comprise terminal user's identity documents.Identity documents can include but not limited to any one of name, address, birthday, address, telephone number, e-mail address or the like or make up.
Identity token can comprise the electronic signature from identity supplier 120, thereby proves that this identity documents is correct.In this way, businessman and/or payment provider can be trusted third party's (being the identity supplier) of no interest relations, rather than terminal user's representative arbitrarily.But crypto identity token before on network, transmitting, and deciphering when receiving, so that prevent eavesdropping on the network by the expectation network equipment (for example businessman, payment provider or the like, as more detailed said ground) hereinafter.In other embodiments, payment token only is the voucher of terminal user ID, and not subsidiary identity information.
Can be randomly, businessman 140 can be through sending to request identity supplier 120, and identity token (step 245) is confirmed in request.The request that is used to confirm identity token can comprise identity information is forwarded to identity supplier 120 from businessman 140.After the request of confirmation of receipt identity token, identity supplier 120 can confirm this identity token, and whether the token that determines one's identity thus is true.Then, identity supplier 120 can be transmitted to businessman 140 (step 255) with the expression of the authenticity of identity token.Selectively, businessman 140 self can confirm identity token (step 265) (for example effectively or otherwise handling this token through the supposition identity token) simply.Can be randomly; To respond from businessman 140 and return to terminal user's computing machine 110; Wherein, whether effectively response can comprise identity token message, any feasible discount or the message of sales promotion and/or the message of any other type, because present invention is not limited in this respect (step 265).
Terminal user's computing machine 110 can be through identity token being sent to payment provider 130, from payment provider request payment token (step 315).Perhaps, the terminal user can use and the similar fashion that combines identity supplier 120 to describe (promptly through identifier is provided, such as SIM user number, NIC address and/or use login/password combination), asks payment token through signing in on the payment provider 130.Should recognize: the terminal user can use other mode request payment token, because present invention is not limited in this respect.In addition, the terminal user can send the relevant information of buying, such as price and the character bought, so that payment provider can the verification terminal user can be paid.Yet it is essential providing and buying INFORMATION IS NOT, because it possibly be unnecessary or can in the subsequent step of transaction, handle.
When businessman in traditional Trading Model directly concluded the business with the terminal user, businessman possibly must guarantee that the payment information that is provided by the terminal user is correct and enough.For example, the credit number that businessman possibly provided through access operation, with inquire about this number whether effectively, this card whether effectively, whether have enough funds and/or this card whether correctly to be associated with the identity that provides by the terminal user.If some information are defective, then possibly have to cancel, stop or drop the business.In addition, the terminal user feel to conclude the business accomplish and do not visit again this network and/or do not visit again the website or the like of businessman after, transaction stops and possibly take place.
Businessman must notify the terminal user existing problems of should concluding the business then, and the terminal user will have to once more the line footpath this conclude the business correction problem (, specifying to have different cards of enough funds or the like) for example through correctly importing payment information.In some instances, possibly not notify the terminal user, and this business transaction is accomplished never.
Among the described in this article different embodiment because remove correct, the enough funds of non-end-user payment information can with and/or supplier's proof payment token will not be sent in GC group connector user payment, so businessman's continuous business immediately.Any defective in the transaction can be discerned and solve in real time, is to satisfy expection so that all each sides can relatively be sure of to accomplish about transaction.
In addition, but (for example handle credit card, account transfer or the like) because the payment provider processes financial transactions, businessman can be in order to avoid set up and safeguard and for example handle credit number or otherwise handle payment process and the required foundation structure of funds transfer.In some cases, payment token be operating as payment provider can be through remittance or through transmit the assurance of specified fund to businessman's EFT.Payment token also can be the assurance of paying through non-electronically, sends check or other negotiable instruments such as promising to undertake to businessman.
See that from the viewpoint of businessman business transaction has basically no risk,, therefore be not easy to swindled, fool and take advantage of and even the ignorant mistake when individual and Financial Information are provided because terminal user's identity and payment verification are handled by the third party.Therefore, businessman possibly more be willing to be intended to carry out online business transaction with unknown end-user on the untrusted network.See from terminal user's viewpoint, individual and Financial Information belong to safeguard this information and/or terminal user with the entity of its opening relationships.The individual and the financial terminal user profile of secret needn't offer businessman, thereby reduce the weakness that confidential information is misapplied or usurped.Therefore, the terminal user possibly more be ready to carry out business transaction with unknown businessman, and needn't worry whether businessman is credible.
In some conventional business transaction models, identity information and payment information are imported by the user, and are handled by third party or businessman.As stated, these models are that difficulty is used, deficiency and consuming time to the user.In addition, the conventional model security and the businessman that present relevant terminal user's security information is subject to swindle and/or the terminal user is prone to take place the variety of issue of payment fault.The applicant recognizes: the business transaction software that each of the computing machine that in various business transactions, utilizes is installed can reduce or eliminate the problem about safety and swindle.In addition, can be through many actions of handling by terminal user and businessman in the conventional model of business transaction software executing, thus make transaction more simply and more directly perceived to the terminal user.
Fig. 8 illustrates a tripartite secure communication that more aforesaid characteristics are used for during business transaction, setting up and an example of various confidence limits.More describe ground in detail like hereinafter, this model allows single or subscribes payment and the payment associating, so that the more payment of little company can be assembled by service or businessman, thereby allows the single bill of consumer payment.Shown in the way, distributed system 800 is configured to be convenient to the business transaction between consumer 810, businessman 830 and the payment provider 805.Payment confidence limit 815 was opened businessman 830 in 805 minutes with consumer's 810/ payment provider, so that between payment provider 805 and consumer 810 or consumer's computing equipment (any one that promptly use available mechanism described in this paper suitably discerned or self verifies the consumer to payment provider), have trusting relationship.Therefore, consumer 810 can utilize this trusting relationship to come the payment to businessman 830 of various types of payments and various authorization of service.
For example, suppose that businessman 830 requires prepayment consumer 810 to want the product of buying (for example requiring the consumer goods of prepayment, like automobile, computing machine or the like).Yet before the request payment authorization, described in this paper, the user of consumer's 810 computing equipments can require suitably to verify.As long as authentification of user, consumer's 810 computing equipments can suitably be asked payment provider 805 payments through any different mechanisms described in this paper.For example, consumer 810 can provide by consumer 810 computing system signature or other solicited messages of encrypting to payment provider.This authentication the suitably request (that is, the user has advance account, line of credit or other escrow accounts, such as the mobile subscriber who is described below) of the affirmation of paying ability of account owner's (being the consumer).If payment token is then sent in success, reserve the fund that is used to guarantee payment then.Usually by payment provider (the for example mobile network's server described in this paper) signature and/or otherwise encrypt this payment token, and be delivered to consumer's 810 client computer.Consumer 810 sends back businessman 830 with this payment token, and businessman 830 is to this token of payment provider checking, and if success then accomplish this order.
In case prepare to send article (for example having established goods for consumption), businessman 830 just can use this reservation payment token to ask payment provider 830 payments.Notice that the amount of money that is used for Payment Request can be different from the amount of money of being reserved.However, payment provider 805 is verified and is returned payment response to businessman 830 and/or consumer 810.If checked and approved, then businessman 830 can transport (perhaps providing) this order to consumer 810, and its payment is provided.On the other hand, if the refusal to pay or require further user interactions, then what action businessman 830, payment provider 805 and/or consumer 810 can select to take.For example, if do not mated with the fund of reserving by the amount of money of businessman's 830 requests, then the new amount of money can requesting consumption person 810 be authorized by payment provider 805 and/or businessman 830.In addition, payment provider 805 can require to authorize user's input of transfer funds, no matter the payment of reserving and asking has any variation.Certainly, also can conceive other actions and the process that is used to accomplish business transaction at this.
Notice that subscribe article although above-mentioned tripartite secure payment mechanism is used for buying, single payment also can be applied to other services and/or commodity.For example, single payment mechanism can be applied to prepare downloaded software program immediately.Selectively or together with ground, but the programs at different levels that the single payment release is downloaded (for example student's version, expert's version or other independent functional).In fact, will recognize that above-mentioned single payment can be used for various dissimilar purchases, a part is with slightly improved form of payment.
For example, suppose that consumer 810 wants to set up reservation to continue service (for example newspaper or subscription, film reservation, game application or other expire payable at sight commodity and/or service) with businessman 830.Therefore, businessman 830 will be to consumer's 810 inquiry payment token, and consumer's 810 client computer can be authorized the user interactions to continue with request thus, described in this paper.Similar with preceding text; Consumer 810 signs or otherwise encrypts Payment Request (for example using the electronics charging information, as mentioned below) and this request is sent to payment provider 805 (the for example third party of mobile operator, credit card company, prepayment or other types service or the like).This request of this authentication and verifying account holder (being consumer or client) have enough initial funds.If success is then sent, signed and/or encrypts payment token, and returns to consumer's 810 client computer, this client computer is returned the payment token transmission and is subscribed businessman 830.Businessman 830 verifies the affirmation of token then and accomplishes to subscribe and is provided with.
Notice that payment token is stored in businessman 830 usually, and when subscribing payment, regularly use by payment provider 805 requests.Therefore, when handling the reservation payment, businessman's 830 retrieval payment token also send it to payment provider 805, are used for payment and settlement.Payment provider 805 is verified and is returned payment response to businessman 830 and/or consumer 810.Permit response if return, then subscribe businessman 830 and will pay the runtime next payment provider 805 account and ask and receive payment.Yet if Payment Request is rejected, payment provider 8705 and/or businessman 830 can suitably respond.For example, businessman 830 (or payment provider 805) can get in touch (for example via e-mail) with user or consumer 810, informs that they do not pay off payment.Consumer 810 can carry out aforesaid single payment then, or through same or different payment provider 805 another reservation payment is set.Certainly, businessman 830, payment provider 805 and/or consumer 810 can have other rules or the requirement that is used to handle these and other payment authorization, like more detailed said ground hereinafter.
Shown in preceding, a plurality of business partners that other embodiment allow 810 of single consumers to pay to have contractual arrangement or the associating of subsidiary company.Ordinary business practice relation is complicated, and requires to divide the various services that pairing provided in the specific enterprise model and/or the payment of commodity.For example, when from travel agency's 830 purchase tourisms, can be consumer 810 package deal is provided, comprise that flight arrangement, hotel stay, passport is served or the like.Therefore, the businessman 830 that contracts out many these services and/or commodity usually must preserve the itemized account of these business transactions, so that its business partner is carried out suitable payment.For alleviating the complicacy of these record keeping and other tasks, the embodiment among this paper provides automatic payment associating based on each transaction business partner in the particular type relation.
For example, automobile leasing service (for example business partner " A " 820) can require businessman's 830 payments, as the part of bundle sale holiday.Insurance company's (for example business partner " B " 825) can be based on each transaction fee to businessman's 830 charges.Based on business partner confidence limit 835, when businessman 830 is carried out single payment, can payment automatically be formed an alliance with each business partner (for example " A " 820 and " B " 825).In other words, 805 pairs of businessmans of consumer 810 or payment provider 830 carry out single payment, yet can suitably pay all subsidiary companies that have according to the business relations of the confidence limit of business model 835.Notice that this payment will depend on electronics record keeping report usually, like more detailed said ground hereinafter.More specifically, the various piece that is used to capture, appears with the electronic bill of other purposes can should be joined to each business partner corresponding to what part of payment.In addition, can sign and/or encrypt these parts each so that the customizing messages of relevant payment to consumer 810, payment provider 805 or as by the different business partner 820 of different trust boundaries 815,825 definition, be opaque between 825.
Note,, also have other business relations that can use this embodiment although described above-mentioned payment conjunctive model with respect to travel agency's experience.For example, make up the article with a plurality of parts of buying through different suppliers company, buy be used for the material of these products and the product supplier who pays based on each article, based on the payment or the binding of the media product of each sales payment royalty or can otherwise calculate and the business model of any other type that business partner is paid also can be used said embodiment based on each article.Likewise, each embodiment that travel agency is used for describing this paper only is used for the example purpose, and is not intended to limit or narrow down said embodiment.
Fig. 4 illustrates the networked computer system that is used to handle business transaction according to an embodiment of the invention.Networked computer system 400 can be similar with computer system 100 shown in Figure 1.Yet in Fig. 4, each computing machine in the system 400 comprises the local business transaction software of installing 485.Especially, terminal user or consumer's computing machine 410, identity supplier 420, payment provider 430 and businessman 440 comprise business transaction software 485a-485d respectively.The business transaction software that is installed on each computing machine in the system can be identical locally, or can customize certain computer in view of computing machine role (being that computing machine is operating as terminal user's node, businessman's node, identity supplier's node, payment provider node or the like or some above-mentioned combinations) in transaction.In either case, with each installation be configured to other networked computers on fabricated section communicate by letter so that carry out online transaction.For example, can with each fabricated section be configured to networked computer on fabricated section communicate by letter so that execution graph 2 and/or method shown in Figure 3.
In one embodiment, the local business transaction software 485a that installs can create the identity token that utilizes terminal user's computing machine 410 identification terminal users on identity supplier 420.In addition, the business transaction software 485a on the identity supplier 420 can be transmitted to terminal user's computing machine 410, payment provider 430, businessman 440 and/or any other computing machine with this identity token, because present invention is not limited in this respect.Can respond the expression of between terminal user and businessman, carrying out online transaction at the local business transaction software 485b that installs on terminal user's computing machine 410, send identity information (so that identification terminal user).This locality is installed in the payment token that the business transaction software 485c that is installed on the payment provider 430 can receive identity token and the ability that generates verification terminal user payment (for example payment token) online transaction.This locality is installed in the checking of the ability that the business transaction software 485d that installed in the businessman 440 can the receiving terminal user so that before proceeding online transaction, pay.
In one embodiment, each computing machine in the system 400 uses the local fitting operation of identical or similar operation system 495.For example, each computing machine in the system 400 can use Microsoft
Operational System Control.Business transaction software 485 can be the subsystem of operating system.In this way, each computing machine that is used in the business transaction is communicated by letter with the known mode of making peace.Because the direct communication and handle affirmation, checking and security on network of business transaction software, so the terminal user needn't know relevant any information each other with businessman, and the more important thing is and needn't set up any trusting relationship.In addition, because some part of transaction handled by operating system,, and do not need obscuring and the usually participation of difficulty of terminal user so most of transaction can invisibly be carried out the user basically.
Through on each computing machine, having business transaction software, various encryption technologies can used information during a computing machine is sent to another.In addition, can be included in effective other security feature in the finite time cycle, such as identity token and/or payment token.For example, identity token can comprise the time component of fixed time, and it is invalid that any assembly that after this time, receives and handle token should be regarded as, and this token is regarded as the checking of identity and/or payment.The business transaction component software can in a planned way be handled any time limit relevant with token.This can prevent through from obtain token in inappropriate use of time " fishing " after a while.
Should recognize: business transaction software needs not to be the part of operating system, but can be any local program or the package of the computing machine of the business transaction participating on network, communicating with one another.For example, business transaction software can be the application program by third party's exploitation, and it can install on computers with operation on the operating system that is installed on the computing machine or operation with having no truck with.Can application deployment be become any one or combination operation with operating system, so that can use the computing machine or the equipment of extensive performance and configuration, and be not limited to any specific operating system, processor, instruction set or the like.
Fig. 5 illustrates the business transaction of being initiated by the terminal user who selects one or more required commodity and/or service, and the transaction part of wherein buying is at least in part by the transaction software subsystem processes of a part that is distributed as each operation system of computer of participating in one or more transaction.The terminal user who is connected to network 505 through terminal user's computing machine 510 can run application 555.Application program 555 can be the browser that shows the enterprise web site that commodity or service are provided.Application program 555 can provide the application program of the option of participating in online transaction, such as the Flame Image Process edit routine that allows user's steers image.
The terminal user can select one or more commodity or service to buy via application program 555.For example, the terminal user possibly hope to make the image through editor professionally to be printed on the photographic quality paper.Application program 555 can comprise this option under print menu.Printing Qptions can generate when being selected lists all available Printing Qptionses, comprises the window or the dialog box of the service that can on network, use.For example, Printing Qptions can be listed ISP 540a, 540b, 540c, as the option that is used to provide print service.When the user selects one of ISP, can start aforesaid online business transaction.Especially, service supplier can the requesting terminal user provide identity token.As response, application program 555 (or embedding the application program in the business transaction software 585) can generate the dialog box or the interface of listing available identity supplier.For example, like more detailed said ground hereinafter, dialog box can be listed identity supplier 520a, 520b, 520c, can select to handle the possible identity supplier of authentication as the user.
Fig. 9 illustrates in the compartment system and according to the use of the commercial subsystem of the trusted of exemplary embodiment and other characteristics.As shown in, the local computing devices 920 in the distributed system 900 are configured to according to the embodiment described in this paper online or local retail transaction is provided.Notice that although trusted business transaction subsystem 965 only is shown the part of local computing device 920, similar subsystem also can reside on other network entities.Be also noted that; Although among this paper each assembly or module are described as residing on any certain entity; But these assemblies or module can be distributed in the The whole calculations system, and reside on the network entity of any amount (that is, various piece may reside on one or more network entities).Therefore, the network equipment or entity only are used for example purpose with using at this to the specific aesthstic layout of particular module, and are not intended to limit or the scope of the embodiment that narrows down at this.
No matter how are the distribution of computing system 900 and aesthstic layout, as previously mentioned, there is the trust boundaries 906 of separating the trusting relationship between each assembly.Although can divide this relation differently, in the present example, trusting relationship is present in payment provider 900 in trusting between the business transaction subsystem 965.This advantageously allows many characteristics that current business system can not provide.For example, trust boundaries 906 from the business transaction of businessman abstract application program 925.Therefore, previous version and other application program 925 can be experienced in terminal user 940 provides band, although most function appears at outside the band.For example, allowing on photographic quality paper, to print in the above-mentioned example of professional image, selection, identity validation, the payment options in the drop-down menu and being used to helps the user to carry out the part that other assemblies that this service buys are revealed as application program 925.In addition; Application program 925 can be bought calling 930 to trusting business transaction subsystem 965 when receiving the input of the service of purchase and/or commodity; Use this purchase to call out then and generate dialog box; Receive user's 940 inputs 935, perhaps otherwise automatically communicate by letter, described in this paper with businessman 905 and/or payment provider 990.
In other words, user 940 and nonessential trusted application 925 or businessman 905 in business transaction.On the contrary, trust is limited to the subsystem 965 when front baffle, and this reduces secret and carries out required degree of belief of business transaction or grade safely.Promptly; End user via subsystem 965 imports 935; Or it is detailed 950 to store the account of 945 calling parties 940 from safety 960 account informations, and this account detail comprises that the user is reluctant or the inconvenient sensitive information of openly sharing 955 (for example credit card information, personal information, user name/password or the like).Likewise, abstract application program 925, businessman 905 and other assemblies are of in this article from the finance that receives subsystem 965 control and other escrow accounts detailed 955.These are very different with aforesaid current business transaction, and wherein application program 925 or businessman 905 safeguard and control account information.Therefore, the embodiment of this described in this paper advantageously provides other safe level with other embodiment during business transaction.This is much direct trusting relationship, has the right access or contacts the assembly of highstrung finance data or the quantity of mechanism so that minimize.
As shown in Figure 9, similar with above-mentioned tripartite security business transaction, trust boundaries 906 is also represented the secure communication between payment provider and the trusted business transaction subsystem 965.Therefore, subsystem 965 is verified to payment provider 900 with said variety of way, thus permission and its secure communication.With above-mentioned similar; Local computing device (can be the handheld portable devices that is described below in the local retail transaction; Personal computer in the online transaction, or other similar devices described in this paper) want the various services and/or the commodity that provide by businessman 905.In this example, charging information 910 is provided for local computing device 920, is used for employed other purposes of authentication, audit and exemplary embodiment as described herein.This charging information can include but not limited to: the charging information of the price of commodity and/or service, the detailed description of business transaction, businessman's 905 customizing messages, payment unions information, type of transaction (for example single payment, reservation or the like) or other types.Bill information 910 also can comprise out of Memory, such as businessman constraint and payment options, like more detailed said ground hereinafter.
In one embodiment, bill information 910 is to be configured to machine-readable electronic bill, and it provides many favorable ability for current business transaction system.For example, it can be the part (or otherwise in another communication, sending payment provider 990 to) of payment token request 980 that an embodiment provides charging information 910, as previously mentioned.Likewise, this bill information can be used for payment token affirmation 940 by payment provider 990.More specifically, confirm to compare with the payment token that provides by businessman 905 985 information by the bill information 910 that consumer or local computing device 920 provide in 904 in payment token.Therefore, confirm 904 bill information 910 and bill information 910 couplings from token request 980 if be used for payment token, then payment provider 990 can further be guaranteed the authenticity of payment token 985 and the reliability of businessman.
Notice that how being relayed to payment provider 990 (and other assemblies among this paper) from the bill information 910 of businessman can change.For example, the bill information 910 that sends to payment provider 990 from businessman 905 can be the copy that sends to trusted business transaction subsystem 965 or client's 920 bill information 910.Selectively, perhaps together with ground, bill information 910 can be signature and/or the encryption version from payment provider 990 via consumer or local computing device 920 routes.In either case, payment provider can be carried out aforementioned comparison, is used for authentication payment token 985.
Further note: also can be used to provide the more detailed description of the expense relevant with bill like this bill information 910 that is used by payment provider 990, this bill will offer the user so that on user account, charge afterwards.Because this also can be a machine readable bill 910,, be used for further authorizing payment to businessman 905 so local computing device 920 can compare this bill information 910 and the bills that before received by businessman 905.In other words, if be not complementary with any bill that receives from businessman 905 from the bill information in the bill of payment provider 990 910, then this charge will be regarded as swindle.
In another embodiment, businessman 905 can be used to examine user and other checking purposes, payment associating or the like with this bill information 910.For example, the businessman's part that can sign or otherwise encrypt bill information 910.This allows a plurality of favorable characteristics among the embodiment described in this paper.For example, bill information 910 can be by the part of payment provider via the payment token 985 of local computing device 920 receptions.The authenticity of businessman's 905 ability verification bill informations 910 is used for authentication payment token 985 from client computer 920 or trusted business transaction subsystem 965.Similarly, confirm during 904 that businessman 905 can use from the bill information 910 of payment provider 990 receptions and confirm or authentication payment provider 990 and/or local computing device 920 in payment token.In other words; Because bill information 910 is routed to payment provider via subsystem 965 or consumer 920, thus with the charging information that be complementary, that receive from payment provider that sends to client computer 920 can authentication client 920 and from the payment token 985 of payment provider 990.
Attention: in another embodiment, as above brief said ground, bill information 910 also can be used for the payment associating by businessman.In this embodiment, the different piece of bill information 910 can be machine-readable, is used for confirming should distributing to foregoing business partner from which part (after successful payment verification) of the fund of payment provider 990.Notice that in this embodiment the part of bill information 910 is with encrypted or otherwise to user 940 (or consumer's client computer 920), payment provider 990 or be not opaque with other assemblies of the part of the business relations of businessman 905 usually.This also discerns the business partner in the associating of keeping accounts uniquely, and can be used for authentication purpose thus.More specifically, the various piece that is exclusively used in the bill information 910 of business partner can be used the special-purpose secret key encryption of this business partner, thereby this charging information only can be seen by businessman 905 and specific transactions partner.Yet, in other embodiments, be used to pay the bill part of distributing or uniting and only sign by businessman 905, opaque to other assemblies in the system 900 thus.
Certainly, as recognizing, other purposes of bill information 910 also can be used for various purposes.For example, charging information 910 can be used to examine purpose, the product distribution is checked, or any other well-known business and other purposes.Therefore, the above-mentioned usage that is used to authorize, discern, pay the bill information 910 of associating or any other purpose only is used for illustrative purpose, and is not intended to limit or the scope of the embodiment that narrows down, only if explicitly call in addition.
Notice that trust boundaries 906 also has other favorable characteristics among other embodiment described in this paper with subsystem 965.For example, as shown in Figure 9, the payment provider code 970 in the subsystem 965 allows to move safely the code that is exclusively used in one or more payment provider 990.This code can be used to be exclusively used in the further mandate of payment provider, biological example mensuration, radio frequency identification (RFID), user name/password or any a plurality of other verification techniques.In other words, because payment provider 990 has and the trusted of subsystem 965 relation, so payment provider can move untrusted code, is used for its dedicated service purpose.
Use this code 970 also to allow to receive to have user experience in the more comprehensive band of payment provider 990 or the control of any other assembly of trusting relationship with subsystem 970.For example, although not shown, the trusted relation may reside between some businessmans 905 and the subsystem 965, is used to allow untrusted code by subsystem 965 operations.Likewise, businessman 905, payment provider 990 or any other assembly of participating in business transaction can provide comprehensive user experience, as being revealed as operation in application program 925 (previous version or the like).Yet many incidents appear at outside the band.For example; In the above-mentioned example that image is carried out the photographic quality printing by professional service, can present to the characteristic or the function of application (for example in response to user's input) of user's dialog box, payment options or any other quantity through code 970 controls that each trusted network entity (for example payment provider 990, businessman 905 or the like) provides specially.Therefore, like the more detailed said ground of hereinafter, when estimating payment options with other constraints, also can use this code by businessman 905 and/or payment provider 990.
As stated, in one embodiment, selected ISP or businessman send any requirement and authentication request to the identity supplier.For example, the ISP can sell commodity or the service that requires minimal ages or be defined in a certain geographic position.Therefore, can identity supplier's inventory be limited to those identity supplier of the identity documents that the requirement of satisfying the ISP can be provided.For example, identity supplier's inventory can be limited to those identity supplier that age verification or current address information (such as RMV) can be provided.
Likewise, can generate the dialog box of the option of listing payment provider.For example, dialog box can be listed payment provider 530a, 530b and 530c, and they can comprise credit card company respectively, the bank of electronics debit service is provided or the private third party of financial service is provided.About identity request, selected ISP can comprise and buy any Payment Request that is associated.For example, the ISP can only accept certain type credit card.Then, in payment provider is selected dialog box, list or the available payment provider that enables in these payment requirements of reflection.After selecting payment provider, pay warrant can be proceeded and can accomplish transaction.
Notice that other embodiment also provide the comparison of businessman's constraint (for example available payment options, age limit or the like) with consumer's rule, be used for definite each action that can take.Figure 10 illustrates this embodiment, and wherein distributed system 1000 is configured in a planned way based on confirming action such as this information of businessman's constraint 1010 and/or consumer's rule 1035.For example, businessman 1020 can retrain definition its service of purchase and/or acceptable payment provider 1005 of commodity or type of payment in 1010 in businessman.Then, determination module can provide this constraint to the user, for example imports in 1040 the user interface the request user to be used to select one or more available payment options.Import 1040 based on the user, can get in touch suitable payment provider 1005 and come suitably to subsidize service and/or commodity.
In another embodiment, except or replace businessman's constraint 1010, also can use consumer's rule 1035.For example, consumer's rule 1035 can be represented only can carry out the payment of some type to the businessman 1020 of some type.More specifically, consumer rule 1035 can be represented: if unregistered or otherwise trust businessman 1020, the payment that then can return can be used for from the purchase of businessman 1020.
Certainly, as stated, when the action confirming in business transaction, to take, can use other businessmans' rules 1010 retrain 1035 by determination module 1030 with the consumer.In fact, for compatible and other purposes, can compare businessman's constraint 1010 and consumer's rule 1035.For example, when to the user selection of payment provider 1005 being provided, the payment provider 1005 that can available payment options and the consumer from businessman 1020 can be obtained or allow compares.Certainly, based on such as default setting, supplier's ratings or hobby, or the set of options value of any other quantity, the selection of also can paying automatically.In fact, based on the realization of each businessman 1010 and/or consumer's 1035 rules, can carry out any amount of action.For example, if rule (businessman 1010 or consumer 1035) failure is perhaps otherwise run counter to, then possibly solve conflict or other differences from businessman 1020 or user's 1040 (automatically based on other rule or setting value) additional input.Therefore, any specific action of being taked when realizing defined constraint and/or rule only is used for the example purpose at this, and is not intended to limit or narrow down in the scope of this embodiment that provides.
Be otherwise noted that as stated businessman's constraint 1010 can be included in the charging information or offer the consumer individually.Be also noted that simultaneously each rule of comparison all can carry out with action of taking thus under these scopes, that is, need not user knowledge and/or other system assembly.In addition, notice that native system is not limited to constraint or the rule that is only defined by consumer or businessman.For example, payment provider also can define the various restrictions that can combine or replace consumer and/or businessman's rule to consider.Therefore, businessman and consumer's constraint are used for confirming that exercises (such as the payment provider option) only are used for the example purpose in this article, and are not intended to limit or narrow down said embodiment, only if explicitly call in addition.
In the online transaction of routine, terminal user and/or ISP are difficult to all understand for certain when transaction finishes and whether successfully send commodity or service.For example, the terminal user can select the software package that is used on network, downloading, or the terminal user can buy song, film or other electronic mediums.Sometimes network connects and possibly before downloading completion, break off.In these cases, possibly attract the terminal user to select commodity once more, but also possibly hesitate, because the terminal user does not know whether he or she will buy the double expense of paying for this reason.Likewise, whether the ISP possibly not know to download yet and successfully accomplishes, and whether possibly collect double expense when selecting these commodity to remedy this destruction once more when user's trial.
The applicant has recognized some uncertainties that in business transaction software, provide record or auditing capabilities can eliminate relevant electronic download.For example, finally carrying out payment options can be depending on from the signal of downloading the audit characteristic of accomplishing.That kind is interrupted if download, and then the terminal user can confirm that selected payment options does not pass through.The writing function parts that for example, can comprise all each steps of the business transaction that record is undertaken by machine from the business transaction software 585 (or other said subsystems or network entity assembly) of Fig. 5.Recorded information can be used as the evidence of purchase or is used for memory transaction.In addition, business transaction software 585 can comprise the surveillance coverage to electronic download, and this software only sends the affirmation of successfully downloading after will finally paying.Complete successfully through apparent commodity or service transmission signal and pay surely, can solve and the problem of eliminating double record keeping basically.
Can develop software by company and handle various tasks; Comprise common word processing and document process, electrical form, picture editting even more professional task, such as video editing, computer graphical software, Web content developing application, portfolio management software or the like.Yet, have the software of each task that the processing terminal user can hope to carry out maybe be expensive surprising.Software package can spend general hundreds of, several thousand, to tens in addition up to ten thousand dollar between, to obtain single permission.In addition, the terminal user possibly need to need the service of application-specific once in a while or sporadicly, thereby the price of buying this application possibly be irrational.
The applicant has recognized the advantage that allows the terminal user in the pay as you go environment, to utilize software.Especially, can only charge to the terminal user, rather than pay the retail price (wherein, not using many functional parts and/or application program basically) of this software the time quantum that uses this application program to spend.Fig. 6 illustrates has the networked computer system that allows the terminal user to pay the business transaction framework that uses the time quantum that this application program spent.Networked computer system 600 comprises the network 605 with terminal user's node 610 and a plurality of identity supplier 620, a plurality of payment provider 630 and a plurality of ISP 640 interconnection.
Terminal user's node 610 can be the computing machine of operation on operating system 695.A plurality of software applications 655 can be installed on terminal user's computing machine.Software application can be when buying and the computing machine binding, can free download on network, and perhaps by the sellers branch of application program (free or few expense, or be used for registering) usually to supplier.Application program 655 can be the application program of any kind, and the application program of any amount can be installed on computers.ISP 640 can with the one or more application-associated that are installed on terminal user's computing machine 610.For example, ISP 640a can be the one or more computing machines that developer and sellers had by application program 655a.Similarly, ISP 640b and 640c can be associated with application program 655b and 655c respectively.
In the model of payable at sight that expires, the service that is provided by the ISP is to use the permission of installation associated application on computers.For example, when distributed for free software (for example application program 655), it is at first disabled, thereby under situation about at first not obtaining from the permission of the seller of application program, the user can not move this application.Can be somebody's turn to do permission through starting with one or more ISPs' 640 business transaction acquisition.For example, application program 655a can be that the terminal user wants to use the desktop publishing application program that designed card or pamphlet in several hours.When the terminal user opened application program 655a, the terminal user was apprised of this terminal user and need buys permission and use this application program.For example, can manifest dialog box, list the characteristic and the price of various usage license abilities.
Permission can be used for the special time amount, for example one hour or one day.In case close application program, permission just maybe be expired, and perhaps permission can be still effective, till expiration of time limit.Permission can be based on allowing the terminal user to accomplish one or more operations or adopting the operation or the task of one or more required function parts.The attachment feature that uses can be increased the price of permission.It will be appreciated that the permission that to consult to have any required time limit, because each side of the present invention is not limited to this on the one hand.
In case the terminal user has selected licensed option, just can the indicating terminal user select identity supplier and/or payment provider, perhaps can select one or another to start online transaction defaultly.Can be through handling transaction basically as at the business transaction software described in any one of above or following examples 685.When the ISP when one of payment provider 620 receives payment token, the ISP can transmit permission according to the time limit of when initiating transaction, reaching.
Can handle the permission that is received by total licensed service 690, so that can be called to the suitable accessibility of this application program.Total licensed service can be sent to application program 655 then and enable key, so that the user can and utilize its function according to permission this software of operation.Enable any information that key can comprise that application program maybe needs, so that in the time limit shown in the permission, required service is provided.Enable the password that key can comprise to be provided by the ISP, so that application program knows that this permission is effective and/or can rely on these representatives by total licensed service that can obtain effectively permission 690 simply.In case the application program operation just can be notified metering engine 694 tracking times and represent to application program when expired permission is.Perhaps, this application program able to programme is forbidden self then to inquire about the metering engine termly when permission is out of date.In addition, through inquiry metering engine, if permission comprises a time limit, then application program can provide the regular warning or the renewal of remaining time quantum in the relevant permission of being bought to the user.
When the terminal user finished, he can select professionally to print entire product, also select to start another online transaction, such as the Printing Qptions that combines the said transaction of Fig. 5.The payable at sight that expires permission can provide much more dirigibility to the user, and makes them have the right to visit the software of formerly not visiting owing to the price of buying the software package with permission life cycle.In addition, software vendor can be used to from being unwilling to pay whole retail prices but be ready to pay the user's of limited use and/or limited function profit.
Software piracy influences the profit of whole software industry.The user of annual non-approval software makes a large amount of relatively amount of money of loss of enterprises.In case bought software product, sellers are just to install software and how many computing machines are installed the almost not control of these softwares wherein.Illegally provide software download to provide more general method to distribute on the internet and obtain the unpaid software of terminal user.The applicant recognizes: the comparatively safe and simple business transaction framework with the payable at sight scheme that expires is provided, and the framework described in the routine embodiment as shown in figure 6 can alleviate or eliminate problem of piracy.Because the free branch of sellers software, so the terminal user can usurp this software, as long as they see fit.Owing to only enable this software through time of payment permission or task permission, the therefore limiting terminal user ability of misapplying this software basically.
As previously mentioned, the embodiment among this paper allows to use mobile module (for example Subscriber Identity Module (SIM)) authenticating identity and/or the payment that links to each other with the specific escrow account of mobile foundation structure or operating system.With the typical standard different (for example global system for mobile communications (GSM), third generation partner program and other similar agreements) of the mobile communication that produces via the trusted radio net, independently do not carrying out on the trusted data network (for example internet) according to the checking of embodiment among this paper.Therefore, the embodiment among this paper solves by in network service and other many other safety problems of independently using this mobile module (SIMs) to cause in the procotol environment.These safety problems comprise: confirm to be used for certificate server the trusted network end points, secure network is connected and the user of authenticating network certificate server to user, authentication SIM and the certificate server of mobile module or SIM device authentication client computer, authentication SIM equipment, setting up between mobile module and the network authentication server.
In addition, in order to meet GSM, 3GPP and other standards other requirement is set on terminal device, this terminal device will be mutual with mobile module or SIM equipment.More specifically, GSM, 3GPP and other similar standard-required SIM limiting mobile terminals comprise the visit of encryption key to the information of some type.For satisfying these requirements, the embodiment among this paper provides the abstract security configuration of the processing of some message and security and decoding being entrusted to SIM equipment itself.For example, shown in figure 11, fire wall 1090 definition is used for when on separate network 1060, communicating by letter state machine and the protocol message from main process equipment 1070 abstract SIM 1085.More specifically, fire wall 1090 uses restriction or limits quantity and/or the formal state machine of order that driver sends to the order of SIM 1085 itself that read in the main frame 1075.Therefore; (for example cellular phone, SIM interface or the like-attention " mobile module " expression is used for total term of " SIM " to SIM equipment 1080; But use interchangeably at this; Only if special declaration is arranged in addition) become portable terminal, and main process equipment 1075 becomes the peripherals of the communication protocol 1055 that meets mobile network 1050.Hereinafter is described with solving some the other safety requirements of above-outlined and some state machines and the agreement of problem in more detail.
Each safe level that embodiment among this paper can represent according to given security token, definition are used for going up the security configuration of authentication at trusted separate network not (promptly with corresponding to the foundation structure or the operator system of mobile module the irrelevant network of radio net).These include but not limited to device security level, network security level, user security level and service safe level.On each layer, have the demands of different and the process that are used to obtain security token.Therefore, like more detailed said ground hereinafter, each safe level is represented the different authentication grade in the security model and is had some requirement and/or assurance respectively.In addition, it should be noted that each safe level can or can not be independent of other grade.In addition, before realizing network or user security level, maybe needn't the apparatus for establishing safe level; Yet, being suitable assurance, this delaminating process possibly conform with expectation.
The device security level representes that physics has mobile module, for example such as the SIM equipment of portable phone.Usually after suitable authentication, issue device token (the SIM security token that promptly has the device security level) by mobile module or SIM equipment by the user locally.Usually normally be provided for the user's of authentication mobile module this requirement by mobile foundation structure or mobile operator.In addition, usually by the authentication of SIM equipment facilities and equipments, yet other embodiment can provide the use of other assemblies in verification process.For example, SIM or other equipment can require password before mobile module or other equipment will send device token.Certainly, also can expect the other forms of voucher that is used for authentication on device level at this.
In one embodiment, SIM equipment requirements client computer or host computer before the device security token sends to mobile module authentication or identification itself.In addition, use by moving the strategy that foundation structure is provided with, by the operating period of mobile module or SIM device control device token usually.In one embodiment, can dynamically dispose through independence and/or radio net by operating period or other requirements of mobile operator setting.If device token does not have operating period or other restrictions, this SIM does not require that the user is to mobile module again more than the authentication once so usually.
The network security level is illustrated in not on the trusted separate network, and mobile module or SIM are connected with encryption between mobile foundation structure or the network.Suppose and just can set up the network security level by client computer or host access release SIM equipment, and exist or user interactions without the user.Usually, the network security level is the single factors authentication, asserts the evidence that has SIM equipment to mobile foundation structure or operator.Usually, before the network security token is issued client computer or host computer device, move foundation structure and send the network security token with authenticated server with through inquire response type mechanism.Therefore, this network security level token can be used in the subsequent authentication stage and Transport Layer Security is provided, with encrypt and/or signature client computer and certificate server and/or mobile foundation structure between further not alternately.
Fig. 7 A illustrates the separate network 700 that is configured to send the network level security token, is used between client computer and certificate server, setting up Transport Layer Security and communicates by letter.Usually; Client computer or host computer device 710 (can be personal computer, mobile phone or other portable or non-moving computing equipments) move foundation structure 720 through via authentication/trust server 715 network security token request 725 being sent to; Start authentication request (yet; Notice that this request also can be started such as SIM705 itself by another equipment).Usually, this request 725 of when being received by certificate server 715, will not signing then, is signed and/or this request of encryption before being used to confirm the mobile foundation structure 720 of this request from certificate server 715 sending to.Then, trusted server 715 can should inquire that then 730 send to mobile module 705 to mobile foundation structure 720 or mobile operator queried access 730.Mobile module 705 use it with mobile foundation structure 720 between shared secret 740; Be used to generate inquire response 735, then with inquire response 735 be forwarded to client computer 710-note usually this secret will be SIM705 special-purpose and be provided with by mobile operator 720.
Client computer 710 will use inquire response 735 to generate the response of request security token, and it also can comprise SIM identity and inquiry 730, is used for authentication purpose.Usually, although client computer will ask mobile module 705 usefulness equipment 705 shared secret 740 or such as other keys of SIM device token sign and/or encrypt-this can be or can be dispensable.Can use for example shared secret 740 affirmations response of request security token and inquire response 735 wherein.Note, shown in preceding, can or can be not through being used for generating the same key signature and/or the response of enciphering request security token of inquire response 735.In either case; If move foundation structure 720 confirm inquire responses 735 (be inquire response effectively and mobile module have effective escrow account), move the acknowledgement messaging that foundation structure 720 and/or certificate server 715 can comprise the network security token 745 with encrypted session key of using shared secret 740 signatures and/or encrypting through generation.This message can be used the security token (for example X.509 certificate, kerberos credentials or the like) of certificate server 715 ' oneself or use the security token that moves foundation structure 720 ' further to sign.Therefore, client computer 710 can these signature information of authentication and the refined net session key is sent to SIM705, is used for deciphering.Use shared secret 740, then mobile module 705 can return to client computer 710 with unencrypted session key 750.
Notice that send in the network security token 745 above-mentioned, mobile module 705 need move effective escrow account in good standing on the foundation structure 720 usually.Therefore, after checking inquire response 735 and this effective escrow account information, can between the mobile foundation structure 720 of SIM 705 and generation virtual secure channel, break the wall of mistrust.Then, the software platform or the storehouse of host computer device 710 are entrusted or be delivered to session key 750 from mobile module 705, and from mobile operator 720 to certificate server 715 (if necessary).Note the physics proximity (can be wireless or wired connection be connected) of mobile module 705 and host computer device 710 and the trusting relationship between mobile foundation structure 720 and the certificate server 715 with it via USB port, bluetooth or other.Then, use these session keys, be used to set up secure communication 755 by client computer 710 and trust server 715.
Note, can have second operator scheme that is used for authentication mobile module 705, it can be used by mobile foundation structure 720.In this case, user rs host 710 can ask SIM 705 to generate and its inquiry (usually with the Nonce form) of signing.Then, when from trusted server 715 or mobile foundation structure 720 request network security tokens 725, client computer 710 can be added the information as the part of device token.If mobile operator 720 can the Authentication devices token packet contain effective inquire response 735, then can network token 745 directly be sent back to client computer 710, be used to decipher above-mentioned session key.
As ground is described hereinafter in more detail, need this network level security token 745 to allow usually to being used for from the client access of the authenticated service token of service of third party's services request and/or commodity.Notice that also in order to obtain the network token, preceding text have supposed that client computer or main frame computing equipment 710 successfully confirmed to be used for the network endpoint of certificate server 715 and/or mobile foundation structure 720.In addition, suppose that client computer 710 and user's (not shown) have carried out authentication to SIM equipment 705.As stated, network security level token 745 is used to subsequent authentication in the stage, and Transport Layer Security encrypt and sign further mutual between client computer 710 and the trusted server 715 is provided.By the operating period of certificate server 715 or mobile operator 720 Control Network tokens 745 (with other tokens).Because network token 745 is as the session-context between SIM equipment 705 and the mobile foundation structure 720, thus the byte number of several hours or several days, transmission can be limited the operating period, and/or only effective when mobile module 705 suitably is connected to client computer 710.
As previously mentioned, the user security level representes that the user is usually through being provided at the information of SIM705 or main frame computing equipment 710 external memorys, to network (trusted server 715, mobile foundation structure 720 or other services) authentication.Therefore, based on the proof that has SIM 705 and some external knowledge (for example user name/password), set up multifactor authentication in conjunction with the user security level of network safe level.Usually, trusted server 715 or mobile foundation structure 720 only are to sign and issue the user class safe component, yet third party's service in some instances also can be signed and issued this User Token.Therefore, move foundation structure 720 (or other services that are determined on a case-by-case basis) before user security level token is sent it back client computer 710, will be through inquire response mechanism checking user.Note, use the user security token to sign and/or encrypt request, be described below service token by client computer.Except that the trusted server, the recommend customers machine does not send to any service (can not verify/use it because there are other services usually) with the user security token.The same with above-mentioned network token 745, User Token can have the limited operating period that receives mobile operator 720 controls, and can receive the byte number of duration, transmission and/or the restriction that the connection between mobile module 705 and the client computer 710 exists.
Fig. 7 B illustrates and is configured to send the separate network 700 that is used for setting up 715 of client computer 710 and certificate servers the user class security token that multilevel security communicates by letter.The user network authentication phase allows the known people of mobile operator 720 (or other servers) checking whether to have known device 705.Effectively, the user network stage was one or two factor authentication stage, and made network avoid distributed denial of service attack.In addition, stolen SIM equipment 705 and protected the user through preventing to use inadequately.
Main frame computing equipment 710 can send the request of User Token 765, and this request sends to via trusted server 715 and moves foundation structure 720.Usually, signature request 765 not when receiving by authentication/trusted server 715, then send to move foundation structure 720 before authentication/trusted server 715 can sign and/or encrypt this request, be used for this request of affirmation from certificate server 715.Then, trusted server 715 can should be inquired about 770 and send to mobile module 705 to mobile foundation structure 720 or mobile operator queried access 770 then.Note, can use to be different from the algorithm that is used for to the inquiry 730 of network authentication apparatus 705 and to generate inquiry 770.Client computer 710 will be extracted inquiry 770 and it will be delivered to mobile module 705 from token message, represent that this is an authentification of user.Therefore, SIM 705 will be from client computer 710 request user vouchers 775.Then, host computer 710 imports 780 to user's 760 inquiring users, and it is returned mobile module 705.SIM 705 or client computer 710 can randomly judge the user import 780 or voucher should use the network security key (being session key) 750 of previous acquisition to encrypt.
Use the user to import 780, mobile module 705 will generate inquire response 785 and it will be returned to client computer 710, and client computer 710 will generate and send the request security token and reply, and comprise for example SIM identifier, inquiry 770 and inquire response 785.Usually, client computer 710 will ask mobile module 705 usefulness network security tokens 745, share key 740 or SIM 705 private keys are signed and/or the response of enciphering request security token.With preceding text similarly, use for example shared secret 740, or other mobile module 705 private keys, can confirm that request security token wherein replys and inquire response 785.Note, as stated, can or can be not do not sign and/or the enciphering request security token is replied through the same key that is used for generating inquire response 785.In either case; Confirm inquire responses 785 (being that the user's voucher that is provided is correct) if move foundation structure 720, then move foundation structure 720 and/or certificate server 715 and can reply through the message that generation comprises the user security token 795 with the encrypting user key that uses shared secret 740 or other equipment 705 private keys signature and/or encrypt.This message can be used the security token (for example X.509 certificate, kerberos credentials or the like) of certificate server 715 ' oneself or use the security token that moves foundation structure 720 to come further signature.Then, client computer 710 can the certifying signature message and the encrypting user key is delivered to SIM 705, is used for deciphering.Use shared secret 740 (or being determined on a case-by-case basis other keys), mobile module 705 can return to client computer 710 with unencrypted user key 790 then, thereby to network 795 authenticated.
User's service authentication stage provides the authentication of representing third party's service to Mobile Network Operator 720.Similar with the user network safe level, user's service stage is multifactor authentication phase, and during at least one stage of authentication, prevents to send service token in user's 760 non-existent situation lower network.With how to send service token relevant, there are two kinds of operator schemes of certificate server 715 usually.At first, if user 760 had before obtained User Token, then trusted server 715 can be regarded as authentication with user 760, and sends service token automatically (supposition uses User Token 790,795 suitably to sign to the request of service token).On the other hand, do not send User Token 790,795 as yet, then will require user 760, be used to ask User Token 790,795 with the mode authentication identical with above-outlined if move foundation structure 720.
Fig. 7 C illustrates when between client computer 710 and third-party server 728, setting up secure communication, and how the heterogeneous networks entity communicates by letter on separate network 700.As implied above, mobile device 705 can be to 720 authentications of mobile operator system, as previously mentioned with user 760.Therefore, after the record keeping account number of suitably confirming mobile device 705 and authenticated 760 have it, between certificate server 715 and client computer 710, there is secure communication.Then, when client computer for example 710 hopes to serve 728 when buying service and/or commodity from the third party, trusted server 715 (or mobile foundation structure 720, be determined on a case-by-case basis) can send the service token 724 that are used for different services.Therefore, client computer 710 can send to third-party server with service token 726, confirms this token 722 through certificate server 715 then.Notice that third-party server 728 can maybe can not require other authentication, and can use foregoing, as to be used to carry out this affirmation various mechanism.Also note, use service token 726 not only between client computer 710 and third-party server 728, to set up secure communication, but also can with aforementioned similar mode, expression user 760 ' pays the ability of one or more services and/or commodity.
Notice that till service token was sent to client computer 710, the security token that is sent was unworthy to any other service except that certificate server 715 usually.Reason be security layering structure can prevent any external user exactly decoding device token, network token or even User Token because they are derived with root or shared key 740 that mobile foundation structure 720 is understood by being merely SIM equipment 705.This sends after any third party's 728 network services can utilize the service token 724 of security token 724 at certificate server 715 usually.Be also noted that above-mentioned security token and message (for example inquiry, inquire response or the like) can adopt various forms and scheme.For example, token and/or message can be XML, scale-of-two or other similar coded formats, can be by maybe or not hoping that the mobile operator 720 with some key element that network SIM communicates by letter represents to the third side sends.
Above-mentionedly portable hardware device 705 is used for authentication, identification and/or payment affirmation can be used to buy online or local retail service and/or commodity (for example online newspaper, music, software application or other commodity and service), or be used to allow to visit the application program (for example
AbodePhotoshop, Print program, payable at sight software or the like expires) of operation on local PC or client computer 710.Therefore, the foregoing description is to distributed protection software on a plurality of main process equipments 710 of free release or content (for example music, video, recreation or the like) advantageous particularly.In other words, permit to become now to depend on portable mobile apparatus 705 that its can not involved with limited computing equipment collection thereby allow portable digital to discern by authentication as stated mutually.Likewise, user 706 gets into friend's room and needn't carry all his/her programs or other protection contents, and can be via portable set 705 accesses and authentication.
As should recognize ground from preceding text; There are many aspects in the present invention described in this paper; Can irrespectively use each other; Comprise relating to identity token, payment token, select among a plurality of identity suppliers one, select in a plurality of payment provider, and the various aspects of existence, service provider system, identity supplier system and the payment provider system of business transaction software on end-user system.Should also realize that: in certain embodiments, can use all above-mentioned functions parts together, or in specific implementation, can adopt the combination in any or the subclass of above-mentioned functions parts together, because each side of the present invention is not limited to this on the one hand.
The above embodiment of the present invention can be with any realization of several different methods.For example, can use hardware, software or its combination to realize these embodiment.When realizing with software, software code can be carried out on any proper process device or processor collection, provides regardless of still being distributed in a plurality of computing machines at single computing machine.It will be appreciated that any assembly of carrying out above-mentioned functions or one or more controllers that the assembly collection can be regarded as controlling above-mentioned functions usually.Can accomplished in various ways one or more controllers, such as through specialized hardware, or through using microcode or software programming to carry out the common hardware (for example one or more processor) of above-mentioned functions.
The method in this general introduction that it will be appreciated that can be encoded to the software that can on the one or more processors of any that adopt several operation systems or platform, carry out.In addition, this software can use multiple suitable programming language and/or traditional programming or wscript.exe to write, and also can be compiled as the executable machine code.At this on the one hand; Should recognize; One embodiment of the present of invention are to computer-readable medium or a plurality of computer-readable medium (for example computer memory, one or more floppy disk, compact disk, CD, tape or the like); The one or more programs of coding on it, execution realizes the method for each embodiment of the invention described above when on one or more computing machines or other processors, carrying out these programs.Computer-readable medium or media can transport, so that program stored or a plurality of program can be loaded on one or more different computing machines or other processors above that, to realize aforesaid various aspects of the present invention.
It is to be understood that representing to be used for programmed computer or other processors in use a technical term in general sense " program " realizes the computer code or the instruction set of any kind of aforesaid various aspects of the present invention.In addition; Should recognize: according to an aspect of the present invention; When being performed; One or more computer programs of carrying out method of the present invention need not reside on single computing machine or the processor, but can be distributed in a plurality of various computing machines or the processor with modular manner, so that realize various aspects of the present invention.
Can be separately, combine or use various aspects of the present invention, and the details and the configuration of the said aspect of the present invention assembly that is not limited to set forth in the preceding text or illustrate in the drawings in its application facet with the concrete various configurations of discussing in preceding text embodiment.Each side of the present invention can be other embodiment, and can implement or execution with the whole bag of tricks.Various aspects of the present invention can combine any kind network, troop or structure realizes.It is unrestricted that network is realized.Therefore, foregoing description and accompanying drawing are only as an example.
In claims, use the ordinal number term; Require key element itself not hint that any priority, precedence or a claim key element are on another such as " first ", " second ", " the 3rd " or the like modification right; Or the time sequencing of manner of execution action, and only make a distinction so that distinguish the mark of claim key element with another key element with same names (if not using the ordinal number term) as a claim key element that will have a certain title.
Simultaneously, wording of using among this paper and term are used to describe purpose, and should not be regarded as restriction.Use " comprising ", " by ... form " or " having ", " comprising ", " relating to " and this paper in variant be intended to comprise after this list and equivalents, and other item.
Claims (9)
1. in the system that comprises the computing equipment that is used for consumer, businessman and at least one payment provider; A kind of computer implemented method of carrying out by the computing equipment that is used for consumer, businessman and at least one payment provider; Said method be used for through be used for said consumer, said businessman and said at least one payment provider computing equipment between set up data three parts exchange; Be provided for on-line purchase service, commodity or the transaction of both security business, said method comprises:
Consumer's computing equipment, it sends one or more services, commodity or both the online requests that is provided by businessman of buying to businessman's computing equipment;
Said consumer receives charging information from said businessman, and it comprises and the said one or more services of purchase, commodity or price that both are relevant;
Said consumer sends at least one payment provider computing equipment with said accounting information;
Said at least one payment provider is stored said accounting information;
Said consumer asks said at least one payment provider that payment token is provided; Be used as the proof of the ability of the said one or more services of said consumer payment, commodity or both prices; Wherein said payment token comprises said accounting information, and said consumer has the book keeping operation account about said at least one payment provider;
The consumer receives said payment token from said at least one payment provider, and wherein said payment token identifies the payment authorization to said price uniquely, and the sensitive information of relevant said consumer's said escrow account needn't be provided to said businessman;
Said consumer sends said payment token to said businessman;
Finalization from said consumer to said one or more services, commodity or both requests before, said businessman sends said payment token at least one payment provider, with to said at least one payment provider validation of payment;
Accounting information in the said payment token that said at least one payment provider will receive from said businessman compares with the accounting information of being stored that receives from said consumer, to verify said payment token;
Said businessman receives the affirmation of having been verified from the payment token of said at least one payment provider;
Said businessman comes finalization to buying said one or more service, commodity or both requests through send said affirmation to said consumer; And
Said consumer receives the affirmation to the validity of said payment token, and its indication is suitably transferred to said consumer with said one or more services, commodity or both from said businessman.
2. the method for claim 1 is characterized in that, said accounting information further comprises said service, commodity or both descriptions, one or more from the available payment options of said businessman or businessman's specific information.
3. the method for claim 1 is characterized in that, said payment token can be cancelled by said consumer, said at least one payment provider or both.
4. the method for claim 1; It is characterized in that; Said payment token identifies the payment authorization to said price uniquely; And the sensitive information of relevant said consumer's said escrow account needn't be provided to said businessman because said payment token by said at least one payment provider signature, encrypt or both, and wherein confirm that to said at least one payment provider said payment token comprises the said signature of checking, encryption or both.
5. the method for claim 1 is characterized in that, said one or more services, commodity or both require to subscribe or many payments, and wherein said payment token can be used repeatedly this payment.
6. the method for claim 1; It is characterized in that; Said one or more service, commodity or both require to subscribe or repeatedly payment, and wherein said payment token is only just effective to the single payment of said reservation or many payments, and wherein the other token of needs be used for follow-up payment.
7. the method for claim 1 is characterized in that, the said accounting information that sends to said consumer from said businessman is encrypted by said businessman or signed, and said method also comprises:
Said businessman verifies that when receiving said payment token the warp in the said payment token is encrypted or the authenticity of the accounting information of signature, receives from said consumer so that said payment token is verified as.
8. the one or more computer-readable storage mediums that have the computer executable instructions of being stored; Said instruction is when being carried out by one or more processors of the system that comprises the computing equipment that is used for consumer, businessman and at least one payment provider; Carry out a kind of method; Said method through be used for said consumer, said businessman and said at least one payment provider computing equipment between set up data three parts exchange; Be provided for on-line purchase service, commodity or the transaction of both security business, said method comprises:
Consumer's computing equipment, it sends one or more services, commodity or both the online requests that is provided by businessman of buying to businessman's computing equipment;
Said consumer receives charging information from said businessman, and it comprises and the said one or more services of purchase, commodity or price that both are relevant;
Said consumer sends at least one payment provider computing equipment with said accounting information;
Said at least one payment provider is stored said accounting information;
Said consumer asks said at least one payment provider that payment token is provided; Be used as the proof of the ability of the said one or more services of said consumer payment, commodity or both prices; Wherein said payment token comprises said accounting information, and said consumer has the book keeping operation account about said at least one payment provider;
The consumer receives said payment token from said at least one payment provider, and wherein said payment token identifies the payment authorization to said price uniquely, and the sensitive information of relevant said consumer's said escrow account needn't be provided to said businessman;
Said consumer sends said payment token to said businessman;
Finalization from said consumer to said one or more services, commodity or both requests before, said businessman sends said payment token at least one payment provider, with to said at least one payment provider validation of payment;
Accounting information in the said payment token that said at least one payment provider will receive from said businessman compares with the accounting information of being stored that receives from said consumer, to verify said payment token;
Said businessman receives the affirmation of having been verified from the payment token of said at least one payment provider;
Said businessman comes finalization to buying said one or more service, commodity or both requests through send said affirmation to said consumer; And
Said consumer receives the affirmation to the validity of said payment token, and its indication is suitably transferred to said consumer with said one or more services, commodity or both from said businessman.
9. the method for claim 1; It is characterized in that; Said payment token identifies the payment authorization to said price uniquely, and the sensitive information of relevant said consumer's said escrow account needn't be provided to said businessman, because said payment token does not comprise said sensitive information.
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US67275405P | 2005-04-19 | 2005-04-19 | |
US60/672,754 | 2005-04-19 | ||
US11/376,535 US7849020B2 (en) | 2005-04-19 | 2006-03-15 | Method and apparatus for network transactions |
US11/376,535 | 2006-03-15 | ||
US11/379,133 | 2006-04-18 | ||
US11/379,143 US8996423B2 (en) | 2005-04-19 | 2006-04-18 | Authentication for a commercial transaction using a mobile module |
US11/379,133 US20060235795A1 (en) | 2005-04-19 | 2006-04-18 | Secure network commercial transactions |
US11/379,143 | 2006-04-18 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2006800111402A Division CN101496059A (en) | 2005-04-19 | 2006-04-19 | Network commercial transactions |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102368325A true CN102368325A (en) | 2012-03-07 |
Family
ID=37115927
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011103649867A Pending CN102368325A (en) | 2005-04-19 | 2006-04-19 | Network commercial transactions |
Country Status (12)
Country | Link |
---|---|
EP (1) | EP1872188A4 (en) |
JP (1) | JP2008541206A (en) |
KR (1) | KR20070120125A (en) |
CN (1) | CN102368325A (en) |
AU (1) | AU2006236243B2 (en) |
BR (1) | BRPI0608591A2 (en) |
CA (1) | CA2601785A1 (en) |
IL (1) | IL185978A0 (en) |
MX (1) | MX2007012648A (en) |
NO (1) | NO20074614L (en) |
SG (1) | SG161290A1 (en) |
WO (1) | WO2006113834A2 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102646252A (en) * | 2012-03-19 | 2012-08-22 | 重庆先迈通信技术有限公司 | Business server system and business processing method of negotiated price transaction business |
CN103678966A (en) * | 2012-08-31 | 2014-03-26 | Ncr公司 | Security module and method of securing payment information |
CN104144146A (en) * | 2013-05-10 | 2014-11-12 | 中国电信股份有限公司 | Method and system for visiting website |
CN105378776A (en) * | 2013-02-26 | 2016-03-02 | 维萨国际服务协会 | Methods and systems for providing payment credentials |
CN107851254A (en) * | 2015-07-20 | 2018-03-27 | 维萨国际服务协会 | At utmost reduce the seamless transaction of user's input |
CN109242488A (en) * | 2018-11-22 | 2019-01-18 | 腾讯科技(深圳)有限公司 | A kind of secure payment control method, device and server |
CN109716373A (en) * | 2016-08-12 | 2019-05-03 | 万事达卡国际公司 | Cipher authentication and tokenized transaction |
CN112740259A (en) * | 2018-09-24 | 2021-04-30 | 优基股份有限公司 | System, method and apparatus for performing cryptographically secured transactions |
Families Citing this family (182)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8762263B2 (en) | 2005-09-06 | 2014-06-24 | Visa U.S.A. Inc. | System and method for secured account numbers in proximity devices |
US7739169B2 (en) | 2007-06-25 | 2010-06-15 | Visa U.S.A. Inc. | Restricting access to compromised account information |
US8121956B2 (en) | 2007-06-25 | 2012-02-21 | Visa U.S.A. Inc. | Cardless challenge systems and methods |
US7937324B2 (en) | 2007-09-13 | 2011-05-03 | Visa U.S.A. Inc. | Account permanence |
TWI474212B (en) | 2007-09-24 | 2015-02-21 | 蘋果公司 | Embedded authentication systems in an electronic device |
DE102007048044A1 (en) * | 2007-10-05 | 2009-04-09 | T-Mobile International Ag | Content distribution with inherent user-oriented authorization check |
US8600120B2 (en) | 2008-01-03 | 2013-12-03 | Apple Inc. | Personal computing device control using face detection and recognition |
US9015074B2 (en) | 2008-02-01 | 2015-04-21 | Mazooma Technical Services, Inc. | Device and method for facilitating financial transactions |
US7720764B2 (en) | 2008-02-01 | 2010-05-18 | Kenneth James Emerson | Method, device, and system for completing on-line financial transaction |
US8620826B2 (en) | 2008-03-27 | 2013-12-31 | Amazon Technologies, Inc. | System and method for receiving requests for tasks from unregistered devices |
US20090307140A1 (en) | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
US8219489B2 (en) | 2008-07-29 | 2012-07-10 | Visa U.S.A. Inc. | Transaction processing using a global unique identifier |
CA2742963A1 (en) | 2008-11-06 | 2010-05-14 | Visa International Service Association | Online challenge-response |
US9715681B2 (en) | 2009-04-28 | 2017-07-25 | Visa International Service Association | Verification of portable consumer devices |
US8602293B2 (en) | 2009-05-15 | 2013-12-10 | Visa International Service Association | Integration of verification tokens with portable computing devices |
US8893967B2 (en) | 2009-05-15 | 2014-11-25 | Visa International Service Association | Secure Communication of payment information to merchants using a verification token |
US9105027B2 (en) | 2009-05-15 | 2015-08-11 | Visa International Service Association | Verification of portable consumer device for secure services |
US10846683B2 (en) | 2009-05-15 | 2020-11-24 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US8534564B2 (en) | 2009-05-15 | 2013-09-17 | Ayman Hammad | Integration of verification tokens with mobile communication devices |
US7891560B2 (en) | 2009-05-15 | 2011-02-22 | Visa International Service Assocation | Verification of portable consumer devices |
US9038886B2 (en) | 2009-05-15 | 2015-05-26 | Visa International Service Association | Verification of portable consumer devices |
US10140598B2 (en) | 2009-05-20 | 2018-11-27 | Visa International Service Association | Device including encrypted data for expiration date and verification value creation |
JP5418025B2 (en) | 2009-07-08 | 2014-02-19 | 株式会社リコー | Information processing apparatus, system management method, system management program, and recording medium recording the program |
US10255591B2 (en) | 2009-12-18 | 2019-04-09 | Visa International Service Association | Payment channel returning limited use proxy dynamic value |
WO2011088109A2 (en) | 2010-01-12 | 2011-07-21 | Visa International Service Association | Anytime validation for verification tokens |
US10255601B2 (en) | 2010-02-25 | 2019-04-09 | Visa International Service Association | Multifactor authentication using a directory server |
US9245267B2 (en) | 2010-03-03 | 2016-01-26 | Visa International Service Association | Portable account number for consumer payment account |
US9342832B2 (en) | 2010-08-12 | 2016-05-17 | Visa International Service Association | Securing external systems with account token substitution |
US20120089450A1 (en) * | 2010-10-07 | 2012-04-12 | Microsoft Corporation | Loyalty offer |
US9525548B2 (en) | 2010-10-21 | 2016-12-20 | Microsoft Technology Licensing, Llc | Provisioning techniques |
US8805434B2 (en) | 2010-11-23 | 2014-08-12 | Microsoft Corporation | Access techniques using a mobile communication device |
US9509686B2 (en) | 2010-12-03 | 2016-11-29 | Microsoft Technology Licensing, Llc | Secure element authentication |
WO2012112822A2 (en) | 2011-02-16 | 2012-08-23 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
US10586227B2 (en) | 2011-02-16 | 2020-03-10 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
SG193510A1 (en) | 2011-02-22 | 2013-10-30 | Visa Int Service Ass | Universal electronic payment apparatuses, methods and systems |
CN103503010B (en) | 2011-03-04 | 2017-12-29 | 维萨国际服务协会 | Ability to pay is bound to the safety element of computer |
BG66795B1 (en) * | 2011-04-11 | 2018-12-17 | Николаев Попов Красимир | A method to fulfill complex tasks, valuation and payment effected in a common computer environment |
WO2012142045A2 (en) | 2011-04-11 | 2012-10-18 | Visa International Service Association | Multiple tokenization for authentication |
US8880040B2 (en) | 2011-05-23 | 2014-11-04 | Microsoft Corporation | Mobile network operator identification |
US9582598B2 (en) | 2011-07-05 | 2017-02-28 | Visa International Service Association | Hybrid applications utilizing distributed models and views apparatuses, methods and systems |
US9355393B2 (en) | 2011-08-18 | 2016-05-31 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
WO2013006725A2 (en) | 2011-07-05 | 2013-01-10 | Visa International Service Association | Electronic wallet checkout platform apparatuses, methods and systems |
US9704155B2 (en) | 2011-07-29 | 2017-07-11 | Visa International Service Association | Passing payment tokens through an hop/sop |
US10242358B2 (en) | 2011-08-18 | 2019-03-26 | Visa International Service Association | Remote decoupled application persistent state apparatuses, methods and systems |
US10825001B2 (en) | 2011-08-18 | 2020-11-03 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US9710807B2 (en) | 2011-08-18 | 2017-07-18 | Visa International Service Association | Third-party value added wallet features and interfaces apparatuses, methods and systems |
US9165294B2 (en) | 2011-08-24 | 2015-10-20 | Visa International Service Association | Method for using barcodes and mobile devices to conduct payment transactions |
US8862767B2 (en) | 2011-09-02 | 2014-10-14 | Ebay Inc. | Secure elements broker (SEB) for application communication channel selector optimization |
US10223730B2 (en) | 2011-09-23 | 2019-03-05 | Visa International Service Association | E-wallet store injection search apparatuses, methods and systems |
US9002322B2 (en) * | 2011-09-29 | 2015-04-07 | Apple Inc. | Authentication with secondary approver |
RU2631983C2 (en) | 2012-01-05 | 2017-09-29 | Виза Интернэшнл Сервис Ассосиэйшн | Data protection with translation |
US10223710B2 (en) | 2013-01-04 | 2019-03-05 | Visa International Service Association | Wearable intelligent vision device apparatuses, methods and systems |
US9830595B2 (en) | 2012-01-26 | 2017-11-28 | Visa International Service Association | System and method of providing tokenization as a service |
AU2013214801B2 (en) | 2012-02-02 | 2018-06-21 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems |
US10282724B2 (en) | 2012-03-06 | 2019-05-07 | Visa International Service Association | Security system incorporating mobile device |
WO2013166501A1 (en) | 2012-05-04 | 2013-11-07 | Visa International Service Association | System and method for local data conversion |
US9524501B2 (en) | 2012-06-06 | 2016-12-20 | Visa International Service Association | Method and system for correlating diverse transaction data |
US9547769B2 (en) | 2012-07-03 | 2017-01-17 | Visa International Service Association | Data protection hub |
US9846861B2 (en) | 2012-07-25 | 2017-12-19 | Visa International Service Association | Upstream and downstream data conversion |
US9256871B2 (en) | 2012-07-26 | 2016-02-09 | Visa U.S.A. Inc. | Configurable payment tokens |
US9665722B2 (en) | 2012-08-10 | 2017-05-30 | Visa International Service Association | Privacy firewall |
WO2014043278A1 (en) | 2012-09-11 | 2014-03-20 | Visa International Service Association | Cloud-based virtual wallet nfc apparatuses, methods and systems |
US8959032B2 (en) | 2012-10-10 | 2015-02-17 | Quisk, Inc. | Self-authenticating peer to peer transaction |
US10176478B2 (en) | 2012-10-23 | 2019-01-08 | Visa International Service Association | Transaction initiation determination system utilizing transaction data elements |
US9911118B2 (en) | 2012-11-21 | 2018-03-06 | Visa International Service Association | Device pairing via trusted intermediary |
US10304047B2 (en) | 2012-12-07 | 2019-05-28 | Visa International Service Association | Token generating component |
US9741051B2 (en) | 2013-01-02 | 2017-08-22 | Visa International Service Association | Tokenization and third-party interaction |
US10740731B2 (en) | 2013-01-02 | 2020-08-11 | Visa International Service Association | Third party settlement |
US20140258123A1 (en) * | 2013-03-05 | 2014-09-11 | Quisk, Inc. | Tokenized Payment Service Registration |
WO2014143776A2 (en) | 2013-03-15 | 2014-09-18 | Bodhi Technology Ventures Llc | Providing remote interactions with host device using a wireless device |
GB2512080A (en) * | 2013-03-19 | 2014-09-24 | Visa Europe Ltd | A method and system for transferring data |
US11055710B2 (en) | 2013-05-02 | 2021-07-06 | Visa International Service Association | Systems and methods for verifying and processing transactions using virtual currency |
SG11201509386UA (en) | 2013-05-15 | 2015-12-30 | Visa Int Service Ass | Mobile tokenization hub |
US10878422B2 (en) | 2013-06-17 | 2020-12-29 | Visa International Service Association | System and method using merchant token |
CN113469670B (en) | 2013-07-24 | 2024-04-05 | 维萨国际服务协会 | System and method for ensuring data transfer risk using tokens |
AU2014294613B2 (en) | 2013-07-26 | 2017-03-16 | Visa International Service Association | Provisioning payment credentials to a consumer |
US10496986B2 (en) | 2013-08-08 | 2019-12-03 | Visa International Service Association | Multi-network tokenization processing |
CN114819961A (en) | 2013-08-08 | 2022-07-29 | 维萨国际服务协会 | Method and system for provisioning payment credentials for mobile devices |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
JP6386567B2 (en) | 2013-10-11 | 2018-09-05 | ビザ インターナショナル サービス アソシエーション | Network token system |
US9978094B2 (en) | 2013-10-11 | 2018-05-22 | Visa International Service Association | Tokenization revocation list |
US11574299B2 (en) | 2013-10-14 | 2023-02-07 | Equifax Inc. | Providing identification information during an interaction with an interactive computing environment |
AU2014334713A1 (en) | 2013-10-14 | 2016-05-19 | Equifax Inc. | Providing identification information to mobile commerce applications |
US10515358B2 (en) | 2013-10-18 | 2019-12-24 | Visa International Service Association | Contextual transaction token methods and systems |
US10489779B2 (en) | 2013-10-21 | 2019-11-26 | Visa International Service Association | Multi-network token bin routing with defined verification parameters |
US10366387B2 (en) | 2013-10-29 | 2019-07-30 | Visa International Service Association | Digital wallet system and method |
AU2014353151B2 (en) | 2013-11-19 | 2018-03-08 | Visa International Service Association | Automated account provisioning |
BR112016014106A2 (en) | 2013-12-19 | 2017-08-08 | Visa Int Service Ass | METHOD FOR ENHANCED SECURITY OF A COMMUNICATION DEVICE, AND, COMMUNICATION DEVICE |
US9922322B2 (en) | 2013-12-19 | 2018-03-20 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
US10433128B2 (en) | 2014-01-07 | 2019-10-01 | Visa International Service Association | Methods and systems for provisioning multiple devices |
US9846878B2 (en) | 2014-01-14 | 2017-12-19 | Visa International Service Association | Payment account identifier system |
US10026087B2 (en) | 2014-04-08 | 2018-07-17 | Visa International Service Association | Data passed in an interaction |
US9942043B2 (en) | 2014-04-23 | 2018-04-10 | Visa International Service Association | Token security on a communication device |
SG11201608973TA (en) | 2014-05-01 | 2016-11-29 | Visa Int Service Ass | Data verification using access device |
KR20160146784A (en) | 2014-05-05 | 2016-12-21 | 비자 인터네셔널 서비스 어소시에이션 | System and method for token domain control |
EP3146747B1 (en) | 2014-05-21 | 2020-07-01 | Visa International Service Association | Offline authentication |
US10043185B2 (en) | 2014-05-29 | 2018-08-07 | Apple Inc. | User interface for payments |
US10866731B2 (en) | 2014-05-30 | 2020-12-15 | Apple Inc. | Continuity of applications across devices |
US11023890B2 (en) | 2014-06-05 | 2021-06-01 | Visa International Service Association | Identification and verification for provisioning mobile application |
US20150379505A1 (en) * | 2014-06-30 | 2015-12-31 | Intuit Inc. | Using limited life tokens to ensure pci compliance |
US9780953B2 (en) | 2014-07-23 | 2017-10-03 | Visa International Service Association | Systems and methods for secure detokenization |
US10484345B2 (en) | 2014-07-31 | 2019-11-19 | Visa International Service Association | System and method for identity verification across mobile applications |
US10339293B2 (en) | 2014-08-15 | 2019-07-02 | Apple Inc. | Authenticated device used to unlock another device |
US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US10140615B2 (en) | 2014-09-22 | 2018-11-27 | Visa International Service Association | Secure mobile device credential provisioning using risk decision non-overrides |
EP3198907B1 (en) * | 2014-09-26 | 2019-04-10 | Visa International Service Association | Remote server encrypted data provisioning system and methods |
US11257074B2 (en) | 2014-09-29 | 2022-02-22 | Visa International Service Association | Transaction risk based token |
US10015147B2 (en) | 2014-10-22 | 2018-07-03 | Visa International Service Association | Token enrollment system and method |
GB201419016D0 (en) | 2014-10-24 | 2014-12-10 | Visa Europe Ltd | Transaction Messaging |
US10325261B2 (en) | 2014-11-25 | 2019-06-18 | Visa International Service Association | Systems communications with non-sensitive identifiers |
SG11201702763TA (en) | 2014-11-26 | 2017-05-30 | Visa Int Service Ass | Tokenization request via access device |
CN107005563B (en) | 2014-12-12 | 2021-03-30 | 维萨国际服务协会 | Supply platform for machine-to-machine devices |
US10257185B2 (en) | 2014-12-12 | 2019-04-09 | Visa International Service Association | Automated access data provisioning |
US10187363B2 (en) | 2014-12-31 | 2019-01-22 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
US10096009B2 (en) | 2015-01-20 | 2018-10-09 | Visa International Service Association | Secure payment processing using authorization request |
US11250391B2 (en) | 2015-01-30 | 2022-02-15 | Visa International Service Association | Token check offline |
WO2016126729A1 (en) | 2015-02-03 | 2016-08-11 | Visa International Service Association | Validation identity tokens for transactions |
US10977657B2 (en) | 2015-02-09 | 2021-04-13 | Visa International Service Association | Token processing utilizing multiple authorizations |
US10164996B2 (en) | 2015-03-12 | 2018-12-25 | Visa International Service Association | Methods and systems for providing a low value token buffer |
SG10201908338TA (en) | 2015-04-10 | 2019-10-30 | Visa Int Service Ass | Browser integration with cryptogram |
US9998978B2 (en) | 2015-04-16 | 2018-06-12 | Visa International Service Association | Systems and methods for processing dormant virtual access devices |
US10552834B2 (en) | 2015-04-30 | 2020-02-04 | Visa International Service Association | Tokenization capable authentication framework |
WO2016182771A1 (en) * | 2015-05-11 | 2016-11-17 | One Factor Holdings Llc | Integrated activity management system and method of using same |
WO2017066792A1 (en) | 2015-10-15 | 2017-04-20 | Visa International Service Association | Instant token issuance system |
US10664843B2 (en) | 2015-12-04 | 2020-05-26 | Visa International Service Association | Unique code for token verification |
AU2017206119B2 (en) | 2016-01-07 | 2020-10-29 | Visa International Service Association | Systems and methods for device push provisioning |
AU2017214412A1 (en) | 2016-02-01 | 2018-06-28 | Visa International Service Association | Systems and methods for code display and use |
US11501288B2 (en) | 2016-02-09 | 2022-11-15 | Visa International Service Association | Resource provider account token provisioning and processing |
US10223685B2 (en) * | 2016-02-26 | 2019-03-05 | Arithmetic Operations Incorporated | Systems, methods, and media for pay-per-access micropayment-based web browsing and server applications |
US10313321B2 (en) | 2016-04-07 | 2019-06-04 | Visa International Service Association | Tokenization of co-network accounts |
CN109074578A (en) | 2016-04-19 | 2018-12-21 | 维萨国际服务协会 | System and method for executing push transaction |
US11250424B2 (en) | 2016-05-19 | 2022-02-15 | Visa International Service Association | Systems and methods for creating subtokens using primary tokens |
DK179186B1 (en) | 2016-05-19 | 2018-01-15 | Apple Inc | REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION |
RU2018144220A (en) | 2016-06-03 | 2020-07-09 | Виза Интернэшнл Сервис Ассосиэйшн | SUB-TOKEN MANAGEMENT SYSTEM FOR CONNECTED DEVICES |
CN114693289A (en) | 2016-06-11 | 2022-07-01 | 苹果公司 | User interface for transactions |
US10621581B2 (en) | 2016-06-11 | 2020-04-14 | Apple Inc. | User interface for transactions |
DK201670622A1 (en) | 2016-06-12 | 2018-02-12 | Apple Inc | User interfaces for transactions |
US11068899B2 (en) | 2016-06-17 | 2021-07-20 | Visa International Service Association | Token aggregation for multi-party transactions |
EP3261034A1 (en) | 2016-06-23 | 2017-12-27 | Mastercard International Incorporated | Method and system for authorizing and processing payment transactions over a network |
AU2017281938A1 (en) | 2016-06-24 | 2018-10-25 | Visa International Service Association | Unique token authentication cryptogram |
BR112018076196A2 (en) | 2016-07-11 | 2019-03-26 | Visa International Service Association | method, and portable communication and access devices. |
CA3026224A1 (en) | 2016-07-19 | 2018-01-25 | Visa International Service Association | Method of distributing tokens and managing token relationships |
US20180068313A1 (en) | 2016-09-06 | 2018-03-08 | Apple Inc. | User interfaces for stored-value accounts |
US10509779B2 (en) | 2016-09-14 | 2019-12-17 | Visa International Service Association | Self-cleaning token vault |
CN111355776B (en) | 2016-09-20 | 2023-10-24 | 徐蔚 | Service providing method and device based on multiple application programs and mobile terminal |
DK179471B1 (en) | 2016-09-23 | 2018-11-26 | Apple Inc. | Image data for enhanced user interactions |
US10496808B2 (en) | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
CN110036386B (en) | 2016-11-28 | 2023-08-22 | 维萨国际服务协会 | Access identifier supplied to application program |
US10755339B2 (en) | 2017-03-17 | 2020-08-25 | Team Labs, Inc. | System and method of purchase request management using plain text messages |
US10915899B2 (en) | 2017-03-17 | 2021-02-09 | Visa International Service Association | Replacing token on a multi-token user device |
AU2018253294B2 (en) | 2017-04-13 | 2022-09-15 | Equifax Inc. | Location-based detection of unauthorized use of interactive computing environment functions |
US10902418B2 (en) | 2017-05-02 | 2021-01-26 | Visa International Service Association | System and method using interaction token |
US11431836B2 (en) | 2017-05-02 | 2022-08-30 | Apple Inc. | Methods and interfaces for initiating media playback |
US10992795B2 (en) | 2017-05-16 | 2021-04-27 | Apple Inc. | Methods and interfaces for home media control |
US11494765B2 (en) | 2017-05-11 | 2022-11-08 | Visa International Service Association | Secure remote transaction system using mobile devices |
US20220279063A1 (en) | 2017-05-16 | 2022-09-01 | Apple Inc. | Methods and interfaces for home media control |
CN111343060B (en) | 2017-05-16 | 2022-02-11 | 苹果公司 | Method and interface for home media control |
CN110770773B (en) * | 2017-06-20 | 2024-07-19 | 区块链控股有限公司 | Multi-round token distribution system and method using blockchain networks |
AU2018291152B2 (en) | 2017-06-29 | 2021-11-11 | Equifax, Inc. | Third-party authorization support for interactive computing environment functions |
US10491389B2 (en) | 2017-07-14 | 2019-11-26 | Visa International Service Association | Token provisioning utilizing a secure authentication system |
JP6736686B1 (en) | 2017-09-09 | 2020-08-05 | アップル インコーポレイテッドApple Inc. | Implementation of biometrics |
KR102185854B1 (en) | 2017-09-09 | 2020-12-02 | 애플 인크. | Implementation of biometric authentication |
CA3090205A1 (en) | 2017-12-14 | 2019-06-20 | Equifax Inc. | Embedded third-party application programming interface to prevent transmission of sensitive data |
EP3762844A4 (en) | 2018-03-07 | 2021-04-21 | Visa International Service Association | Secure remote token release with online authentication |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11256789B2 (en) | 2018-06-18 | 2022-02-22 | Visa International Service Association | Recurring token transactions |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
SG11202103377WA (en) | 2018-10-08 | 2021-04-29 | Visa Int Service Ass | Techniques for token proximity transactions |
GB2580934B (en) * | 2019-01-30 | 2022-08-03 | Fusion Holdings Ltd | Systems and methods for authorizing user access to restricted content |
SG11202108626QA (en) | 2019-05-17 | 2021-09-29 | Visa Int Service Ass | Virtual access credential interaction system and method |
EP4231124A1 (en) | 2019-05-31 | 2023-08-23 | Apple Inc. | User interfaces for audio media control |
US10996917B2 (en) | 2019-05-31 | 2021-05-04 | Apple Inc. | User interfaces for audio media control |
US11651297B2 (en) * | 2019-12-30 | 2023-05-16 | Expedia, Inc. | Booking management system |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
US11392291B2 (en) | 2020-09-25 | 2022-07-19 | Apple Inc. | Methods and interfaces for media control with dynamic feedback |
US11563579B2 (en) * | 2020-10-02 | 2023-01-24 | Nvidia Corporation | Token-based zero-touch enrollment for provisioning edge computing applications |
EP4264460A1 (en) | 2021-01-25 | 2023-10-25 | Apple Inc. | Implementation of biometric authentication |
US11847378B2 (en) | 2021-06-06 | 2023-12-19 | Apple Inc. | User interfaces for audio routing |
US11877218B1 (en) | 2021-07-13 | 2024-01-16 | T-Mobile Usa, Inc. | Multi-factor authentication using biometric and subscriber data systems and methods |
US11784956B2 (en) | 2021-09-20 | 2023-10-10 | Apple Inc. | Requests to add assets to an asset account |
US20230222246A1 (en) * | 2022-01-07 | 2023-07-13 | Mastercard International Incorporated | Systems and methods for use in imposing a common domain |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7152045B2 (en) * | 1994-11-28 | 2006-12-19 | Indivos Corporation | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5671279A (en) * | 1995-11-13 | 1997-09-23 | Netscape Communications Corporation | Electronic commerce using a secure courier system |
US5812668A (en) * | 1996-06-17 | 1998-09-22 | Verifone, Inc. | System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture |
DE19630920C1 (en) * | 1996-07-31 | 1997-10-16 | Siemens Ag | Subscriber authentication and/or data encryption method |
JP2000036000A (en) * | 1998-06-30 | 2000-02-02 | Sun Microsyst Inc | Neutral observer in electronic commercial transaction |
US6327578B1 (en) * | 1998-12-29 | 2001-12-04 | International Business Machines Corporation | Four-party credit/debit payment protocol |
US7171694B1 (en) * | 1999-07-21 | 2007-01-30 | E-Payments | Method for performing a transaction over a network |
FI20000760A0 (en) * | 2000-03-31 | 2000-03-31 | Nokia Corp | Authentication in a packet data network |
WO2001090861A2 (en) * | 2000-05-25 | 2001-11-29 | Echarge Corporation | Secure transaction protocol |
JP2002207929A (en) * | 2001-01-12 | 2002-07-26 | Nippon Telegr & Teleph Corp <Ntt> | Method and device for customer authentication, provider device and its processing method, and sales service providing device and its processing method |
US20020147820A1 (en) * | 2001-04-06 | 2002-10-10 | Docomo Communications Laboratories Usa, Inc. | Method for implementing IP security in mobile IP networks |
DE10149298A1 (en) * | 2001-10-05 | 2003-04-17 | Siemens Ag | Method for electronic posting and payment of invoices, involves setting up connection from customer to bank server |
JP3899890B2 (en) * | 2001-10-18 | 2007-03-28 | 日本電信電話株式会社 | Billing method and system, purchase control terminal, authentication billing server, sales server, billing program, and storage medium storing billing program |
JP2003168035A (en) * | 2001-12-04 | 2003-06-13 | Senshukai General Service Co Ltd | Method for acquiring detailed information of client |
US7996888B2 (en) * | 2002-01-11 | 2011-08-09 | Nokia Corporation | Virtual identity apparatus and method for using same |
WO2005022428A1 (en) * | 2003-08-28 | 2005-03-10 | Ibm Japan, Ltd. | Attribute information providing server, attribute information providing method, and program |
GB2406925B (en) * | 2003-10-09 | 2007-01-03 | Vodafone Plc | Facilitating and authenticating transactions |
US20050114261A1 (en) * | 2003-11-21 | 2005-05-26 | Chuang Guan Technology Co., Ltd. | Payment system for using a wireless network system and its method |
-
2006
- 2006-04-19 JP JP2008507849A patent/JP2008541206A/en active Pending
- 2006-04-19 MX MX2007012648A patent/MX2007012648A/en active IP Right Grant
- 2006-04-19 AU AU2006236243A patent/AU2006236243B2/en not_active Ceased
- 2006-04-19 KR KR1020077022840A patent/KR20070120125A/en not_active Application Discontinuation
- 2006-04-19 SG SG201002693-8A patent/SG161290A1/en unknown
- 2006-04-19 CA CA002601785A patent/CA2601785A1/en not_active Abandoned
- 2006-04-19 CN CN2011103649867A patent/CN102368325A/en active Pending
- 2006-04-19 WO PCT/US2006/014801 patent/WO2006113834A2/en active Application Filing
- 2006-04-19 EP EP06758421A patent/EP1872188A4/en not_active Withdrawn
- 2006-04-19 BR BRPI0608591-1A patent/BRPI0608591A2/en not_active IP Right Cessation
-
2007
- 2007-09-12 NO NO20074614A patent/NO20074614L/en not_active Application Discontinuation
- 2007-09-17 IL IL185978A patent/IL185978A0/en unknown
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102646252A (en) * | 2012-03-19 | 2012-08-22 | 重庆先迈通信技术有限公司 | Business server system and business processing method of negotiated price transaction business |
CN103678966A (en) * | 2012-08-31 | 2014-03-26 | Ncr公司 | Security module and method of securing payment information |
CN105378776A (en) * | 2013-02-26 | 2016-03-02 | 维萨国际服务协会 | Methods and systems for providing payment credentials |
CN104144146A (en) * | 2013-05-10 | 2014-11-12 | 中国电信股份有限公司 | Method and system for visiting website |
CN104144146B (en) * | 2013-05-10 | 2017-11-03 | 中国电信股份有限公司 | A kind of method and system of access website |
CN107851254A (en) * | 2015-07-20 | 2018-03-27 | 维萨国际服务协会 | At utmost reduce the seamless transaction of user's input |
CN109716373A (en) * | 2016-08-12 | 2019-05-03 | 万事达卡国际公司 | Cipher authentication and tokenized transaction |
CN109716373B (en) * | 2016-08-12 | 2023-11-07 | 万事达卡国际公司 | Cryptographically authenticated and tokenized transactions |
CN112740259A (en) * | 2018-09-24 | 2021-04-30 | 优基股份有限公司 | System, method and apparatus for performing cryptographically secured transactions |
CN109242488A (en) * | 2018-11-22 | 2019-01-18 | 腾讯科技(深圳)有限公司 | A kind of secure payment control method, device and server |
CN109242488B (en) * | 2018-11-22 | 2022-02-18 | 腾讯科技(深圳)有限公司 | Safety payment control method and device and server |
Also Published As
Publication number | Publication date |
---|---|
CA2601785A1 (en) | 2006-10-26 |
AU2006236243A1 (en) | 2006-10-26 |
JP2008541206A (en) | 2008-11-20 |
NO20074614L (en) | 2007-11-16 |
IL185978A0 (en) | 2008-01-20 |
WO2006113834A2 (en) | 2006-10-26 |
EP1872188A4 (en) | 2011-04-27 |
SG161290A1 (en) | 2010-05-27 |
WO2006113834A9 (en) | 2007-11-01 |
EP1872188A2 (en) | 2008-01-02 |
BRPI0608591A2 (en) | 2010-01-19 |
AU2006236243B2 (en) | 2011-03-24 |
WO2006113834A3 (en) | 2009-04-23 |
MX2007012648A (en) | 2007-12-13 |
KR20070120125A (en) | 2007-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102368325A (en) | Network commercial transactions | |
CN101496059A (en) | Network commercial transactions | |
CN110945554B (en) | Registry Blockchain Architecture | |
US8996423B2 (en) | Authentication for a commercial transaction using a mobile module | |
CN101421754A (en) | Secure network commercial transactions | |
CN108885745B (en) | Blockchain-based exchange with tokenization | |
CN109155035B (en) | Method and system for efficiently transferring entities on a point-to-point distributed book using blockchains | |
RU2402814C2 (en) | On-line commercial transactions | |
KR100506913B1 (en) | Electronic payment system using anonymous representative payment means and method thereof | |
US8571992B2 (en) | Methods and apparatus for title structure and management | |
US20160125403A1 (en) | Offline virtual currency transaction | |
CN102592239A (en) | Network commercial transactions | |
JP2004511028A (en) | Method and system for securely collecting, storing and transmitting information | |
CA2892457C (en) | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction | |
US12106288B2 (en) | Authentication system and method | |
AU2011202945B2 (en) | Network commercial transactions | |
CN115917571A (en) | Internet data use control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120307 |