WO2003023644A1 - A general packet-based payment and transaction method and system - Google Patents

A general packet-based payment and transaction method and system Download PDF

Info

Publication number
WO2003023644A1
WO2003023644A1 PCT/US2001/027586 US0127586W WO03023644A1 WO 2003023644 A1 WO2003023644 A1 WO 2003023644A1 US 0127586 W US0127586 W US 0127586W WO 03023644 A1 WO03023644 A1 WO 03023644A1
Authority
WO
WIPO (PCT)
Prior art keywords
packet
access
facility
wallet
packets
Prior art date
Application number
PCT/US2001/027586
Other languages
French (fr)
Inventor
Eli M. Noam
Original Assignee
Noam Eli M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Noam Eli M filed Critical Noam Eli M
Priority to PCT/US2001/027586 priority Critical patent/WO2003023644A1/en
Publication of WO2003023644A1 publication Critical patent/WO2003023644A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme

Definitions

  • This invention relates to the process of payments by and to streams of information for passage and transactions in computers, networks, and other electronic devices.
  • Storage networks - Unrelated users optimize storage utilization by linking hard drives and other storage devices.
  • Processing Networks - Computer users utilize the processing capacity of other unrelated computers.
  • Web Interaction - Websites are communicating and transacting with each other directly, without the human intervention of clicking etc.
  • Processor and sensor interaction - Transactions are moving from direct human control to those of delegated devices dealing with each other. For example, automobiles will be communicating directly with highways, air conditioners with utilities, etc.
  • Transmission Interaction - Information travels across transmission networks of various carriers, and various transmission media, depending on the rapidly slnfting availability of capacity and price.
  • the data packets comprising a single message could travel across different networks, and be passed on from network to network.
  • Information Trade Much economic activity is taking place in buying, selling, and accessing information. Some information is sought by the user, for business or entertainment purposes. In other cases, the information is pushed to users and requires their attention and resources.
  • each packet consists of a "payload" (the actual information to be transmitted) as well as an "overhead” that includes the address of the destination, as well as information about the source (the sender).
  • the proposed protocol for the next-generation Internet protocol IPv6 includes a field in the packet to list the priority level.
  • One recent patent could be identified for a payment mechanism for packet networks. It is for payments for transmission only, by a subtraction from a prepaid storage card. It does not provide for payments to other types of information transaction, or for payments to a packet rather than from a packet.
  • Fig 1 is a schematic diagram of a transactional data packet, illustrating the collocation , on a packet, of means of payment, transactional intelligence, and infonnation.
  • Fig 2 is a flow diagram for access tokens, illustrating a full circle of an electronic payment coin from issuance over usage to redemption. Summary
  • a decentralized system of nano-fransactions for infonnation applications and other commercial transactions including access, processing, storage, fransmission, purchases, and sales, and capable of differential treatment of packets and of two-way transactions.
  • a location is assigned and defined as the "packet wallet” (18).
  • This packet wallet contains information bits of an alphanumeric sequence which is called an "access token” (20).
  • access tokens are transferable, and permit access to a facility (such as 54, 56, and 60) that requires them for access.
  • a field might contain multiple tokens (such as 20 and 22), or tokens denominated at multiple units that can be drawn down like a debit card.
  • Access tokens (20) could include the address (32) of die issuer institution (50) that created it.
  • the packet controller (16) is a software program that can engage in decision making regarding the payments (transfer) of the tokens.
  • the packet controller (16) consists of several elements, among them a set of packet instructions (24), a packet communicator (26), and a packet authorizer (28) tiiat conducts logical operations.
  • the packet controller deteraiines whether to engage in a transaction or to take an alternative, such as a transfer to another facility, based on programmed decision rules.
  • the packet instructions and authorization would often be encrypted.
  • the "convoy field” (14) could identify a set of other packets, designated “follower packets". Such follower packets would not include the packet wallet (18) and packet controller (16). When such infonnation is provided in a fransactional packet, such packet is known as a "fransactional lead packet”.
  • a "facility access gateway” (62) is provided.
  • a gateway consists of a “facility access controller” (64), which is software that blocks and unblocks access to the facility in accordance to its decision rules. It communicates its price and availability to the packet communicator (26), which may authorize the packet wallet (18) to release access tokens (20) and to transfers them to the facility wallet (66).
  • the facility wallet (66) is a software location that is part of the facility access gateway (62), and which stores die access tokens (20) transferred to it from the packet wallet (18).
  • the facility access controller may also be able to identify other infonnation contained in the packet, such as die source address (4) of the sender and the destination address (6) of the recipient.
  • the packet instructions (24) could also contain instructions whether to return a fransactional packet (7) containing access tokens, and to what destination. For such a return to redemption, it would travel without its data payload (8).
  • Facility gateways (62) send access tokens (20) from their wallets (66) for redemption to the issuer (50) of such tokens, or to alternative redeemers (58). To do so they load tiiese access tokens on their own data packets, which make their way to the redeemers over return facilities (60) for which service they might have to transfer some of the access tokens. The redeeming institutions would issue a credit for d e returned access tokens.
  • Access tokens (20) are created by authorized issuer institutions (50) and bought by users ("source of packets" (52)) who add them, at a quantity and denomination based on their assessment of die transactions likely to be needed, to the transactional data packets which tiiey send out. These users also provide die data payload, if any, other overhead and header information such as their address (4), die destination address (6), packet and convoy identifiers (12 and 14), and die set of packet instructions (24) that enable it to engage in transactions.
