WO1998000948A1 - Public network merchandising system - Google Patents

Public network merchandising system Download PDF

Info

Publication number
WO1998000948A1
WO1998000948A1 PCT/US1997/011649 US9711649W WO9800948A1 WO 1998000948 A1 WO1998000948 A1 WO 1998000948A1 US 9711649 W US9711649 W US 9711649W WO 9800948 A1 WO9800948 A1 WO 9800948A1
Authority
WO
WIPO (PCT)
Prior art keywords
merchant
customer
information
merchandising
master key
Prior art date
Application number
PCT/US1997/011649
Other languages
French (fr)
Inventor
Bryan Colvin, Sr.
Original Assignee
Allsoft Distributing, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Allsoft Distributing, Inc. filed Critical Allsoft Distributing, Inc.
Priority to AU35151/97A priority Critical patent/AU3515197A/en
Publication of WO1998000948A1 publication Critical patent/WO1998000948A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]

Definitions

  • the present invention relates to digital commerce and, more particularly, to digital commerce conducted over a public network.
  • the Internet is expected to become the world's new market place. The number of people who have access to the Internet is growing rapidly. Merchants are increasingly interested in selling products and services over the Internet, particularly via the World Wide Web.
  • Another problem with commerce over the Internet is that the customer generally must type in and transmit a plethora of information, including confidential financial information, each time the customer wishes to purchase something from a merchant.
  • the type and form of such information varies from merchant to merchant, and each merchant typically has a customized electronic order form. This is a hassle for the customer. It also requires confidential information to be placed at risk each time such information is transmitted to a new merchant.
  • the present invention provides for an improved merchandising system.
  • a merchandising system according to the present invention is particularly useful in connection with commerce conducted over a large public network, such as the Internet.
  • Each transaction involves a merchant, a customer and a financial institution, such as a bank or other money processor.
  • a financial institution such as a bank or other money processor.
  • Each merchant, customer and financial institution that may participate in transactions has its own encryption key, which is kept confidential.
  • a copy of each such key also exists in a central, secure database system.
  • Each customer preferably is given a free "Internet Consumer kit,” available at each participating merchant, which includes software for conducting transactions with merchants.
  • Each merchant uses an integrated communications software package that includes a database, a customer interface, a financial institution interface, and a virtual HTML store generator.
  • the customer selects products to purchase by accessing a merchant's Web site and clicking on one or more "links” that puts the products in a "virtual shopping cart.”
  • the customer clicks a "checkout link” that causes an itemized price list to be downloaded to the customer's computer. Once downloaded, this information is merged with information locally stored on the customer's computer.
  • the customer's computer then adds sales tax information and sends this information along with a shipping address back to the merchant. Credit card information from the customer is sent directly to the financial institution; the merchant never receives the customer's credit card information.
  • the financial institution informs the merchant that the transaction is complete.
  • the present invention offers many advantages over the prior art. Advantages associated with one or more embodiments of the present invention include, without limitation, the advantages enumerated below.
  • the amount of confidential information sent to merchants is limited, reducing the risk that such information will be intercepted or misused.
  • the customer need not type in a large amount of information each time a transaction is conducted.
  • the customer simply transfers this information from his local database using a limited number of predetermined keystrokes. This method is much preferred because such personal information rarely changes. When such information does change, the customer need only update his database once.
  • FIG. 1 is a block diagram of a merchandising system according to the present invention. Detailed Description of Preferred Embodiment(s)
  • transactions are conducted over a large public network, such as the Internet.
  • a large public network such as the Internet.
  • Each transaction involves a merchant, a customer, and a money processor that each use computer systems connected to the network.
  • Each merchant, customer and money processor that may participate in transactions has its own encryption key.
  • This encryption key is referred to herein as a secured key (or "private" key), meaning that the collection of data constituting the key is not made publicly available and, preferably, is not made available to others except as described herein.
  • a copy of each secured key also exists in a central, secure database system that is also connected to the network.
  • a secured key preferably can be used to encrypt and decrypt messages.
  • Each customer uses an "Internet Consumer kit" containing the software for conducting transactions as described herein. Internet consumer kits preferably are made widely available. For example, the kits may be made available at each participating merchant.
  • Each merchant uses an integrated communications software package that includes a database, a customer interface, a money processor interface, and a virtual HTML store generator.
  • the customer selects products to purchase by accessing a merchant's
  • FIG. 1 shows only a single merchant computer system, a single money processor computer system, and a single customer computer system. It is understood that the present invention permits any number of merchant, money processor and customer computer systems, each of which operates as described below.
  • the merchant, customer and money processor computer systems shown in FIG. 1 (systems 3, 2, and 4, respectively) independently run interrelated software programs and function as a group to permit merchandising according to the present invention. As shown in FIG. 1, each system has an associated secured key. Communications among separate systems preferably are conducted over the Internet.
  • a master key server system 1 acts as a secure communications router. Master key server 1 communicates with various computer systems over the Internet or other public network system. As shown in FIG. 1 , master key server 1 includes a secured key database containing copies of the secured key for each merchant, customer, and money processor. The communication paths between master key server and various other computer systems are shown as path-7, path-9, path- 10, and path- 13. These paths indicate logical paths; the communications sent along these paths are preferably over the Internet and, as with other Internet communications described herein, the actual physical paths may vary.
  • Customer computer system 2 initiates communications. Customer system 2 obtains information from the merchant computer system (also referred to as the Merchant's Storefront) 3 over communication path-6. Information generally is sent in the form of HTML pages that are dynamically created by the merchant system. Each time a customer clicks on an item in a store, the information is stored in a logical "shopping cart.”
  • a file containing all selected items gets transmitted to the customer.
  • This file is lightly encrypted before transmission, and then sent to the customer for further processing.
  • a password is also transmitted to the customer, preferably as part of the file; the password is used by the customer to encrypt merchant and money processor data packets that are to be sent to the merchant and the money processor systems, respectively. After these data packets are created by the customer, they are combined in a single file, encrypted with the customer's secured key, and sent to master key server 1.
  • the master key server 1 then decrypts this file, splits it into two separate files (a merchant data packet and a money processor data packet) and ships each packet to its final destination.
  • Master key server 1 has a copy of each customer's secured key in a secured key database and, therefore, possesses the capability to decrypt the data sent to it.
  • files are shipped out from the master key server 1, they are encrypted with the secured keys of the recipients.
  • the master key server is blind to the actual data content being sent through it.
  • Merchant system 3 has a local (storefront) database 17, which stores each customer's order, all inventory items, and pricing information. Merchant system 3 communicates with local database 17 via communications path 16. This database is tightly integrated into the virtual store's software system and the database may be part of the same computer system as the merchant's storefront.
  • the merchant has a direct communications path 8 to the money processor server system 4 and a direct path 6 to the customer 2, which paths preferably are over the Internet. Communication on these paths is performed outside of the knowledge of master key server 1 so that private passwords may be used to create a 2-level encryption system as noted above.
  • Merchant manager 12 communicates with the merchant's storefront via master key server 1 over path-13.
  • Merchant manager 12 typically runs on a personal computer and is password protected. This allows the merchant manager to add inventory items and change pricing information.
  • the merchant manager 12 has a secured key for communications through the master key server. A copy of this secured key therefore exists in the secured key database of the master key server.
  • Money processor system 4 preferably communicates directly with a financial institution (e.g., a bank or credit card processor) 5, via path-1 1.
  • Current methods for conducting such communication include modems running on a private line direct to the bank.
  • the bank is also money processor server 4, thereby eliminating communications path-11.
  • Money processor system 4 receives a one-way communications packet via path-8 from the merchant system 3 giving it the password sent to the customer, which password will later be used to unlock the data packet originating from the customer 2. Communications from the money processor system 4 back to the merchant system 3 are routed through the master key server 1 via path- 10.
  • the customer has an associated local customer database 15 with which it communicates over path 14.
  • This path may simply be a file read or write operation, and the database may be integrated into the customer computer system.
  • Each logical client of the master key server 1 i.e., each customer, merchant, and money processor computer system
  • Each logical client of the master key server 1 has its secured key updated following each transmission or reception of data by that client. This creates a moving target; in the unlikely event that a secured key is discovered, it is valid only for a single transaction and from a single customer. There is no way that this knowledge may be applied to other transactions; thus, security is greatly improved.
  • the most viable attack on the security of this system would be to break into the building where the master key server is located and load all the secured keys. This is where the double blind method is useful; as noted above, in some embodiments, information passing through the master key server is encrypted in a form which cannot be decrypted by the master key server, before it is encrypted using the secured key.
  • Preferred embodiments of merchandising systems according to the present invention use a series of inter-related communications to perform a transaction.
  • the set of basic communications used by a preferred merchandising system is described below.
  • the name of the file being downloaded has a 3-letter suffix, such as ".ASD”, which causes what is commonly known as a "Helper Application” to run and receive this file being downloaded from the Merchant via the Internet.
  • the downloaded file is lightly encrypted (or scrambled) and contains a CRC checking system that validates the contents of this file. Light encryption or scrambling is defined as a process in which all the information necessary to unscramble the message including the key is sent together with the message in one file.
  • the decryption algorithm contained within one customer program is identical to the algorithms in all other customer programs.
  • the information being sent is not sensitive information; it only details what the customer has purchased.
  • the purpose of the light encryption is to reduce the possibility of a bogus file accidentally causing the customer program to respond. Even if someone were to figure out how to create a fake merchant, the file would eventually get thrown out because the master key server will not communicate with a merchant that is not in the master key database.
  • the downloaded and lightly encrypted file sent by the merchant contains the following information:
  • the merchant's account number and purchase order number This number will eventually get passed along to the money processor system 4 by the customer, and allows the money processor (server) system 4 to know which merchant account to credit.
  • the merchant's order number This number keeps track of which order is which. This number will eventually get sent back to the system 3 for tracking purposes. This number is also used by the money processor system 4.
  • An encryption key This key is used to "keep the master key server 1 honest.” Data packets are encrypted using both the customer secured key and the encryption key sent by the merchant.
  • the master key server 1 removes one level of encryption (i.e., the secured key level) so that it can re-encrypt the packet with the secured key of the recipient, and send it to another location. It does not know how to decrypt the second level. It merely encrypts and sends the data packet "as is" on to the next location. This "double-blind" method of encryption keeps all information that flows through the master key server unrecognizable as an added level of security.
  • a series of equations defining post-processing activities The merchant is blind to information such as state and local taxes. In order to avoid any need for the customer to enter tax-related information into a form, post processing via a local calculator is performed on the customer's computer. As information eventually flows back to the merchant, the merchant may then account for the sales tax collected by receiving the state and county information from the customer. This makes shopping much less of a hassle by minimizing the amount of information that a customer has to enter into any merchant's order form.
  • a list of information items that the merchant requires to ship the product to the customer This list includes shipping address and name. Other options may also be requested, such as EMAIL address, and telephone number. The customer has the option to prevent selected information from being sent to the merchant. 2. Customer to Master Kev Server.
  • an application program that resides on the customer's computer is launched using as input the contents of the file sent by the merchant.
  • This application performs the following functions:
  • the master key server 1 receives this packet sent by the customer.
  • the file sent to the master key server 1 uses an 8 character index key name to look up the customer's secured key in the master key database.
  • the master key server (1) Decrypts the packet sent by the customer using its copy of the customer's secured key, which is stored in the master key database.
  • the index key used to look up the secured key preferably is passed to the master key database by virtue of the physical name of the file which was transmitted. In other words, the file name and index key name are identical.
  • the name sent to the processor is a combination of the order number, and the merchant account number (which merchant account number preferably is the merchant's index key ).
  • the name of the file sent back to the merchant is the order number.
  • the master key server uses a "decryption" algorithm to "encrypt” the data. This helps to further secure the data because the algorithm to encrypt is different from the algorithm to decrypt. Deriving the decryption algorithm from the encryption algorithm is a difficult and painfully slow process at best. This process includes reverse engineering several client programs. The task of deriving the algorithm number from the index key is nearly impossible. In some alternative embodiments, the algorithm number is completely unrelated to the index key and is stored in the master key database.
  • Money processor system 4 receives a data packet, but does not know how to decrypt it. It must receive information concerning decryption directly from the merchant. This decryption entails a password string that was sent to the customer. The merchant originally created this password string and tells the customer and the processor what it is without the master key server ever having access to this information. This double blind method keeps the master key server honest.
  • the merchant receives its data packet which contains an order number, tax information, the total price and the customer's shipping address. At no time is the credit card number exposed to the merchant or any other sensitive information that it has no business seeing. This keeps the credit card information very safe.
  • the merchant will eventually receive a message from the credit card processor which validates the order. The customer can be informed in any conventional manner that all transactions have been completed.
  • the secured key preferably changes through a process of handshaking.
  • the master key server passes a random string of characters to each client that sends a packet of data. This random string of characters modifies the old secured key, creating a new secured key.
  • Both the client and the master key server update their respective secured keys in the same way after handshaking has completed.
  • Master key server sends a data packet containing a string of random numbers. This data packet is encrypted using the old secured key.
  • Master key server receives this packet, checks the 256 numbers for validity, and returns a message back to the client further validating the new key. This message uses the new secured key.
  • Merchants and money processors change their keys on a scheduled basis.
  • the merchant and processor may also have a block of keys so that it can update them on a rotating basis.
  • Each client is defined as either a customer, a merchant, or a bank.
  • a client may request a new key. This is driven by the client who sends a special message to the master key server. This message uses yet another encryption system based on the index key and an algorithm number. The client commands the master key server to discard the old index key, and to issue a new one. This encryption is necessary to prevent someone from throwing away a key that does not belong to him. This action will also cause the customer to lose all of the information contained within his local database including all credit card information. This process helps to remove orphaned index keys from cluttering the database. Also, if the system is not used in a year's time from the last use, the index key is deleted from the database.
  • the client program is password protected. If the client forgets his password, he will have to reenter all of the information contained within his database. It is not necessary to get a new index key.
  • the initial password generates the initial secured key. After this is done, the password is needed only to secure the local database. The password protection is put in place to prevent the situation where the family computer is stolen, and to prevent children from using the system without parental supervision.
  • the credit card server is totally automated requiring no human intervention. In the event that something goes wrong, the customer may call the bank or credit card processing center. This information is contained within the final web page displayed by the merchant. That page will either tell the user that the transfer of money was successful or provide a reason for its rejection. Some common problems may be as follows: credit card expiration date has expired; credit line has been exceeded; credit card reported lost or stolen; given name on credit card does not match actual name.
  • the store manager communicates with the actual store by using the master key server.
  • the store manager has a special software package that has the ability to command the store to upload or download its current inventory database, change pricing information, or add new items to the database.
  • the store manager may also change the look and feel of the store by uploading new graphics, and logos.
  • This software package is written in such a way as to remove the complexity of creating HTML forms, programming SQL database engines, and other complex activities making the store manager able to do what he does best.
  • This store manager software package is also password protected. This prevents dishonest employees from changing price information without the knowledge of the store manager. In the event that the store manager forgets his password, a system is put in place to extract this password. This is performed using the following procedure:
  • Store manager calls a mall manager, an entity responsible for verifying the identity of merchants.
  • Mall manager verifies that the store manager is who he says he is by comparing his application with verbal questions.
  • the mall manager then provides a temporary password that takes the store manager to a later screen which allows the merchant to enter in a new password.
  • This temporary password is based on the combination of the index key for the store, the index key of the store manager, and a pseudo random number based on a seed created by the secured key; the mall manager does not see the secured key, but only the resulting random number.
  • a self- checking CRC Built into this temporary password is a self- checking CRC. This temporary password only works one time and only on this one machine.
  • a screen comes up asking the merchant manager to enter in a new password.
  • the store manager preferably must then retype the password.
  • the present invention is particularly useful in connection with the popular Hyper-Text Markup Language ("HTML") used on the World Wide Web, a graphical communications system that runs over the Internet.
  • HTML Hyper-Text Markup Language
  • links point to other locations and files on the Internet.
  • a link uses .an addressing scheme similar to how mail is delivered by the post office.
  • Domain Name Services have been deployed allowing the user to type in plain text instead of what are known as IP addresses.
  • IP addresses contains 4 bytes each separated by the colon character. Below are several examples of IP addresses:
  • the first series of characters up to and including the "//” defines a communications protocol. This tells the "Internet Web Browsers” how to inte ⁇ ret a data package that will eventually get transmitted.
  • the next section contains the domain name. Domain names end in suffixes such as: net, com, edu, org, and pri.
  • a domain name may also contain a one or more prefixes such as "www". Each prefix is delimited by a period. The computer that owns that domain name resolves these prefixes to a physical IP address or a directory. Following the domain name is a directory path name the most common being "/index.html" which indicates the official starting home page for that domain.
  • EMAIL Another function of the Internet that predates web pages is EMAIL.
  • An EMAIL address uses one or more prefixes such as someone's name, and appends "@" plus the domain name. Several examples are shown below: gary@foo.com
  • helper apps are invoked when a file name containing a file extension consistent with that application. These helper application suffixes are programmable.
  • This invention uses the above concept of a "helper app” in order to launch the customer program that receives the information from the merchant which also sends this information back to the merchant and bank mixed with the customer's personal information.
  • the program that the customer runs is capable of performing encryption intended for commerce only.
  • the customer may only communicate with the bank and the merchant via the master key server (FIG. 1,1).
  • the algorithm used cannot be easily modified to be used as a stand-alone encryption system.
  • the system is further restricted by not .allowing customers to communicate with other customers.
  • the information that gets sent by the customer is nothing more than credit card numbers, shipping address, name and purchase total. This kind of information does not pose a national risk, nor can it facilitate drug trafficking. Thus, there is no reason for any barriers or restrictions concerning the export of this technology. It is relatively easy to establish a "virtual store" using the present invention.
  • the store manager can remotely change prices, add inventory items, and even change the look of his storefront.
  • This program is tightly integrated with the merchant's storefront. Security is maintained because only the computer that has the store manager's secured key can change the storefront.
  • the software is also password protected preventing dishonest employees from changing price information. For smaller shop keepers, it is also possible for the store manager to run his entire business from the virtual store's database keeping shipping logs, inventory, and all other aspects of running a business.
  • a single secured key used in connection with the present invention preferably can be used to encrypt and decrypt messages. Based on the present disclosure, however, it will be apparent to those skilled in the art that the present invention permits embodiments in which different keys .are used to encrypt and decrypt messages.

Abstract

The system conducts commerce over large public networks, such as the Internet. The system includes a money processor server (4) with a bank or credit card processor (5); a merchant manager (12); a unit for customer (2); a merchant's storefront unit (3); and, a local storefront database. The system also includes a master key server (1), which acts as a secure communication router.

Description

PUBLIC NETWORK MERCHANDISING SYSTEM
Field of the Invention
The present invention relates to digital commerce and, more particularly, to digital commerce conducted over a public network.
Background of the Invention
The Internet is expected to become the world's new market place. The number of people who have access to the Internet is growing rapidly. Merchants are increasingly interested in selling products and services over the Internet, particularly via the World Wide Web.
There are, however, several problems with conducting commerce over a public network such as the Internet. One problem is the lack of a secure means for transferring information and money. When making a purchase, a customer generally must transmit his credit card number and other confidential information electronically to the merchant. Such information is at risk of interception by third parties or misuse by employees of the merchant. Although some Web browsers permit data encryption, the effectiveness of such encryption generally is limited.
Another problem with commerce over the Internet is that the customer generally must type in and transmit a plethora of information, including confidential financial information, each time the customer wishes to purchase something from a merchant. The type and form of such information varies from merchant to merchant, and each merchant typically has a customized electronic order form. This is a hassle for the customer. It also requires confidential information to be placed at risk each time such information is transmitted to a new merchant.
Another problem with commerce over the Internet is the lack of standards and integration for conducting digital commerce. Creating a "virtual store" often is expensive and time consuming because merchants must create custom systems for selling their merchandise .and making sure they obtain adequate information and payment from customers.
Accordingly, there is a need to reduce disadvantages associated with conducting digital commerce over a public network.
Summary of the Invention
The present invention provides for an improved merchandising system. A merchandising system according to the present invention is particularly useful in connection with commerce conducted over a large public network, such as the Internet.
A wide variety of embodiments of the present invention exist. In a preferred embodiment, the invention is implemented as follows. Each transaction involves a merchant, a customer and a financial institution, such as a bank or other money processor. Each merchant, customer and financial institution that may participate in transactions has its own encryption key, which is kept confidential. A copy of each such key also exists in a central, secure database system. Each customer preferably is given a free "Internet Consumer kit," available at each participating merchant, which includes software for conducting transactions with merchants. Each merchant uses an integrated communications software package that includes a database, a customer interface, a financial institution interface, and a virtual HTML store generator. The customer selects products to purchase by accessing a merchant's Web site and clicking on one or more "links" that puts the products in a "virtual shopping cart." The customer then clicks a "checkout link" that causes an itemized price list to be downloaded to the customer's computer. Once downloaded, this information is merged with information locally stored on the customer's computer. The customer's computer then adds sales tax information and sends this information along with a shipping address back to the merchant. Credit card information from the customer is sent directly to the financial institution; the merchant never receives the customer's credit card information. The financial institution informs the merchant that the transaction is complete. The above-described preferred embodiment is only one of many embodiments of the present invention.
The present invention offers many advantages over the prior art. Advantages associated with one or more embodiments of the present invention include, without limitation, the advantages enumerated below.
The amount of confidential information sent to merchants is limited, reducing the risk that such information will be intercepted or misused.
The customer need not type in a large amount of information each time a transaction is conducted. In many embodiments of the present invention, rather than typing personal information into a merchant form, the customer simply transfers this information from his local database using a limited number of predetermined keystrokes. This method is much preferred because such personal information rarely changes. When such information does change, the customer need only update his database once.
It is also relatively easy for merchants to establish a virtual store, because the present invention provides a standardized way to obtain the necessary information and payment from customers.
Additional advantages of the present invention are described below and/or will become apparent to those skilled in the art based on the present disclosure.
Brief Description of the Drawing(s)
A complete understanding of the present invention may be gained by considering the following detailed description in conjunction with the accompanying drawing, in which:
FIG. 1 is a block diagram of a merchandising system according to the present invention. Detailed Description of Preferred Embodiment(s)
In a preferred embodiment of a merchandising system according to the present invention, transactions are conducted over a large public network, such as the Internet. Each transaction involves a merchant, a customer, and a money processor that each use computer systems connected to the network.
Each merchant, customer and money processor that may participate in transactions has its own encryption key. This encryption key is referred to herein as a secured key (or "private" key), meaning that the collection of data constituting the key is not made publicly available and, preferably, is not made available to others except as described herein. A copy of each secured key also exists in a central, secure database system that is also connected to the network. A secured key preferably can be used to encrypt and decrypt messages. Each customer uses an "Internet Consumer kit" containing the software for conducting transactions as described herein. Internet consumer kits preferably are made widely available. For example, the kits may be made available at each participating merchant. Each merchant uses an integrated communications software package that includes a database, a customer interface, a money processor interface, and a virtual HTML store generator. A wide variety of software for implementing the above features, and those features described herein, will be apparent to those skilled in the art based on the present disclosure.
The customer selects products to purchase by accessing a merchant's
Web site and clicking on one or more "links" that put the products in a "virtual shopping cart." The customer then clicks a "checkout link" that causes an itemized price list to be downloaded to the customer's computer. Once downloaded, this information is merged with information locally stored on the customer's computer. The customer's computer then adds sales tax information and sends this information along with a shipping address back to the merchant. Credit card information from the customer is sent directly to the money processor; the merchant preferably does not receive the customer's credit card information. The money processor informs the merchant that the transaction is complete. A. Structure of the System.
The structure of a merchandising system according to the present invention is described in more detail below in connection with FIG. 1. For the sake of clarity, FIG. 1 shows only a single merchant computer system, a single money processor computer system, and a single customer computer system. It is understood that the present invention permits any number of merchant, money processor and customer computer systems, each of which operates as described below.
The merchant, customer and money processor computer systems shown in FIG. 1 (systems 3, 2, and 4, respectively) independently run interrelated software programs and function as a group to permit merchandising according to the present invention. As shown in FIG. 1, each system has an associated secured key. Communications among separate systems preferably are conducted over the Internet.
A master key server system 1 acts as a secure communications router. Master key server 1 communicates with various computer systems over the Internet or other public network system. As shown in FIG. 1 , master key server 1 includes a secured key database containing copies of the secured key for each merchant, customer, and money processor. The communication paths between master key server and various other computer systems are shown as path-7, path-9, path- 10, and path- 13. These paths indicate logical paths; the communications sent along these paths are preferably over the Internet and, as with other Internet communications described herein, the actual physical paths may vary.
Customer computer system 2 initiates communications. Customer system 2 obtains information from the merchant computer system (also referred to as the Merchant's Storefront) 3 over communication path-6. Information generally is sent in the form of HTML pages that are dynamically created by the merchant system. Each time a customer clicks on an item in a store, the information is stored in a logical "shopping cart."
When the customer finally clicks on "go to cashier," a file containing all selected items gets transmitted to the customer. This file is lightly encrypted before transmission, and then sent to the customer for further processing. A password is also transmitted to the customer, preferably as part of the file; the password is used by the customer to encrypt merchant and money processor data packets that are to be sent to the merchant and the money processor systems, respectively. After these data packets are created by the customer, they are combined in a single file, encrypted with the customer's secured key, and sent to master key server 1.
The master key server 1 then decrypts this file, splits it into two separate files (a merchant data packet and a money processor data packet) and ships each packet to its final destination. Master key server 1 has a copy of each customer's secured key in a secured key database and, therefore, possesses the capability to decrypt the data sent to it. Before files are shipped out from the master key server 1, they are encrypted with the secured keys of the recipients. When there are two levels of encryption (i.e., when the data content is separately encrypted before encryption with the secured key), the master key server is blind to the actual data content being sent through it.
Merchant system 3 has a local (storefront) database 17, which stores each customer's order, all inventory items, and pricing information. Merchant system 3 communicates with local database 17 via communications path 16. This database is tightly integrated into the virtual store's software system and the database may be part of the same computer system as the merchant's storefront. The merchant has a direct communications path 8 to the money processor server system 4 and a direct path 6 to the customer 2, which paths preferably are over the Internet. Communication on these paths is performed outside of the knowledge of master key server 1 so that private passwords may be used to create a 2-level encryption system as noted above.
Merchant manager 12 communicates with the merchant's storefront via master key server 1 over path-13. Merchant manager 12 typically runs on a personal computer and is password protected. This allows the merchant manager to add inventory items and change pricing information. As shown in FIG. 1 , the merchant manager 12 has a secured key for communications through the master key server. A copy of this secured key therefore exists in the secured key database of the master key server.
Money processor system 4 preferably communicates directly with a financial institution (e.g., a bank or credit card processor) 5, via path-1 1. Current methods for conducting such communication include modems running on a private line direct to the bank. In some embodiments, however, the bank is also money processor server 4, thereby eliminating communications path-11. Money processor system 4 receives a one-way communications packet via path-8 from the merchant system 3 giving it the password sent to the customer, which password will later be used to unlock the data packet originating from the customer 2. Communications from the money processor system 4 back to the merchant system 3 are routed through the master key server 1 via path- 10.
The customer has an associated local customer database 15 with which it communicates over path 14. This path may simply be a file read or write operation, and the database may be integrated into the customer computer system.
Each logical client of the master key server 1 (i.e., each customer, merchant, and money processor computer system) has its secured key updated following each transmission or reception of data by that client. This creates a moving target; in the unlikely event that a secured key is discovered, it is valid only for a single transaction and from a single customer. There is no way that this knowledge may be applied to other transactions; thus, security is greatly improved. The most viable attack on the security of this system would be to break into the building where the master key server is located and load all the secured keys. This is where the double blind method is useful; as noted above, in some embodiments, information passing through the master key server is encrypted in a form which cannot be decrypted by the master key server, before it is encrypted using the secured key. B. Communications During Transactions.
Preferred embodiments of merchandising systems according to the present invention use a series of inter-related communications to perform a transaction. The set of basic communications used by a preferred merchandising system is described below.
1. Merchant to Customer.
A customer finds a merchant Web site, clicks on the items that he desires to purchase, and presses the "BUY IT" link on his web browser software. Clicking on "BUY IT" causes a packet of information to be downloaded ( Fig 1-path 6). The name of the file being downloaded has a 3-letter suffix, such as ".ASD", which causes what is commonly known as a "Helper Application" to run and receive this file being downloaded from the Merchant via the Internet. The downloaded file is lightly encrypted (or scrambled) and contains a CRC checking system that validates the contents of this file. Light encryption or scrambling is defined as a process in which all the information necessary to unscramble the message including the key is sent together with the message in one file. The decryption algorithm contained within one customer program is identical to the algorithms in all other customer programs. The information being sent is not sensitive information; it only details what the customer has purchased. The purpose of the light encryption is to reduce the possibility of a bogus file accidentally causing the customer program to respond. Even if someone were to figure out how to create a fake merchant, the file would eventually get thrown out because the master key server will not communicate with a merchant that is not in the master key database.
The downloaded and lightly encrypted file sent by the merchant contains the following information:
(1 ) The merchant's account number and purchase order number. This number will eventually get passed along to the money processor system 4 by the customer, and allows the money processor (server) system 4 to know which merchant account to credit. (2) The merchant's order number. This number keeps track of which order is which. This number will eventually get sent back to the system 3 for tracking purposes. This number is also used by the money processor system 4.
(3) An encryption key. This key is used to "keep the master key server 1 honest." Data packets are encrypted using both the customer secured key and the encryption key sent by the merchant. The master key server 1 removes one level of encryption (i.e., the secured key level) so that it can re-encrypt the packet with the secured key of the recipient, and send it to another location. It does not know how to decrypt the second level. It merely encrypts and sends the data packet "as is" on to the next location. This "double-blind" method of encryption keeps all information that flows through the master key server unrecognizable as an added level of security.
(4) The list of items that the customer selected. This information will eventually turn into a receipt that the customer may print out or save to his hard disk.
(5) A series of equations defining post-processing activities. The merchant is blind to information such as state and local taxes. In order to avoid any need for the customer to enter tax-related information into a form, post processing via a local calculator is performed on the customer's computer. As information eventually flows back to the merchant, the merchant may then account for the sales tax collected by receiving the state and county information from the customer. This makes shopping much less of a hassle by minimizing the amount of information that a customer has to enter into any merchant's order form.
(6) A list of information items that the merchant requires to ship the product to the customer. This list includes shipping address and name. Other options may also be requested, such as EMAIL address, and telephone number. The customer has the option to prevent selected information from being sent to the merchant. 2. Customer to Master Kev Server.
After this information is received in the customer's computer, an application program that resides on the customer's computer is launched using as input the contents of the file sent by the merchant. This application performs the following functions:
(1 ) Decrypts the message being sent by the merchant.
(2) Calculates local and sales taxes if any.
(3) Prompts the user to choose a credit card or ATM card to pay for the items that he selected at the merchant's store (the credit card numbers were previously stored).
(4) Creates two data packets: one to be sent back to the merchant, and the other to be sent to the credit card processing center or bank.
(5) Encrypts these two data packets with the password that was sent to the customer by the merchant.
(6) Combines these two data packets and creates a header detailing where they are to be sent. This header also defines the size of each data packet, the index key which will be used to encrypt the data packet, and the Internet address of where to send this packet. Also included is the name of the file that will be downloaded.
(7) Encrypts the entire information packet with its secured key.
(8) Sends this file to the master key server.
3. Master Kev Server to Merchant and Money Processor Systems.
The master key server 1 receives this packet sent by the customer. The file sent to the master key server 1 uses an 8 character index key name to look up the customer's secured key in the master key database. The master key server: (1) Decrypts the packet sent by the customer using its copy of the customer's secured key, which is stored in the master key database. The index key used to look up the secured key preferably is passed to the master key database by virtue of the physical name of the file which was transmitted. In other words, the file name and index key name are identical.
(2) Reads the header information that tells the master key server where to send the information. The name sent to the processor is a combination of the order number, and the merchant account number (which merchant account number preferably is the merchant's index key ). The name of the file sent back to the merchant is the order number.
(3) Separates each data packet and re-encrypts each data packet using the secured key associated with the recipient. The master key server uses a "decryption" algorithm to "encrypt" the data. This helps to further secure the data because the algorithm to encrypt is different from the algorithm to decrypt. Deriving the decryption algorithm from the encryption algorithm is a difficult and painfully slow process at best. This process includes reverse engineering several client programs. The task of deriving the algorithm number from the index key is nearly impossible. In some alternative embodiments, the algorithm number is completely unrelated to the index key and is stored in the master key database.
(4) Sends each data packet to the recipient. One data packet goes to the merchant, the other to the bank or credit card processor.
4. Money Processor To/From Merchant.
Money processor system 4 receives a data packet, but does not know how to decrypt it. It must receive information concerning decryption directly from the merchant. This decryption entails a password string that was sent to the customer. The merchant originally created this password string and tells the customer and the processor what it is without the master key server ever having access to this information. This double blind method keeps the master key server honest.
The merchant receives its data packet which contains an order number, tax information, the total price and the customer's shipping address. At no time is the credit card number exposed to the merchant or any other sensitive information that it has no business seeing. This keeps the credit card information very safe. The merchant will eventually receive a message from the credit card processor which validates the order. The customer can be informed in any conventional manner that all transactions have been completed.
C. Additional Security Measures.
After each use of the master key server, the secured key preferably changes through a process of handshaking. The master key server passes a random string of characters to each client that sends a packet of data. This random string of characters modifies the old secured key, creating a new secured key. Both the client and the master key server update their respective secured keys in the same way after handshaking has completed.
Handshaking is performed as follows:
(1) Master key server sends a data packet containing a string of random numbers. This data packet is encrypted using the old secured key.
(2) Client creates a new secured key while saving the old one based on the random data it received after decryption. (3) Client sends a message back to the master key server using the "New Secured key". The message reads: OK I got it! This message is preceded by a string of 256 pseudo random numbers generated by using the previous random data it received as a seed. The seed was also previously initialized by the index key and algorithm number. Also part of the header is the "command" which tells the master key server that this is a key update handshake message and not a packet transmission.
(4) Master key server receives this packet, checks the 256 numbers for validity, and returns a message back to the client further validating the new key. This message uses the new secured key.
(5) The client then throws away the old key and uses the new key.
Merchants and money processors change their keys on a scheduled basis. The merchant and processor may also have a block of keys so that it can update them on a rotating basis.
Each client is defined as either a customer, a merchant, or a bank. In the unlikely event that the secured keys get out of sync, a client may request a new key. This is driven by the client who sends a special message to the master key server. This message uses yet another encryption system based on the index key and an algorithm number. The client commands the master key server to discard the old index key, and to issue a new one. This encryption is necessary to prevent someone from throwing away a key that does not belong to him. This action will also cause the customer to lose all of the information contained within his local database including all credit card information. This process helps to remove orphaned index keys from cluttering the database. Also, if the system is not used in a year's time from the last use, the index key is deleted from the database.
The client program is password protected. If the client forgets his password, he will have to reenter all of the information contained within his database. It is not necessary to get a new index key. The initial password generates the initial secured key. After this is done, the password is needed only to secure the local database. The password protection is put in place to prevent the situation where the family computer is stolen, and to prevent children from using the system without parental supervision.
The credit card server is totally automated requiring no human intervention. In the event that something goes wrong, the customer may call the bank or credit card processing center. This information is contained within the final web page displayed by the merchant. That page will either tell the user that the transfer of money was successful or provide a reason for its rejection. Some common problems may be as follows: credit card expiration date has expired; credit line has been exceeded; credit card reported lost or stolen; given name on credit card does not match actual name.
There are also two logical portions to each merchant's merchandising operation. One is the merchant's storefront (also referred to as the merchant system), and the other is the store manager (also referred to as the merchant manager). The store manager communicates with the actual store by using the master key server. The store manager has a special software package that has the ability to command the store to upload or download its current inventory database, change pricing information, or add new items to the database. The store manager may also change the look and feel of the store by uploading new graphics, and logos. This software package is written in such a way as to remove the complexity of creating HTML forms, programming SQL database engines, and other complex activities making the store manager able to do what he does best. This store manager software package is also password protected. This prevents dishonest employees from changing price information without the knowledge of the store manager. In the event that the store manager forgets his password, a system is put in place to extract this password. This is performed using the following procedure:
( 1 ) Store manager calls a mall manager, an entity responsible for verifying the identity of merchants.
(2) Mall manager verifies that the store manager is who he says he is by comparing his application with verbal questions. (3) The mall manager then provides a temporary password that takes the store manager to a later screen which allows the merchant to enter in a new password. This temporary password is based on the combination of the index key for the store, the index key of the store manager, and a pseudo random number based on a seed created by the secured key; the mall manager does not see the secured key, but only the resulting random number. Built into this temporary password is a self- checking CRC. This temporary password only works one time and only on this one machine.
(4) A screen comes up asking the merchant manager to enter in a new password.
(5) The store manager preferably must then retype the password.
In the event that the secured keys for the merchant manager get out of sync, the manager must download an "emergency repair kit". This repair kit is password protected, where the password must be received verbally over the phone by the mall manager. This repair kit also fixes the combined problem of a forgotten password and an out-of-sync secured key. This uses the same above process except for the fact that the locally stored secured key is used instead of the copy that resides in the master key server. This process of resynchronizing is different from that of a customer, because of security issues. Also, there is no locally stored information other than the secured key and password on the merchant's merchant computer; thus, reentering information is not possible because the database is large and remote.
D. Use of Web-Related Features.
The present invention is particularly useful in connection with the popular Hyper-Text Markup Language ("HTML") used on the World Wide Web, a graphical communications system that runs over the Internet. In HTML, links point to other locations and files on the Internet. A link uses .an addressing scheme similar to how mail is delivered by the post office. Domain Name Services have been deployed allowing the user to type in plain text instead of what are known as IP addresses. Currently an IP address contains 4 bytes each separated by the colon character. Below are several examples of IP addresses:
1 13:46:5:199 51 : 191 :77:192
173: 1 12:255:66 131 :7:51 :101
This provides roughly 4 billion addresses that may be used. Each of these addresses could potentially have what is known as a domain name. These domain names are registered and distributed on multiple computers and routers. A router is a device that sends information from one server to another. Several examples of Internet addresses interpreted by Domain Name Service are as follows:
http://www.allsoft.disti.com/index.html
http://www.microsoft.com
ftp://ftp.linksys.com
gopher://liberty.uc.wlu.edu/public/
The first series of characters up to and including the "//" defines a communications protocol. This tells the "Internet Web Browsers" how to inteφret a data package that will eventually get transmitted. The next section contains the domain name. Domain names end in suffixes such as: net, com, edu, org, and pri. A domain name may also contain a one or more prefixes such as "www". Each prefix is delimited by a period. The computer that owns that domain name resolves these prefixes to a physical IP address or a directory. Following the domain name is a directory path name the most common being "/index.html" which indicates the official starting home page for that domain.
Another function of the Internet that predates web pages is EMAIL. An EMAIL address uses one or more prefixes such as someone's name, and appends "@" plus the domain name. Several examples are shown below: gary@foo.com
bill@whitehouse.gov
mark.ee 1 @aol.com
Many "Internet Web Page Browsers" have what are known as "helper apps". A helper application is invoked when a file name containing a file extension consistent with that application. These helper application suffixes are programmable. Some examples follow:
Extension name: Program:
".zip" winzip.exe
".wav" mplayer.exe
".ps" gscript.exe
".doc" msword.exe
This invention uses the above concept of a "helper app" in order to launch the customer program that receives the information from the merchant which also sends this information back to the merchant and bank mixed with the customer's personal information.
The program that the customer runs is capable of performing encryption intended for commerce only. The customer may only communicate with the bank and the merchant via the master key server (FIG. 1,1). The algorithm used cannot be easily modified to be used as a stand-alone encryption system. The system is further restricted by not .allowing customers to communicate with other customers. The information that gets sent by the customer is nothing more than credit card numbers, shipping address, name and purchase total. This kind of information does not pose a national risk, nor can it facilitate drug trafficking. Thus, there is no reason for any barriers or restrictions concerning the export of this technology. It is relatively easy to establish a "virtual store" using the present invention. The store manager can remotely change prices, add inventory items, and even change the look of his storefront. This is accomplished using a "store manager" program operating in accordance with the present invention. This program is tightly integrated with the merchant's storefront. Security is maintained because only the computer that has the store manager's secured key can change the storefront. The software is also password protected preventing dishonest employees from changing price information. For smaller shop keepers, it is also possible for the store manager to run his entire business from the virtual store's database keeping shipping logs, inventory, and all other aspects of running a business.
The present invention encompasses all subject-matter within the scope of the following claims. In this regard, it will be appreciated by those skilled in the art that additional embodiments of the present invention beyond those explicitly discussed above may be made without departing from the teachings of the present invention. Such embodiments are intended to be within the scope of the claims.
For example, a single secured key used in connection with the present invention preferably can be used to encrypt and decrypt messages. Based on the present disclosure, however, it will be apparent to those skilled in the art that the present invention permits embodiments in which different keys .are used to encrypt and decrypt messages.
Based on the present disclosure, it will also be apparent to those skilled in the art that embodiments of the present invention exist wherein the secured key held by a client is actually different from the "copy" held by the master key server, so long as the master key server and the relevant client can each encrypt and decrypt messages transmitted between them, and each keeps the relevant keys confidential.
For puφoses of this disclosure, the terms "include" and "including" mean "include/including without limitation."

Claims

Claims
1. A merchandising system for conducting a transaction over a network, comprising:
a merchant system;
a money processor system; and
a customer system having means for sending to the merchant system, over the network, a merchant transaction data packet that contains information required by the merchant to process the transaction, and means for sending to the money processor system, over the network, a money-processor transaction data packet that contains information required by the money processor to process the transaction, wherein the money processor transaction data packet includes confidential information that is not included in the merchant transaction data packet.
2. The merchandising system of Claim 1, wherein the network is public.
3. The merchandising system of Claim 2, wherein the network comprises the Internet.
4. The merchandising system of Claim 2, wherein the customer system, the merchant system, and the money processor system communicate in encrypted form.
5. The merchandising system of Claim 4, wherein the customer system, the merchant system, and the money processor system communicate through a master key server, wherein the master key server performs decryption services.
6. The merchandising system of Claim 1, further comprising a customer database local to the customer system and customer data stored in the customer database.
7. The merchandising system of Claim 1, further comprising a master key server which stores secured and index keys, wherein the master key server translates information sent in encrypted form by the customer system, the merchant system, and the money processor system.
8. The merchandising system of Claim 1 , wherein the customer system, the merchant system, and the money processing system communicate with each other over a wide area network.
9. The merchandising system of Claim 1 , wherein the customer system receives merchant information from the merchant system, combines the merchant information with selected locally stored personal and financial information to create two separate transaction data packets, one of the transaction data packets being set to the merchant, and the other of the transaction data packets being sent to the money processor.
10. The merchandising system described in Claim 9, wherein the stored personal and financial information comprises confidential customer information, and the customer system, in response to a command from a user of the customer system, sends a selected amount of information to the money processor system.
1 1. A merchandising system, comprising:
a central server system having a plurality of secured keys;
a plurality of client systems, each of the client systems being associated with one of said secured keys, wherein two or more client systems communicate with each other through the server system, and the server system decrypts information sent by a first client system using the secured key associated with the first client system and encrypts the information with a secured key associated with a second client system.
12. The merchandising system of Claim 9, wherein the transaction data packets are sent through a master key server, and the packets are first encrypted using a data string and subsequently encrypted using a secured key available to the master key server.
13. The merchandising system of Claim 12, where the customer system receives the data string from the merchant system.
PCT/US1997/011649 1996-06-28 1997-06-27 Public network merchandising system WO1998000948A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU35151/97A AU3515197A (en) 1996-06-28 1997-06-27 Public network merchandising system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/671,734 1996-06-28
US08/671,734 US5825881A (en) 1996-06-28 1996-06-28 Public network merchandising system

Publications (1)

Publication Number Publication Date
WO1998000948A1 true WO1998000948A1 (en) 1998-01-08

Family

ID=24695672

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1997/011649 WO1998000948A1 (en) 1996-06-28 1997-06-27 Public network merchandising system

Country Status (3)

Country Link
US (1) US5825881A (en)
AU (1) AU3515197A (en)
WO (1) WO1998000948A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001054038A1 (en) * 2000-01-20 2001-07-26 David Thieme System and method for facilitating secure payment with privacy over a computer network including the internet
GB2339949B (en) * 1998-07-02 2002-09-25 Advent Television Ltd An apparatus for conducting a secure electronic transaction
GB2393202A (en) * 2001-05-21 2004-03-24 Statoil Asa Methods of well treatment
EP3895111A4 (en) * 2018-12-13 2022-09-07 Coinbase Inc. System and method for secure sensitive data storage and recovery

Families Citing this family (348)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7831470B1 (en) 1996-09-04 2010-11-09 Walker Digital, Llc Method and apparatus for facilitating electronic commerce through providing cross-benefits during a transaction
US8229844B2 (en) 1996-06-05 2012-07-24 Fraud Control Systems.Com Corporation Method of billing a purchase made over a computer network
US7555458B1 (en) 1996-06-05 2009-06-30 Fraud Control System.Com Corporation Method of billing a purchase made over a computer network
US20030195848A1 (en) 1996-06-05 2003-10-16 David Felger Method of billing a purchase made over a computer network
US6041123A (en) * 1996-07-01 2000-03-21 Allsoft Distributing Incorporated Centralized secure communications system
US6088683A (en) * 1996-08-21 2000-07-11 Jalili; Reza Secure purchase transaction method using telephone number
US7593870B2 (en) * 1996-08-21 2009-09-22 Reza Jalili Method for telephone-based authenticated authorization of transactions
AUPO201196A0 (en) * 1996-08-29 1996-09-19 Xcellink Corporation Funds transfer system and method
US6415264B1 (en) 1997-07-08 2002-07-02 Walker Digital, Llc System and method for determining a posting payment amount
US7818284B1 (en) 1996-09-04 2010-10-19 Walker Digital, Llc Method and apparatus for providing cross-benefits via a central authority
US5978840A (en) * 1996-09-26 1999-11-02 Verifone, Inc. System, method and article of manufacture for a payment gateway system architecture for processing encrypted payment transactions utilizing a multichannel, extensible, flexible architecture
US6058381A (en) * 1996-10-30 2000-05-02 Nelson; Theodor Holm Many-to-many payments system for network content materials
US7729988B1 (en) * 1997-03-21 2010-06-01 Walker Digital, Llc Method and apparatus for processing credit card transactions
JPH10269284A (en) * 1997-03-25 1998-10-09 Hitachi Ltd Method and system for providing commodity information in electronic business transaction system
US7162434B1 (en) * 1997-05-05 2007-01-09 Walker Digital, Llc Method and apparatus for facilitating the sale of subscriptions to periodicals
US6014636A (en) * 1997-05-06 2000-01-11 Lucent Technologies Inc. Point of sale method and system
US6829595B2 (en) 1997-06-27 2004-12-07 Valista, Inc. MicroTrac internet billing solutions
US6029141A (en) * 1997-06-27 2000-02-22 Amazon.Com, Inc. Internet-based customer referral system
US6295522B1 (en) * 1997-07-11 2001-09-25 Cybercash, Inc. Stored-value card value acquisition method and apparatus
US5899980A (en) * 1997-08-11 1999-05-04 Trivnet Ltd. Retail method over a wide area network
US5903878A (en) * 1997-08-20 1999-05-11 Talati; Kirit K. Method and apparatus for electronic commerce
US5983273A (en) 1997-09-16 1999-11-09 Webtv Networks, Inc. Method and apparatus for providing physical security for a user account and providing access to the user's environment and preferences
US6226624B1 (en) 1997-10-24 2001-05-01 Craig J. Watson System and method for pre-authorization of individual account remote transactions
US6157924A (en) * 1997-11-07 2000-12-05 Bell & Howell Mail Processing Systems Company Systems, methods, and computer program products for delivering information in a preferred medium
US6016479A (en) * 1998-02-10 2000-01-18 Interstate Solutions, Llc Computer-based system, computer program product and method for recovering tax revenue
US6636833B1 (en) 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US6101485A (en) * 1998-03-26 2000-08-08 International Business Machines Corporation Electronic solicitations for internet commerce
US6070149A (en) * 1998-07-02 2000-05-30 Activepoint Ltd. Virtual sales personnel
DE69935913T2 (en) * 1998-07-02 2008-01-10 Cryptography Research Inc., San Francisco LACK RESISTANT UPGRADE OF AN INDEXED CRYPTOGRAPHIC KEY
US6223287B1 (en) * 1998-07-24 2001-04-24 International Business Machines Corporation Method for establishing a secured communication channel over the internet
US6947908B1 (en) 1998-08-27 2005-09-20 Citibank, N.A. System and use for correspondent banking
US7827057B1 (en) 1998-10-05 2010-11-02 Walker Digital, Llc Method and apparatus for providing cross-benefits based on a customer activity
DE19850089A1 (en) * 1998-10-30 2000-05-04 Maz Mikroelektronik Anwendungs Electronic payment methods on the Internet
US6327578B1 (en) 1998-12-29 2001-12-04 International Business Machines Corporation Four-party credit/debit payment protocol
US6324526B1 (en) 1999-01-15 2001-11-27 D'agostino John System and method for performing secure credit card purchases
US7107226B1 (en) 1999-01-20 2006-09-12 Net32.Com, Inc. Internet-based on-line comparison shopping system and method of interactive purchase and sale of products
US7359871B1 (en) 1999-03-02 2008-04-15 Alticor Investments Inc. System and method for managing recurring orders in a computer network
US7353194B1 (en) 1999-03-02 2008-04-01 Alticor Investments, Inc. System and method for managing recurring orders in a computer network
US6980962B1 (en) 1999-03-02 2005-12-27 Quixtar Investments, Inc. Electronic commerce transactions within a marketing system that may contain a membership buying opportunity
US20040220829A1 (en) * 1999-03-22 2004-11-04 Ofir Baharav Distributed system and method for managing communication among healthcare providers, patients and third parties
EP1163621A2 (en) * 1999-03-22 2001-12-19 Escript, Inc. Method and apparatus for medical covering group request processing, review and management
AU3917500A (en) * 1999-03-25 2000-10-09 Yusave.Com, Inc. System and method for implementing web-based direct manufacturer marketing and transactions
US7565308B1 (en) * 1999-03-25 2009-07-21 Bollay Denison W Method of executing an electronic commerce sale from an affiliate web site
WO2000062259A1 (en) 1999-04-13 2000-10-19 Orbis Patents Limited Person-to-person, person-to-business, business-to-person, and business-to-business financial transaction system
AUPQ010299A0 (en) * 1999-05-03 1999-05-27 Fast 101 Pty Ltd Improvements in or relating to trading and settlement
US6401077B1 (en) 1999-05-28 2002-06-04 Network Commerce, Inc. Method and system for providing additional behavior through a web page
AU5475500A (en) * 1999-06-09 2000-12-28 Intelishield.Com, Inc. Internet payment system
AU5729200A (en) * 1999-06-09 2000-12-28 Intelishield.Com, Inc. Internet payment system
US6460022B1 (en) * 1999-08-18 2002-10-01 Joel Fredric Plotkin Process for protecting sensitive price information from internet based data collection systems
FR2797981B1 (en) * 1999-08-27 2007-12-21 Cpio Multimedia ONLINE TRANSACTION SYSTEM
EP1437700A2 (en) * 1999-08-30 2004-07-14 CORNUEJOLS, Georges Communicationmethod and -device
FR2797973B1 (en) * 1999-08-30 2004-11-19 Georges Marc Cornuejols DATA BACKUP METHOD AND DEVICE
CA2385683A1 (en) * 1999-09-13 2001-04-05 Healinx A message and program system supporting communication
US7742967B1 (en) 1999-10-01 2010-06-22 Cardinalcommerce Corporation Secure and efficient payment processing system
US9430769B2 (en) 1999-10-01 2016-08-30 Cardinalcommerce Corporation Secure and efficient payment processing system
US6988085B2 (en) 1999-10-19 2006-01-17 Shad Hedy System and method for real-time electronic inquiry, delivery, and reporting of credit information
US7373317B1 (en) 1999-10-27 2008-05-13 Ebay, Inc. Method and apparatus for facilitating sales of goods by independent parties
US7370006B2 (en) 1999-10-27 2008-05-06 Ebay, Inc. Method and apparatus for listing goods for sale
US20090265249A1 (en) * 1999-11-05 2009-10-22 American Express Travel Related Services Company, Inc. Systems and methods for split tender transaction processing
US7962406B2 (en) * 1999-11-05 2011-06-14 American Express Travel Related Services Company, Inc. Systems and methods for facilitating transactions
US8195565B2 (en) * 1999-11-05 2012-06-05 Lead Core Fund, L.L.C. Systems and methods for point of interaction based policy routing of transactions
US8458086B2 (en) * 1999-11-05 2013-06-04 Lead Core Fund, L.L.C. Allocating partial payment of a transaction amount using an allocation rule
US7899744B2 (en) * 1999-11-05 2011-03-01 American Express Travel Related Services Company, Inc. Systems and methods for approval of an allocation
US7941367B2 (en) * 1999-11-05 2011-05-10 American Express Travel Related Services Company, Inc. Systems and methods for allocating an amount between sub-accounts
US20090265241A1 (en) * 1999-11-05 2009-10-22 American Express Travel Related Services Company, Inc. Systems and methods for determining a rewards account to fund a transaction
US8103585B2 (en) * 1999-11-05 2012-01-24 American Express Travel Related Services Company, Inc. Systems and methods for suggesting an allocation
US8851369B2 (en) * 1999-11-05 2014-10-07 Lead Core Fund, L.L.C. Systems and methods for transaction processing using a smartcard
WO2001033522A1 (en) * 1999-11-05 2001-05-10 American Express Travel Related Services Company, Inc. Systems and methods for facilitating commercial transactions between parties residing at remote locations
US8073772B2 (en) * 1999-11-05 2011-12-06 American Express Travel Related Services Company, Inc. Systems and methods for processing transactions using multiple budgets
US8596527B2 (en) * 1999-11-05 2013-12-03 Lead Core Fund, L.L.C. Methods for locating a payment system utilizing a point of sale device
US7962407B2 (en) * 1999-11-05 2011-06-14 American Express Travel Related Services Company, Inc. Systems and methods for allocating an amount between transaction accounts
US20090265250A1 (en) * 1999-11-05 2009-10-22 American Express Travel Related Services Company, Inc. Systems and methods for processing a transaction according to an allowance
US8794509B2 (en) * 1999-11-05 2014-08-05 Lead Core Fund, L.L.C. Systems and methods for processing a payment authorization request over disparate payment networks
US8190514B2 (en) * 1999-11-05 2012-05-29 Lead Core Fund, L.L.C. Systems and methods for transaction processing based upon an overdraft scenario
US7904385B2 (en) * 1999-11-05 2011-03-08 American Express Travel Related Services Company, Inc. Systems and methods for facilitating budgeting transactions
US8234212B2 (en) * 1999-11-05 2012-07-31 Lead Core Fund, L.L.C. Systems and methods for facilitating transactions with interest
US20090164328A1 (en) * 1999-11-05 2009-06-25 American Express Travel Related Services Company, Inc. Systems and Methods for Locating a Payment System and Determining a Taxing Authority Utilizing a Point of Sale Device
US20090164331A1 (en) * 1999-11-05 2009-06-25 American Express Travel Related Services Company, Inc. Systems for Locating a Payment System Utilizing a Point of Sale Device
US7996307B2 (en) * 1999-11-05 2011-08-09 American Express Travel Related Services Company, Inc. Systems and methods for facilitating transactions between different financial accounts
US8275704B2 (en) * 1999-11-05 2012-09-25 Lead Core Fund, L.L.C. Systems and methods for authorizing an allocation of an amount between transaction accounts
US7962408B2 (en) * 1999-11-05 2011-06-14 American Express Travel Related Services Company, Inc. Systems and methods for establishing an allocation of an amount between transaction accounts
US20090164329A1 (en) * 1999-11-05 2009-06-25 American Express Travel Related Services Company, Inc. Systems for Processing a Payment Authorization Request Utilizing a Network of Point of Sale Devices
US7908214B2 (en) * 1999-11-05 2011-03-15 American Express Travel Related Services Company, Inc. Systems and methods for adjusting loan amounts to facilitate transactions
US8814039B2 (en) * 1999-11-05 2014-08-26 Lead Core Fund, L.L.C. Methods for processing a payment authorization request utilizing a network of point of sale devices
US8646685B2 (en) * 1999-11-05 2014-02-11 Lead Core Fund, L.L.C. Device for allocating a payment authorization request to a payment processor
US7475808B1 (en) 1999-11-05 2009-01-13 American Express Travel Related Services Company, Inc. Systems and methods for locating a payment system utilizing a wireless point of sale device
US20090048887A1 (en) * 1999-11-05 2009-02-19 American Express Travel Related Services Company, Inc. Systems and Methods for Facilitating Transactions Involving an Intermediary
US8820633B2 (en) * 1999-11-05 2014-09-02 Lead Core Fund, L.L.C. Methods for a third party biller to receive an allocated payment authorization request
US7877325B2 (en) * 1999-11-05 2011-01-25 American Express Travel Related Services Company, Inc. Systems and methods for settling an allocation of an amount between transaction accounts
US20090271278A1 (en) * 1999-11-05 2009-10-29 American Express Travel Related Services Company, Inc. Systems and methods for routing a transaction request to a payment system via a transaction device
US7925585B2 (en) * 1999-11-05 2011-04-12 American Express Travel Related Services Company, Inc. Systems and methods for facilitating transactions with different account issuers
US7941372B2 (en) * 1999-11-05 2011-05-10 American Express Travel Related Services Company, Inc. Systems and methods for receiving an allocation of an amount between transaction accounts
US7979349B2 (en) * 1999-11-05 2011-07-12 American Express Travel Related Services Company, Inc. Systems and methods for adjusting crediting limits to facilitate transactions
US8103584B2 (en) * 1999-11-05 2012-01-24 American Express Travel Related Services Company, Inc. Systems and methods for authorizing an allocation of an amount between transaction accounts
US8180706B2 (en) * 1999-11-05 2012-05-15 Lead Core Fund, L.L.C. Systems and methods for maximizing a rewards accumulation strategy during transaction processing
US20090048886A1 (en) * 1999-11-05 2009-02-19 American Express Travel Related Services Company, Inc. Systems and Methods for Facilitating Gifting Transactions
US20090048885A1 (en) * 1999-11-05 2009-02-19 American Express Travel Related Services Company, Inc. Systems and Methods for Facilitating Cost-Splitting Transactions
US20090164325A1 (en) * 1999-11-05 2009-06-25 American Express Travel Related Services Company, Inc. Systems and Methods for Locating an Automated Clearing House Utilizing a Point of Sale Device
US8875990B2 (en) * 1999-11-05 2014-11-04 Lead Core Fund, L.L.C. Systems and methods for allocating a payment authorization request to a payment processor
WO2001037167A1 (en) 1999-11-16 2001-05-25 Regency Ventures Ltd, Charted Corporation Services A method and system for configurating products
US7127415B1 (en) 1999-11-16 2006-10-24 Regency Ventures Ltd. Method and system for acquiring branded promotional products
US7603311B1 (en) 1999-11-29 2009-10-13 Yadav-Ranjan Rani K Process and device for conducting electronic transactions
GB2357356B (en) * 1999-12-17 2003-12-03 Pri Ltd Supply system
US7343322B1 (en) * 1999-12-28 2008-03-11 Time Consumer Marketing, Inc. Method and apparatus for marketing products over the internet
US20020077954A1 (en) * 1999-12-29 2002-06-20 Slaight Thomas H. Sourcing system and method
US6477509B1 (en) 2000-01-06 2002-11-05 Efunz.Com Internet marketing method and system
US7254553B2 (en) * 2000-01-14 2007-08-07 Fogelson Bruce A Builders on-line assistant
US7076455B1 (en) * 2000-01-14 2006-07-11 Bruce A. Fogelson Builders on-line assistant
US7844503B2 (en) * 2000-01-14 2010-11-30 Fogelson Bruce A Builders on-line assistant
SG89314A1 (en) * 2000-01-18 2002-06-18 Cazh Pte Ltd Secure network electronic transactions and payments system
US8533094B1 (en) 2000-01-26 2013-09-10 Ebay Inc. On-line auction sales leads
US20030126036A1 (en) * 2000-02-29 2003-07-03 First Data Corporation Online payments
US7366695B1 (en) * 2000-02-29 2008-04-29 First Data Corporation Electronic purchase method and funds transfer system
US20030126075A1 (en) * 2001-11-15 2003-07-03 First Data Corporation Online funds transfer method
US7865414B2 (en) * 2000-03-01 2011-01-04 Passgate Corporation Method, system and computer readable medium for web site account and e-commerce management from a central location
TW550477B (en) 2000-03-01 2003-09-01 Passgate Corp Method, system and computer readable medium for Web site account and e-commerce management from a central location
AU2001250017A1 (en) 2000-03-03 2001-09-17 Dun And Bradstreet, Inc. Facilitating a transaction in electronic commerce
US7140036B2 (en) 2000-03-06 2006-11-21 Cardinalcommerce Corporation Centralized identity authentication for electronic communication networks
US8645137B2 (en) 2000-03-16 2014-02-04 Apple Inc. Fast, language-independent method for user authentication by voice
US7499875B1 (en) 2000-03-17 2009-03-03 Ebay Inc. Method and apparatus for facilitating online payment transactions in a network-based transaction facility using multiple payment instruments
DE10195918T1 (en) 2000-03-17 2003-04-03 Ebay Inc Method and device for facilitating payment transactions in a network-based transaction device using various payment instruments
US20010032123A1 (en) * 2000-03-20 2001-10-18 Megan Burns Electronic commerce utilizing a value parameter
US7376629B1 (en) * 2000-04-03 2008-05-20 Incogno Corporation Method of and system for effecting anonymous credit card purchases over the internet
US7177798B2 (en) * 2000-04-07 2007-02-13 Rensselaer Polytechnic Institute Natural language interface using constrained intermediate dictionary of results
US20020023054A1 (en) * 2000-04-13 2002-02-21 Gillespie Kenneth E. Method and system for protecting credit card transactions
US20020016726A1 (en) * 2000-05-15 2002-02-07 Ross Kenneth J. Package delivery systems and methods
WO2001097185A2 (en) * 2000-06-12 2001-12-20 Xacct Technologies Ltd System, method and computer program product for allowing a carrier to act as a credit-approval entity for e-commerce transactions
US8515860B2 (en) * 2000-06-12 2013-08-20 Amdocs (Israel) Ltd. System, method and computer program product for prepaid and wireless voice communication and IP
DE10031220C2 (en) * 2000-06-27 2002-05-29 Ulrich Michael Kipper Method and device for processing a transaction in an electronic communication network
US7359869B1 (en) 2000-07-14 2008-04-15 Stamps.Com, Inc. Method and system for facilitating secure electronic transactions with multiple merchants
KR20020010948A (en) * 2000-07-31 2002-02-07 한미숙 Open Intelligent Network Gateway System
US6691112B1 (en) * 2000-08-01 2004-02-10 Darren Michael Siegal Method for indexing and managing a searchable community of non-HTML information
WO2002017553A2 (en) * 2000-08-18 2002-02-28 United States Postal Service Apparatus and methods for the secure transfer of electronic data
US6938019B1 (en) * 2000-08-29 2005-08-30 Uzo Chijioke Chukwuemeka Method and apparatus for making secure electronic payments
US20040117315A1 (en) * 2000-08-30 2004-06-17 George Cornuejols Online transaction information backup method and device
US20020069114A1 (en) * 2000-12-01 2002-06-06 Charette Phillip Carl Method and system for placing a purchase order over a communications network
CA2327935C (en) * 2000-12-08 2013-10-22 Wmode Inc. System and method to provide real time transaction validation and billing via a communications network
US7099834B2 (en) * 2000-12-15 2006-08-29 International Business Machines Corporation Method, system, and program for transferring data between servers through a client computer over a network
US20020107756A1 (en) * 2000-12-18 2002-08-08 Hammons James P. Method for creating and operating a personalized virtual internet store including "disconnected" purchasing capability
US20020133466A1 (en) * 2001-03-13 2002-09-19 Pugh James B. Internet payment system
EP1410345A1 (en) * 2001-03-14 2004-04-21 Pri Limited Supply system
US20020169665A1 (en) * 2001-05-10 2002-11-14 The Procter & Gamble Company In-channel marketing and product testing system
US7367058B2 (en) * 2001-05-25 2008-04-29 United States Postal Service Encoding method
US10592901B2 (en) 2001-06-04 2020-03-17 Orbis Patents, Ltd. Business-to-business commerce using financial transaction numbers
US7200568B2 (en) * 2001-08-16 2007-04-03 The Procter & Gambel Company Customized customer portal
US20070078787A1 (en) * 2001-08-17 2007-04-05 Randy Mersky Method and apparatus for conducting transactions over a network
US7296003B2 (en) 2001-08-17 2007-11-13 Globex Financial Services, Inc. Method and apparatus for facilitating manual payments for transactions conducted over a network
ITFI20010199A1 (en) 2001-10-22 2003-04-22 Riccardo Vieri SYSTEM AND METHOD TO TRANSFORM TEXTUAL COMMUNICATIONS INTO VOICE AND SEND THEM WITH AN INTERNET CONNECTION TO ANY TELEPHONE SYSTEM
US7184980B2 (en) * 2001-11-15 2007-02-27 First Data Corporation Online incremental payment method
US7801813B2 (en) * 2001-12-05 2010-09-21 Davo Financial Services Llc Selective escrow using electronic funds transfer
US6901387B2 (en) * 2001-12-07 2005-05-31 General Electric Capital Financial Electronic purchasing method and apparatus for performing the same
US20090177563A1 (en) * 2001-12-07 2009-07-09 American Express Travel Related Services Company, Inc. Authorization refresh system and method
US7805376B2 (en) * 2002-06-14 2010-09-28 American Express Travel Related Services Company, Inc. Methods and apparatus for facilitating a transaction
US7577585B2 (en) * 2001-12-07 2009-08-18 American Express Travel Related Services Company, Inc. Method and system for completing transactions involving partial shipments
US7159180B2 (en) 2001-12-14 2007-01-02 America Online, Inc. Proxy platform integration system
US20040018506A1 (en) 2002-01-25 2004-01-29 Koehler Ryan T. Methods for placing, accepting, and filling orders for products and services
US7716165B2 (en) 2002-02-12 2010-05-11 Mantas, Inc. Analysis of third party networks
US7039167B2 (en) * 2002-04-04 2006-05-02 Capitol One Financial Corporation Call routing system and method
US8275673B1 (en) 2002-04-17 2012-09-25 Ebay Inc. Method and system to recommend further items to a user of a network-based transaction facility upon unsuccessful transacting with respect to an item
US20030200162A1 (en) * 2002-04-18 2003-10-23 International Business Machines Corporation Secure peer-to-peer money transfer
AU2003243523B2 (en) * 2002-06-12 2008-04-10 Cardinalcommerce Corporation Universal merchant platform for payment authentication
US8645266B2 (en) * 2002-06-12 2014-02-04 Cardinalcommerce Corporation Universal merchant platform for payment authentication
US7693783B2 (en) * 2002-06-12 2010-04-06 Cardinalcommerce Corporation Universal merchant platform for payment authentication
US20040015416A1 (en) * 2002-07-22 2004-01-22 Benjamin David Foster Seller configurable merchandising in an electronic marketplace
US7729984B1 (en) 2002-09-27 2010-06-01 Abas Enterprises Llc Effecting financial transactions
US7480935B2 (en) * 2002-10-10 2009-01-20 International Business Machines Corporation Method for protecting subscriber identification between service and content providers
AU2003279992A1 (en) 2002-10-21 2004-05-13 Ebay Inc. Listing recommendation in a network-based commerce system
US20050125240A9 (en) * 2002-10-21 2005-06-09 Speiser Leonard R. Product recommendation in a network-based commerce system
US7742401B2 (en) * 2003-08-11 2010-06-22 Netapp, Inc. Network having switchover with no data loss
US20050086103A1 (en) * 2003-10-17 2005-04-21 American Express Travel Related Services Company, Inc. Electronic shopping cart for transactions
US7413112B2 (en) 2004-03-16 2008-08-19 American Express Travel Related Services Company, Inc. Method and system for manual authorization
US8200687B2 (en) * 2005-06-20 2012-06-12 Ebay Inc. System to generate related search queries
US8677377B2 (en) 2005-09-08 2014-03-18 Apple Inc. Method and apparatus for building an intelligent automated assistant
US20070156584A1 (en) * 2005-11-22 2007-07-05 Primerevenue, Inc. Supply Chain Financing Systems and Methods
US20070282744A1 (en) * 2005-11-22 2007-12-06 Primerevenue, Inc. Supply chain financing and credit memo systems and methods
US20070125838A1 (en) * 2005-12-06 2007-06-07 Law Eric C W Electronic wallet management
US20080040275A1 (en) * 2006-04-25 2008-02-14 Uc Group Limited Systems and methods for identifying potentially fraudulent financial transactions and compulsive spending behavior
US20070250441A1 (en) * 2006-04-25 2007-10-25 Uc Group Limited Systems and methods for determining regulations governing financial transactions conducted over a network
US7814112B2 (en) 2006-06-09 2010-10-12 Ebay Inc. Determining relevancy and desirability of terms
US20070299774A1 (en) * 2006-06-22 2007-12-27 First Data Corporation System and method for card not present transactions
US9318108B2 (en) 2010-01-18 2016-04-19 Apple Inc. Intelligent automated assistant
US7606766B2 (en) * 2006-12-21 2009-10-20 American Express Travel Related Services Company, Inc. Computer system and computer-implemented method for selecting invoice settlement options
US8818904B2 (en) 2007-01-17 2014-08-26 The Western Union Company Generation systems and methods for transaction identifiers having biometric keys associated therewith
US7933835B2 (en) 2007-01-17 2011-04-26 The Western Union Company Secure money transfer systems and methods using biometric keys associated therewith
US8504473B2 (en) 2007-03-28 2013-08-06 The Western Union Company Money transfer system and messaging system
US8977255B2 (en) 2007-04-03 2015-03-10 Apple Inc. Method and system for operating a multi-function portable electronic device using voice-activation
US20100106579A1 (en) * 2007-04-17 2010-04-29 American Express Travel Related Services Company, Inc. System and method for determining consumer incentives based upon positive consumer behavior
US20100106581A1 (en) * 2007-04-17 2010-04-29 American Express Travel Related Services Company Inc. System and method for enabling registration, determination and distribution of positive behavior incentives
US20100106585A1 (en) * 2007-04-17 2010-04-29 American Express Travel Related Services Company, Inc. System and method for evaluating positive behavior and offering incentives based upon limited use identifier transactions
US8050998B2 (en) * 2007-04-26 2011-11-01 Ebay Inc. Flexible asset and search recommendation engines
US8051040B2 (en) 2007-06-08 2011-11-01 Ebay Inc. Electronic publication system
US9053089B2 (en) 2007-10-02 2015-06-09 Apple Inc. Part-of-speech tagging using latent analogy
US9330720B2 (en) 2008-01-03 2016-05-03 Apple Inc. Methods and apparatus for altering audio output signals
US8065143B2 (en) 2008-02-22 2011-11-22 Apple Inc. Providing text input using speech data and non-speech data
US8996376B2 (en) 2008-04-05 2015-03-31 Apple Inc. Intelligent text-to-speech conversion
US10496753B2 (en) 2010-01-18 2019-12-03 Apple Inc. Automatically adapting user interfaces for hands-free interaction
US8762210B2 (en) 2008-06-03 2014-06-24 Cardinalcommerce Corporation Alternative payment implementation for electronic retailers
US10157375B2 (en) * 2008-06-03 2018-12-18 Cardinalcommerce Corporation Alternative payment implementation for electronic retailers
US8464150B2 (en) 2008-06-07 2013-06-11 Apple Inc. Automatic language identification for dynamic text processing
US20100030549A1 (en) 2008-07-31 2010-02-04 Lee Michael M Mobile device having human language translation capability with positional feedback
US8768702B2 (en) 2008-09-05 2014-07-01 Apple Inc. Multi-tiered voice feedback in an electronic device
US8898568B2 (en) 2008-09-09 2014-11-25 Apple Inc. Audio user interface
US8712776B2 (en) 2008-09-29 2014-04-29 Apple Inc. Systems and methods for selective text to speech synthesis
US8676904B2 (en) 2008-10-02 2014-03-18 Apple Inc. Electronic devices with voice command and contextual data processing capabilities
WO2010067118A1 (en) 2008-12-11 2010-06-17 Novauris Technologies Limited Speech recognition involving a mobile device
US8862252B2 (en) 2009-01-30 2014-10-14 Apple Inc. Audio user interface for displayless electronic device
US8380507B2 (en) 2009-03-09 2013-02-19 Apple Inc. Systems and methods for determining the language to use for speech generated by a text to speech engine
US10540976B2 (en) 2009-06-05 2020-01-21 Apple Inc. Contextual voice commands
US20120311585A1 (en) 2011-06-03 2012-12-06 Apple Inc. Organizing task items that represent tasks to perform
US10241752B2 (en) 2011-09-30 2019-03-26 Apple Inc. Interface for a virtual digital assistant
US10241644B2 (en) 2011-06-03 2019-03-26 Apple Inc. Actionable reminder entries
US9858925B2 (en) 2009-06-05 2018-01-02 Apple Inc. Using context information to facilitate processing of commands in a virtual assistant
US9431006B2 (en) 2009-07-02 2016-08-30 Apple Inc. Methods and apparatuses for automatic speech recognition
US8682649B2 (en) 2009-11-12 2014-03-25 Apple Inc. Sentiment prediction from textual data
US8788429B2 (en) * 2009-12-30 2014-07-22 First Data Corporation Secure transaction management
US8311838B2 (en) 2010-01-13 2012-11-13 Apple Inc. Devices and methods for identifying a prompt corresponding to a voice input in a sequence of prompts
US8381107B2 (en) 2010-01-13 2013-02-19 Apple Inc. Adaptive audio feedback system and method
US10553209B2 (en) 2010-01-18 2020-02-04 Apple Inc. Systems and methods for hands-free notification summaries
US10679605B2 (en) 2010-01-18 2020-06-09 Apple Inc. Hands-free list-reading by intelligent automated assistant
US10705794B2 (en) 2010-01-18 2020-07-07 Apple Inc. Automatically adapting user interfaces for hands-free interaction
US10276170B2 (en) 2010-01-18 2019-04-30 Apple Inc. Intelligent automated assistant
WO2011089450A2 (en) 2010-01-25 2011-07-28 Andrew Peter Nelson Jerram Apparatuses, methods and systems for a digital conversation management platform
US8682667B2 (en) 2010-02-25 2014-03-25 Apple Inc. User profiling for selecting user specific voice input processing information
US8713021B2 (en) 2010-07-07 2014-04-29 Apple Inc. Unsupervised document clustering using latent semantic density analysis
US8719006B2 (en) 2010-08-27 2014-05-06 Apple Inc. Combined statistical and rule-based part-of-speech tagging for text-to-speech synthesis
US8719014B2 (en) 2010-09-27 2014-05-06 Apple Inc. Electronic device with text error correction based on voice recognition data
US8516062B2 (en) 2010-10-01 2013-08-20 @Pay Ip Holdings Llc Storage, communication, and display of task-related data
US8918467B2 (en) 2010-10-01 2014-12-23 Clover Leaf Environmental Solutions, Inc. Generation and retrieval of report information
US10762293B2 (en) 2010-12-22 2020-09-01 Apple Inc. Using parts-of-speech tagging and named entity recognition for spelling correction
US10515147B2 (en) 2010-12-22 2019-12-24 Apple Inc. Using statistical language models for contextual lookup
US8781836B2 (en) 2011-02-22 2014-07-15 Apple Inc. Hearing assistance system for providing consistent human speech
US9262612B2 (en) 2011-03-21 2016-02-16 Apple Inc. Device access using voice authentication
US9058591B2 (en) 2011-03-29 2015-06-16 @Pay Ip Holdings Llc System and method for email-based donations
US8775263B2 (en) 2011-03-29 2014-07-08 @Pay Ip Holdings Llc System and method for email-based e-commerce
WO2012161720A1 (en) 2011-05-20 2012-11-29 Primerevenue, Inc. Supply chain finance system
US20120310642A1 (en) 2011-06-03 2012-12-06 Apple Inc. Automatically creating a mapping between text data and audio data
US10057736B2 (en) 2011-06-03 2018-08-21 Apple Inc. Active transport based notifications
US20120310702A1 (en) 2011-06-03 2012-12-06 Uc Group Limited Systems and methods for monitoring compulsive behavior and for identifying early warning indicators across multiple websites
US8812294B2 (en) 2011-06-21 2014-08-19 Apple Inc. Translating phrases from one language into another using an order-based set of declarative rules
US8706472B2 (en) 2011-08-11 2014-04-22 Apple Inc. Method for disambiguating multiple readings in language conversion
US20130046652A1 (en) 2011-08-18 2013-02-21 EasyGive LLC System and method for selectively providing information to internet users
US8994660B2 (en) 2011-08-29 2015-03-31 Apple Inc. Text correction processing
US8762156B2 (en) 2011-09-28 2014-06-24 Apple Inc. Speech recognition repair using contextual information
US10026120B2 (en) 2012-01-06 2018-07-17 Primerevenue, Inc. Supply chain finance system
US10134385B2 (en) 2012-03-02 2018-11-20 Apple Inc. Systems and methods for name pronunciation
US9483461B2 (en) 2012-03-06 2016-11-01 Apple Inc. Handling speech synthesis of content for multiple languages
US20130246296A1 (en) 2012-03-19 2013-09-19 @Pay LLC Method for processing multimodal mobile donations via text message and email communication
US9280610B2 (en) 2012-05-14 2016-03-08 Apple Inc. Crowd sourcing information to fulfill user requests
US10417037B2 (en) 2012-05-15 2019-09-17 Apple Inc. Systems and methods for integrating third party services with a digital assistant
US8775442B2 (en) 2012-05-15 2014-07-08 Apple Inc. Semantic search using a single-source semantic model
WO2013185109A2 (en) 2012-06-08 2013-12-12 Apple Inc. Systems and methods for recognizing textual identifiers within a plurality of words
US9721563B2 (en) 2012-06-08 2017-08-01 Apple Inc. Name recognition system
US9495129B2 (en) 2012-06-29 2016-11-15 Apple Inc. Device, method, and user interface for voice-activated navigation and browsing of a document
US9710797B2 (en) 2012-07-18 2017-07-18 @Pay Ip Holdings Llc Email-based e-commerce
US9996862B2 (en) 2012-07-23 2018-06-12 @Pay Ip Holdings Llc Point of sale email-based e-commerce
US9704148B2 (en) 2012-07-27 2017-07-11 @Pay Ip Holdings Llc Email payment gateway for e-commerce
US9704184B2 (en) 2012-07-27 2017-07-11 @Pay Ip Holdings Llc Email payment gateway for donations
US9576574B2 (en) 2012-09-10 2017-02-21 Apple Inc. Context-sensitive handling of interruptions by intelligent digital assistant
US9547647B2 (en) 2012-09-19 2017-01-17 Apple Inc. Voice-based media searching
US8935167B2 (en) 2012-09-25 2015-01-13 Apple Inc. Exemplar-based latent perceptual modeling for automatic speech recognition
KR102516577B1 (en) 2013-02-07 2023-04-03 애플 인크. Voice trigger for a digital assistant
US10642574B2 (en) 2013-03-14 2020-05-05 Apple Inc. Device, method, and graphical user interface for outputting captions
US9733821B2 (en) 2013-03-14 2017-08-15 Apple Inc. Voice control to diagnose inadvertent activation of accessibility features
US9977779B2 (en) 2013-03-14 2018-05-22 Apple Inc. Automatic supplementation of word correction dictionaries
US10652394B2 (en) 2013-03-14 2020-05-12 Apple Inc. System and method for processing voicemail
US9368114B2 (en) 2013-03-14 2016-06-14 Apple Inc. Context-sensitive handling of interruptions
US10572476B2 (en) 2013-03-14 2020-02-25 Apple Inc. Refining a search based on schedule items
US10748529B1 (en) 2013-03-15 2020-08-18 Apple Inc. Voice activated device for use with a voice-based digital assistant
US11151899B2 (en) 2013-03-15 2021-10-19 Apple Inc. User training by intelligent digital assistant
WO2014144949A2 (en) 2013-03-15 2014-09-18 Apple Inc. Training an at least partial voice command system
CN112230878A (en) 2013-03-15 2021-01-15 苹果公司 Context-sensitive handling of interrupts
WO2014144579A1 (en) 2013-03-15 2014-09-18 Apple Inc. System and method for updating an adaptive speech recognition model
WO2014197336A1 (en) 2013-06-07 2014-12-11 Apple Inc. System and method for detecting errors in interactions with a voice-based digital assistant
US9582608B2 (en) 2013-06-07 2017-02-28 Apple Inc. Unified ranking with entropy-weighted information for phrase-based semantic auto-completion
WO2014197334A2 (en) 2013-06-07 2014-12-11 Apple Inc. System and method for user-specified pronunciation of words for speech synthesis and recognition
WO2014197335A1 (en) 2013-06-08 2014-12-11 Apple Inc. Interpreting and acting upon commands that involve sharing information with remote devices
EP3008641A1 (en) 2013-06-09 2016-04-20 Apple Inc. Device, method, and graphical user interface for enabling conversation persistence across two or more instances of a digital assistant
US10176167B2 (en) 2013-06-09 2019-01-08 Apple Inc. System and method for inferring user intent from speech inputs
CN105265005B (en) 2013-06-13 2019-09-17 苹果公司 System and method for the urgent call initiated by voice command
WO2015020942A1 (en) 2013-08-06 2015-02-12 Apple Inc. Auto-activating smart responses based on activities from remote devices
US10296160B2 (en) 2013-12-06 2019-05-21 Apple Inc. Method for extracting salient dialog usage from live data
US10346846B2 (en) 2014-04-24 2019-07-09 Swoop Ip Holdings Llc SMS and social media dual authorization, management oversight, and non-password security in email based e-commerce
US9620105B2 (en) 2014-05-15 2017-04-11 Apple Inc. Analyzing audio input for efficient speech and music recognition
US10592095B2 (en) 2014-05-23 2020-03-17 Apple Inc. Instantaneous speaking of content on touch devices
US9502031B2 (en) 2014-05-27 2016-11-22 Apple Inc. Method for supporting dynamic grammars in WFST-based ASR
US9785630B2 (en) 2014-05-30 2017-10-10 Apple Inc. Text prediction using combined word N-gram and unigram language models
US10289433B2 (en) 2014-05-30 2019-05-14 Apple Inc. Domain specific language for encoding assistant dialog
US9633004B2 (en) 2014-05-30 2017-04-25 Apple Inc. Better resolution when referencing to concepts
US9842101B2 (en) 2014-05-30 2017-12-12 Apple Inc. Predictive conversion of language input
US10170123B2 (en) 2014-05-30 2019-01-01 Apple Inc. Intelligent assistant for home automation
US9715875B2 (en) 2014-05-30 2017-07-25 Apple Inc. Reducing the need for manual start/end-pointing and trigger phrases
US10078631B2 (en) 2014-05-30 2018-09-18 Apple Inc. Entropy-guided text prediction using combined word and character n-gram language models
US9734193B2 (en) 2014-05-30 2017-08-15 Apple Inc. Determining domain salience ranking from ambiguous words in natural speech
US9430463B2 (en) 2014-05-30 2016-08-30 Apple Inc. Exemplar-based natural language processing
EP3149728B1 (en) 2014-05-30 2019-01-16 Apple Inc. Multi-command single utterance input method
US9760559B2 (en) 2014-05-30 2017-09-12 Apple Inc. Predictive text input
US10659851B2 (en) 2014-06-30 2020-05-19 Apple Inc. Real-time digital assistant knowledge updates
US9338493B2 (en) 2014-06-30 2016-05-10 Apple Inc. Intelligent automated assistant for TV user interactions
US10446141B2 (en) 2014-08-28 2019-10-15 Apple Inc. Automatic speech recognition based on user feedback
US9818400B2 (en) 2014-09-11 2017-11-14 Apple Inc. Method and apparatus for discovering trending terms in speech requests
US10789041B2 (en) 2014-09-12 2020-09-29 Apple Inc. Dynamic thresholds for always listening speech trigger
US9646609B2 (en) 2014-09-30 2017-05-09 Apple Inc. Caching apparatus for serving phonetic pronunciations
US10074360B2 (en) 2014-09-30 2018-09-11 Apple Inc. Providing an indication of the suitability of speech recognition
US9886432B2 (en) 2014-09-30 2018-02-06 Apple Inc. Parsimonious handling of word inflection via categorical stem + suffix N-gram language models
US10127911B2 (en) 2014-09-30 2018-11-13 Apple Inc. Speaker identification and unsupervised speaker adaptation techniques
US9668121B2 (en) 2014-09-30 2017-05-30 Apple Inc. Social reminders
US10552013B2 (en) 2014-12-02 2020-02-04 Apple Inc. Data detection
US9711141B2 (en) 2014-12-09 2017-07-18 Apple Inc. Disambiguating heteronyms in speech synthesis
US9865280B2 (en) 2015-03-06 2018-01-09 Apple Inc. Structured dictation using intelligent automated assistants
US9886953B2 (en) 2015-03-08 2018-02-06 Apple Inc. Virtual assistant activation
US10567477B2 (en) 2015-03-08 2020-02-18 Apple Inc. Virtual assistant continuity
US9721566B2 (en) 2015-03-08 2017-08-01 Apple Inc. Competing devices responding to voice triggers
US9899019B2 (en) 2015-03-18 2018-02-20 Apple Inc. Systems and methods for structured stem and suffix language models
US9842105B2 (en) 2015-04-16 2017-12-12 Apple Inc. Parsimonious continuous-space phrase representations for natural language processing
US10083688B2 (en) 2015-05-27 2018-09-25 Apple Inc. Device voice control for selecting a displayed affordance
US10127220B2 (en) 2015-06-04 2018-11-13 Apple Inc. Language identification from short strings
US10101822B2 (en) 2015-06-05 2018-10-16 Apple Inc. Language input correction
US10255907B2 (en) 2015-06-07 2019-04-09 Apple Inc. Automatic accent detection using acoustic models
US10186254B2 (en) 2015-06-07 2019-01-22 Apple Inc. Context-based endpoint detection
US11025565B2 (en) 2015-06-07 2021-06-01 Apple Inc. Personalized prediction of responses for instant messaging
US10747498B2 (en) 2015-09-08 2020-08-18 Apple Inc. Zero latency digital assistant
US10671428B2 (en) 2015-09-08 2020-06-02 Apple Inc. Distributed personal assistant
US9697820B2 (en) 2015-09-24 2017-07-04 Apple Inc. Unit-selection text-to-speech synthesis using concatenation-sensitive neural networks
US10366158B2 (en) 2015-09-29 2019-07-30 Apple Inc. Efficient word encoding for recurrent neural network language models
US11010550B2 (en) 2015-09-29 2021-05-18 Apple Inc. Unified language modeling framework for word prediction, auto-completion and auto-correction
US11587559B2 (en) 2015-09-30 2023-02-21 Apple Inc. Intelligent device identification
US10691473B2 (en) 2015-11-06 2020-06-23 Apple Inc. Intelligent automated assistant in a messaging environment
US10049668B2 (en) 2015-12-02 2018-08-14 Apple Inc. Applying neural network language models to weighted finite state transducers for automatic speech recognition
US10223066B2 (en) 2015-12-23 2019-03-05 Apple Inc. Proactive assistance based on dialog communication between devices
US10446143B2 (en) 2016-03-14 2019-10-15 Apple Inc. Identification of voice inputs providing credentials
US9934775B2 (en) 2016-05-26 2018-04-03 Apple Inc. Unit-selection text-to-speech synthesis based on predicted concatenation parameters
US9972304B2 (en) 2016-06-03 2018-05-15 Apple Inc. Privacy preserving distributed evaluation framework for embedded personalized systems
US10249300B2 (en) 2016-06-06 2019-04-02 Apple Inc. Intelligent list reading
US10049663B2 (en) 2016-06-08 2018-08-14 Apple, Inc. Intelligent automated assistant for media exploration
DK179309B1 (en) 2016-06-09 2018-04-23 Apple Inc Intelligent automated assistant in a home environment
US10067938B2 (en) 2016-06-10 2018-09-04 Apple Inc. Multilingual word prediction
US10509862B2 (en) 2016-06-10 2019-12-17 Apple Inc. Dynamic phrase expansion of language input
US10586535B2 (en) 2016-06-10 2020-03-10 Apple Inc. Intelligent digital assistant in a multi-tasking environment
US10490187B2 (en) 2016-06-10 2019-11-26 Apple Inc. Digital assistant providing automated status report
US10192552B2 (en) 2016-06-10 2019-01-29 Apple Inc. Digital assistant providing whispered speech
DK179343B1 (en) 2016-06-11 2018-05-14 Apple Inc Intelligent task discovery
DK179049B1 (en) 2016-06-11 2017-09-18 Apple Inc Data driven natural language event detection and classification
DK201670540A1 (en) 2016-06-11 2018-01-08 Apple Inc Application integration with a digital assistant
DK179415B1 (en) 2016-06-11 2018-06-14 Apple Inc Intelligent device arbitration and control
WO2018013961A1 (en) 2016-07-15 2018-01-18 Cardinalcommerce Corporation Authentication to authorization bridge using enriched messages
US10593346B2 (en) 2016-12-22 2020-03-17 Apple Inc. Rank-reduced token representation for automatic speech recognition
DK179745B1 (en) 2017-05-12 2019-05-01 Apple Inc. SYNCHRONIZATION AND TASK DELEGATION OF A DIGITAL ASSISTANT
DK201770431A1 (en) 2017-05-15 2018-12-20 Apple Inc. Optimizing dialogue policy decisions for digital assistants using implicit feedback

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4203166A (en) * 1977-12-05 1980-05-13 International Business Machines Corporation Cryptographic file security for multiple domain networks
DE3003998A1 (en) * 1980-02-04 1981-09-24 Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt DATA ENCRYPTION AND DECRYLING SYSTEM
US4578530A (en) * 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US5444780A (en) * 1993-07-22 1995-08-22 International Business Machines Corporation Client/server based secure timekeeping system
JP3263878B2 (en) * 1993-10-06 2002-03-11 日本電信電話株式会社 Cryptographic communication system
US5661803A (en) * 1995-03-31 1997-08-26 Pitney Bowes Inc. Method of token verification in a key management system
US5657390A (en) * 1995-08-25 1997-08-12 Netscape Communications Corporation Secure socket layer application program apparatus and method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CARNEGIE MELLON UNIVERSITY, 1995, "The NetBill Electronic Commerce Project". *
ELECTRONIC ENGINEERING TIMES, 20 March 1995, SANTO B., "Bill-Paying Put On-Line", p. 82. *
IMA INTELLECTUAL PROPERTY PROJECT PROCEEDINGS, Vol. 1, No. 1, January 1994, SIRBU M.A., "Internet Billing Service Design and Prototype Implementation", pp. 67-79. *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2339949B (en) * 1998-07-02 2002-09-25 Advent Television Ltd An apparatus for conducting a secure electronic transaction
SG65768A1 (en) * 1998-07-02 2005-10-28 Advent Television Ltd An apparatus for conducting a secure electronic transaction
WO2001054038A1 (en) * 2000-01-20 2001-07-26 David Thieme System and method for facilitating secure payment with privacy over a computer network including the internet
GB2393202A (en) * 2001-05-21 2004-03-24 Statoil Asa Methods of well treatment
GB2393202B (en) * 2001-05-21 2005-12-21 Statoil Asa Methods of well treatment
EP3895111A4 (en) * 2018-12-13 2022-09-07 Coinbase Inc. System and method for secure sensitive data storage and recovery

Also Published As

Publication number Publication date
US5825881A (en) 1998-10-20
AU3515197A (en) 1998-01-21

Similar Documents

Publication Publication Date Title
US5825881A (en) Public network merchandising system
US6041123A (en) Centralized secure communications system
US6748367B1 (en) Method and system for effecting financial transactions over a public network without submission of sensitive information
US5903652A (en) System and apparatus for monitoring secure information in a computer network
US5848161A (en) Method for providing secured commerical transactions via a networked communications system
US7264152B2 (en) Anonymous transaction authentication
US7043025B2 (en) Method and apparatus for secured electronic commerce
US7702578B2 (en) Method, system and computer readable medium for web site account and e-commerce management from a central location
US20040260653A1 (en) Anonymous transactions
US8396810B1 (en) Centralized authorization and fraud-prevention system including virtual wallet for network-based transactions
US20040107163A1 (en) Technique for securely conducting online transactions
CA2418096A1 (en) Method and system of securely collecting, storing, and transmitting information
WO2001001622A2 (en) Apparatus and method for performing secure network transactions
JPH09251494A (en) Account settlement system using virtual prepaid card
JPH10105603A (en) Method and device for information communication
US20040093277A1 (en) Method and system for secure electronic purchase transactions
Yang The security of electronic banking
US20170337604A1 (en) Method, system and computer readable medium for web site account and e-commerce management from a central location
JPH10162067A (en) Information registering method utilizing network
WO2001011515A2 (en) Method and system for making anonymous electronic payments on the world wide web
JPH11203323A (en) Method for managing electronic commercial transaction information and computer readable recording medium for recording information management client program
WO2002015077A1 (en) Apparatus and method for performing secure network transactions
Flick et al. Electronic commerce: an analysis of financial transaction methods and associated security
THATCHER Protecting E-Commerce Systems
JP2003044775A (en) Electronic commerce method and apparatus, and program

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG UZ VN YU ZW AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH KE LS MW SD SZ UG ZW AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: CA

NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 98504478

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase