WO1999027475A1 - Payment system and method using tokens - Google Patents
Payment system and method using tokens Download PDFInfo
- Publication number
- WO1999027475A1 WO1999027475A1 PCT/IL1998/000563 IL9800563W WO9927475A1 WO 1999027475 A1 WO1999027475 A1 WO 1999027475A1 IL 9800563 W IL9800563 W IL 9800563W WO 9927475 A1 WO9927475 A1 WO 9927475A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tokens
- party
- token
- user
- transaction
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/29—Payment schemes or models characterised by micropayments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/403—Solvency checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
Definitions
- This invention concerns systems and methods for collecting payments in a distributed digital communications environment.
- the invention relates in particular to large networks and the Internet.
- service providers may find it difficult to collect a fee for services performed.
- a service provide may possibly devise a software package with an integral module which accounts for the use of the software, so that the service provider may charge the user accordingly.
- a provider of a registered E-mail service may be paid for services provided.
- a weak point in such a software is that it is too easy to neutralize the accounting module, to render it inoperable, so that the user may use the software for free. And, if one user does not have the required technical skills for that, he/she may be sure that a hacker somewhere across the globe already did it, and that a "cracked/broken" version of the software is available on the Internet. Thus, a hacker or unauthorized person may spread worldwide a software package to attack the legitimate software. This may result in a large scale misuse of the software, while avoiding the required payment.
- Another approach to the fee collecting problem may be to channel all transactions through the service provider's facility.
- the service provider then has control on any and all transactions being performed, and can enforce a payment policy as desired.
- Still another payment method may include the user using his/her credit card to pay in real time for any transaction.
- the disadvantage of this method is that the credit card number may be compromised, since the Internet and similar links are not secure. If an unauthorized person intercepts the credit card information, this may be used in fraudulent transactions. The card owner may find it difficult to prove a specific transaction was not authorized, or even to detect some of the unauthorized charges.
- a provider of walkie-talkie devices or wireless sets cannot collect a fee from each call, since the communication is direct between users, without the manufacturer's mediation.
- Another example is the use of a software for premium services relating to E-mail. It may be advantageous both to manufacturer and user to charge per use, not a global fee for the software. But how to account for use of the software? The manufacturer may even not be aware of the existence of the user, who may have obtained the software from a third party.
- the object is basically accomplished using a method of payment including the steps of (a) A transaction management unit receives from a user there a request to perform a service for which payment with tokens is required; (b) The management unit checks whether there are yet unused tokens available in the system. If an unused token was found, go to step (c) ; If there are no available tokens, then the service cannot be performed, END; (c) The management unit requests information on an available token and changes its status to "canceled"; (d) During the subsequent transaction with the second party, the management unit sends information relating to the token now used and canceled to the second party.
- the invention allows a third party to collect a fee from a transaction between two parties, even though the third party does not participate in transactions between the two parties.
- a user is provided with electronic tokens or stamps, against a payment.
- the user while using the service performed by the service provider, destroys a token or stamp as payment for that service.
- the tokens are all "used” or “destroyed” , so the user has to buy new tokens for future use of the service.
- the method may be used to pay for various available services or products.
- the user is required to make public or present proof that he/she indeed did destroy the tokens as required.
- a party to a transaction and the public in general can monitor the legitimacy of the use of tokens by a specific user.
- a large number of possible monitoring persons may verify a large number of the service or software, to ensure there are no illegitimate transactions, or at least that the number of these illegitimate transaction will not grow to large numbers.
- the system and method performs an automatic process of presenting proof of destroying the tokens, and of checking that the other party presented a legitimate proof as well.
- users will check each other with respect to the performance of payments as required, without requiring a deliberate effort on the part of the users.
- the software package will include means for automatically displaying and reporting any detected lack of payment or lack of report of tokens being destroyed as required.
- the system and method include means for diffusing the information on the use of tokens among many users, to allow high visibility of each user's proper conduct.
- tokens provider Another important aspect of the use of tokens is to pay to a second party for a service or product. Whereas the tokens provider will eventually pay to the second party, there is no need that the tokens provider approve in real time each and every transaction. Moreover, the invention discloses an effective method for dissemination of tokens to users.
- the special structure and operation of a large-scale, distributed payment system impose special requirements, including inter alia the need to effectively distribute tokens to a huge number of users of these tokens, and to keep track of them all.
- Fig. 1 illustrates the structure of a system for presenting reports on tokens to other users, and for monitoring other's reports.
- Fig. 2 details the structure of a token information management and storage database.
- Fig. 3 illustrates the structure of a report detailing the use of tokens.
- Fig. 4 illustrates the use of reports on tokens in transactions between various users, with Figs. 4(A), 4(B) and 4(C) illustrating three possible consecutive transactions.
- Fig. 5 illustrates another embodiment of the structure of a report detailing the use of tokens.
- Fig. 6 illustrates a structure of a tokens use report, with means for token use diffusion among users.
- a system for presenting reports on tokens to other users and for monitoring other's reports may include the following parts:
- a transactions management unit 11 using tokens.
- the unit 11 is activated when the user requires to perform a service for which payment using tokens is required.
- a service may include a special type of E-mail or an encryption procedure or other service provided, on the Internet or elsewhere.
- a tokens database 12 which includes information on tokens acquired from the service provider, which is usually also the tokens issuer.
- Unit 11 reads tokens from the database 12 each time there is a requirement to use the service and pay with tokens. Only if there are tokens available, will the service be performed. If the service is performed, then the database 12 is instructed to "cancel" the token, that is to indicate that the token was used. Thus, database 12 serves as a storage for tokens, keeping both used and available tokens and additional information related to these tokens.
- tokens use monitoring unit 13, to verify the correct use of tokens by other parties who connect to the system as shown.
- Each token also includes status indicating means, which change from "ready” to "used” or "canceled” after a token is used.
- Channel 15 may include a telephone line and/or a wireless link or a connection to Internet or other means for performing a digital communication session with other users.
- Tokens may be used as payment means for a wide variety of services, for example including but not limited to registered E-mail, legal E-mail, permits generation and management, certificates generation and management.
- Tokens may also be used to pay for products in commercial transactions over the Internet.
- a method for providing service with tokens used as payment means may include the following steps:
- Transaction management unit 11 receives from the local user a request to perform a service for which payment with tokens is required.
- Unit 11 checks whether there are yet unused tokens available in the system, that is in tokens database 12, that is tokens whose status is "ready” as opposed to "used” or "canceled".
- step (c) If an unused token was found, go to step (c) ;
- Unit 11 requests and/or retrieves information on an available (unused as yet) token from the database or storage unit 12. The status of the token which was retrieved will be automatically changed in the database 12, and will thereafter be designated as "used” or "canceled".
- unit 11 sends information relating to the used token to that other party, through channel 15.
- a method for monitoring proper use of tokens by other users may include the following steps:
- Tokens use monitoring unit 13 receives reports from other users, indicating their use of tokens and cancellation of tokens in each transaction.
- Unit 13 transfers the received reports to a database of tokens reports 14, which including information on use of tokens by other users.
- a database of tokens reports 14 which including information on use of tokens by other users.
- latest information on tokens is store, and oldest information is discarded.
- Unit 13 requests and/or retrieves information on previous reports from the same user from database 14.
- Unit 13 processes reports on the use of tokens by the other user, comparing according to predefined criteria.
- unit 13 stores that information in database 14 and/or displays a violation report and/or reports that to the tokens issuer, and/or sends a note to the user of such token.
- the abovedetailed system and method allow a third party (the tokens issuer) to collect a fee from a transaction between two parties, even though that third party does not participate in transactions between the two parties.
- Tokens may be loaded into the wireless set and their use accounted for as detailed above, including a report to the other party for verification purposes.
- wireless sets like citizen band systems can now be sold at a discount or even distributed for free, like cellular sets.
- cellular sets connect through a center and bring a fee to the manufacturer each time the set is used, wireless sets are used directly between users and a fee policy could not be enforced.
- Another example - now a software package for premium services relating to E-mail may be freely distributed, and the provider may get paid as the package is used.
- the package is used directly between users, without the intervention of the software provider, the use of tokens as per the present invention ensures that the software provider will be paid for the service.
- the invention may be advantageously used to pay for services on a network, especially for services required irregularly, where the user desires to pay per use.
- a user may desire to connect to a database.
- the prevalent method of payment now in use is a subscription for a fixed period, so that during that period the user is permitted unlimited access to the database, or a given amount of time. This may not be a satisfactory solution, since there are so many databases and other services now available, that a user may desire to use just a short time in each of them. But it may not be economical to subscribe to all of them, and to pay for a long time in each, where the user expects not to fully utilize all that time.
- resources in a net may be hardcopy printers belonging to a third party.
- a user may use the printer and pay with tokens, according to the volume of use, or the number of pages printed.
- Another example would be for network computers.
- a new concept in computers relates to a system where each user will have just a simple, low cost computer, and will use software resources available in the net. For a commercially viable system, there should be a payment for the use of these resources.
- Resources may include advanced word processors, database systems, super fast signal processors and much more. There are so many resources available, and so many users. There is the difficult problem of paying for the use of these resources, and for accounting for actual use of each resource by each user.
- the provider of the services may offer the services through many outlets. Separately, the provider sells tokens for the use of these resources. Then the provider does not have to take part in every transaction, but the tokens will be used and new tokens will have to be bought by users, as detailed above.
- the abovedetailed applications refer to payments to a third party for services rendered.
- tokens may each represent a fixed amount of money or time of use of resource, or a specific number of calls using a resource.
- a token may represent a prepaid amount of money, or a credit to that specific amount.
- An example involves not the Internet, but a local net, like a net in a business center. Many firms may have offices in the center, and they all may occasionally use services provided by other firms there, like printing or copying or data archiving or CD-ROM programming or ordering products like office supplies.
- Another example is in motels where a counter is activated for the use of electricity or gas.
- the counter is coin operated, and the guest pays in advance for a specific amount of the service to be used.
- tokens are used to actually pay to a second party for a service or product. Unlike prior systems, here there is no need that the tokens provider approve in real time each and every transaction. Thus, no huge centers are required to support all the transactions in the world.
- Fig. 2 details the structure of a token information management and storage database.
- Database 12 may include token identification part 21 , which includes (not shown) token unique serial number and optional additional information, all signed or encrypted with the private key of the service provider and/or the tokens issuer.
- the optional information may include the value of a token, if several products/services are available.
- Tokens may be presented to various providers of services or products. If token is presented to a third party, that party may require payment from the tokens issuer, so in effect the issuer performs the actual payment between users.
- a token status part 22, indicates whether the token was already used or not. If not - it is ready and available for the next use.
- Tokens are preferably arranged in chronological order of use, with last used token placed first in the list, as shown.
- Unused tokens are preferably arranged in chronological order with earliest token first. This structure allows for more efficient, faster processing by recipient.
- Tokens T-103 to T-1 1 1 , T-903 and T-903 are ready to use.
- Tokens T-100 to T-1 1 1 may have been issued at a specific date, with tokens T-903 and T-903 issued at a later date. Hence the different serial number and the relative location in the table.
- Fig. 3 illustrates the structure of a report detailing the use of tokens. This is sent to another user during a transaction therebetween which requires that User-1 will "spend” or “use” or “lose” a token. The report is sent so as to show the other party that indeed payment was performed for the transaction.
- This report enables the second party to verify that indeed User-1 had a token available prior to the transaction, and did destroy that token during the transaction, as required.
- User of service ID 331 contains the name or nickname or other information to identify the user who pays with tokens.
- the name should be understood or traceable by the service provider and/or tokens issuer, since they are the ultimate party who monitors the use of their tokens. In this example, a nickname "User-1 " is reported.
- Tokens are preferably arranged in chronological order of use, with the last used token (the token used in the present transaction) being placed first in the list, as shown.
- the report may otherwise indicate which token was used last, and the order of use of previous tokens. This information is helpful to allow monitoring for correct use of tokens, as detailed below. There may be a limit on the number of used tokens reported, to keep the communications effective. Then - only the last token(s) may be transmitted to other users, for example one or five or ten or 100 for example. Here, only three previous tokens are shown, however the actual number of tokens may be much larger.
- the date of use 332 indicates the date of use of the service, that is the day when a specific token (to be detailed as well) was destroyed or canceled. In the example, the date is 10.26.97.
- the time of use 333 is the time when the token was canceled, here 19.55 .
- a common time may be used by all the users in the system, for example Greenwich time.
- each user presents his/her local time. Since time of various reports is compared separately for each user, there is no need to compare time reports among different users, so there is no need for a uniform time base.
- the token ID 334 indicates the specific token which was used in the present transaction, in this example the value was T-103.
- Token ID 334 may include (not shown) an unique serial number, together with the signature of the tokens issuer. The signature may use the private key of the issuer. Alternatively, an unique combination of serial code and date may be used. In still another embodiment, a digital code indicative of time of issue may be used.
- Additional optional information may include the details of the buyer of that token (to whom it was sold), an expiry date and/or other information. All the information may be signed by the tokens provider.
- Previous token ID 335 indicates the token which was used in a previous transaction by User-1 , that is the last token used before token T-103. In the example, this was token T-102.
- a report including this information allows the other party to the transaction to verify that the tokens reported to be used are changing with time, that is that User-1 updates his/her tokens database and presents each time a different token, thus User-1 pays for the transaction with tokens, as required.
- the date of use 336 may be useful for monitoring the use of tokens, here its value is 10.22.97 .
- the time of use 337 allows a more precise comparison and evaluation of reports, here it was 14.50 .
- a plurality of previously used tokens is preferable since it increases the chance that the other party has in their database a related report, and can detect discrepancies if the use of tokens was not proper.
- previous token ID 338 is T-101
- date of use 339 is 10.22.97
- Time of use 340 is 13.15.
- the date of use 342 was 10.22.97, and the time of use 343 was 11 .05 .
- the signature of user 344 is proof that User-1 sent that report. It may include a hash or CRC of the abovementioned information, encrypted with the private key of User-1 .
- a tokens use monitoring unit 13 (See Fig. 1 ) at another user's facility may monitor the transaction for proper use of tokens.
- the monitoring unit 13 uses information in a database of tokens reports 14 attached thereto.
- An implementation of a monitoring routine is illustrated as Method 13 below. The method is automatically performed by computer means (not shown) at another user's facility.
- a second user upon receiving a tokens use report, can evaluate the report to determine whether improper use of tokens has been made by User-1 , by performing the following steps:
- step (z) store, display and/or report misuse of tokens ).
- step (z) store, display and/or report misuse of tokens ).
- Each token in the report is compared with tokens stored in the database of tokens reports 14 (see Fig. 1) , for User-1 .
- step (z) If a token with the same ID was detected, but with a different time/date, or a token with an identical time/date but with a different token ID was found in the database, then a discrepancy was detected, go to step (z) . d.
- the time span of the tokens in the report is evaluated, that is the time between the first used token and the last used token.
- step (z) If a token report was found in the database, whose time is within the above time span but for which there is no corresponding token report in the report, then a token report is missing, thus a discrepancy was detected, go to step (z).
- the method can thus effectively prevent large scale fraud and avoidance of payments due.
- Fig. 4 illustrates the use of reports on tokens in transactions between various users.
- a first user 1 User-1
- a first user 1 connects through communication channel 15 to a second user 18 (User-2 in the example) .
- a tokens use report 3 is sent from first user 1 to the second user 18.
- Report 3 includes details on token T-104 (the presently used token) as well as previously used tokens T-103, T-102, T-101 and T-100.
- a report 3 may be more detailed, to include for example information as detailed in Fig. 3 above.
- FIG. 4(B) A subsequent transaction is illustrated in Fig. 4(B).
- the first user 1 (User-1 ) connects to a third user 19 (User-51 ), through communication channel 152.
- the communication channels may be different, or the same channel may be used.
- a tokens use report 38 is sent from first user 1 to third user 19.
- Report 38 is an updated version of report 3 above, to indicate token T-105 as the presently used token.
- Token T-104 now belongs to the previously used tokens list, together with T-103, T-102 and T-101 . Assuming that the reports are limited to four previous tokens, then token T-100 (the oldest) is now removed from the report.
- the list may include many more tokens, however it should preferably be limited anyway, to prevent waste of communication time and of storage space. Thus, a limit will be reached eventually, and then the oldest tokens will be removed from subsequently transmitted reports.
- FIG. 4(C) A later transaction is illustrated in Fig. 4(C).
- the first user 1 (User-1 ) connects again to the second user 18 (User-2).
- a communication channel 152 may be used, maybe a channel different than that used in the previous transaction illustrated in Fig 4(A).
- a tokens use report 39 is sent from first user 1 to second user 18.
- report 39 is an updated version of report 38, to indicate token T-106 as the presently used token.
- Tokens T-105, T-104 now belong to the previously used, tokens list, together with T-103 and T-102. Token
- T-101 (the oldest) is now being removed from the report 39.
- step (z) store, display and/or report misuse of tokens ).
- report 3 indicates that token T-104 was used, whereas later report 39 indicates the use of token T-105. Therefore, there appear to be no discrepancy in this respect.
- step (z) store, display and/or report misuse of tokens .
- each token in one report 39 is compared with the tokens stored in the other report 3. If there is an overlap between the tokens, then the tokens should appear in the same order, with none missing, otherwise a discrepancy is declared.
- report 39 details used tokens as T-107, T-106, T-105, T-103 and T-102, whereas report 3 indicated tokens T-104, T-103, T-102, T-101 and T-100, then a discrepancy was found - in the later report 39 the use of token T-104 between T-103 and T-105 is missing.
- the method is efficient in a statistical sense. However, by comparing two or more reports from the same user, a higher probability of detecting fraud by the first user 1 is achieved.
- Fig. 5 illustrates another embodiment of the structure of a report detailing the use of tokens, with means for transferring information on use of tokens between users.
- the logical parts of the report in column 31 with an example of possible specific values assigned to these parts in column 32.
- the report here differs from that illustrated in Fig. 3 in that now the sender signs each token used, separately.
- the report includes
- User of service ID 331 contains the name or nickname or other information to identify the user who pays with tokens. Again, tokens are preferably arranged in chronological order of use, with the last used token placed first in the list, as shown.
- Date of use 332 indicates the date of use of the service, that is the day when a specific token (to be detailed as well) was destroyed or canceled. In the example, the date is 10.26.97.
- Time of use 333 is the time when the token was canceled, here 19.55 .
- Token ID 334 indicates the specific token which was used in the present transaction, in this example the value was T-103.
- Signature-3 346 is the signature of the sender (User-1 ) on the last token used, that is T-103 and related information. In the example, its value is 359771 1 .
- This structure allows the recipient to distribute part of the token information to other users, so as to diffuse the information relating to the use of tokens.
- This allows each user to store information on the use of tokens from various users in their respective database of tokens reports 14, and to subsequently compare the information with other reports from other users or from a user directly reporting to them on the use of tokens.
- Fig. 6 illustrates a structure of a tokens use report, with means for diffusion of reports about token use among other users.
- the report includes two parts, a report on own use of tokens 41 and a report on other's use of tokens 42
- the report 41 includes information on last tokens used by the present sender, as detailed in Fig. 5 above and the related description. It includes an indication of the user of service ID 331 , with the name or nickname or other information to identify the sender. Date of use 332 indicates the date of use of the service, that is when the token 334 was canceled.
- Time of use 333 is the time when the token 334 was canceled.
- Token ID 334 indicates the specific token which was used in the present transaction.
- Signature-3 346 is the signature of the sender (User-1 ) on the last token used.
- report 41 further includes information on previously used tokens as illustrated in Figs. 6 and 5.
- a report on others' use of tokens 42 is a collection of token reports from various user, as sent by other users when they connected to the present sender and reported their use of tokens.
- user of service ID 421 refers to an user designated as User-5, who had previously reported the use of a token on the Date of use 422, that is the date when the token 424 was canceled in the User-5 tokens database.
- Time of use 423 is the time when the token 424 was canceled.
- Token ID 424 indicates the specific token which was then used.
- Signature-37 425 is the signature of the sender (User-5) on the report relating to the use of that token, T-788 used.
- report 42 further includes information on other users' use of tokens, like User-19 illustrated there.
- Each such token report is extracted from a report from another user, in the form as illustrated in Fig. 5.
- each token can be included by recipient in his/her reports to other users.
- the advantage of the method is that the public becomes the watchdog over the proper use of the tokens.
- the process is automatic, thus fast and effective, and does not require an effort on the part of the user.
- a. unit 11 requests and/or retrieves information on an available (unused as yet) token from the database or storage unit 12, as well as information on previously used tokens;
- unit 11 prepares a first part of a token use report, including information on the last token used as well as previous tokens used by the present user;
- tokens use monitoring unit 13 request and/or retrieves from unit 14 reports on the use of tokens by other users, and transfers these reports to unit 11 ;
- unit 11 prepares a second part of a token use report, including information on the use of tokens by other users;
- a report including the first part prepared in step (b) and a second part prepared in step (d) is sent to another user during a paid transaction.
- the second part of the report in step (d) may be performed by unit 13, then sent to unit 1 1 or directly to the other user.
- information relating to violation of token use rules by others is always included in the token use report. Thus the information on violations or fraud is diffused throughout the system, until it reaches the tokens issuer or other party with enforcing capabilities.
- Tokens use monitoring unit 13 receives reports from other users, indicating their use of tokens, as well as information on the use of tokens by others;
- Unit 13 transfers the received reports to a database of tokens reports 14;
- Unit 13 organizes the information in database 14 according to chronological order and separately for each user;
- step (z) store, display and/or report misuse of tokens .
- step (z) store, display and/or report misuse of tokens .
- step (z) store, display and/or report misuse of tokens ).
- Each token in the report is compared with tokens stored in the database of tokens reports 14 (see Fig. 1) , for User-1 .
- step (z) If a token with the same ID was detected, but with a different time/date, or a token with an identical time/date but with a different token ID was found in the database, then a discrepancy was detected, go to step (z) .
- the time span of the tokens in the report is evaluated, that is the time between the first used token and the last used token. If a token report was found in the database, whose time is within the above time span but for which there is no corresponding token report in the report, then a token report is missing, thus a discrepancy was detected, go to step (z).
- the present invention discloses an effective method for dissemination of tokens to users.
- One possible method is to create a file "token" , to include an indication of the value of the token, signed or encrypted with the private key of the tokens provider.
- Each token may represent a fixed amount of money or time of use of resource, or a specific number of calls using a resource, as the need be.
- a disadvantage of the above method is that, for huge amounts of tokens distributed to many users, it may be difficult for the tokens issuer to keep track of them all, to prevent duplicates and to detect fraud. Thus the tokens issuer may become a bottleneck in the digital commerce.
- the above special requirements stem from the structure and operation of a large-scale, distributed payment system.
- K a specific number of tokens. User pays for the tokens or uses credit, as per the business arrangement between user and tokens issuer;
- Token issuer prepares a digital document, allowing the user to generate K tokens, with specific parameters. These may include the value of each token, and the serial number of the first and last token.
- the digital information in the document may effectively say:
- the above digital document is signed or encrypted with the private key of the tokens issuer, and delivered to the user.
- the document is delivered to a software package at the user's facility, a software which is responsible for tokens issuing and accounting for, that is unit 11 , see Fig. 1 ;
- the user software (unit 11 ) checks whether a token can be issued, according to the permit/digital document. If positive, a counter of used tokens is incremented, and a token prepared with a serial number which is the successor of the last token generated, all within the serial numbers according to the digital document.
- a token may effectively include the following: "Token No. 256, value $10, generated by User-73, according to permit from lssuer-9" .
- the token is signed or encrypted with the private key of User-73. If encrypted, then an indication to identify User-73 should be left en clair, to allow decryption of the message. Go to step (d). If all the tokens were already generated according to the digital document issued in step (a), then no token is generated, and the user is informed accordingly "no more tokens available". END.
- a measure of safety is achieved in the above method, since the user issuing these tokens may have to sign with his/her private key, so that each token is traceable to source, and if there is suspicion of fraudulent use, then a user may be held accountable. On the other hand, this very possibility may prevent users from misusing the tokens in the first place, thus achieving the desired safety.
- the safety in this method is achieved not in a centralized system with the center having "dictatorial" powers and intervening in each transaction, but a distributed system “democratic” , where users participate in enforcing the tokens and payment policy, and in checking that other users do the same.
- Method 7 a user will not report to others about the use of tokens, however the system assigns to each token a serial number, with number in ascending order.
- a recipient of a token may compare the serial number of the presently received token with the serial number of a previous token or previous tokens. If the serial numbers are not all different from each other and in ascending order, this is an indication of tokens misuse. A tokens misuse is thus displayed for others to see.
- the method is detailed below as Method 8.
- Token issuer prepares a digital document, allowing the user to generate K tokens, with specific parameters. These may include the value of each token, and the serial number of the first and last token.
- the digital information in the document may effectively say:
- the above digital document is signed or encrypted with the private key of the tokens issuer; c.
- the user software (unit 1 1 ) checks whether a token can be issued, according to the permit/digital document. If positive, a counter of used tokens is incremented, and a token is prepared with a serial number which equals the previous serial number plus a fixed increment (for example, the previous number plus 1 ), where all the serial numbers are within the serial numbers according to the digital document.
- a token may effectively include the following:
- step (a) If all the tokens were already generated according to the digital document issued in step (a), then no token is generated, and the user is informed accordingly "no more tokens available". END.
- tokens of various value where the value of each token is embedded in the token ID as created by the token issuer. This allows the user to pay various amounts for different services or products, as the need be. This is equivalent to the use of different money bills, each having a different value.
- the tokens may also be arranged in the order of their value.
- the tokens database 12 may also be arranged in the order of their value.
- several separate sections may be used in tokens database 12, each section including only tokens of a specific value.
- the methods may be updated to permit the use of a plurality of tokens at one time/date. Such an activity will then be considered as valid.
- the recipient has the ability to verify that the tokens are valid, by performing a hash or CRC, then decrypting the hash or CRC in the token with the known, public key of the tokens issuer, and comparing results. If the results do not correspond, then the tokens are false.
- the recipient also has the ability to verify the signature of the reports sending party, again by verifying the signature of that party as detailed above: perform a hash or CRC, then decrypt the hash or CRC in the report with the known, public key of the other user issuer, and compare results.
- signature by a party involves the computation of a hash or CRC of a piece of information, and encryption of the hash or CRC with the private key of the sender.
- a token may include additional information, for example a picture and/or graphics and/or an audio message.
- additional information for example a picture and/or graphics and/or an audio message.
- a digital token may resemble an ordinary coin, by having a value attached thereto as well as additional information.
- a token may be used as letterhead or paper for a firm.
- the firm assigns tokens to employees, who can use these tokens in official letters, for example in E-mail messages.
- the token becomes the letterhead of the company in this electronic paper application.
- the company may authorize employees to use a token in each E-mail message sent in the course of their work.
- the token is used as digital paper, to "write" messages thereon.
- the tokens need not be prepaid by the user. It is possible to include advertising in the token, with the firm benefiting from the advertising paying for the use of tokens. This approach may be better suited for the Internet environment, where services are generally free. Other methods to replace direct payment by the user may be used.
- the advertising may be implemented in the additional information in the token, which may include pictures, graphics, audio and/or other information.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002314098A CA2314098A1 (en) | 1997-11-20 | 1998-11-19 | Payment system and method using tokens |
AU12567/99A AU1256799A (en) | 1997-11-20 | 1998-11-19 | Payment system and method using tokens |
EP98955880A EP0993642A1 (en) | 1997-11-20 | 1998-11-19 | Payment system and method using tokens |
US12/457,351 US20090254483A1 (en) | 1998-11-19 | 2009-06-09 | Payment system and method using tokens |
US13/902,921 US20140074695A1 (en) | 1997-11-20 | 2013-05-27 | Payment System and Method Using Tokens |
US14/092,672 US20140089184A1 (en) | 1997-11-20 | 2013-11-27 | Payment System and Method Using Tokens |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL12226397A IL122263A0 (en) | 1997-11-20 | 1997-11-20 | Payment system and method using tokens |
IL122263 | 1997-11-20 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/586,881 Continuation US7555460B1 (en) | 1997-11-20 | 2000-06-05 | Payment system and method using tokens |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999027475A1 true WO1999027475A1 (en) | 1999-06-03 |
Family
ID=11070873
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL1998/000563 WO1999027475A1 (en) | 1997-11-20 | 1998-11-19 | Payment system and method using tokens |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP0993642A1 (en) |
AU (1) | AU1256799A (en) |
CA (1) | CA2314098A1 (en) |
IL (1) | IL122263A0 (en) |
WO (1) | WO1999027475A1 (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001044968A2 (en) * | 1999-12-02 | 2001-06-21 | Oakington Technologies Limited | Transaction system and method |
WO2001073707A2 (en) * | 2000-03-29 | 2001-10-04 | Cma Business Credit Services | Method and apparatus for managing one or more value bearing instruments |
FR2815206A1 (en) * | 2000-10-10 | 2002-04-12 | Canon Kk | Communications network remote execution process having client execution request having step sending server execution cost equivalent money cost transfer. |
EP1241562A1 (en) * | 2001-03-16 | 2002-09-18 | Richler Graphics Ltd | Controlling printing on a network |
EP1252562A2 (en) * | 2000-01-26 | 2002-10-30 | PayByClick Corporation | Method and apparatus for conducting electronic commerce transactions using electronic tokens |
WO2002091321A1 (en) * | 2001-05-04 | 2002-11-14 | Giesecke & Devrient Gmbh | Method and arrangement for paying data accessible on a data network |
EP1265200A1 (en) * | 2001-06-04 | 2002-12-11 | Orbis Patents Limited | Credit card system and method |
GB2378780A (en) * | 2001-08-14 | 2003-02-19 | Elan Digital Systems Ltd | An arrangement for preventing the re-use of tokens in accessing pay-per-use software |
EP1400053A2 (en) * | 2001-02-27 | 2004-03-24 | Visa International Service Association | Distributed quantum encrypted pattern generation and scoring |
EP1546969A2 (en) * | 2002-09-30 | 2005-06-29 | Scott Sampson | Electronic payment validation using transaction authorization tokens |
WO2006117695A3 (en) * | 2005-01-26 | 2007-04-19 | Heng Kah Choy | Fraud-free payment for internet purchases |
US7240024B2 (en) | 2000-10-10 | 2007-07-03 | Canon Kabushiki Kaisha | Method for remote execution of a function in a communication network |
US7774370B2 (en) | 2002-09-30 | 2010-08-10 | Sampson Scott E | Controlling the validity status of communicated messages |
US8051172B2 (en) | 2002-09-30 | 2011-11-01 | Sampson Scott E | Methods for managing the exchange of communication tokens |
US20110313791A1 (en) * | 2010-06-18 | 2011-12-22 | Mytelehealthsolutions, Llc | System and Method for a Health Campaign Manager |
US11222327B2 (en) | 2016-12-12 | 2022-01-11 | Advanced New Technologies Co., Ltd. | Resource allocation method and device, and electronic payment method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5826245A (en) * | 1995-03-20 | 1998-10-20 | Sandberg-Diment; Erik | Providing verification information for a transaction |
US5839119A (en) * | 1996-09-27 | 1998-11-17 | Xerox Corporation | Method of electronic payments that prevents double-spending |
-
1997
- 1997-11-20 IL IL12226397A patent/IL122263A0/en unknown
-
1998
- 1998-11-19 WO PCT/IL1998/000563 patent/WO1999027475A1/en not_active Application Discontinuation
- 1998-11-19 EP EP98955880A patent/EP0993642A1/en not_active Withdrawn
- 1998-11-19 CA CA002314098A patent/CA2314098A1/en not_active Abandoned
- 1998-11-19 AU AU12567/99A patent/AU1256799A/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5826245A (en) * | 1995-03-20 | 1998-10-20 | Sandberg-Diment; Erik | Providing verification information for a transaction |
US5839119A (en) * | 1996-09-27 | 1998-11-17 | Xerox Corporation | Method of electronic payments that prevents double-spending |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001044968A3 (en) * | 1999-12-02 | 2002-07-11 | Oakington Technologies Ltd | Transaction system and method |
WO2001044968A2 (en) * | 1999-12-02 | 2001-06-21 | Oakington Technologies Limited | Transaction system and method |
EP1252562A2 (en) * | 2000-01-26 | 2002-10-30 | PayByClick Corporation | Method and apparatus for conducting electronic commerce transactions using electronic tokens |
US7328189B2 (en) | 2000-01-26 | 2008-02-05 | Paybyclick Corporation | Method and apparatus for conducting electronic commerce transactions using electronic tokens |
EP1252562A4 (en) * | 2000-01-26 | 2006-06-07 | Paybyclick Corp | Method and apparatus for conducting electronic commerce transactions using electronic tokens |
WO2001073707A2 (en) * | 2000-03-29 | 2001-10-04 | Cma Business Credit Services | Method and apparatus for managing one or more value bearing instruments |
WO2001073707A3 (en) * | 2000-03-29 | 2003-08-28 | Cma Business Credit Services | Method and apparatus for managing one or more value bearing instruments |
FR2815206A1 (en) * | 2000-10-10 | 2002-04-12 | Canon Kk | Communications network remote execution process having client execution request having step sending server execution cost equivalent money cost transfer. |
US7240024B2 (en) | 2000-10-10 | 2007-07-03 | Canon Kabushiki Kaisha | Method for remote execution of a function in a communication network |
EP1400053A2 (en) * | 2001-02-27 | 2004-03-24 | Visa International Service Association | Distributed quantum encrypted pattern generation and scoring |
EP1241562A1 (en) * | 2001-03-16 | 2002-09-18 | Richler Graphics Ltd | Controlling printing on a network |
WO2002091321A1 (en) * | 2001-05-04 | 2002-11-14 | Giesecke & Devrient Gmbh | Method and arrangement for paying data accessible on a data network |
EP1265200A1 (en) * | 2001-06-04 | 2002-12-11 | Orbis Patents Limited | Credit card system and method |
GB2378780B (en) * | 2001-08-14 | 2003-07-09 | Elan Digital Systems Ltd | Data integrity |
GB2378780A (en) * | 2001-08-14 | 2003-02-19 | Elan Digital Systems Ltd | An arrangement for preventing the re-use of tokens in accessing pay-per-use software |
EP1546969A2 (en) * | 2002-09-30 | 2005-06-29 | Scott Sampson | Electronic payment validation using transaction authorization tokens |
EP1546969A4 (en) * | 2002-09-30 | 2008-04-23 | Scott Sampson | Electronic payment validation using transaction authorization tokens |
US7774370B2 (en) | 2002-09-30 | 2010-08-10 | Sampson Scott E | Controlling the validity status of communicated messages |
US8051172B2 (en) | 2002-09-30 | 2011-11-01 | Sampson Scott E | Methods for managing the exchange of communication tokens |
WO2006117695A3 (en) * | 2005-01-26 | 2007-04-19 | Heng Kah Choy | Fraud-free payment for internet purchases |
CN101189629A (en) * | 2005-01-26 | 2008-05-28 | H·K·蔡 | Fraud-free payment for internet purchases |
US8740069B2 (en) | 2005-01-26 | 2014-06-03 | Heng Kah Choy | Fraud-free payment for internet purchases |
US20110313791A1 (en) * | 2010-06-18 | 2011-12-22 | Mytelehealthsolutions, Llc | System and Method for a Health Campaign Manager |
US11222327B2 (en) | 2016-12-12 | 2022-01-11 | Advanced New Technologies Co., Ltd. | Resource allocation method and device, and electronic payment method |
US11734667B2 (en) | 2016-12-12 | 2023-08-22 | Advanced New Technologies Co., Ltd. | Resource allocation method and device, and electronic payment method |
Also Published As
Publication number | Publication date |
---|---|
AU1256799A (en) | 1999-06-15 |
IL122263A0 (en) | 1998-04-05 |
CA2314098A1 (en) | 1999-06-03 |
EP0993642A1 (en) | 2000-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7555460B1 (en) | Payment system and method using tokens | |
DE69900169T2 (en) | CREDIT CARD SYSTEM AND PROCEDURE | |
EP0796480B1 (en) | Method and apparatus for conducting computerized commerce | |
US6353812B2 (en) | Computer-based method and system for aiding transactions | |
US7778924B1 (en) | System and method for transferring items having value | |
US6385731B2 (en) | Secure on-line PC postage metering system | |
US9418381B2 (en) | Method and system for notifying customers of transaction opportunities | |
US5757917A (en) | Computerized payment system for purchasing goods and services on the internet | |
US20090254476A1 (en) | Method and system for managing personal and financial information | |
EP1026644A1 (en) | Method and apparatus for performing electronic transactions | |
US20010037467A1 (en) | Controlled transfer of information in computer networks | |
WO1999027475A1 (en) | Payment system and method using tokens | |
US20070214085A1 (en) | System and method for detecting fraudulent calls | |
KR19990022620A (en) | Access control system and method for data storage media | |
KR20000069468A (en) | Reliance server for electronic transaction system | |
CA2457688A1 (en) | System for managing and reporting financial account activity | |
US20010044778A1 (en) | Electronic commercial transaction system | |
US7958546B2 (en) | Identity access management system | |
JPH1091705A (en) | Data transmission system and method in electronic transaction | |
WO2001055921A1 (en) | Personal information data storage system and its uses | |
CN1153582A (en) | Method for securely using digital signatures in commercial cryptographic system | |
KR20030010817A (en) | Method and system for issuing documentary evidence using an internet | |
KR20050014617A (en) | Total settlement of accounts system for the recipient | |
WO2000021008A1 (en) | An on-line incentive system | |
EP1148452A2 (en) | Apparatus particularly for supporting sales over data communication networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1998955880 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1998955880 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2314098 Country of ref document: CA Ref country code: CA Ref document number: 2314098 Kind code of ref document: A Format of ref document f/p: F |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998955880 Country of ref document: EP |