  • fransactional data packets (7) In order for fransactional data packets (7) to be able to access facilities (54 and 56) operated by various other facility providers and obtain their facility operations (68), tiiey would have to pass the facility access gateways (62) of such facility providers. These gateways would require the transfer (i.e. payment) of access tokens (20) from the packet wallet (18) to the facility wallet (66). Tokens can be used for many purposes, at many facilities. For example, facilities whose services are bought by the transactional packet, such as transmission providers, storage devices, encryption and conversion service providers, or providers of databases would require the transfer of access tokens from the fransactional packet (7).
  • the tokens could be used to buy or sell a variety of other goods and services, with the fransactional packet functioning as an agent for fransactions beyond its own passage and processing, based on the set of packet instructions (24) provided by the source of such packets (52).
  • the facility access controller (64) would engage in a fransaction with the packet controller (16), which would release one or several access tokens from the packet wallet (18) and transfer them to the facility wallet (66), in order to gain access to the facility or engage in other fransactions.
  • the direction of payment is in the opposite direction, because the facility receives a service of benefit from the fransactional packet or acquires other consideration.
  • An example would be the audio recorder equipment facility of a consumer, to whom packets containing music are sent by a music distributor. In such a situation, the facility access controller (64) will transfer its own access tokens (20) to the packet wallet (18), as payment for the receipt of information of value.
  • the packets themselves are likely to be larger than they are today, to accommodate the additional fields, and in order to avoid the repetition of such overhead data as packet wallet (18) and packet controller (16). It is also possible for a fransactional packet to function as a "lead transactional packet" for other packets tiiat do not contain a packet wallet and packet controller.
  • a lead packet would conduct the fransaction, and pay for it through the transfer of access tokens, for a set of otiier "follower packets" designated by it on its "convoy field". This would enable the creation of convoys of packets moving near each otiier, similarly to virtual circuit packet networks.
  • Transactional packets could operate for many different packet protocols and be compatible with many means of communication and equipment.
  • Facility access controllers can set access token requirements at a fixed rate, or they can change the required access price dynamically, depending on the available capacity, time of day, demand, etc. They could also set different access token requirements depending on the domain name type or identity of the sender as revealed in the source address (4), or destination address (6), or of a priority classification or service category provided by the packet.
  • the access tokens can be created by a variety of ways, including banks and intermediary institutions. Parts of the tokens can be encrypted to reduce the potential for forgery, and need not be decrypted by the users.
  • Several types of access tokens are possible. They would be typically of very low denominations and sold in bulk by these institutions to facilities and users. There could be several basic denominations of tokens, just as in the case of coins, and/or tokens that could be drawn down, as in the case of pre-payment cards.
  • Packet controllers would have instructions whether to return fransactional data packets containing access tokens (and without the data payload of the packet) to the issuer of the access token (50), to the original source of the packets (52), to an alternative redeemer (58), or to remain with the facility access gateway as credit for future transactions. ( Note: not all of these alternatives are charted in Fig. 2 in order to reduce clutter.)
  • the facility gateways would periodically redeem their net balance of access tokens at the issuer of die access tokens (50) or alternative redeeming institutions (58).
  • the address identification (32) of the institution issuing the access tokens and their presentation for redemption, plus information on sender, recipients, and facilities, will assist in maintaining security against the forgery and duplication of access tokens.
  • the system and method of transactional data packets and facility access gateways enables the creation of transactions among packets and facilities. It enables prices to be set by facilities for tiieir service, simple negotiations to take place between packets and facilities, payment to be transfened from the packets to facilities (and vice versa), packets to seek the optimal facilities for the service they require relative to its cost, according to their instructions. In other cases, where facilities may desire visits by those seeking information, such as advertising, promotional or commerce sites, the visiting packets could be paid in tokens by the facility for their visit.
  • the system of fransactional data packets can be expanded into a more general system of intelligent agent programs carrying means of payment with them, and capable of collecting payments from those with which they transact.
  • a system can be employed for a wide variety of economic fransactions beyond infonnational activities. These are but a few examples for applications that could emerge based on the method and system.
  • the method enables a market system of prices, choices, and payments on the level of packets. It endows packets with greater decision autonomy and economic means to enable such autonomy. It thus creates money linked to processing intelligence, "smart money", as well as information that is linked to means of payment, "rich infonnation". It does not require advance relationships between the transacting parties such as subscriptions or contracts.
  • the system also permits, through its ability to identify packets, the differential treatment of packets of different senders, recipients, and type of content. It therefore creates a fine tool for differentiated pricing and priority, and also for differential legal and regulatory treatment of various packets.
  • the above system and method has flexibility in the type of tokens, of which there could be several, and in such added features such that of the "lead packet', and of packet identification and differentiation. Many other features are possible, such as, for example, an access token's validity expiring after a certain time, interest be added to unspent tokens, or packet controllers requiring payment for a duplication of a packet. These are merely examples of the potential features and applications that become possible once the method of integrating strings of infonnation with money and some processing intelligence is adopted.
  • the method described creates an efficient mechanism of payments and fransactions on the level of packets for services that such packets require or provide to other parties.
  • Such a system could have a major impact on all aspects of die information sector and of transactions in general.

Abstract

The invention provides a method and system to enable data packets (7) to engage in two-way transactions with various facilities, electronic equipment, and data sources (54,56), performing various services. This is accomplished by loading of data packets (7) with access tokens (20), denominated at certain values and issued by certain institutions (50). These tokens (20) are then transferred, according to the instructions of a packet controller (16) that is part of a packet, and according to the interaction of packet controller (16) and facility (54,56) gateway access controller (64), from packets (7) to facilities (54,56) or the source of the packet (52). This system enables information, communication, and general commercial activities by establishing a generalized mechanism for payment, transactions, negotiation, and differentiation on the packet level.

Description

A General Packet-Based Payment and Transaction Method and
System
Cross-Reference to Related Applications
Not applicable
Background — Field of Invention
This invention relates to the process of payments by and to streams of information for passage and transactions in computers, networks, and other electronic devices.
Background — Overview
More units of electronic information are being produced, moved, processed, stored, accessed, and sold than ever before. Information flows are being handled by numerous transmission carriers, storage providers, processors, and content vendors, most of them operated by commercial entities. The information flows reach and interact with numerous devices. It is difficult for network firms and service and information providers to charge for their services, and for users and suppliers to monitor and control the numerous transactions that are required in moving, processing, buying, and selling of information
A few examples follow for the emerging complex system for informational transactions.
Storage networks - Unrelated users optimize storage utilization by linking hard drives and other storage devices.
Processing Networks - Computer users utilize the processing capacity of other unrelated computers.
Web Interaction - Websites are communicating and transacting with each other directly, without the human intervention of clicking etc.
Processor and sensor interaction - Transactions are moving from direct human control to those of delegated devices dealing with each other. For example, automobiles will be communicating directly with highways, air conditioners with utilities, etc.
Transmission Interaction - Information travels across transmission networks of various carriers, and various transmission media, depending on the rapidly slnfting availability of capacity and price. The data packets comprising a single message could travel across different networks, and be passed on from network to network.
Information Trade - Much economic activity is taking place in buying, selling, and accessing information. Some information is sought by the user, for business or entertainment purposes. In other cases, the information is pushed to users and requires their attention and resources.
Priority Assignment. Different streams of information require different priority in transmission, processing, etc.
Intelligent Agents and Software Robots. Software programs are being sent out by users to access data bases operated by other entities, to find information, and to bring it to the user.
As these examples show, the complexity and number of transactions involving information is growing, and many of them are outside of direct control and monitoring by humans or centralized machines. Too much of attention, transmission and processing capacity would be used up by each piece of information having to be controlled from the distance, report back, receive instructions, account for itself, etc.
With the increasing complexity of the information enviromnent, it becomes necessary to create a method that would permit to conduct a numerous transactions in infoπnation and related goods and services quickly, under rapidly changing circumstances, and involving numerous parties, many of which do not know each other. Without such a transaction and payment mechanism many services would either not be provided or be inefficient in their provision. A way to engage in such transactions is to conduct them on the level of the infoπnation itself, to integrate the information with the transaction itself. And since information is increasingly moved and handled in the form of a set of binary information -"data packets" — this means that the transaction mechanism would be placed at the packet level itself.
To draw an analogy: the traditional method of informational transactions was like that for a freight train: the train moving across well-defined and pre-arranged paths, involving arrangements among a few firms, and with payments invoiced by a bulk bill. These kinds of arrangements are likely to remain for certain types of information flows, such as the distribution of live, mass audience video programming over cable television networks. In contrast, what is increasingly needed for information resembles a system of private vans, whose trained drivers pick their route with continuing reference to congestion (this is analogous to conventional packet switched communication), pay tolls and parking fees from their own wallet, find the cheapest route, buy gasoline, negotiate with the customer for payment for both delivery fees and merchandise, collect payments upon delivery, and deposit these payments at a bank.
Background — Discussion of Prior Art
There is very little direct literature or patents that could be identified, though there are several related strands of related prior art. 1. General Systems of Electronic Money and Micro-Payments. E-Money schemes create secure ways to transfer and store money electronically, and to pay electronically for transactions. To deal with smaller transactions, a variety of micro-payment schemes have been proposed and patented. Because the amounts in question can be non-trivial, the encryption used in order to assure security tends to be fairly strong, and there is usually an element of human intervention in authorizing and specifying the fransaction, or at least to control and monitor the transaction from a distance. These systems aim to create electronic money for an entire transaction, such as for accessing a song, reading an electronic magazine, or securing and relatively anonymous cash-like payment from pre-paid cards and similar devices. These schemes do not operate on the packet level, and do not assign information packets with the means and the ability to transact directly.
These patents include:
US 5930777 to Barber, 1999, Methods of charging for pay-per-access information over a network
US 5999919 to Jarcki and Odlyzko, 1999, Efficient micropayment system
US 06029150 to Kravitz, 2000, Payment and transactions in electronic commerce system
US 06072870 to Nguyen, Haller and Kramer (2000) System, method and article of manufacture for a gateway payment architecture utilizing a multichannel, extensible, flexible architecture
US 06061665 to Bahreman (2000) System, method and article of manufacture for a dynamic negotiation of a network payment framework Literature references:
Chi, Ellis. Evaluation ofMicropayment Schemes. http://www.hpl.hp.com/techreportws/97/HPL-97-14.html, fanuary 1997
Ferguson, Niels, "Single Term Off-Line Coins," Proceedings of EuroCrypt'93, ftp.cwi.nl/pub/CWIreports/AA/CS-R9318.ps.Z. 1993
Kytpoki, Jari and Kapijoki. Vesa. Micropayments - Requirements and Solutions. http://vyrww.hut.fi/~vkarpiio/netsec99/. January 2000.
Schmidt Carsten and Rudolf Mϋller, A Framework for Micropayment Evaluation, Netnomics 1 No. 2, 1999. pp.187-200
2. Allocation of Computing Capacity. A variety of proposals have been made for the allocation of scarce processing capacity, some with an economic dimension of payments or auction. Here, too, is die fransaction for the processing capacity handled separately from the information that is to be processed.
Examples for such patents are:
US4727487 2/1988 to Matsui et al, Hitachi, Resource allocation method in a computer system
US5487168 1 /1996 to Geiner et al. International Business Machines Corporation, Method and system for global optimization of device allocation
US5640569: to Miller et al, Sun Microsystems, 6/1997, Diverse goods arbitration system and method for allocating resources in a distributed computer system US 6078906, to Huberman, Xerox, June 2000, Method and system for providing a document service over a computer network using an automated brokered auction
US5450570: to Richek et al, Compaq, Sept 1995, Computer implemented method and apparatus for dynamic configuration of a computer system and circuit boards including computer resource allocation conflict resolution
3. Payment forPacket Switching.
Increasingly, digital information streams are being separated, for purposes of transmission over data networks, and for accessing computers and other devices, into a series of units known as data packets. Several protocols for packets exist. Traditionally each packet consists of a "payload" (the actual information to be transmitted) as well as an "overhead" that includes the address of the destination, as well as information about the source (the sender). More recently, the proposed protocol for the next-generation Internet protocol IPv6 includes a field in the packet to list the priority level. One recent patent could be identified for a payment mechanism for packet networks. It is for payments for transmission only, by a subtraction from a prepaid storage card. It does not provide for payments to other types of information transaction, or for payments to a packet rather than from a packet. It does not include the packet intelligence needed for engaging in transactions based on decision rules. And it has no provision for a differentiated treatment of packets. Thus, it is limited to toll payments for packet switched networks, aand does not provide a general transaction mechanism for information. US6088687to Leleu, July 2000, Billing procedure and system for data transmission networks
An earlier patent provides for a still more limited payment system, of digital postage stamps attached to entire messages such as e-mail letters. US5771289: to Kuzma, June 1998, Method and apparatus for transmitting electronic data using attached electronic credits to pay for the transmission.
One article was identified that discussed mechanisms of counting packets and settling among several partners. (Hardy and Tribble, 1995). That essay suggests, among several other issues, that any pair of adjoining carriers or other sites can transact with each other by establishing counters (accumulators) for packets traversing between their two adjoining sites, and a settlement system based on it among these neighboring sites. Somewhat contradictorily to this settlement system of sites with each other, there is also a provision for payment by a value card that is part of the infonnation that gets routed. This system requires some preexisting limited trust relationship among the parties, and hence the number of participants with which any party can deal with is limited. Furthermore, the mechanism in question is not generalized for transactions of all kinds. It is used only for payment by the infonnation, i.e., it is a one-way transfer. And it does not provide die packets with a means of intelligence to conduct fransaction according to certain decision rules.
Hardy, Norman and Tribble, Eric Dean "The Digital Silk Road. " In TuUoh, William, Mark Miller, and Don Lavoie, eds. Agoric Systems: Market Based Computation, September 1995. 4. Intelligent Agents. No patents could be identified for intelligent agent software programs that are also capable of payment for access, fransmission, processing, or which carry means of payment for transactions they engage in.
5.By the Applicant. Noam, the applicant, in related papers, (1995, 1998) dealing with governmental spectrum policy, discussed the use of token- based access to the frequency spectrum, as an alternative to licensing requirements. That proposal was limited to wireless spectrum, using tokens issued by local clearinghouses of users, and did not include transaction intelligence, a two-way capability, or a generalizable fransaction capability. Noam's papers did, however, spark his further flunking, and led to two unpublished talks about economic and policy implications of the integration of information and money, given in March and July, 2000. This then led to the development of die present invention.
Noam, Eli. "Taking the Next Step Beyond Spectrum Auctions: Open Spectrum Access." IEEE Communications Magazine, December 1995, pp. 66-73.
Noam, Eli. "Spectrum Auctions: Yesterdays Heresy, Today's Orthodoxy, Tomorrow's Anachronism." Journal of Law and Economics, December 1998. pp. 765-790.
Objects and Advantages Several objects and advantages of my invention are:
(a) to provide a system and method for the payment, wid out central control, for die transmission, processing, storage, and ofrier transactions relating to information, and of access to infonnation, and for any other transaction by electronic means.
(b) To provide a system and method by which information, intelligent agent software programs, and payment tokens are collocated, moving together across networks and devices.
(c) To provide an intelligence in the infonnation itself, thereby making it capable of transactional decisions for many purposes. To make such a system compatible witii numerous applications, transactions, and users, tiius establishing a general payment mechanism for electronic activities.
(d) Further objects and advantages of the invention will become apparent from a consideration of its description.
Description of Drawings
Fig 1 is a schematic diagram of a transactional data packet, illustrating the collocation , on a packet, of means of payment, transactional intelligence, and infonnation.
Fig 2 is a flow diagram for access tokens, illustrating a full circle of an electronic payment coin from issuance over usage to redemption. Summary
A decentralized system of nano-fransactions for infonnation applications and other commercial transactions including access, processing, storage, fransmission, purchases, and sales, and capable of differential treatment of packets and of two-way transactions.
Description of Invention
Figures 1 and 2
In a data packet known as a "transactional data packet" (7), a location (field) is assigned and defined as the "packet wallet" (18). This packet wallet contains information bits of an alphanumeric sequence which is called an "access token" (20). Such access tokens are transferable, and permit access to a facility (such as 54, 56, and 60) that requires them for access. A field might contain multiple tokens (such as 20 and 22), or tokens denominated at multiple units that can be drawn down like a debit card.
Access tokens (20) could include the address (32) of die issuer institution (50) that created it.
Another location in die transactional data packet (7) is set as the field for a "packet controller" (16), which is a software program that can engage in decision making regarding the payments (transfer) of the tokens. The packet controller (16) consists of several elements, among them a set of packet instructions (24), a packet communicator (26), and a packet authorizer (28) tiiat conducts logical operations. The packet controller deteraiines whether to engage in a transaction or to take an alternative, such as a transfer to another facility, based on programmed decision rules. The packet instructions and authorization would often be encrypted.
Anotiier field in die fransactional packets (7), the "convoy field" (14) could identify a set of other packets, designated "follower packets". Such follower packets would not include the packet wallet (18) and packet controller (16). When such infonnation is provided in a fransactional packet, such packet is known as a "fransactional lead packet".
At various facilities (such as 54 and 56)- for example transmission segments, switches, processing or storage devices, office equipment, and consumer electronic devices -- a "facility access gateway" (62) is provided. Such a gateway consists of a "facility access controller" (64), which is software that blocks and unblocks access to the facility in accordance to its decision rules. It communicates its price and availability to the packet communicator (26), which may authorize the packet wallet (18) to release access tokens (20) and to transfers them to the facility wallet (66). The facility wallet (66) is a software location that is part of the facility access gateway (62), and which stores die access tokens (20) transferred to it from the packet wallet (18).
The facility access controller may also be able to identify other infonnation contained in the packet, such as die source address (4) of the sender and the destination address (6) of the recipient. The packet instructions (24) could also contain instructions whether to return a fransactional packet (7) containing access tokens, and to what destination. For such a return to redemption, it would travel without its data payload (8).
Facility gateways (62) send access tokens (20) from their wallets (66) for redemption to the issuer (50) of such tokens, or to alternative redeemers (58). To do so they load tiiese access tokens on their own data packets, which make their way to the redeemers over return facilities (60) for which service they might have to transfer some of the access tokens. The redeeming institutions would issue a credit for d e returned access tokens.
Operation of Invention
Figures 1 and 2
Access tokens (20) are created by authorized issuer institutions (50) and bought by users ("source of packets" (52)) who add them, at a quantity and denomination based on their assessment of die transactions likely to be needed, to the transactional data packets which tiiey send out. These users also provide die data payload, if any, other overhead and header information such as their address (4), die destination address (6), packet and convoy identifiers (12 and 14), and die set of packet instructions (24) that enable it to engage in transactions.
In order for fransactional data packets (7) to be able to access facilities (54 and 56) operated by various other facility providers and obtain their facility operations (68), tiiey would have to pass the facility access gateways (62) of such facility providers. These gateways would require the transfer (i.e. payment) of access tokens (20) from the packet wallet (18) to the facility wallet (66). Tokens can be used for many purposes, at many facilities. For example, facilities whose services are bought by the transactional packet, such as transmission providers, storage devices, encryption and conversion service providers, or providers of databases would require the transfer of access tokens from the fransactional packet (7). Furthermore, the tokens could be used to buy or sell a variety of other goods and services, with the fransactional packet functioning as an agent for fransactions beyond its own passage and processing, based on the set of packet instructions (24) provided by the source of such packets (52).
The facility access controller (64) would engage in a fransaction with the packet controller (16), which would release one or several access tokens from the packet wallet (18) and transfer them to the facility wallet (66), in order to gain access to the facility or engage in other fransactions.
But it is also possible that the direction of payment is in the opposite direction, because the facility receives a service of benefit from the fransactional packet or acquires other consideration. An example would be the audio recorder equipment facility of a consumer, to whom packets containing music are sent by a music distributor. In such a situation, the facility access controller (64) will transfer its own access tokens (20) to the packet wallet (18), as payment for the receipt of information of value.
These transactions, conducted on the packet level of mformation, are termed "nano"transactions . However, the transaction amounts in question need not be small. The mechanism created - a collocation of a fransaction intelligence software, a means of payment, and a vehicle in the fonn of a transactional data packet — permit applications ti at go beyond the treatment of the packet itself. It creates an intelligent agent program which carries its own means of payment, and is hence capable of negotiation and payment for any goods and services, such as payment for an item of merchandise it identifies as a desirable buy. Similarly, it can also be empowered to conduct a sale to other parties, and to collect payment from tiiem.
The packets themselves are likely to be larger than they are today, to accommodate the additional fields, and in order to avoid the repetition of such overhead data as packet wallet (18) and packet controller (16). It is also possible for a fransactional packet to function as a "lead transactional packet" for other packets tiiat do not contain a packet wallet and packet controller. A lead packet would conduct the fransaction, and pay for it through the transfer of access tokens, for a set of otiier "follower packets" designated by it on its "convoy field". This would enable the creation of convoys of packets moving near each otiier, similarly to virtual circuit packet networks. Transactional packets could operate for many different packet protocols and be compatible with many means of communication and equipment.
Facility access controllers can set access token requirements at a fixed rate, or they can change the required access price dynamically, depending on the available capacity, time of day, demand, etc. They could also set different access token requirements depending on the domain name type or identity of the sender as revealed in the source address (4), or destination address (6), or of a priority classification or service category provided by the packet.
The access tokens can be created by a variety of ways, including banks and intermediary institutions. Parts of the tokens can be encrypted to reduce the potential for forgery, and need not be decrypted by the users. Several types of access tokens are possible. They would be typically of very low denominations and sold in bulk by these institutions to facilities and users. There could be several basic denominations of tokens, just as in the case of coins, and/or tokens that could be drawn down, as in the case of pre-payment cards.
Packet controllers would have instructions whether to return fransactional data packets containing access tokens (and without the data payload of the packet) to the issuer of the access token (50), to the original source of the packets (52), to an alternative redeemer (58), or to remain with the facility access gateway as credit for future transactions. ( Note: not all of these alternatives are charted in Fig. 2 in order to reduce clutter.)
The facility gateways would periodically redeem their net balance of access tokens at the issuer of die access tokens (50) or alternative redeeming institutions (58).
The address identification (32) of the institution issuing the access tokens and their presentation for redemption, plus information on sender, recipients, and facilities, will assist in maintaining security against the forgery and duplication of access tokens. The system and method of transactional data packets and facility access gateways enables the creation of transactions among packets and facilities. It enables prices to be set by facilities for tiieir service, simple negotiations to take place between packets and facilities, payment to be transfened from the packets to facilities (and vice versa), packets to seek the optimal facilities for the service they require relative to its cost, according to their instructions. In other cases, where facilities may desire visits by those seeking information, such as advertising, promotional or commerce sites, the visiting packets could be paid in tokens by the facility for their visit. In other cases, such as that of certain personal infonnation, the access to such infonnation would be tied to payments by tokens to an individual's electronic wallet located at a facility. In other cases, where information is "pushed" to a recipient or facility, consuming that recipient's processing, transmission, and attention, it could be required to compensate the recipient dirough the transfer of tokens.
It is likely that certain new types of facilities would emerge, for example those offering escrow services for payments, those offering markets where packets could select those facilities whose rates or performance are most favorable to them, and those engaged in international transactions involving the access packets issued by institutions in various countries.
Similarly, the system of fransactional data packets can be expanded into a more general system of intelligent agent programs carrying means of payment with them, and capable of collecting payments from those with which they transact. Such a system can be employed for a wide variety of economic fransactions beyond infonnational activities. These are but a few examples for applications that could emerge based on the method and system. The method enables a market system of prices, choices, and payments on the level of packets. It endows packets with greater decision autonomy and economic means to enable such autonomy. It thus creates money linked to processing intelligence, "smart money", as well as information that is linked to means of payment, "rich infonnation". It does not require advance relationships between the transacting parties such as subscriptions or contracts.
The system also permits, through its ability to identify packets, the differential treatment of packets of different senders, recipients, and type of content. It therefore creates a fine tool for differentiated pricing and priority, and also for differential legal and regulatory treatment of various packets.
The above system and method has flexibility in the type of tokens, of which there could be several, and in such added features such that of the "lead packet', and of packet identification and differentiation. Many other features are possible, such as, for example, an access token's validity expiring after a certain time, interest be added to unspent tokens, or packet controllers requiring payment for a duplication of a packet. These are merely examples of the potential features and applications that become possible once the method of integrating strings of infonnation with money and some processing intelligence is adopted.
Conclusion, Ramification, and Scope of Invention Accordingly, the method described creates an efficient mechanism of payments and fransactions on the level of packets for services that such packets require or provide to other parties. Such a system could have a major impact on all aspects of die information sector and of transactions in general.
Such a mechanism pennits numerous applications, in the same way that markets evolve and services emerge once economic incentives are created. The immediate benefits would be for fransactions in transmission, storage, processing, information access, and content provision, going far beyond computer communications. Numerous applications would no doubt emerge as payment for them becomes possible, and as the packets are enabled to flexibly engage in fransactions.
Thus the scope of the invention should be determined by the appended claims and their legal equivalents, rather than by the examples given. It is to be understood tiiat embodiments and variations described and provided herein are merely illusfrative of the principles of the invention and that various modifications may be implemented by those skilled in the art without departing from the scope and spirit of the invention.
Claims
What is claimed is:

Claims

1. A method and system of payment for transactions, including but not limited to those involving information, comprising:
a) an access code bit-string lαiown as an access token, denominated at a certain value, and also capable of containing the address of the issuer of said access token b) a software control program known as a packet controller c) a software program, located at the facilities and equipment of providers of various services involving information, data, and media content, as well as located at the facilities and equipment of the users of such information, and not limited to computer, data communication, or Internet equipment, known as a facility access gateway and including a facility access controller and a facility wallet, d) dedicated fields in a data packet known as a transactional data packet, to store one or several said access tokens in a field known as the packet wallet, and to store said packet controller, such that said access tokens,
1.) after being acquired from an issuer,
2.) are placed in the packet wallet by a source of said transactional data packets, 3.) and are transferred in full or part at the said facility access gate into the facility wallet in return for access to the facility and its services, or in return for other consideration, 4.) or, one or several access tokens are transferred from the facility wallet to the packet wallet in return for the service which the packet provides to the facility, or in return for other consideration 5.) with such transfers controlled by an interaction of the packet, such as through its packet controller, and the facility access controller, 6.) and the said access tokens may be redeemed by the owners of the said wallets at the issuer or others.
2. A method and system of transactions, comprising: a) a set of electronically encoded bits known as electronic money b) a software control program known as an intelligent agent, such that said intelligent agent
1.) can release, as well as receive, said electronic money from other entities
2.) can engage in transactions with such other entities.
3. A method and system of transaction, comprising: a) an access code bit-string known as an access token, denominated at a certain value b) a software program, located at the facilities and equipment of providers of various services involving information, data and media content, as well as located at the facilities of the users of such information, known as a facility access gateway, and including a facility access controller and a facility wallet, c) a dedicated filed in a data packet known as a transactional data packet to store said access token, known as the packet wallet, such that said access tokens,
1.) after being acquire from an issuer
2.) are placed in the packet wallet,
3.) and are transferred in full or in part at the said facility access gate into the facility wallet in return for access to the facility and its services, or in return for other consideration
4.) and the said access tokens may be redeemed by the owners of said wallets at the issuer of others.
4. 1 also claim a method and system as defined in Claims 1, 2, and 3, with the additional and severable features to enable additional types of performances:
a) a field on a transactional data packet, said field known as the convoy information field, identifying other packets as its follower packets, for which it conducts transactions with facilities, to reduce the number of transactions for long streams of information b) a software program as part of the facility access controller that reads the source and destination addresses and other fields of a packet, and is able to establish varied access conditions for packets based on said addresses.
5. 1 also claim a method and system as defined in Claims 1, 2, and 3, with the additional features to enable additional types of performances: a) the packet controller and/or the packet wallet including the access tokens consist of several data packets that are associated with each other through identification in the convoy information field.
6. 1 also claim a metiiod and system as defined in Claim 1 and 2, with the additional features to enable additional types of performances: a) Transactional data packets and/oreoul add additional packet f-. . controller software, as well as additional access tokens, subsequent to their being sent out initially.
7. 1 also claim a method and system as defined in Claim 1 and 2, with the additional features to enable additional types of performances: a) facility gateways could be located at a distance from the actual facility, and/or issue their own transactional data packets, thereby enabling the creation of centralized markets for certain services and goods b) transactional data packets issued by various packet sources, including those of facilities, could transact among themselves while remote from their facilities.
PCT/US2001/027586 2001-09-07 2001-09-07 A general packet-based payment and transaction method and system WO2003023644A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2001/027586 WO2003023644A1 (en) 2001-09-07 2001-09-07 A general packet-based payment and transaction method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2001/027586 WO2003023644A1 (en) 2001-09-07 2001-09-07 A general packet-based payment and transaction method and system

Publications (1)

Publication Number Publication Date
WO2003023644A1 true WO2003023644A1 (en) 2003-03-20

Family

ID=21742814

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/027586 WO2003023644A1 (en) 2001-09-07 2001-09-07 A general packet-based payment and transaction method and system

Country Status (1)

Country Link
WO (1) WO2003023644A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9602292B2 (en) 2015-07-25 2017-03-21 Confia Systems, Inc. Device-level authentication with unique device identifiers
US9603019B1 (en) 2014-03-28 2017-03-21 Confia Systems, Inc. Secure and anonymized authentication
US10484359B2 (en) 2015-07-25 2019-11-19 Confia Systems, Inc. Device-level authentication with unique device identifiers

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5903880A (en) * 1996-07-19 1999-05-11 Biffar; Peter C. Self-contained payment system with circulating digital vouchers
US5949880A (en) * 1996-01-31 1999-09-07 Dallas Semiconductor Corporation Transfer of valuable information between a secure module and another module
US5987140A (en) * 1996-04-26 1999-11-16 Verifone, Inc. System, method and article of manufacture for secure network electronic payment and credit collection
US6236091B1 (en) * 1999-09-30 2001-05-22 Advanced Micro Devices, Inc. Method of forming a local interconnect with improved etch selectivity of silicon dioxide/silicide

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5949880A (en) * 1996-01-31 1999-09-07 Dallas Semiconductor Corporation Transfer of valuable information between a secure module and another module
US5987140A (en) * 1996-04-26 1999-11-16 Verifone, Inc. System, method and article of manufacture for secure network electronic payment and credit collection
US5903880A (en) * 1996-07-19 1999-05-11 Biffar; Peter C. Self-contained payment system with circulating digital vouchers
US6236091B1 (en) * 1999-09-30 2001-05-22 Advanced Micro Devices, Inc. Method of forming a local interconnect with improved etch selectivity of silicon dioxide/silicide

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "First HOP system allows digital ticket purchases", RCR, vol. 19, no. 19, 25 September 2000 (2000-09-25), pages 101 *
BUSINESS WIRE, 12 December 1999 (1999-12-12) *
DATABASE CORPORATE RESOURCE NET ANONYMOUS: "Six Companies Announce Plans to Support Proposed Digital Payments Industry Standard", XP002905923 *
DATABASE CORPORATE RESOURCE NET SHORT, S. G.: "Beyond Digital Wallets", XP002905922 *
ECONTENT, vol. 23, no. 2, April 2000 (2000-04-01) - May 2000 (2000-05-01), pages 31 *
MOUGAYAR, WALID: "Opening Digital Markets, second edition, pages 126-128", 1998, MCGRAW-HILL, NEW YORK, XP002905925 *
THOMAS, SUSAN: "NatWest takes a gamble on payments microprocessing", BANK TECHNOLOGY NEWS, vol. 12, no. 11, November 1999 (1999-11-01), NEW YORK, pages 39 - 41, XP002905924 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9603019B1 (en) 2014-03-28 2017-03-21 Confia Systems, Inc. Secure and anonymized authentication
US9602292B2 (en) 2015-07-25 2017-03-21 Confia Systems, Inc. Device-level authentication with unique device identifiers
US10484359B2 (en) 2015-07-25 2019-11-19 Confia Systems, Inc. Device-level authentication with unique device identifiers

Similar Documents

Publication Publication Date Title
KR101570038B1 (en) Processing Transactions Of Different Payment Devices Of The Same Issuer Account and Computer Readable Medium
US6805287B2 (en) System and method for converting a stored value card to a credit card
Abrazhevich Classification and characteristics of electronic payment systems
JP3970868B2 (en) How to process gold payments on a network with multiple users
US20100161404A1 (en) Promotional item identification in processing of an acquired transaction on an issued account
Stroborn et al. Internet payments in Germany: a classificatory framework and empirical evidence
US20020156696A1 (en) System and method for micropayment in electronic commerce
US20040019552A1 (en) Limited inventory offered for sale at iteratively adjusted pricing
US7850080B2 (en) Assistance method and apparatus for online purchases of goods or services conducted with payment card systems
WO1999024891A2 (en) Distributed network based electronic wallet
CN105960654A (en) Method and apparatus for paying for web content, virtual goods and goods of small value
KR20070065192A (en) System and method for complex transaction card
US7203657B1 (en) General packet-based payment and transaction method and system
JP7448996B2 (en) Blockchain-based virtual currency intermediation and distribution system with point redemption
KR20030020189A (en) Integrated electronic money system
JP2001034695A (en) Electronic money system, cooperation center and recording medium
CN1983323A (en) Electronic transaction method and system
KR20000054780A (en) A settlement system by use of payment means having a multi-ID
WO2003023644A1 (en) A general packet-based payment and transaction method and system
Dai et al. Comparing and contrasting micro-payment models for E-commerce systems
EP1244046A1 (en) System for effecting prepayment of products or services purchased by electronic means
WO2010017244A2 (en) Online interactive issued account acquired transaction information management
JP2002083240A (en) Point exchange method and system
WO2020032314A9 (en) System for processing on/off-line multi-payment on basis of multi-wallet using blockchain
Vincent et al. Transaction flow in card payment systems using mobile agents

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): IN

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB IE IT LU MC NL PT SE TR

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP